Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
Configuration Guide
First Published: November 10, 2011
Last Modified: March 26, 2015
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
2011-2015
CONTENTS
Preface
CHAPTER 1
CHAPTER 2
Licensing 7
Finding Feature Information 7
Feature Overview 8
Licenses Supported on Cisco ASR 901 Cisco ASR 901S Router 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
iii
Contents
License Types 11
Image Level License 11
Features Supported 12
Feature Based License 12
Port Based/Mode License 13
1588BC License 14
Port or Interface Behavior 14
Port Based License 14
Example: When Port Based License is not Installed 14
Example: When Port Based License is Installed 15
10gigUpgrade License 15
Example: When 10gigUpgrade License is not Installed 15
Example: When 10gigUpgrade License is Installed 16
Flexi License 17
Example: When Flexi License is not Installed 17
Example: When Flexi License is Installed 17
1588BC License 18
Example: When 1588BC License is not Installed 18
Example: When 1588BC License is Installed 18
Removing the License 19
Generating the License 19
Installing the License 20
Changing the License 21
Verifying the License 21
Where to Go Next 21
Additional References 22
Feature Information for Licensing 23
CHAPTER 3
First-Time Configuration 25
Setup Mode 25
Before Starting Your Router 25
Using Setup Mode 25
Configuring Global Parameters 26
Completing the Configuration 29
Verifying the Cisco IOS Software Version 29
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
iv
Contents
CHAPTER 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
v
Contents
Where to Go Next 53
Additional References 53
Feature Information for Monitoring and Managing the Cisco ASR 901 Cisco ASR 901S
Router 55
CHAPTER 5
CHAPTER 6
Software Upgrade 67
Selecting a Cisco IOS Image 67
Upgrading the Cisco IOS image 67
Auto Upgrading the MCU 72
Manually Upgrading the ROMMON 72
Auto Upgrade of ROMMON 73
CHAPTER 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
vi
Contents
CHAPTER 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
vii
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
viii
Contents
CHAPTER 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
ix
Contents
CHAPTER 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
x
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xi
Contents
CHAPTER 11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xii
Contents
CHAPTER 12
CHAPTER 13
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xiii
Contents
CHAPTER 14
CHAPTER 15
CHAPTER 16
CHAPTER 17
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xiv
Contents
CHAPTER 18
CHAPTER 19
CHAPTER 20
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xv
Contents
CHAPTER 21
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xvi
Contents
CHAPTER 22
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xvii
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xviii
Contents
CHAPTER 23
CHAPTER 24
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xix
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xx
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxi
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxii
Contents
CHAPTER 25
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxiii
Contents
CHAPTER 26
CHAPTER 27
Hot Standby Router Protocol and Virtual Router Redundancy Protocol 557
Finding Feature Information 558
Information About HSRP and VRRP 558
Overview of HSRP and VRRP 558
Text Authentication 558
Preemption 558
How to Configure HSRP 559
Configuring HSRP 559
Configuration Examples for HSRP 561
Example: Configuring HSRP Active Router 561
Example: Configuring HSRP Backup Router 561
Example: HSRP Text Authentication 561
Information About HSRP Version 2 562
HSRP Version 2 Design 562
How to Configure HSRP Version 2 562
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxiv
Contents
CHAPTER 28
CHAPTER 29
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxv
Contents
CHAPTER 30
CHAPTER 31
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxvi
Contents
CHAPTER 32
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router 609
Finding Feature Information 609
Prerequisites for IPv6 Support on the Cisco ASR 901 Router 610
Restrictions for IPv6 Support on the Cisco ASR 901 Router 610
Information About IPv6 Support on the Cisco ASR 901 Router 611
Benefits 611
Overview of IPv6 611
IPv6 Address Formats 611
IPv6 Addressing and Discovery 612
Static Configuration 613
Stateless Autoconfiguration 613
ICMPv6 613
IPv6 Duplicate Address Detection 614
IPv6 Neighbor Discovery 614
IPv4 and IPv6 Dual-Stack on an Interface 614
Routing Protocols 615
IS-IS Enhancements for IPv6 615
OSPFv3 for IPv6 615
Multiprotocol BGP Extensions for IPv6 615
Bidirectional Forwarding Detection for IPv6 615
QoS for IPv6 616
How to Configure IPv6 Support on the Cisco ASR 901 Router 616
Configuring IPv6 Addressing and Enabling IPv6 Routing 616
Configuring a Static IPv6 Route 617
Enabling Stateless Auto-Configuration 619
Implementing IPv6 on VLAN Interfaces 619
Implementing IPv6 Addressing on Loopback Interfaces 620
Configuring ICMPv6 Rate Limiting 621
Configuring IPv6 Duplicate Address Detection 622
Configuring IPv6 Neighbor Discovery 623
Configuring IPv6 and IPv4 Dual-Stack on the Same VLAN 624
Configuring OSPFv3 for IPv6 625
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxvii
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxviii
Contents
CHAPTER 33
CHAPTER 34
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxix
Contents
CHAPTER 35
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxx
Contents
Feature Information for Layer 2 Control Protocol Peering, Forwarding, and Tunneling 703
CHAPTER 36
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxi
Contents
CHAPTER 37
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxii
Contents
CHAPTER 38
CHAPTER 39
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxiii
Contents
CHAPTER 40
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxiv
Contents
CHAPTER 41
CHAPTER 42
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxv
Contents
IGMPv1 820
IGMPv2 820
IGMPv3 820
IGMP Snooping 821
IGMP Snooping Support 821
PIM SSM Mapping 822
Static SSM Mapping 822
Reverse Path Forwarding 822
IP Multicast VRF Lite 823
PIM BFD 823
Configuring IPv4 Multicast 824
Enabling IPv4 Multicast Routing 824
Configuring PIM SSM 825
Configuring PIM SSM Mapping 826
Configuring Multicast Receivers in VRF Interface 827
Configuring IGMP Snooping 827
Enabling IGMP Snooping Globally 828
Enabling IGMP Snooping on a VLAN 828
Configuring an IGMP Snooping Query 829
Disabling IGMP Snooping 831
Configuring IPv4 Multicast Routing for VRF Lite 832
Enabling a VRF Under the VLAN Interface 833
Configuring PIM BFD on an IPv4 Interface 834
Verifying IPv4 Multicast Routing 835
Verifying PIM SSM 835
Verifying PIM SSM Mapping 836
Verifying Static Mroute 837
Verifying IGMP Snooping 838
Verifying IP Multicast Routing for VRF Lite 839
Verifying PIM BFD Support 842
Configuration Examples for IPv4 Multicast 843
Example: IPv4 Multicast Routing 843
Example: Configuring PIM SSM 843
Example: Configuring PIM SSM Mapping 843
Example: Configuring Rendezvous Point 844
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxvi
Contents
CHAPTER 43
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxvii
Contents
CHAPTER 44
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxviii
Contents
CHAPTER 45
IP Security 905
Finding Feature Information 905
Prerequisites for IP Security 906
Restrictions for IP Security 906
Information About IP Security 906
IKE Security Protocol 907
Advanced Encryption Standard 907
Triple DES Encryption 907
Encrypted Preshared Key 907
IKE Modes 907
Supported Components 908
Configuring IP Security 909
Creating a Preshared Key 909
Creating an ISAKMP Policy 910
Creating an ISAKMP Profile 911
Defining an IPsec Transform Set 912
Creating an IPsec Profile 913
Creating a VPN Tunnel Interface 914
Configuring Static Routing 915
Verifying Static Routing 916
Enabling Dynamic Routing 916
Verifying Dynamic Routing 917
Configuration Examples for IP Security 918
Example: Creating a Preshared Key 918
Example: Creating an ISAKMP Policy 918
Example: Creating an ISAKMP Profile 919
Example: Defining an IPsec Transform Set 919
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xxxix
Contents
CHAPTER 46
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xl
Contents
CHAPTER 47
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xli
Contents
Prerequisites for Configuring ITU-T G.8032 Ethernet Ring Protection Switching 954
Restrictions for Configuring ITU-T G.8032 Ethernet Ring Protection Switching 954
Information About Configuring ITU-T G.8032 Ethernet Ring Protection Switching 954
G.8032 Overview 954
ITU-T G.8032 Ethernet Ring Protection Switching Functionality 955
Single-Ring Topology 957
Multiple-Rings Topology 957
R-APS Control Messages 958
CFM Protocols and Link Failures 959
G.8032 Ring-Supported Commands and Functionality 959
G.8032 ERP Timers 960
Protection Switching Functionality in a Single Link Failure and Recovery 960
How to Configure ITU-T G.8032 Ethernet Ring Protection Switching 963
Configuring the Ethernet Ring Profile 963
Configuring an Ethernet Protection Ring 964
Configuring Topology Change Notification Propagation 967
Verifying Ethernet Ring Protection Configuration 967
Troubleshooting Tips 970
Configuration Examples for ITU-T G.8032 Ethernet Ring Protection Switching 972
Example: Configuration for Ethernet Ring Protection 972
Additional References 973
Related Documents 973
Standards 973
RFCs 973
Technical Assistance 974
Feature Information for Configuring ITU-T G.8032 Ethernet Ring Protection Switching 974
CHAPTER 48
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlii
Contents
CHAPTER 49
Auto-IP 991
Auto-IP 991
CHAPTER 50
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xliii
Contents
CHAPTER 51
CHAPTER 52
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xliv
Contents
CHAPTER 53
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlv
Contents
CHAPTER 54
CHAPTER 55
Overview 1077
Information About Smart Licensing 1077
Benefits 1078
Supported Software Models and PIDs 1078
How to Configure Cisco Smart Licensing 1079
Enabling Smart Licensing 1079
Registering the Device 1080
Authorizing the Device 1081
Verifying Smart Licensing Configuration 1081
Configuration Examples for Smart Licensing 1085
Example: Smart Call Home 1087
Additional References 1088
Feature Information for Cisco Smart Licensing 1089
CHAPTER 56
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlvi
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlvii
Contents
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlviii
Date
Change Summary
OL-23826-01
November
2011
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
xlix
Document
Number/Release
Date
OL-23826-02
January 2012
Change Summary
OL-23826-03
May 2012
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
l
Document
Number/Release
Date
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
li
Document
Number/Release
Date
OL-23826-04
August 2012
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lii
Document
Number/Release
Date
Change Summary
OL-23826-05
October 2012
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
liii
Document
Number/Release
Date
OL-23826-06
February 2013
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
liv
Document
Number/Release
Date
Change Summary
OL-23826-07
March 2013
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lv
Document
Number/Release
Date
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lvi
Document
Number/Release
Date
Change Summary
OL-23826-08
July 2013
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lvii
Document
Number/Release
Date
OL-23826-09
November
2013
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lviii
Document
Number/Release
Date
Change Summary
OL-23826-10
March 2014
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lix
Document
Number/Release
Date
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lx
Document
Number/Release
Date
Change Summary
LicensingLicensing information about the new variants of
the Cisco ASR 901 10G Router (A901-6CZ-FS-A and
A901-6CZ-FS-D) is added to the licensing document.
MLD SnoopingMLD is a protocol used by IPv6 multicast
routers to discover the presence of multicast listeners (nodes
looking to receive IPv6 multicast packets) on its directly
attached links, and to discover which multicast packets are of
interest to neighboring nodes.
Network Address TranslationConfigures Network Address
Translation (NAT) for IP address conservation. This module
also provides information about the benefits of configuring
NAT for IP address conservation.
TWAMP RFC ComplianceThe TWAMP RFC compliance
feature supports RFC 5357 which specifies a Two-Way Active
Measurement Protocol (TWAMP), based on the One-way
Active Measurement Protocol (OWAMP), that adds two-way
or round-trip measurement capabilities.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxi
Document
Number/Release
Date
OL-23826-11
July 2014
Change Summary
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxii
Document
Number/Release
Date
Change Summary
November
2014
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxiii
Document
Number/Release
Date
March 2015
Change Summary
Document Number
Date
Change Summary
OL-30498-01
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxiv
Document Number
Date
Change Summary
OL-30498-02
March 2014
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxv
Document Number
Date
Change Summary
G.8032 at Interface LevelThe ITU-T G.8032 Ethernet Ring
Protection Switching feature implements protection switching
mechanisms for Ethernet layer ring topologies. This feature
uses the G.8032 Ethernet Ring Protection (ERP) protocol,
defined in ITU-T G.8032, to provide protection for Ethernet
traffic in a ring topology, while ensuring that no loops are
within the ring at the Ethernet layer. The loops are prevented
by blocking traffic on either a predetermined link or a failed
link.
IGMP SnoopingIGMP snooping allows a router to examine
IGMP packets and make forwarding decisions based on their
content. Using IGMP snooping, the router intercepts IGMP
messages from the host and updates its multicast table
accordingly.
IPv6 Services: Extended Access Control ListsThe standard
ACL functionality in IPv6 is similar to standard ACLs in IPv4.
Access lists determine what traffic is blocked and what traffic
is forwarded at router interfaces and allow filtering based on
source and destination addresses and inbound interface. Each
access list has an implicit deny statement at the end. IPv6 ACLs
are defined and their deny and permit conditions are set using
the ipv6 access-list command with the deny and permit
keywords in global configuration mode.
MLD SnoopingMLD is a protocol used by IPv6 multicast
routers to discover the presence of multicast listeners (nodes
looking to receive IPv6 multicast packets) on its directly
attached links, and to discover which multicast packets are of
interest to neighboring nodes.
Network Address TranslationEffective with Cisco IOS
Release 15.4(2)S, you can configure Network Address
Translation (NAT) for IP address conservation. This module
also provides information about the benefits of configuring
NAT for IP address conservation.
TWAMP RFC ComplianceThe TWAMP RFC compliance
feature supports RFC 5357 which specifies a Two-Way Active
Measurement Protocol (TWAMP), based on the One-way
Active Measurement Protocol (OWAMP), that adds two-way
or round-trip measurement capabilities.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxvi
Document Number
Date
Change Summary
OL-30498-03
July 2014
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxvii
Document Number
Date
Change Summary
IP SecurityThe IP Security feature enables you to configure
the Internet Key Exchange (IKE) protocol for basic IP Security
(IPsec) Virtual Private Networks (VPNs). IKE is a key
management protocol standard that is used in conjunction with
the IPsec standard. IPsec is an IP security feature that provides
robust authentication and encryption of IP packets.
1588 PTP Best Master Clock Algorithm1588 PTP Best
Master Clock Algorithm (BMCA) is used to select the master
clock on each link, and ultimately, select the grandmaster clock
for the entire PTP domain. BCMA runs locally on each port
of the ordinary and boundary clocks, and selects the best clock
on the link by comparing the local data sets with the received
data from the announce messages.
BFD Support for Multicast (PIM)The Bidirectional
Forwarding Detection (BFD) Support for Multicast (PIM)
feature, also known as PIM BFD, registers PIM as a client of
BFD. PIM can then utilize BFD to initiate a session with an
adjacent PIM node to support BFD's fast adjacency failure
detection in the protocol layer.
CFM CCM Hardware OffloadEffective from Cisco IOS
Release 15.4(3)S, the Cisco ASR 901S router supports CFM
hardware offloading. Configuring Ethernet CFM for offload
CFM session requires configuring the CFM domain with the
supported offload CCM intervals 3.3 ms,10 ms, and 100 ms.
You can optionally configure the sampling rate for the offload
cfm sessions and the default sampling rate is 20000.
DHCP Snooping with Option-82 on EVCDHCP Snooping
is one of the switch features on the Cisco ASR 901S series
routers that will be supported while functioning as a Layer 2
switch.
G.8032 and Psuedo Preemption SupportEffective from Cisco
IOS Release 15.4(3)S, the Cisco ASR 901S router supports
G.8032 on port-channel interface.
IP Multicast VRF LiteThe IP Multicast VRF Lite feature
provides IPv4 multicast support for multiple virtual
routing/forwarding contexts (VRFs). The IPv4 Multicast VRF
Lite feature simplifies the management and troubleshooting
of traffic belonging to a specific VRF.
IPv6 Multicast VRF LiteThe IPv6 Multicast VRF Lite
feature provides IPv6 multicast support for multiple virtual
routing/forwarding contexts (VRFs). The IPv6 Multicast VRF
Lite feature simplifies the management and troubleshooting
of traffic belonging to a specific VRF.
PTP Loopback Interface VRF AwarenessPTP support over
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxviii
Document Number
Date
Change Summary
virtual routing and forwarding (VRF) instance-enabled
interfaces allows the PTP loopback interface to be part of VRF
rather than maintaining the loopback addresses in the global
routing table. This enables the service providers to reuse the
same IP address for multiple loopback interfaces by
configuring PTP loopback under VRF.
PTP over EthernetEffective from Cisco IOS Release
15.4(3)S, the Cisco ASR 901S router supports PTP over
Ethernet.
Configuring Wi-Fi Management InterfaceEffective with
Cisco IOS Release 15.4(3)S, support is provided for the Wi-Fi
management interface on the FA chassis models of the Cisco
ASR 901S router. The Wi-Fi management interface can be
enabled or disabled using the Cisco IOS CLIs.
Objectives
This guide explains how to configure software features on the Cisco ASR 901-TDM version and Cisco ASR
901-Ethernet version routers. Cisco ASR 901S Series Aggregation Services Routers. Unless otherwise stated,
the features described in this guide apply to both the routers.
Audience
This guide is for the person responsible for configuring the router. This guide is intended for the following
audiences:
Customers with technical networking background and experience.
System administrators who are familiar with the fundamentals of router-based internetworking, but who
may not be familiar with Cisco IOS software.
System administrators who are responsible for installing and configuring internetworking equipment,
and who are familiar with Cisco IOS software.
Organization
The major sections of this software configuration guide are listed in the following table:
Chapter
Description
Chapter 2, Licensing
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxix
Chapter
Description
First-Time Configuration
Software Upgrade
Configuring EtherChannels
Configuring EoMPLS
Configuring Pseudowire
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxx
Chapter
Description
Configuring Clocking
Configuring QoS
Configuring MLPPP
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Describes how to support Long Term Evolution (LTE)
Router
rollouts that provides high-bandwidth data connection
for mobile wireless devices.
Labeled BGP Support
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxi
Chapter
Description
Storm Control
Describes the Remote Loop-free Alternate (LFA) Fast Reroute (FRR) feature that uses a backup route,
computed using dynamic routing protocol during a
node failure, to avoid traffic loss.
IPv4 Multicast
IPv6 Multicast
IP Security
Chapter 47, ITU-T G.8032 Ethernet Ring Protection Describes how to implement protection switching
Switching
mechanisms for Ethernet layer ring topologies.
Chapter 48, Configuring NAT for IP Address
Conservation
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxii
Chapter
Description
Organization
The major sections of this software configuration guide are listed in the following table:
Chapter
Description
Licensing
First-Time Configuration
Software Upgrade
Configuring EtherChannels
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxiii
Configuring EoMPLS
Configuring Pseudowire
Configuring Clocking
Configuring QoS
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxiv
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Describes how to support Long Term Evolution (LTE)
Router
rollouts that provides high-bandwidth data connection
for mobile wireless devices.
Labeled BGP Support
Storm Control
Describes the Remote Loop-free Alternate (LFA) Fast Reroute (FRR) feature that uses a backup route,
computed using dynamic routing protocol during a
node failure, to avoid traffic loss.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxv
IPv4 Multicast
IPv6 Multicast
IP Security
G.8032 Overview
Overview
Auto-IP
Conventions
This publication uses the following conventions to convey instructions and information.
Convention
Description
boldface font
italic font
[]
{x | y | z}
screen font
<>
[]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxvi
Note
Timesaver
Tip
Caution
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Related Documentation
The following list includes documentation related to your product by implementation.
Cisco ASR 901 Cisco ASR 901S Series Aggregation Services Router Documents
Cisco ASR 901 Cisco ASR 901S Series Aggregation Services Router Command Reference
Cisco ASR 901 Cisco ASR 901S Series Aggregation Services Router Hardware Installation Guide
Cisco Regulatory Compliance and Safety Information for Cisco ASR 901 Cisco ASR 901S Series
Aggregation Services Router
Release Notes
Release Notes for Cisco ASR 901 Cisco ASR 901S Series Aggregation Services Router
To access the related documentation on Cisco.com, go to:
http://www.cisco.com/en/US/partner/products/ps12077/tsd_products_support_series_home.html
http://www.cisco.com/c/en/us/support/routers/asr-901s-series-aggregation-services-routers/
tsd-products-support-series-home.html
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxvii
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
lxxviii
CHAPTER
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1
The Cisco ASR 901 Cisco ASR 901S router supports Ethernet Virtual Circuits (EVC) only. Metro-Ethernet
Forum (MEF) defines an Ethernet Virtual Connection as an association between two or more user network
interfaces identifying a point-to-point or multipoint-to-multipoint path within the service provider network.
An EVC is a conceptual service pipe within the service provider network.
For more information on EVCs, see Configuring Ethernet Virtual Connections, on page 85.
Introduction, page 2
Features, page 3
Introduction
A RAN is typically composed of thousands of BTSs or Node Bs, hundreds of base station controllers or radio
network controllers (BSCs or RNCs), and several mobile switching centers (MSCs). The BTS or Node Bs
and BSC or RNC are often separated by large geographic distances, with the BTSs or Node Bs located in cell
sites uniformly distributed throughout a region, and the BSCs, RNCs, and MSCs located at suitably chosen
Central Offices (CO) or mobile telephone switching offices (MTSO).
The traffic generated by a BTS or Node B is transported to the corresponding BSC or RNC across a network,
referred to as the backhaul network, which is often a hub-and-spoke topology with hundreds of BTS or Node
Bs connected to a BSC or RNC by point-to-point time division multiplexing (TDM) trunks. These TDM
trunks may be leased-line T1/E1s or their logical equivalents, such as microwave links or satellite channels.
The Cisco ASR 901 has two different types of interfaces by default: network node interfaces (NNIs) to connect
to the service provider network and user network interfaces (UNIs) to connect to customer networks. Some
features are supported only on one of these port types. You can also configure enhanced network interfaces
(ENIs). An ENI is typically a user-network facing interface and has the same default configuration and
functionality as UNIs, but can be configured to support protocol control packets for Cisco Discovery Protocol
(CDP), Spanning-Tree Protocol (STP), EtherChannel Link Aggregation Control Protocol (LACP).
The Cisco ASR 901S router is a small cell site gateway designed to transport small cell BTS traffic and send
it to the base station controller.
Small cells (for example, Long Term Evolution [LTE] femtocells) are low-power cellular base stations that
use licensed spectrum and are typically deployed in residential, enterprise, metropolitan hotspot or rural
settings. They provide an excellent user experience through enhanced coverage, performance, throughput and
services based on location.
A typical RAN backhaul network connects cell-site nodes with central-site node. In the case of LTE based
pico cell the eNode is connected to the core network (Mobility Management Entity [MME]) via the backhaul
whereby the need of small cell router comes in.
Traffic emanating from larger cells is routed over the RAN to the core network through the Radio Network
Controller (RNC) via the lub interface. Traffic from smaller cells, specifically femtocells, may be more
efficiently routed over a separate gateway (via the luh interface) using an additional device, such as a Home
NodeB gateway.
The Cisco ASR 901S router provides fixed four GE optical ports for back haul and two GE copper for
downstream connectivity. This router provides teh following chassis models and interfaces:
Product Identifier of Chassis Model Description
A901S-4SG-F-D
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
2
A901S-2SG-F-D
A901S-3SG-F-AH
A901S-2SG-F-AH
Features
This section contains the following topics:
Performance Features
Autosensing of port speed and autonegotiation of duplex mode on all ports for optimizing bandwidth.
Automatic-medium-dependent interface crossover (auto-MDIX) capability on 100 and 100/1000 Mbps
interfaces and on 100/1000 BASE-T/TX small form-factor pluggable (SFP) module interfaces that
enables the interface to automatically detect the required cable connection type (straight-through or
crossover) and to configure the connection appropriately.
EtherChannel for enhanced fault tolerance and for providing up to 8 Gbps (Gigabit EtherChannel) or
800 Mbps (Fast EtherChannel) full duplex of bandwidth between switches, routers, and servers.
Link Aggregation Control Protocol (LACP) for automatic creation of EtherChannel links (supported
only on NNIs or ENIs).
Forwarding of Layer 2 and Layer 3 packets at Gigabit line rate.
Management Options
CLIYou can access the CLI either by connecting your management station directly to the router
console port or by using Telnet from a remote management station. For more information about the CLI,
see Using the Command-Line Interface, on page 57
Cisco Configuration EngineThe Cisco Configuration Engine is a network management device that
works with embedded Cisco IOS CNS Agents in the Cisco ASR 901 Cisco ASR 901S Series Aggregation
Services Router software. You can automate initial configurations and configuration updates by generating
router-specific configuration changes, sending them to the router, executing the configuration change,
and logging the results.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
3
Manageability Features
Address Resolution Protocol (ARP) for identifying a router through its IP address and its corresponding
MAC address
Cisco Discovery Protocol (CDP) Versions 1 and 2 for network topology discovery and mapping between
the router and other Cisco devices on the network (supported on NNIs by default, can be enabled on
ENIs, not supported on UNIs)
Network Time Protocol (NTP) for providing a consistent time stamp to all routers from an external
source
Cisco IOS File System (IFS) for providing a single interface to all file systems that the router uses.
In-band management access for up to five simultaneous Telnet connections for multiple CLI-based
sessions over the network. Effective with Cisco IOS Release 15.3(2)S1, in-band management access
for up to 98 simultaneous Telnet connections for multiple CLI-based sessions over the network.
In-band management access for up to five simultaneous, encrypted Secure Shell (SSH) connections for
multiple CLI-based sessions over the network.
In-band management access through SNMP Versions 1 and 2c get and set requests.
Out-of-band management access through the router console port to a directly attached terminal or to a
remote terminal through a serial connection or a modem
User-defined command macros for creating custom router configurations for simplified deployment
across multiple routers
Support for metro Ethernet operation, administration, and maintenance (OAM) IEEE 802.1ag Connectivity
Fault Management (CFM), Ethernet Line Management Interface (E-LMI) on customer-edge and
provider-edge devices, and IEEE 802.3ah Ethernet OAM discovery, link monitoring, remote fault
detection, and remote loopback, and IEEE 802.3ah Ethernet OAM discovery, link monitoring, remote
fault detection, and remote loopback (requires the metro IP access or metro access image)
Configuration replacement and rollback to replace the running configuration on a router with any saved
Cisco IOS configuration file
CPU utilization threshold logs.
Security Features
Password-protected access (read-only and read-write access) to management interfaces for protection
against unauthorized configuration changes
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
4
Configuration file security so that only authenticated and authorized users have access to the configuration
file, preventing users from accessing the configuration file by using the password recovery process
Multilevel security for a choice of security level, notification, and resulting actions
Automatic control-plane protection to protect the CPU from accidental or malicious overload due to
Layer 2 control traffic on UNIs or ENIs
TACACS+, a proprietary feature for managing network security through a TACACS server
RADIUS for verifying the identity of, granting access to, and tracking the actions of remote users through
authentication, authorization, and accounting (AAA) services
Extended IP access control lists for defining security policies in the inbound direction on physical ports.
Extended IP access control lists for defining security policies in the inbound and outbound direction on
SVIs.
Layer 3 Features
IP routing protocols for load balancing and for constructing scalable, routed backbones:
OSPF
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
5
BGP Version 4
IS-IS dynamic routing
BFD protocol Bidirectional Forwarding Detection (BFD) Protocol to detect forwarding-path failures
for OSPF, IS-IS, and BGP routing protocols
IP routing between VLANs (inter-VLAN routing) for full Layer 3 routing between two or more VLANs,
allowing each VLAN to maintain its own autonomous data-link domain
Static IP routing for manually building a routing table of network path information
Equal-cost routing for load balancing and redundancy
Internet Control Message Protocol (ICMP) and ICMP Router Discovery Protocol (IRDP) for using router
advertisement and router solicitation messages to discover the addresses of routers on directly attached
subnets
Monitoring Features
Router LEDs that provide port- and router-level status
Router LEDs that provide System, Management, and Network level status.
Note
The LEDs may be turned off using the Cisco IOS CLI.
Syslog facility for logging system messages about authentication or authorization errors, resource issues,
and time-out events
Enhanced object tracking for HSRP clients (requires metro IP access image)
IP Service Level Agreements (IP SLAs) support to measure network performance by using active traffic
monitoring (requires metro IP access or metro access image)
IP SLAs EOT to use the output from IP SLAs tracking operations triggered by an action such as latency,
jitter, or packet loss for a standby router failover takeover (requires metro IP access or metro access
image)
EOT and IP SLAs EOT static route support to identify when a preconfigured static route or a DHCP
route goes down (requires metro IP access or metro access image)
Embedded event manager (EEM) for device and system management to monitor key system events and
then act on them though a policy (requires metro IP access or metro access image)
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
6
CHAPTER
Licensing
This feature module describes the licensing aspects of the Cisco ASR 901 Cisco ASR 901S Series
Aggregation Services Router.
Finding Feature Information, page 7
Feature Overview, page 8
Licenses Supported on Cisco ASR 901 Cisco ASR 901S Router, page 8
License Types, page 11
Port or Interface Behavior, page 14
Generating the License, page 19
Installing the License , page 20
Changing the License, page 21
Verifying the License, page 21
Where to Go Next, page 21
Additional References, page 22
Feature Information for Licensing, page 23
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
7
Licensing
Feature Overview
Feature Overview
The Cisco ASR 901 Cisco ASR 901S router license is similar to any other software license in Cisco. It is tied
to the Unique Device Identifier (UDI) where the license is integrated to the PID (Product Identifier) and
SN (Serial Number). A license generated for one router cannot be shared or installed in any other router.
Complete these steps to obtain the license file:
1 Purchase the required Product Authorization Key (PAK).
2 Get the UDI from the device.
3 Enter the UDI and PAK in the Ciscos licensing portal.
You will receive a license file through email.
1 Install the licenses on the device. For more information on how to install the license, see Installing the
License , on page 20.
In addition to using the router CLI, you can install the license using the Cisco License Manager (CLM) or the
Callhome interface.
Chassis PID
License PID
License Description
A901-12C-FT-D
SL-A901-A
AdvancedMetroIPAccess
Image
A901-12C-F-D
A901-4C-FT-D
A901-4C-F-D
A901-6CZ-FT-A
A901-6CZ-FT-D
A901-6CZ-F-A
A901-6CZ-F-D
A901-6CZ-FS-A
A901-6CZ-FS-D
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
8
Licensing
Licenses Supported on Cisco ASR 901 Cisco ASR 901S Router
Sl.No.
Chassis PID
License PID
License Description
A901-12C-F-D
SL-A901-B
IPBase
A901-4C-FT-D
FLS-A901-4S
Gige4SfpUpgrade
Feature
A901-4C-F-D
FLS-A901-4S= 1
Gige4CuUpgrade
Feature
10gigUpgrade
Feature
Gige4portflexi
Feature
A901-12C-FT-D
A901-4C-FT-D
A901-4C-F-D
A901-6CZ-FT-A
A901-6CZ-FT-D
A901-6CZ-F-A
A901-6CZ-F-D
A901-6CZ-FS-A
A901-6CZ-FS-D
3
L-FLS-A901-4S= 1
4
A901-4C-FT-D
FLS-A901-4T
A901-4C-F-D
FLS-A901-4T= 1
L-FLS-A901-4T= 1
A901-6CZ-FT-A
FLS-A901-2Z
A901-6CZ-FT-D
FLS-A901-2Z= 1
A901-6CZ-F-A
L-FLS-A901-2Z= 1
A901-6CZ-F-D
A901-6CZ-FS-A
A901-6CZ-FS-D
6
A901-6CZ-FT-A
FLS-A901-4
A901-6CZ-FT-D
FLS-A901-4= 1
A901-6CZ-F-A
L-FLS-A901-4= 1
A901-6CZ-F-D
A901-6CZ-FS-A
A901-6CZ-FS-D
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
9
Licensing
Licenses Supported on Cisco ASR 901 Cisco ASR 901S Router
Sl.No.
Chassis PID
License PID
License Description
A901-12C-FT-D
SL-A901-T
1588BC
Feature
A901-6CZ-FS-A
SL-A901-I
IPsec
Feature
A901-6CZ-FS-D
SL-A901-I=
NAT
A901-12C-F-D
A901-4C-FT-D
A901-4C-F-D
A901-6CZ-FT-A
A901-6CZ-FT-D
A901-6CZ-F-A
A901-6CZ-F-D
A901-6CZ-FS-A
A901-6CZ-FS-D
8
L-SL-A901-I=
Chassis PID
License PID
License Description
A901S-4SG-F-D
SL-A901-B
Base license
SL-A901-A=
SL-A901-T=
A901S-3SG-F-D
A901S-2SG-F-D
A901S-3SG-F-AH
A901S-2SG-F-AH
2
A901S-4SG-F-D
A901S-3SG-F-D
A901S-2SG-F-D
A901S-3SG-F-AH
A901S-2SG-F-AH
A901S-4SG-F-D
A901S-3SG-F-D
A901S-2SG-F-D
A901S-3SG-F-AH
A901S-2SG-F-AH
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
10
Feature
Licensing
License Types
The Cisco ASR 901S software uses the license description to resolve errors related to license availability.
You need to map the proper license PID as per the table above and purchase the licenses.
The Cisco ASR 901S router supports only permanent licenses.
The Cisco ASR 901 software uses the license description to resolve errors related to license availability. You
need to map the proper license PID as per the table above and purchase the licenses. The Cisco ASR 901
router supports permanent licenses only.
Note
You can configure NAT and IPsec features on the router (A901-6CZ-FS-A and A901-6CZ-FS-D) without
a valid license. The router issues a warning message and allows you to configure the feature. A warning
message regarding the unlicensed feature is flashed every hour. However, this will not have any impact
on the functionality.
You should install only a supported license for the proper chassis PID. You will get a Not Supported message
while trying to install a wrong license. However, license installation process will go through and a confirmation
message is displayed. When you run the show license command to display the details of this license, the
output shows license state as NOT IN USE, and you cannot make it IN USE.
The following is a sample confirmation message that is displayed on the router when you try to install a wrong
license.
Install FLS-A901-4S license on A901-6CZ-F-A (10g) boards,
Router# license install flash:CAT1625U0EP_201307231358341640.lic
Installing licenses from "flash:CAT1625U0EP_201307231358341640.lic"
Installing...Feature:Gige4SfpUpgrade...Successful:Not Supported
1/1 licenses were successfully installed
0/1 licenses were existing licenses
0/1 licenses were failed to install
Router#lic instal flash:CAT1618U02C_201311132320280160.lic
Installing licenses from "flash:CAT1618U02C_201311132320280160.lic"
% Error: The device with UDI A901-4C-FT-D:CAT1618U02C not found
0/3 licenses were successfully installed
0/3 licenses were existing licenses
3/3 licenses were failed to install
Router# 12:36 PM
Router#sh lic udi
SlotID PID SN UDI
-------------------------------------------------------------------------------*0 A901S-4SG-F-D FOC1738N74L A901S-4SG-F-D:FOC1738N74L
License Types
Cisco ASR 901 Cisco ASR 901S router supports the following types of licenses:
Image Level License
Feature Based License
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
11
Licensing
Feature Based License
corresponding to the license that you purchased. Image based licenses (SL-A901-A and SL-A901-B)
(SL-A901-B and SL-A901-A=) need rebooting of the router.
Features Supported
In Cisco ASR 901 Cisco ASR 901S , IPBase (SL-A901-B) Base license (SL-A901-B) and
AdvancedMetroIPAccess (SL-A901-A) are permanent; once installed they do not expire. Trial or temporary
licenses are not supported on the Cisco ASR 901 Cisco ASR 901S router.
License
Features
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
12
Licensing
Feature Based License
Flexi license
10G license
1588BC license
IPsec/NAT-PAT license
Note
Copper (FLS-A901-4T), SFP (SL-A901-B), and 1588BC (SL-A901-T) licenses are feature-based licenses.
Once they are installed, the licenses become active and there is no need to reboot the router.
The feature based license is used to activate individual features when the image level licenses are used.
After the image level license is used and the appropriate subsystems are activated, individual feature license
is used to activate individual features, which includes the ASR901 timing feature license (1588BC).
Note
When installed, the ASR 901S timing feature license (1588 boundary clock) becomes active and there is
no need to reboot the router.
Port Type
Chassis PID
License PIDs
0-3
Copper
A901-4C-FT-D
FLS-A901-4T
A901-4C-F-D
4-7
Combo
8-11
Small Form-Factor
Pluggable(SFP)
A901-4C-FT-D
A901-6CZ-FT-A
No license is required.
These ports are enabled
by default.
FLS-A901-4S
A901-4C-F-D
FLS-A901-4
A901-6CZ-FT-D
A901-6CZ-F-A
A901-6CZ-F-D
TenGig0/1, TenGig0/2
SFP+
A901-6CZ-FT-A
FLS-A901-2Z
A901-6CZ-FT-D
A901-6CZ-F-A
A901-6CZ-F-D
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
13
Licensing
Port or Interface Behavior
By default, ports 4 to 7 are enabled on the router. When you purchase the copper or SFP port license, the
corresponding ports are only enabled. Copper and SFP port licenses can co-exist.
1588BC License
1588BC (SL-A901-T) license is a feature based license. This license does not need rebooting of the router
for activation. The following table lists the features supported
License PID
Features
SL-A901-T
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Method
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
NVRAM
unset
Status
administratively
administratively
administratively
administratively
down
down
down
down
administratively
administratively
administratively
administratively
administratively
down
down
down
down
down
down
down
down
down
down
Protocol
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Router(config-if)#
*Oct 5 14:22:27.743: %LICENSE-1-REQUEST_FAILED: License request for feature fls-a901-4t
1.0 failed. UDI=MWR-3941:FHAK13101A1
Router# show interface gigabitEthernet 0/0
GigabitEthernet0/0 is administratively down, line protocol is down (disabled)
.......
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
14
Licensing
10gigUpgrade License
When the port based license is installed for copper or SFP ports, the corresponding ports are enabled. Following
is a sample output from the show ip interface command:
Router# show ip interface brief
Interface
GigabitEthernet0/0
GigabitEthernet0/1
GigabitEthernet0/2
.....
Note
IP-Address
unassigned
unassigned
unassigned
OK?
YES
YES
YES
Method
unset
unset
unset
Status
Protocol
up
up
administratively down down
administratively down down
Combo ports are either copper or SFP ports depending on the configuration specified in the media-type
command.
10gigUpgrade License
When you do not have the 10gigUpgrade license, the 10 Gigabit Ethernet ports are enabled in 1 Gigabit
Ethernet mode. Install the 10gigUpgrade license to enable new 10 Gigabit Ethernet ports in 10Gigabit Ethernet
mode. To enable 1 Gigabit Ethernet mode, 1 Gigabit Ethernet SFPs have to be used on both the ends. There
is no speed command to control the speed and this depends on the type of the SFP. The 10 Gigabit Ethernet
ports does not support 100M speed. You can connect 10 Gigabit Ethernet SFP+ to 10 Gigabit Ethernet ports
only.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
15
Licensing
10gigUpgrade License
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
16
Licensing
Flexi License
Flexi License
When a flexi license is not present, ports 4 to 7 are enabled. Ports 0 to 3, and ports 8 to 11 are disabled. This
is the expected behavior. Interfaces that are disabled are in the administrative down state.
FLS-A901-4 flexi license is a combination of copper and SFP ports. This license is not tied to any port types.
If you purchase a single FL-A901-4 license and install it, four ports are enabled and if you have two licenses,
all the eight ports are enabled. You can purchase and install two flexi licenses in a router.
Flexi license is also called Count-based license, with a maximum count of two. In a normal license, if the
license is already installed and when you try to install the same license again, the installation fails and router
displays Duplicate License error message. With flexi license (as it is count based), you can install the same
license twice. Anything above this will throw an error.
Note
Flexi license is supported only on the Cisco ASR 901 10G Router.
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Method
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
unset
NVRAM
unset
Status
administratively
administratively
administratively
administratively
down
down
down
down
administratively
administratively
administratively
administratively
administratively
down
down
down
down
down
down
down
down
down
down
Protocol
down
down
down
down
down
down
down
down
down
down
down
down
down
down
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
17
Licensing
1588BC License
1588BC License
When the SL-A901-T SL-A901-T= 1588BC license is not installed, the PTP boundary clock cannot be
configured. For more information on configuring the PTP boundary clock, see PTP Boundary Clock, on page
382.
Note
Though an error message appears on configuring the PTP boundary clock, the running-config file accepts
the PTP boundary clock configuration. This configuration can be saved. However, the PTP boundary
clock is not configured in the hardware, and is inactive.
Router(config)# ptp clock boundary domain 0
%ERROR: Boundary Clock needs a separate license. Please install license and reconfigure
PTP.
Router(config-ptp-clk)#
Note
When the 1588BC license is installed and PTP boundary clock is not configured, the license state is
displayed as Active, Not in Use . When the 1588BC license is installed and PTP boundary clock is
configured, the license state is displayed as Active, In Use .
Router# show license
Index
Index
Index
Index
Index
1
2
3
4
5
Feature: AdvancedMetroIPAccess
Feature: IPBase
Feature: Gige4portflexi
Feature: 10gigUpgrade
Feature: 1588BC
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
18
Licensing
Generating the License
Note
Procedure
Step 1
Use the yes command to remove the PTP boundary clock configuration.
Router(config-ptp-clk)# yes
Step 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
19
Licensing
Installing the License
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
license install ?
Example:
Step 3
Example:
Router# copy tftp: flash:
Step 4
show flash:
Example:
Router# show flash:
Step 5
Example:
Router# license install
FHK10LLL021_20110530015634482.lic
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
20
Licensing
Changing the License
Step 6
Command or Action
Purpose
reload
Example:
Router# reload
Note
If you do not install a license, the router starts with the lowest level license by default.
Note
After installing the AdvancedMetroIPAccess license and reloading the router, the AdvancedMetroIPAccess
license will be activated by default.
second
Where to Go Next
For additional information on Licensing, see the documentation listed in the Additional References section.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
21
Licensing
Additional References
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
22
Licensing
Feature Information for Licensing
RFCs
RFC
Title
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
23
Licensing
Feature Information for Licensing
Feature Name
Releases
Feature Information
Licensing
15.2(2)SNH1
1588BC Licensing
15.2(2)SNI
Licensing
15.4(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
24
CHAPTER
First-Time Configuration
This chapter describes the actions to take before turning on your router for the first time.
Setup Mode, page 25
Verifying the Cisco IOS Software Version, page 29
Configuring the Hostname and Password, page 30
Setup Mode
The setup mode guides you through creating a basic router configuration. If you prefer to configure the router
manually or to configure a module or interface that is not included in setup mode, go to Using the
Command-Line Interface, on page 57 to familiarize yourself with the CLI.
Procedure
Step 1
Step 2
Set up the hardware and connect the console and network cables as described in the Connecting Cables
section of the Cisco ASR 901 Series Aggregation Services Router Hardware Installation Guide. Cisco ASR
901S Series Aggregation Services Router Hardware Installation Guide.
Configure your PC terminal emulation program for 9600 baud, 8 data bits, no parity, and 1 stop bit.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
25
First-Time Configuration
Using Setup Mode
Note
If you made a mistake while using the setup command facility, exit the facility and run it again. Press
Ctrl-C, and type setup at the enable mode prompt ( 1900# ).
Procedure
Step 1
Power on the router. Messages appear in the terminal emulation program window.
Caution
Do not press any keys on the keyboard until the messages stop . Any keys that you press during
this time are interpreted as the first command entered after the messages stop, which might cause
the router to power off and start over. Wait a few minutes. The messages stop automatically.
The messages look similar to the following:
Example:
System Bootstrap, Version 15.1(2r)SNG, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2011 by cisco Systems, Inc.
Compiled Tue 25-Oct-11 12:09 by tinhuang
P2020 platform with 524288 Kbytes of main memory
program load complete, entry point: 0x2000000, size: 0x1d29954
Self decompressing the image :
################################################################################################################################################################################################################################################################################################
[OK]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, 901 Software (ASR901-UNIVERSALK9-M), Version 15.1(2)SNG, RELEASE SOFTWARE
(fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2011 by Cisco Systems, Inc.
Compiled Tue 25-Oct-11 13:13 by prod_rel_team
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
[email protected].
Cisco ASR901-E (P2020) processor (revision 1.0) with 393216K/131072K bytes of memory.
Processor board ID CAT1529U01P
P2020 CPU at 792MHz, E500v2 core, 512KB L2 Cache
1 FastEthernet interface
12 Gigabit Ethernet interfaces
1 terminal line
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
26
First-Time Configuration
Using Setup Mode
Example:
System Bootstrap, Version 15.4(1r)S2, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2013 by cisco Systems, Inc.
Compiled Tue 29-Oct-13 11:18 by shawnk
P2020 platform with 524288 Kbytes of main memory
program load complete, entry point: 0x2000000, size: 0x24a8738
Self decompressing the image :
##########################################################################################
##########################################################################################
##########################################################################################
##########################################################################################
##########################################################################################
##########################################################################################
##########################################################################################
##################################################### [OK]
*** No sreloc section
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, 901 Software (ASR901-UNIVERSALK9-M), Version 15.4(0.19)S0.11, EARLY
DEPLOYMENT ENGINEERING WEEKLY BUILD, synced to BASE_FOR_V154_1_S_XE311_THROTTLE
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Wed 06-Nov-13 13:54 by alnguyen
WDC is not configured 36
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
[email protected].
Cisco A901S-4SG-F-D (P2020) processor (revision 1.0) with 393216K/131072K bytes of memory.
Processor board ID FOC1738N74D
P2020 CPU at 800MHz, E500v2 core, 512KB L2 Cache
1 FastEthernet interface
6 Gigabit Ethernet interfaces
1 terminal line
256K bytes of non-volatile configuration memory.
98304K bytes of processor board System flash (Read/Write)
--- System Configuration Dialog --Would you like to enter the initial configuration dialog? [yes/no]:
The messages vary, depending on the Cisco IOS software image and interface modules in your router.
This section is for reference only, and output might not match the messages on your console.
To begin the initial configuration dialog, enter yes when the following message appears:
Note
Step 2
Example:
Would you like to enter the initial configuration dialog? [yes/no]:yes
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
27
First-Time Configuration
Using Setup Mode
Step 3
Enter a hostname for the router (this example uses 901 -1).
Example:
Configuring global parameters:
Enter host name [Router]: 901-1
Step 4
Enter an enable secret password. This password is encrypted (more secure) and cannot be seen when viewing
the configuration.
Example:
The enable secret is a password used to protect access to
privileged EXEC and configuration modes. This password, after
entered, becomes encrypted in the configuration.
Enter enable secret: ciscoenable
When you enter the enable secret password, the password is visible as you type it. Once you enter
the password, it becomes encrypted in the configuration.
Enter an enable password that is different from the enable secret password. This password is not encrypted
(less secure) and can be seen when viewing the configuration.
Note
Step 5
Example:
The enable password is used when you do not specify an
enable secret password, with some older software versions, and
some boot images.
Enter enable password: ciscoenable
Step 6
To prevent unauthenticated access to the router through ports other than the console port, enter the virtual
terminal password.
Example:
The virtual terminal password is used to protect
access to the router over a network interface.
Enter virtual terminal password: ciscoterminal
Step 7
Step 8
The summary of interfaces appears. This list varies, depending on the network modules installed in your
router.
Step 9 Specify the interface to be used to connect to the network management system.
Step 10 Configure the specified interface as prompted.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
28
First-Time Configuration
Verifying the Cisco IOS Software Version
Procedure
Step 1
If you answer:
0The configuration information that you entered is not saved, and you return to the router enable
prompt. To return to the system configuration dialog, enter setup.
1The configuration is not saved, and you return to the EXEC prompt.
The 901-1> prompt appears indicating that you are at the CLI and you completed a basic router configuration.
Note
Step 2
When the messages stop displaying in your window, press Return to view the command line prompt.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
29
First-Time Configuration
Configuring the Hostname and Password
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
Complete the following steps to configure a hostname and to set an encrypted password:
Procedure
Step 1
When the prompt changes to Router , you have entered enable mode.
Step 2
When the prompt changes to Router(config) , you have entered global configuration mode.
Step 3
Change the name of the router to a meaningful name. Substitute your hostname for Router .
Example:
Router(config)# hostname Router
Step 4
Enter an enable secret password. This password provides access to privileged EXEC mode. When you type
enable at the EXEC prompt ( Router> ), you must enter the enable secret password to access configuration
mode. Enter your secret password.
Example:
Router(config)# enable secret secret password
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
30
First-Time Configuration
Verifying the Hostname and Password
Example:
Router(config)# exit
Procedure
Step 1
Step 2
Step 3
Check the hostname and encrypted password, which appear near the top of the command output.
Exits the global configuration mode and attempt to re-enter it using the new enable password:
Example:
Router# exit
.
.Router con0 is now available
Press RETURN
to get started.
Router> enable
Password: password
Router#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
31
First-Time Configuration
Verifying the Hostname and Password
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
32
CHAPTER
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
33
Note
The Cisco ASR 901 Cisco ASR 901S only supports CNS over motherboard Ethernet interfaces.
For more information about CNS configuration, see Enabling Cisco Networking Services (CNS) and Zero-Touch
Deployment, on page 40.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
34
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
Complete the following steps to configure SNMP:
Procedure
Command or Action
Purpose
Step 1 enable
Example:
Router> enable
Example:
Router# configure
terminal
Step 3 snmp-server community Sets up the community access string to permit access to SNMP. The no
string [view view-name] form of this command removes the specified community string.
[ro | rw] [number]
stringCommunity string is the password to access the SNMP
protocol.
Example:
Router(config)#
snmp-server community
xxxxx RO
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
35
Command or Action
Purpose
rw(Optional) Specifies read-write access. Authorized management
stations are able to both retrieve and modify MIB objects.
number(Optional) Specifies an access list of IP addresses allowed
to use the community string to gain access to the SNMP agent.
Values range from 1 to 99.
Step 4 snmp-server queue-length Establishes the message queue length for each trap host.
length
lengthSpecifies the number of trap events that can be held before
the queue must be emptied.
Example:
Router(config)#
snmp-server
queue-length 100
Step 5 snmp-server enable traps Enables the router to send SNMP traps messages. Use the no form of this
command to disable SNMP notifications.
[notification-type]
[notification-option]
notification-typesnmp [authentication] Enables RFC 1157
SNMP notifications. Note that use of the authentication keyword
Example:
produces the same effect as not using the authentication keyword.
Both the snmp-server enable traps snmp and snmp-server enable
Router(config)#
snmp-server enable
traps snmp authentication forms of this command globally enable
traps
(or, if using the no form, disable) the following SNMP traps:
snmp linkdown linkup
coldstart warmstart
authentication failure
linkup
linkdown
coldstart
warmstart
notification-option(Optional) atm pvc [interval seconds]
[fail-intervalseconds]The optional interval seconds
keyword/argument combination specifies the minimum period
between successive traps, in the range from 1 to 3600. Generation
of PVC traps is dampened by the notification interval to prevent
trap storms. No traps are sent until the interval lapses. The default
interval is 30.
The optional fail-interval seconds keyword/argument combination specifies
the minimum period for storing the failed time stamp, in the range from
0 to 3600. The default fail-interval is 0.
Step 6 snmp-server enable traps Enables SNMP trap messages for a specific environment.
envmon
envmon [voltage | shutdown | supply | fan | temperature]When
the envmon keyword is used, you can enable a specific
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
36
Command or Action
Purpose
Example:
Router(config)#
snmp-server enable
traps envmon
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
37
Command or Action
Purpose
config-copyEnables SNMP config-copy traps.
cpuAllow cpu related traps.
ds1Enables SNMP DS1 traps.
eigrpEnables SNMP EIGRP traps.
entityEnables SNMP entity traps.
envmonEnables SNMP environmental monitor traps.
flashEnables SNMP FLASH notifications.
frame-relayEnables SNMP frame-relay traps.
hsrpEnables SNMP HSRP traps.
ipmulticastEnables SNMP ipmulticast traps.
ipslaEnables SNMP IP SLA traps.
12tunEnables SNMP L2 tunnel protocol traps.
mplsEnables SNMP MPLS traps.
msdpEnables SNMP MSDP traps.
mvpnEnables Multicast Virtual Private Networks traps.
ospfEnables OSPF traps.
pwEnables SNMP PW traps.
rsvpEnables RSVP flow change traps.
snmpEnables SNMP traps.
syslogEnables SNMP syslog traps.
ttyEnables TCP connection traps.
vrrpEnables SNMP vrrp traps.
Step 8 end
Example:
Router(config)#
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
38
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-if)# interface loopback
5005
Step 5
Example:
Router(config-if)# ip-address
10.10.12.10 23
Step 6
end
Example:
Router(config-if)# end
Step 7
Step 8
snmp-servercommunity public ro
Example:
Router(config)# snmp-server community
snmppubliccom RO
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
39
Step 9
Command or Action
Purpose
snmp-servercommunity private rw
Example:
Router(config)# snmp-server community
snmpprivatecom RW
Step 10
snmp-serverenable traps
Example:
Router(config)# snmp-server enable
traps
Step 11
snmp-server trap-source loopback number Specifies the loopback interface from which
SNMP traps messages originate, where number
is the number of the loopback interface you
Example:
configured for the O&M in Step 4.
Router(config)# snmp-server
trap-source loopback 5005
Step 12
end
Example:
Router(config-if)# end
Note
The Cisco ASR 901 Cisco ASR 901S only supports CNS over motherboard Ethernet interfaces.
This section contains the following procedures:
Zero-Touch Deployment
Zero-touch deployment feature gives the router the ability to retrieve its configuration file from the remote
server during initial router deployment with no end-user intervention.
The physical reset of the ZTP button on the router for 0.5 seconds initiates zero touch provisioning.
Pressing the ZTP reset button on the router chassis for more than 8 seconds causes the router to reboot (power
cycle).
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
40
When the router is rebooting due to a hardware button reset (more than 8 second press), the following log is
displayed during boot up: %PLATFORM-6-ZTP_EXTERNAL_EVENT: System rebooted due to an external
ZTP event.
Figure 1: Zero-touch Deployment
The following steps provide an overview of events that take place during Cisco ASR 901 Cisco ASR 901S
zero-touch deployment.
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Connect the Cisco ASR 901 Cisco ASR 901S without any configurations to an upstream router.
The Cisco ASR 901 Cisco ASR 901S auto-senses the management VLAN of the upstream router for IP
connectivity by listening to the traffic it receives on the connected interface.
The Cisco ASR 901 Cisco ASR 901S sends DHCP discover messages using the discovered VLAN tag. If
the upstream router is not using a management VLAN, untagged DHCP discover messages are sent.
The DHCP server responds with a DHCP offer.
The Cisco ASR 901 Cisco ASR 901S sends a DHCP request message to the DHCP server. The DHCP server
then sends the DHCP ACK message.
Note
Step 6 and 7 are used only when Option 43 is not configured.
Step 6
The Cisco ASR 901 Cisco ASR 901S requests network-config file via TFTP.
Step 7
The TFTP server sends the Cisco ASR 901 Cisco ASR 901S a network-config file.
Step 8 The Cisco ASR 901 Cisco ASR 901S sends an HTTP request to the CNS-CE server.
Step 9 The CNS-CE server sends a configuration template to the Cisco ASR 901 Cisco ASR 901S .
Step 10 Publish success event.
Image Download
The following events take place when a CNS-enabled Cisco ASR 901 Cisco ASR 901S downloads a new
image:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
41
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
The CNS-CE server requests inventory (disk/flash info) from the ASR 901-DC. ASR 901S-DC.
The ASR 901-DC. ASR 901S-DC. sends an inventory.
The CNS-CE server sends an image location.
The ASR 901-DC. ASR 901S-DC. sends a TFTP image request.
The ASR 901-DC. ASR 901S-DC. downloads an image from the TFTP server.
Refresh the CNS-CE server to check whether the image download is complete.
Associate the .inv template in the CNS-CE server. Based on the boot variable, the Cisco ASR 901 Cisco ASR
901S reboots with the copied image.
The CNS-CE server reboots the ASR 901-DC. ASR 901S-DC. router.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip dhcp excluded-address
dhcp-server-ip-address
Example:
Router# ip dhcp excluded-address
30.30.1.6
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
42
Step 5
Command or Action
Purpose
Example:
Router# ip dhcp pabudhcp2
Step 6
Example:
Router# network 160.100.100.0
255.255.255.252
Step 7
default-router ip-address
Example:
Router# default-router 30.30.1.6
Step 8
Example:
Router# option 43 ascii
3A1D;A3;B161.100.100.2
Step 9
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
43
cns
cns
cns
cns
cns
cns
!
end
After the Cisco ASR 901 Cisco ASR 901S boots with this configuration, it can connect to the CNS-CE
server.
Configuration Examples
This section provides the following configuration examples:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
44
community xxxxx RO
queue-length 100
enable traps snmp linkdown linkup coldstart warmstart
enable traps envmonsnmp-server host 10.20.30.40 version 2c
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
45
Configuring LEDs
The ASR 901S router supports three LEDsSystem, Management, and Network LEDs. These multicolor
LEDs on the router indicate the nature and severity of the LEDs (see the following table).
LED Label
Function
Color/State
Description
System status
Off
System is in ROM
Monitor (ROMMON)
mode
Green
No hardware failure
detected; system is in
Cisco IOS prompt mode
Amber
Red
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
46
Management status
Network status
Off
No power
Green
Amber
Software upgrade is in
progress (MCU or
ROMMON)
Red
Off
Green
Amber
Red
The System, Management, and Network LEDs can be enabled or disabled using Cisco IOS CLIs. By default
all three LEDs are enabled.
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
47
Step 3
Command or Action
Purpose
Example:
Router(config)# hw-module led disable
Step 4
Example:
Router(config)# Router(config)# no
hw-module led disable
Step 5
end
Example:
Router(config)#end
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
48
Step 3
Command or Action
Purpose
Example:
Router(config)# hw-module alarm 1 enable
1
Step 4
no hw-module alarm { 1 | 2 | 3 | 4} enable {0 |1} Disables the alarm and trigger type.
Example:
Router(config)# no hw-module alarm 1 enable
1
Step 5
end
Example:
Router(config)#end
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
49
Enabling Alarms
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
alarm-contact contact-number
description description-string
Example:
Router(config)# alarm-contact 1
description doorsensor
Step 4
alarm-contact { contact-number | all Configure the trigger and severity for an alarm contact
{severity{critical| major| minor}} number or for all contact numbers.
Example:
Router(config)# alarm-contact 2
severity major
Step 5
Router(config)# alarm-contact 2
trigger closed
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
50
alarm-contact { contact-number | all Configure the trigger for an alarm contact number or for
all contact numbers.
{ trigger {closed| open}}
Example:
Step 6
Enabling Syslogs
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config)# logging host
syslogServerIp
Step 5
Example:
Router(config)# ip route 7.0.0.221
255.255.255.255 7.47.0.1
Step 6
end
Example:
Router(config)# end
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
51
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
snmp-server manager
Example:
Router(config)# snmp-server manager
Step 4
Example:
Router(config)# snmp-server community
public rw
Step 5
Step 6
Example:
Router(config)# snmp-server host server
ip version 2c public udp-port port num
Step 7
Example:
Router(config)# ip route 7.0.0.221
255.255.255.255 7.47.0.1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
52
ALARM CONTACT 1
Status:
Description:
Severity:
Trigger:
ALARM CONTACT 2
Status:
Description:
Severity:
Trigger:
ALARM CONTACT 3
Status:
Description:
Severity:
Trigger:
ALARM CONTACT 4
Status:
Description:
Severity:
Trigger:
Router#
not asserted
door sensor
major
closed
not asserted
flood sensor
critical
closed
not asserted
critical
closed
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
alarm-contact
Router#
not asserted
test_1
critical
open
1
1
1
2
2
3
3
3
4
4
4
description AC Fail
severity critical
trigger closed
description DC Fail
trigger closed
description Junk 3
severity major
trigger closed
description Test 4
severity critical
trigger closed
Source
-----AC Fail
DC Fail
Junk 3
Test 4
Router#
Time
-----Jul 22 2014
Jul 22 2014
Jul 22 2014
Jul 22 2014
18:23:45
18:23:45
18:23:45
18:23:46
Severity
-------CRITICAL
MINOR
MAJOR
CRITICAL
Description [Index]
------------------AC Fail [0]
DC Fail [1]
Junk 3 [2]
Test 4 [3]
External Alarms:
ALARM CONTACT 1 is
ALARM CONTACT 2 is
ALARM CONTACT 3 is
ALARM CONTACT 4 is
not
not
not
not
asserted
asserted
asserted
asserted
Where to Go Next
For additional information on monitoring and managing the Cisco ASR 901 Cisco ASR 901S router, see the
documentation listed in the Additional References section.
Additional References
The following sections provide references related to LLDP feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
53
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
54
Technical Assistance
Description
Link
Note
Table 2: Feature Information for Monitoring and Managing the Cisco ASR 901 Cisco ASR 901S Router,
on page 55 lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Table 2: Feature Information for Monitoring and Managing the Cisco ASR 901 Cisco ASR 901S Router
Feature Name
Releases
Feature Information
15.2(2)SNI
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
55
Feature Name
Releases
Feature Information
15.5(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
56
CHAPTER
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
57
Using the configuration modes (global, interface, and line), you can make changes to the running configuration.
When you save the configuration, these commands are stored and used for router reboots. To access the various
configuration modes, you must start at global configuration mode. From global configuration mode, you can
enter interface configuration mode and line configuration mode.
Table 3: Command Mode Summary, on page 58 describes the main command modes, how to access each
one, the prompt you see in that mode, and how to exit the mode. The examples in the table use the hostname
Router.
For more detailed information on the command modes, see the command reference guide for this release.
Table 3: Command Mode Summary
Command Mode
Access Method
Router Prompt
Displayed
Exit Method
User EXEC
Log in.
Router>
Privileged EXEC
Global
configuration
Interface
configuration
Router#
To go to user EXEC
mode, use the
disable, exit, or
logout command.
To go to privileged
EXEC mode, use
the exit or end
command, or press
Ctrl-Z.
To go to global
configuration mode,
use the exit
command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
58
To return directly to
privileged EXEC
mode, press Ctrl-Z.
Command Mode
Access Method
Router Prompt
Displayed
Exit Method
VLAN
configuration
While in global
Router(config-vlan)# To go to global
Use this mode to
configuration mode,
configuration mode, configure VLAN
enter the vlan
enter the exit
parameters.
command.
vlan-id command.
To return to
privileged EXEC
mode, press Ctrl-Z
or use the end
command.
Line configuration
While in global
Router(config-line)# To go to global
configuration mode,
configuration mode,
specify a line by
use the exit
using the line vty or
command.
line console
To return to
command.
privileged EXEC
mode, press Ctrl-Z
or enter end.
Command
Purpose
help
abbreviated-command-entry?
abbreviated-command-entry <Tab>
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
59
Command
Purpose
command ?
command keyword ?
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
60
Error Message
Meaning
% Incomplete command.
You entered the command incorrectly. The Enter a question mark (?) to display all the
caret (^) marks the point of the error.
commands that are available in this
command mode.
The possible keywords that you can enter
with the command appear.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
61
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in Table 6: Recalling Commands
, on page 62. These actions are optional.
Table 6: Recalling Commands
1
Action
Result
show history
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
62
To globally disable enhanced editing mode, enter this command in line configuration mode:
Router (config-line)# no editing
To re-enable the enhanced editing mode for the current terminal session, enter this command in privileged
EXEC mode:
Router# terminal editing
To reconfigure a specific line to have enhanced editing mode, enter this command in line configuration mode:
Router(config-line)# editing
Capability
Keystroke
Purpose
Press Ctrl-F, or press the right arrow key. Move the cursor forward one character.
Press Ctrl-A.
Press Ctrl-E.
Press Esc B.
Press Esc F.
Press Ctrl-T.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
63
Capability
Keystroke
Purpose
Press Ctrl-D.
Press Ctrl-K.
Press Ctrl-W.
Press Esc D.
Press Esc L.
Press Esc U.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
64
Note
After you complete the entry, press Ctrl-A to check the complete syntax before pressing the Return key to
execute the command. The dollar sign ($) appears at the end of the line to show that the line has been scrolled
to the right:
Router(config)# access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1$
The software assumes you have a terminal screen that is 80 columns wide. If you have a width other than that,
use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command entries.
For information about recalling previous command entries, see the Editing Commands through Keystrokes,
on page 63.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
65
It might take a few minutes to save the configuration to NVRAM. After the configuration has been saved, the
following message appears:
[OK]
Router#
For additional information about using the Cisco IOS Release 15.1SNG, see the guides listed at:
http://www.cisco.com/en/US/products/ps11280/tsd_products_support_series_home.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
66
CHAPTER
Software Upgrade
This chapter explains how to upgrade the Cisco IOS image installed on the Cisco ASR 901 Cisco ASR 901S
router.
Selecting a Cisco IOS Image, page 67
Upgrading the Cisco IOS image, page 67
Auto Upgrading the MCU, page 72
Manually Upgrading the ROMMON , page 72
Auto Upgrade of ROMMON, page 73
Procedure
Step 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
67
Software Upgrade
Upgrading the Cisco IOS image
Download the Cisco IOS software image onto your workstation or PC from the Download Software Area
(registered customers only).
Step 2
Step 3
Prefixes
rw
nvram:
rw
system:
rw
tmpsys:
rw
null:
ro
tar:
rw
tftp:
wo
syslog:
rw
flash:
rw
ramdisk:
rw
rcp:
rw
ftp:
rw
http:
rw
scp:
ro
cns:
Step 4
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
68
Software Upgrade
Upgrading the Cisco IOS image
Step 6
asr901-universalk9-mz.151-2.SNG
asr901-universalk9-mz
Step 7
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
69
Software Upgrade
Upgrading the Cisco IOS image
Example:
Router#show run | inc boot
boot-start-marker
boot system flash asr901-universalk9-mz.151-2.SNG.fc1
boot-end-marker
Router#
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#no boot system
Router(config)#boot system flash asr901-universalk9-mz.151-2.SNG
Router(config)#end
Router#
Router#show run | inc boot
boot-start-marker
boot system flash asr901-universalk9-mz.151-2.SNG
boot-end-marker
Router#
Router#show run | inc boot
boot-start-marker
boot system flash asr901-universalk9-mz
boot-end-marker
Router#
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#no boot system
Router(config)#boot system flash asr901-universalk9-mz
Router(config)#end
Router#
Router#show run | inc boot
boot-start-marker
boot system flash asr901-universalk9-mz
boot-end-marker
Router#
Step 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
70
Software Upgrade
Upgrading the Cisco IOS image
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
71
Software Upgrade
Auto Upgrading the MCU
From theIOS:
Procedure
Step 1
Step 2
Step 3
Step 4
Check the status of the currently running ROMMON using any one of the following commands:
From the ROMMON:
rommon>rommon-pref readonly
From the IOS:
router>show rom-monitor
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
72
Software Upgrade
Auto Upgrade of ROMMON
Note
While upgrade is in progress, if something goes wrong like power-off or power cycler removed, or
if the erase program is not done properly, you can reset the board. It falls back to the read-only
rommon.
What to Do Next
After the ROMMON upgrade, if you need to fall back to either the read-only ROMMON, or the upgrade
ROMMON, use any one of the following commands:
From the IOS:
Router# upgrade rom-monitor preference readonly | upgrade
From the ROMMON:
rommon> rommon-pref readonly
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
73
Software Upgrade
Auto Upgrade of ROMMON
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
74
CHAPTER
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router>
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
75
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
cdp enable
Example:
Router(config-if)# cdp enable
Step 5
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
76
Combo gigabitethernet interface (0/4-7), when the media type is configured as RJ-45
Speed and duplex can be configured only on the copper gigabitethernet interface (0/4-5).
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
To configure speed and duplex operation, complete these steps in the interface configuration mode:
Procedure
Step 1
Command or Action
Purpose
Example:
Router(config-if)# duplex half
Step 2
Example:
Router(config-if)# speed 1000
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
Procedure
Step 1
Command or Action
Purpose
no shutdownno shutdown
Example:
Router(config)# interface
gigabitethernet 0/1
Step 2
no shutdown
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
77
Note
To configure mtu under SVI interface, use mtu bytes command since ip mtu bytes command is not supported
under SVI interface.
Note
Maximum frame size allowed is calculated as the sum of configured MTU value and size of Layer 2
header.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface gigabitethernet slot/port Selects a Gigabit Ethernet interface and enters interface
configuration mode.
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
mtu bytes
Example:
Note
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
78
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
79
This feature is disabled by default and can be enabled or disabled through the CLI. You can configure the
maximum number of MAC movements that are allowed in a specified time interval, beyond which the MAC
movement is termed as flapping.
Once the port is err-disabled, it can be administratively brought up using the shut and no shut commands.
Restrictions and Limitations
If MAC learning is done in tens of thousands, the CPU may slow down. This feature does not address
the slow down or CPU hog due to MAC learning.
When the router is learning tens of thousands of MACs, and there are a couple of genuine MAC
movements (not due to a loop), they are not tagged as MAC flapping since these are valid MAC
movements.
Average MAC Movement issue
For example, let us assume that MAC movement counter is configured for a maximum of 5 MAC movements
in 10 seconds.
If 2000 MACs have contributed for 4 MAC movements each in 10 seconds, the total number of AC movements
will be 8000. Since the individual MAC threshold is not hit in this case, the router does not take any preventive
action. However, this condition may not really occur in practice.
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
mac-flap-ctrl on per-mac
mac-movement time-interval
Example:
Router(config)# mac-flap-ctrl
on per-mac 20 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
80
Note
When DOM is enabled on a port (with active SFP link status) and the SFP encounters violations of
any kind, an error message is displayed, irrespective of the port being combo or non-combo.
When the media type is auto-select, the Cisco ASR 901 Cisco ASR 901S Router configures both
types with auto negotiation of speed and duplex.
When the media type is auto-select, you cannot use 100M SFPs.
When the media type is auto-select, you cannot use the speed and duplex commands.
When the media type is auto-select, the Cisco ASR 901 Cisco ASR 901S Router uses the following
criteria to select the type:
If only one connector is installed, that interface is active and remains active until the media is
removed or the router is reloaded.
If both media are installed in the combo port, the router gives preference to the SFP module
interface.
If both media are installed in the combo port, when the SFP module interface is inactive, the
RJ-45 connector is selected. When the SFP module interface recovers and becomes active, the
RJ-45 connector is disabled and the router gives preference to the SFP module interface.
If both media are installed in the combo port, and the router is reloaded or the port is disabled
and then re-enabled through the shutdown and the no shutdown interface configuration
commands, the router gives preference to the SFP module interface.
Copper SFPs are not supported on combo ports in Cisco ASR 901 Cisco ASR 901S Router
Note
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
81
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
Example:
Router(config-if)# media-type rj45
Step 5
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
82
Following is a sample output when the media type is auto-select and the interface is down:
Router# show interface gigabitethernet 0/7show interface gigabitethernet 0/4
GigabitEthernet0/7 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is 0000.0000.0000 (bia 0000.0000.0000)
MTU 9216 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 1000Mbps, link type is auto, media type is unknown
output flow-control is unsupported, input flow-control is unsupported
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
83
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
84
CHAPTER
Note
Cisco ASR 901 Cisco ASR 901S router does not support switch port configuration.
Finding Feature Information, page 86
Supported EVC Features, page 86
Understanding EVC Features, page 86
Configuring EFPs, page 92
Verifying DHCP Snooping with Option 82 on EVC, page 100
Example: Configuring DHCP Snooping with Option 82 on EVC, page 101
Configuration Examples of Supported Features, page 102
How to Configure EVC Default Encapsulation , page 105
Configuring Other Features on EFPs, page 108
Monitoring EVC, page 119
Configuring Switchport to EVC Mapping, page 121
Troubleshooting DHCP Snooping with Option-82 on EVC, page 123
Additional References, page 123
Feature Information for Configuring Ethernet Virtual Connections, page 124
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
85
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
86
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
87
Encapsulation
Encapsulation defines the matching criteria that maps a VLAN, a range of VLANs, Ethertype, or a combination
of these to a service instance. Configure encapsulation in the service instance configuration mode. You must
configure one encapsulation command per EFP (service instance).
Use the encapsulation command in service-instance configuration mode to set the encapsulation criteria.
Different types of encapsulations are dot1q, dot1ad, and untagged. Valid Ethertype is IPv4.
Note
Cisco ASR 901 Cisco ASR 901S router does not support dot1ad encapsulation on Layer 3 service.
Encapsulation classification options also include:
outer tag VLAN
inner tag VLAN
After you enter an encapsulation method, these keyword options are available in service instance configuration
mode:
bridge-domainConfigures a bridge domain
rewriteConfigures Ethernet rewrite criteria
Command
Description
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
88
Command
Description
encapsulation untagged
encapsulation default
If a packet entering or leaving a port does not match any of the encapsulations on that port, the packet is
dropped, resulting in filtering on ingress. The encapsulation must match the packet on the wire to determine
filtering criteria. On the wire refers to packets ingressing the router before any rewrites and to packets egressing
the router after all rewrites.
VLAN Counters
Cisco ASR 901 Cisco ASR 901S supports counters for Switch Virtual Interface (SVI) Statistics.
Restrictions
Only Bytes counters are supported in SVI Statistics.
Bridge Domains
A service instance must be attached to a bridge domain. Flooding and communication behavior of a bridge
domain is similar to that of a VLAN domain. Bridge-domain membership is determined by which service
instances have joined it (based on encapsulation criteria), while VLAN domain membership is determined by
the VLAN tag in the packet.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
89
Note
You must configure encapsulation before you can configure the bridge domain.
Use the bridge-domain bridge-id service-instance command in the configuration mode to bind the EFP to a
bridge domain instance. The bridge-id is the identifier for the bridge domain instance, a number ranging from
1 to 4094.
Split-Horizon
The split-horizon feature allows service instances in a bridge domain to join groups. Service instances in the
same bridge domain and split-horizon group cannot forward data between each other, but can forward data
between other service instances that are in the same bridge domain, but not in the same split-horizon group.
Service instances do not have to be in a split-horizon group. If a service instance does not belong to a group,
it can send and receive from all ports within the bridge domain. A service instance cannot join more than one
split-horizon group.
Use the bridge-domain bridge-id split-horizon group group_id service-instance command in the
configuration mode to configure a split-horizon group. The group_id is a number from 0 to31. All members
of the bridge-domain configured with the same group_id are part of the same split-horizon group. EFPs that
are not configured with an explicit group_id do not belong to any group.
You can configure no more than 12 service instances per bridge domain. When a bridge domain contains a
service instance that is part of a split-horizon group, this decreases the number of service instances allowed
to be configured in that split-horizon group. The router supports up to 32 split-horizon groups plus the default
(no group).
If a service instance joins split-horizon group, it can have no more than 12 members in split horizon group in
the same bridge domain. We recommend that you add split horizon groups in numerical order to maximize
the number of service instances that can belong to a group.
Rewrite Operations
Use the rewrite command to modify packet VLAN tags. You can also use this command to emulate traditional
802.1Q tagging, where packets enter a router on the native VLAN and VLAN tagging properties are added
on egress. You can also use the rewrite command to facilitate VLAN translation and QinQ.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
90
Use the rewrite ingress tag pop 1symmetric service-instance configuration mode command to specify the
encapsulation adjustment to be performed on the frame ingress to the EFP. Entering pop 1 pops (removes)
the outermost tag.
Note
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
91
Configuring EFPs
This section contains the following topics:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
92
Note
Before Cisco IOS Release 15.3(2)S, EFPs or service instances or bridge domains were not configured.
Note
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 100
Step 4
Example:
Router(config-if)# ip address
20.1.1.1 255.255.255.255
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
93
Step 5
Command or Action
Purpose
Example:
Router(config-if)# vlan-counter
egress
Step 6
exit
Example:
Router(config-if)# exit
Configuration Guidelines
You can configure up to 4000 bridge domains on the Cisco ASR 901 Cisco ASR 901S Router.
You must configure encapsulation on a service instance before configuring bridge domain.
ISL trunk encapsulation is not supported.
The router does not support overlapping configurations on the same interface and same bridge domain.
If you have configured a VLAN range encapsulation, or encapsulation default on service instance 1,
you cannot configure any other encapsulations that also match previous encapsulations in the same
interface and bridge domain.
Default encapsulation is supported only on the physical interface and port channel interface.
If default encapsulation EVC is configured on the interface, only the untagged encapsulation is accepted
and all other encapsulation commands are rejected.
Default EFP under xconnect and untagged EFP under bridge-domain on the same interface is not
supported.
The rewrite command on encapsulation default EVC is rejected.
Supports only untagged EFPs on the port with default encapsulation.
Egress filtering is not supported. All unlearned traffic ingresses on the default encapsulation interface
is flooded to other interfaces that are part of the same bridge-domain.
Layer 3 routing is not supported only under default encapsulation. Layer 2 VPN is supported on the
default encapsulation EFP.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
94
QinQ configuration for Layer3 is not possible with pop1 rewrite. However pop2 configured routed QinQ
is supported.
Default xconnect MTU is 9216.
For interoperability with other routers for an xconnect session, ensure that the MTU on both PE routers
is same before the xconnect session is established.
MPLS is not supported over routed QinQ.
VLAN IDs 4093, 4094, and 4095 are reserved for internal usage.
Traffic with tag protocol identifier (TPID) value of 9200 will pass through Xconnect and BD irrespective
of the TPID value configured on them.
Effective with Cisco IOS Release 15.4(3)S, you can configure both single-tag and priority-tag EFP with
the rewrite option, on the same bridge domain.
As untagged EFP does not support CoS, remember to set CoS value as 0 in IP SLA configuration.
Xconnect over priority tagged EVC configuration is not supported.
Maximum 8 VLAN per interface and 128 VLAN per box are supported in Cisco ASR 901 Router.
Note
The dot1q and dot1ad range configuration is not supported on the port channel interface on Cisco IOS
Release 15.2(2)SNI.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
interface [name ]
Step 3
service instance ethernet Configure an EFP (service instance) and enter service instance
configuration) mode.
The number is the EFP identifier, an integer from 1 to 4096.
(Optional) ethernet name is the name of a previously
configured EVC. You do not need to use an EVC name in a
service instance.
Step 4
encapsulation {dot1q |
dot1ad | untagged |
default}
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
95
Command or Action
Purpose
untaggedMap to untagged VLANs. Only one EFP per port
can have untagged encapsulation.
defaultConfigures default encapsulation.
Step 5
bridge-domain bridge-id
[split-horizon group
group-id]
Step 6
Step 7
end
Step 8
Step 9
copy running-config
startup-config
What to Do Next
Note
Use the no forms of the commands to remove the service instance, encapsulation type, or bridge domain
or to disable the rewrite operation.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
96
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip dhcp snooping
Example:
Router(config)# ip dhcp snooping
Step 4
Example:
Router(config)# ip dhcp snooping
bridge-domain 5
Step 5
Example:
Router(config)# interface
GigabitEthernet1/1
Step 6
Note
Example:
Router(config-if)# ip dhcp snooping
trust
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
97
Step 2
Command or Action
Purpose
Example:
Device# release dhcp vlan 10
Step 3
Procedure
Step 1
Command or Action
Purpose
Example:
Device(config)# interface vlan 10
Step 2
ip dhcp client client-id hex-string client-id Specifies the hex-string client-id including type
octet of 00 or 01.
Example:
Device(config-if)# ip dhcp client
client-id hex 1234
Step 3
Example:
Device(config-if)# ip dhcp client
authentication key-chain dhcp1
Step 4
ip dhcp client authentication mode {token| Specifies the type of authentication to be used
in DHCP messages on the interface.
md5}
Example:
Device(config-if)# ip dhcp client
authentication mode token
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
98
Step 5
Command or Action
Purpose
exit
Example:
Device(config-if)# exit
Step 6
Step 7
key key-id
Example:
Device(config-keychain)# key 1234
Step 8
key-string text
Example:
Device(config-keychain-key)#
key-string secret
Step 9
exit
Example:
Device(config-keychain-key)# exit
Step 10
exit
Example:
Device(config-keychain)# exit
Step 11
ip dhcp-client forcerenew
Example:
Device(config)# ip dhcp-client
forcerenew
Step 12
end
Example:
Device(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
99
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip dhcp snooping
Example:
Router(config)# ip dhcp snooping
Step 4
Example:
Router(config)# interface
GigabitEthernet1/1
Step 5
Example:
Router(config-if)# ip dhcp snooping limit
rate 100
Trusted
-------
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
100
GigabitEthernet0/1
yes
100
To display the status of the DHCP snooping database agent, use the show command given in the following
example:
Router# show ip dhcp snooping database detail
Agent URL :
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Agent Running : No
Delay Timer Expiry : Not Running
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Time : None
Last Failed Reason : No failure recorded.
Total Attempts
Successful Transfers
Successful Reads
Successful Writes
Media Failures
:
:
:
:
:
0
0
0
0
0
Startup Failures
Failed Transfers
Failed Reads
Failed Writes
:
:
:
:
0
0
0
0
:
0
0
0
Expired leases
:
Unsupported vlans :
0
0
Expired leases
:
Unsupported vlans :
0
0
To display the DHCP snooping binding entries, use the the show command given in the following example:
Router# show ip dhcp snooping binding
MacAddress
----------0000.0100.0201
IP Address
----------10.0.0.1
Lease(seconds)
-------------600
Type
------------dhcp-snooping
VLAN
----100
Interface
-------------GigabitEthernet0/1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
101
!
!
multilink bundle-name authenticated
l3-over-l2 flush buffers
asr901-storm-control-bpdu 1000
!
!
spanning-tree mode pvst
!
interface GigabitEthernet0/1
no ip address
negotiation auto
ip dhcp snooping limit rate 100
ip dhcp snooping trust
!
!
interface Port-channel2
no ip address
negotiation auto
ip dhcp snooping limit rate 100
ip dhcp snooping trust
!
!
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
102
Example: Rewrite
In this example, a packet that matches the encapsulation will have one tag removed (popped off). The symmetric
keyword allows the reverse direction to have the inverse action: a packet that egresses out this service instance
will have the encapsulation (VLAN 10) added (pushed on).
Router(config)# interface gigabitethernet0/1
Router(config-if)# service instance 1 Ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# bridge-domain 4000
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
103
In the following example, an attempt is made to release the DHCP lease on an interface that was not originally
assigned an IP address by the DHCP server:
Device# release dhcp vlan 10
Interface does not have a DHCP originated address
In the following example, the release dhcp command is executed without specifying the type and number
arguments:
Device# release dhcp
Incomplete command.
In the following example, an attempt is made to renew the DHCP lease on an interface that was not originally
assigned an IP address by the DHCP server:
Device# renew dhcp vlan 10
Interface does not have a DHCP originated address
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
104
In the following example, the renew dhcp command is executed without specifying the type and number
arguments:
Device# renew dhcp
Incomplete command.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
GigabitEthernet0/4
Step 4
Step 5
encapsulation default
Example:
Router(config-if-srv)# encapsulation
default
Step 6
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
15
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
105
Note
When default encapsulation is configured on xconnect, the Cisco ASR 901 Cisco ASR 901S router does
not support untagged encapsulation on the bridge-domain of the same interface.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
GigabitEthernet0/4
Step 4
service instance instance-id ethernet Creates a service instance on an interface and defines
the matching criteria.
Example:
Router(config-if)# service
instance 10 ethernet
Step 5
encapsulation default
Example:
Router(config-if)# encapsulation
default
Step 6
Example:
Router(config-if-srv)# xconnect
1.1.1.1 100
encapsulation mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
106
Command or Action
Purpose
vc-idThe 32-bit identifier of the virtual circuit
(VC) between the PE routers.
encapsulationSpecifies the tunneling method
to encapsulate the data in the pseudowire.
mplsSpecifies MPLS as the tunneling method.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
107
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
108
If there is no EFP configured, the bridge domain ID equal to the outer-most VLAN tag is used as
forwarding and learning look-up key. For native VLAN frames, the bridge domain equal to the access
VLAN configured in the interface is used. If there is no matching entry in the Layer 2 forwarding table
for the ingress frame, the frame is flooded to all the ports within the bridge domain. Flooding within the
bridge domain occurs for unknown unicast, and broadcast.
Dynamic addresses are addresses learned from the source MAC address when the frame enters the router.
All unknown source MAC addresses are sent to the CPU along with ingress logical port number and
bridge domain ID for learning. Once the MAC address is learned, the subsequent frame with the
destination MAC address is forwarded to the learned port. When a MAC address moves to a different
port, the Layer 2 forwarding entry is updated with the corresponding port.
Dynamic addresses are aged out if there is no frame from the host with the MAC address. If the aged-out
frame is received by the router, it is flooded to the EFPs in the bridge domain and the Layer 2 forwarding
entry is created again. The default for aging dynamic addresses is 5 minutes.
You can configure dynamic address aging time by entering the mac address-table aging time [0 |
10-1000000]. The range is in seconds. An aging time of 0 means that the address aging is disabled.
MAC address movement is detected when the host router moves from one port to another. If a host
moves to another port or EFP, the learning lookup for the installed entry fails because the ingress logical
port number does not match and a new learning cache entry is created. The detection of MAC address
movement is disabled for static MAC addresses where the forwarding behavior is configured by the
user.
You should configure static MAC address before configuring static ARP (configure mac-address-table
static mac-address vlan vlan-id interface number command followed by arp ip-address
hardware-address encap-type command). This is because the Layer 2 MAC address and interface
information are required to program static ARP in hardware.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
109
Note
We recommend that you disable MAC address learning only in VLANs with two ports. If you disable
MAC address learning on a VLAN with more than two ports, every packet entering the switch is
flooded in that VLAN domain.
You cannot disable MAC address learning on a VLAN that is used internally by the router. VLAN
ID 1 is used internally by the router. If the VLAN ID that you enter is an internal VLAN, the switch
generates an error message and rejects the command.
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
Example:
Router(config)# no
mac-address-table learning vlan
10
Step 3
end
Step 4
What to Do Next
To reenable MAC address learning, use the mac-address-table learning global configuration command. The
command causes the configuration to appear in the show running-config privileged EXEC command display.
This example shows how to disable MAC-address learning for all modules on a specific routed interface:
Router(config)# no mac-address-table learning interface GigabitEthernet 0/5
Router(config)#
This example shows how to disable MAC address learning for port-channel interface:
Router(config)# no mac-address-table learning interface port-channel 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
110
Verification
The following are the examples of the outputs using the show commands.
Router# show mac-address-table
Mac Address Table
------------------------------------------Vlan
Mac Address
Type
Ports
------------------------20
2222.2222.2222
STATIC
Gi0/2
10
0000.0700.0a00
DYNAMIC
Gi0/9
10
0000.0700.0b00
DYNAMIC
Gi0/1
Total Mac Addresses for this criterion: 3
In the above example, the show mac-address-table command displays both the dynamically and statically
learned addresses.
Following is an example for show mac-address-table dynamic command which displays only dynamically
learned addresses.
Router# show mac-address-table dynamic
Mac Address Table
------------------------------------------Vlan
Mac Address
Type
Ports
------------------------10
0000.0700.0a00
DYNAMIC
Gi0/9
10
0000.0700.0b00
DYNAMIC
Gi0/1
Total Mac Addresses for this criterion: 2
Following is an example for show mac-address-table vlan 10 command which displays only the addresses
learned on a particular VLAN/BD.
Router# show mac-address-table vlan 10
Mac Address Table
------------------------------------------Vlan
Mac Address
Type
Ports
------------------------10
0000.0700.0a00
DYNAMIC
Gi0/9
10
0000.0700.0b00
DYNAMIC
Gi0/1
Total Mac Addresses for this criterion: 2
Following is an example for show mac-address-table interface g0/9 command which displays only the addresses
learned on a particular VLAN/BD interface.
Router# show mac-address-table interface 0/9
Mac Address Table
------------------------------------------Vlan
Mac Address
Type
Ports
------------------------10
0000.0700.0a00
DYNAMIC
Gi0/9
Total Mac Addresses for this criterion: 1
Following is an example for show mac-address-table interface port-channel command which displays only
the addresses learned on a particular port-channel interface.
Router# show mac-address-table interface port-channel 1
Mac Address Table
------------------------------------------Vlan
Mac Address
Type
Ports
------------------------10
0000.0700.0b00
DYNAMIC
Po1
Total Mac Addresses for this criterion: 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
111
Restrictions
Inner VLAN range filtering for QinQ traffic from Network-to-Network Interface (NNI) to
User-to-Network Interface (UNI) is not enforced if the range is more than 1000.
Egress VLAN range filtering for traffic coming from NNI to UNI, is not supported on UNI.
Single-tagged EVC with VLAN range is not supported on the port channel.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
112
Figure 2: Original (Normal), 802.1Q, and Double-Tagged Ethernet Packet Formats, on page 113 shows the
tag structures of the double-tagged packets.
Figure 2: Original (Normal), 802.1Q, and Double-Tagged Ethernet Packet Formats
In Figure 3: 802.1Q Tunnel Ports in a Service-Provider Network, on page 114, Customer A is assigned VLAN
30, and Customer B is assigned VLAN 40. Packets entering the edge routers with 802.1Q tags are double-tagged
when they enter the service-provider network, with the outer tag containing VLAN ID 30 or 40, appropriately,
and the inner tag containing the original VLAN number, for example, VLAN 100. Even if both Customers
A and B have VLAN 100 in their networks, the traffic remains segregated within the service-provider network
because the outer tag is different. Each customer controls its own VLAN numbering space, which is independent
of the VLAN numbering space used by other customers and the VLAN numbering space used by the
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
113
service-provider network. At the outbound port, the original VLAN numbers on the customer's network are
recovered.
Figure 3: 802.1Q Tunnel Ports in a Service-Provider Network
For Customer A, service instance 1 on Gigabit Ethernet port 0/1 is configured with the VLAN encapsulations
used by the customer: C-VLANs 1100. These are forwarded on bridge-domain 500. The service provider
facing port is configured with a service instance on the same bridge-domain and with an encapsulation dot1q
command matching the S-VLAN. The rewrite ingress pop 1 symmetric command also implies a push of
the configured encapsulation on egress packets. Therefore, the original packets with VLAN tags between 1
and 100 are encapsulated with another S-VLAN (VLAN 30) tag when exiting Gigabit Ethernet port 0/2.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
114
Similarly, for double- tagged (S-VLAN = 30, C-VLAN = 1100) packets coming from the provider network,
using the rewrite ingress pop 1 symmetric command enables the outer S-VLAN tag and forwards the original
C-VLAN tagged frame over bridge-domain 500 out to Gigabit Ethernet port 0/1.
Customer B
Router(config)# interface gigabitethernet0/3
Router(config-if)# service instance 1 Ethernet
Router(config-if-srv)# encapsulation dot1q 1-200
Router(config-if-srv)# bridge-domain 500
Router(config)# interface gigabitethernet0/4
Router(config-if)# service instance 2 Ethernet
Router(config-if-srv)# encapsulation dot1q 40 second-dot1q 1-200
Router(config-if-srv)# rewrite ingress pop 1 symmetric
Router(config-if-srv)# bridge-domain 500
Routed QinQ
Cisco ASR 901 Cisco ASR 901S router supports pop 2 configuration.
Restrictions
Pop 2 is not supported for MPLS, L2VPN, and MPLS VPN deployments.
ACL and QOS configurations for pop2 EVC scenarios are not supported.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
115
The traffic coming from the Base Transceiver Station (BTS) through the GigabitEthernet interface 0/1
has the VLAN tag 10, which is popped and hits the Switch Virtual Interface (SVI) 100.This gets routed
to SVI 101 depending on the destination address.
At the egress on the core interface, two tags (20 and 30) are pushed and sent out of GigabitEthernet
interface 0/2, for SVI 101.
The traffic coming from the core router through GigabitEthernet interface 0/2, is destined to the BTS
and has two tags (20,30); both tags get popped and hit SVI 101. This gets routed to SVI 100, which
sends the traffic out of GigabitEthernet interface 0/1 with VLAN 10.
GigabitEthernet interface 0/2 can have multiple service instances and the traffic egresses out of the
corresponding service instance depending on the SVI it gets routed to.
Restrictions
You must configure SVIs for bridge-domain routing.
The bridge domain must be in the range of 1 to 4094 to match the supported VLAN range.
You cannot have any Layer 2 switchports in the VLAN (bridge domain) used for routing.
You can use bridge domain routing with only native packets.
MPLS is supported on EFP with SVI.
Scale limit for EFPs reduces if you use the second-dotlq command. Use the second-dotlq any command
to maintain this limit.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
116
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 15
Step 4
ip address dhcp
Example:
Router(config-if)# ip address dhcp
Step 5
interface type-number
Example:
Router(config-if)# interface
GigabitEthernet0/70/2
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
117
Command or Action
Step 7
Purpose
Step 8
bridge-domain bridge-id
Example:
Router(config-if)# bridge-domain 15
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
118
All incoming VLANs (outer-most or single) mapped to a bridge domain must belong to the same MST
instance or loops could occur.
For all EFPs that are mapped to the same MST instance, you must configure backup EFPs on every
redundant path to prevent loss of connectivity due to STP blocking a port.
EVC only supports MSTP.
Monitoring EVC
Note
Statistics are not available in the service instance command. To look at flow statistics, you need to configure
a class default policy on the service instance.
Command
Description
show bridge-domain [n ]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
119
Command
Description
Pkts Out
0
Bytes Out
0
show mac address-table count bridge-domain bridge-domain This command displays the number of addresses present for the
specified bridge domain.
id
show mac address-table learning bridge-domain bridge-domain This command displays the learning status for the specified bridge
domain.
id
Example
This is an example of output from the show ethernet service instance detail command:
Router# show ethernet service instance id 1 interface gigabitEthernet 0/1 detail
Service Instance ID: 1
Associated Interface: GigabitEthernet0/130/5
Associated EVC: EVC_P2P_10
L2protocol drop
CE-Vlans:
Encapsulation: dot1q 10 vlan protocol type 0x8100
Interface Dot1q Tunnel Ethertype: 0x8100
State: Up
EFP Statistics:
Pkts In
Bytes In
Pkts Out Bytes Out
214
15408
97150
6994800
EFP Microblocks:
****************
Microblock type: Bridge-domain
Bridge-domain: 10
This is an example of output from the show ethernet service instance statistics command:
Router# show ethernet service instance id 1 interface gigabitEthernet
Service Instance 1, Interface GigabitEthernet0/130/5
Pkts In
Bytes In
Pkts Out Bytes Out
214
15408
97150
6994800
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
120
This is an example of output from the show mac-address table count command:
Router# show mac address-table count bridge-domain 10
Mac Entries for BD
10:
--------------------------Dynamic Address Count : 20
Static Address Count : 0
Total Mac Addresses : 20
exceed-action drop
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
121
interface GigabitEthernet0/2
no negotiation auto
!
interface GigabitEthernet0/3
no negotiation auto
!
interface GigabitEthernet0/4
no negotiation auto
!
interface GigabitEthernet0/5
no negotiation auto
!
interface GigabitEthernet0/6
no negotiation auto
!
interface GigabitEthernet0/7
no negotiation auto
!
interface GigabitEthernet0/8
no negotiation auto
!
interface GigabitEthernet0/9
no negotiation auto
service instance 2615 ethernet
encapsulation dot1q 100 second-dot1q 2615
rewrite ingress tag pop 1 symmetric
bridge-domain 2615
!
service instance 3615 ethernet
encapsulation dot1q 100 second-dot1q 3615
rewrite ingress tag pop 1 symmetric
bridge-domain 3615
!
!
interface GigabitEthernet0/10
no negotiation auto
!
interface GigabitEthernet0/11
no negotiation auto
!
interface ToP0/12
no negotiation auto
!
interface FastEthernet0/0
full-duplex
!
interface Vlan1
!
ip forward-protocol nd
!
!
no ip http server
!
logging esm config
!
!
!
control-plane
!
!
line con 0
line con 1
transport preferred lat pad telnet rlogin udptn mop ssh
transport output lat pad telnet rlogin udptn mop ssh
line vty 0 4
login
!
exception data-corruption buffer truncate
exception crashinfo buffersize 128
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
122
Note
We suggest you do not use the debug command without TAC supervision.
Command
Purpose
Additional References
The following sections provide references related to Configuring EVC feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
123
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
124
Feature Name
Releases
Feature Information
15.2(2)SNH1
15.3(2)S
15.4(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
125
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
126
CHAPTER
Configuring EtherChannels
This chapter describes how to configure EtherChannels on the Cisco ASR 901 Cisco ASR 901S router
Layer 2 or Layer 3 LAN ports.
Understanding How EtherChannels Work, page 127
EtherChannel Configuration Guidelines and Restrictions, page 130
Configuring Etherchannels, page 131
EVC On Port-Channel , page 137
Note
The network device to which a Cisco ASR 901 Cisco ASR 901S is connected may impose its own limits
on the number of ports in an EtherChannel.
If a segment within an EtherChannel fails, traffic previously carried over the failed link switches to the
remaining segments within the EtherChannel. When a failure occurs, the EtherChannel feature sends a trap
that identifies the router, the EtherChannel, and the failed link. Inbound broadcast packets on one segment in
an EtherChannel are blocked from returning on any other segment of the EtherChannel.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
127
Configuring EtherChannels
Understanding How EtherChannels Are Configured
Mode
Description
on
passive
active
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
128
Configuring EtherChannels
Understanding How EtherChannels Are Configured
Both the passive and active modes allow LACP to negotiate between LAN ports to determine if they can
form an EtherChannel, based on criteria such as port speed and trunking state. Layer 2 EtherChannels also
use VLAN numbers.
LAN ports can form an EtherChannel when they are in different LACP modes as long as the modes are
compatible. For example:
A LAN port in active mode can form an EtherChannel successfully with another LAN port that is in
active mode.
A LAN port in active mode can form an EtherChannel with another LAN port in passive mode.
A LAN port in passive mode cannot form an EtherChannel with another LAN port that is also in passive
mode, because neither port will initiate negotiation.
Table 12: LACP EtherChannel Modes, on page 129 provides a summary of these combinations.
Table 12: LACP EtherChannel Modes
Router A
Router B
Result
passive mode
passive mode
passive mode
active mode
active mode
passive mode
active mode
active mode
Note
The LACP system ID is the combination of the LACP system priority value and the MAC address of the
router.
Note
Port priority is only effective when it is configured on a device with an LACP system priority higher than
the peer.
LACP administrative keyLACP automatically configures an administrative key value equal to the
channel group identification number on each port configured to use LACP. The administrative key
defines the ability of a port to aggregate with other ports. A ports ability to aggregate with other ports
is determined by these factors:
Port physical characteristics, such as data rate, duplex capability, and point-to-point or shared
medium
Configuration restrictions that you establish
On ports configured to use LACP, LACP tries to configure the maximum number of compatible ports in an
EtherChannel, up to the maximum allowed by the hardware (eight ports). If LACP cannot aggregate all the
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
129
Configuring EtherChannels
Understanding Port-Channel Interfaces
ports that are compatible (for example, the remote system might have more restrictive hardware limitations),
then all the ports that cannot be actively included in the channel are put in hot standby state and are used only
if one of the channeled ports fails. You can configure an additional 8 standby ports (total of 16 ports associated
with the EtherChannel).
When EtherChannel interfaces are configured improperly, they are disabled automatically to avoid network
loops and other problems.
The commands in this chapter can be used on all LAN ports in the Cisco ASR 901 Cisco ASR 901S .
Configure all LAN ports in an EtherChannel to use the same EtherChannel protocol; you cannot run
two EtherChannel protocols in one EtherChannel.
Configure all LAN ports in an EtherChannel to operate at the same speed and in the same duplex mode.
LACP does not support half-duplex. Half-duplex ports in an LACP EtherChannel are put in the suspended
state.
Enable all LAN ports in an EtherChannel. If you shut down a LAN port in an EtherChannel, it is treated
as a link failure and its traffic is moved to one of the remaining ports in the EtherChannel.
An EtherChannel will not form if one of the LAN ports is a Switched Port Analyzer (SPAN) destination
port.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
130
Configuring EtherChannels
Configuring Etherchannels
Configuring Etherchannels
This section contains the following topics:
Note
Ensure that the LAN ports are configured correctly (see the EtherChannel Configuration Guidelines and
Restrictions, on page 130).
When configuring Layer 2 EtherChannels, configure the LAN ports with the channel-group command
as described in this section, which automatically creates the port-channel logical interface. You cannot
add Layer 2 LAN ports into a manually created port-channel interface.
To create port-channel interfaces for Layer 2 EtherChannels, the Layer 2 LAN ports must be connected
and functioning.
To configure channel groups, complete the following steps for each LAN port in interface configuration mode:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
131
Configuring EtherChannels
Configuring the LACP System Priority and System ID
Procedure
Command or Action
Purpose
Step 1
Step 2
Router(config-if)# no ip address
Step 3
Router(config-if)# channel-protocol
lacp
Step 4
Router(config-if)# channel-group
number mode {active | on | passive}
Step 5
Step 6
Router(config-if)# end
Step 7
Procedure
Step 1
Command or Action
Purpose
Example:
Router(config)# lacp system-priority
23456
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
132
Configuring EtherChannels
Configuring the LACP Transmit Rate
Step 2
Command or Action
Purpose
end
Example:
Router(config)# end
Step 3
What to Do Next
Configuration examples for LACP system priority
This example shows how to configure the LACP system priority:
Router# configure terminal
Router(config)# lacp system-priority 23456
Router(config)# end
The system priority is displayed first, followed by the MAC address of the router.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
133
Configuring EtherChannels
Verifying the LACP Transmit Rate
Step 3
Command or Action
Purpose
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
Example:
end
Example:
Router(config-if)# end
Procedure
Step 1
Command or Action
Purpose
Router(config)# port-channel
load-balance {src-mac | dst-mac |
src-dst-mac | src-ip | dst-ip |
src-dst-ip}
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
134
dst-ipDestination IP addresses
Configuring EtherChannels
Modifying MTU Size on Port-Channel
Command or Action
Purpose
dst-macDestination MAC addresses
src-dst-ipSource and destination IP addresses
src-dst-macSource and destination MAC
addresses
src-ipSource IP addresses
src-macSource MAC addresses
Step 2
Router(config)# end
Step 3
Configuration Examples
This example shows how to configure EtherChannel to use source and destination IP addresses:
Router# configure terminal
Router(config)# port-channel load-balance src-dst-ip
Router(config)# end
Router(config)#
Note
If the MTU size of a port-channel member link is different from the MTU size of the port-channel interface,
the member link is not bundled.
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
135
Configuring EtherChannels
Modifying MTU Size on Port-Channel
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
port-channel 1
Step 4
mtu bytes
Example:
Router(config-if)# mtu 4000
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
136
Configuring EtherChannels
EVC On Port-Channel
EVC On Port-Channel
An EtherChannel bundles individual Ethernet links into a single logical link that provides the aggregate
bandwidth of up to eight physical links.The EVC EtherChannel feature provides support for EtherChannels
on Ethernet Virtual Connection Services (EVCS) service instances.
The EVC EtherChannel feature supports MPBE, local connect, and xconnect service types.
Load balancing is accomplished on a Ethernet flow point (EFP) basis where a number of EFPs exclusively
pass traffic through member links. In a default load balancing, you have no control over how the EFPs are
grouped together, and sometimes the EFP grouping may not be ideal. To avoid this, use manual load balancing
to control the EFP grouping.
Procedure
Step 1
Command or Action
Purpose
Example:
Router(config)# interface port-channel
11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
137
Configuring EtherChannels
Configuring EVC on Port-Channel
Step 2
Command or Action
Purpose
Example:
Router(config-if)# service instance 101
ethernet
Step 3
Example:
Router(config-if-srv)# encapsulation
dot1q 13
Step 4
Step 5
Example:
Router(config-if-srv)# bridge-domain
12
Purpose
Router# show ethernet service instance [id instance-id Displays information about one or more service
interface interface-id | interface interface-id] [detail] instances. If a service instance ID and interface are
specified, only data pertaining to that particular
service instance is displayed. If only an interface ID
is specified, displays data for all service instances s
on the given interface.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
138
Configuring EtherChannels
Configuring EVC on Port-Channel
Command
Purpose
Router# show policy-map interface service instance Displays the policy-map information for a given
service instance.
Solution
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
139
Configuring EtherChannels
Configuring EVC on Port-Channel
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
140
CHAPTER
10
Note
The Cisco ASR 901 Cisco ASR 901S router does not necessarily support all of the commands listed in
the Cisco IOS Carrier Ethernet documentation.
Note
Cisco ASR 901 Cisco ASR 901S does not support CFM pre-draft version.
Understanding Ethernet CFM, page 142
Configuring Ethernet CFM, page 142
Configuring CFM over EFP with Cross Connect, page 166
Configuring CFM with EVC Default Encapsulation, page 170
Verifying CFM with EVC Default Encapsulation, page 171
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
141
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
142
Note
You do not need to enter the ethernet cfm ieee global configuration command to configure the CFM
version as IEEE 802.1ag; the CFM version is always 802.1ag and the command is automatically generated
when you enable CFM.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
143
Command or Action
Purpose
(Optional) For hold-time, enter the maximum cache hold
time in minutes. The range is from 1 to 65535; the default
is 100 minutes.
Step 4
Step 5
Step 6
Step 7
Step 8
service {ma-name |
ma-number | vpn-id vpn }
{vlan vlan-id [direction
down] | port}
Step 9
continuity-check
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
144
Step 10
Command or Action
Purpose
continuity-check interval
value
Step 11
continuity-check
loss-threshold
threshold-value
Step 12
Step 13
Step 14
mip auto-create
[lower-mep-only | none]
Step 15
exit
Step 16
mip auto-create
[lower-mep-only]
Step 17
mep archive-hold-time
minutes
Step 18
exit
Step 19
interface interface-id
Step 20
Specify the service instance number and the name of the EVC.
Step 21
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
145
Command or Action
Purpose
Step 22
cos value
Step 24
end
Step 25
Step 26
Step 27
copy running-config
startup-config
What to Do Next
Note
Use the no form of each command to remove the configuration or return to the default configurations.
Example for Basic CFM configuration
Router(config)# ethernet cfm ieee
Router(config)# ethernet cfm global
Router(config)# ethernet cfm domain abc level 3
Router(config-ecfm)# service test evc EVC1 vlan 5
Router(config-ecfm-srv)# continuity-check
Router(config-ecfm-srv)# exit
Router(config-ecfm)# exit
Router(config)# ethernet evc EVC1
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service instance 1 ethernet EVC1
Router(config-if-srv)# encapsulation dot1q 5
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# bridge domain 5
Router(config-if-srv)# cfm mep domain abc mpid 100
Router(config-if-ecfm-mep)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
146
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
147
The following figure shows the configuring Mutli-NNI CFM in the same VPN.
Figure 4: Configuring Multi-NNI CFM in the Same VPN
Restrictions:
Two MAs can be configured such that MA2 connected with different BD will act as a proxy (alias) for
MA1 only for the MEPs which have the service direction as Up.
Y1731-PM is not supported with Multi-NNI CFM.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
148
Complete these steps to configure Multi-UNI CFM MEPs in the same VPN.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Example:
Router(config)# ethernet cfm
global
Step 3
ethernet cfm domain domain-name Define a CFM domain, set the domain level, and enter
ethernet-CFM configuration mode for the domain. The
level level-id
maintenance level number range is 0 to 7.
Example:
Router(config)# ethernet cfm
domain MD6 level 6
Step 4
Note
Step 5
continuity-check
Example:
Router(config-ecfm-srv)#
continuity-check
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
149
Step 6
Command or Action
Purpose
Example:
Router(config-ecfm-srv)#
continuity-check interval 1s
Step 7
continuity-check loss-threshold
threshold-value
Example:
Router(config-ecfm-srv)#
continuity-check loss-threshold
4
Step 8
alias{alias-short-ma-name | icc
icc-code meg-id | number
ma-number | vlan vlan-id | vpn
vpn-id}
Example:
Router(config-ecfm-srv)# alias
MA6
Step 9
exit
Step 10
exit
Step 11
interface interface-id
Example:
Router(config)# interface
gigabitethernet 0/4
Step 12
service instance number ethernet Specify the service instance number and the name of the
EVC.
name
Example:
Router(config-if)# service
instance 30 ethernet EVC30
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
150
Step 13
Command or Action
Purpose
Example:
Router(config-if-srv)# cfm mep
domain MD6 mpid 30
Step 14
end
Step 15
Step 16
Step 17
copy running-config
startup-config
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
151
Verification
Use the following commands to verify a configuration:
Use the show ethernet cfm maintenance-point local command to verify the Multi-UNI CFMs over EVC
configuration. This command shows the basic configuration information for Multi-UNI CFM.
Router# show ethernet cfm maintenance-points local
Local MEPs:
-------------------------------------------------------------------------------MPID Domain Name
Lvl
MacAddress
Type CC
Ofld Domain Id
Dir
Port
Id
MA Name
SrvcInst
Source
EVC name
-------------------------------------------------------------------------------30
MD6
6
4055.3989.7868 BD-V Y
No
MD6
Up
Gi0/4
30
MA6
30
Static
evc30
40
MD6
6
4055.3989.7869 BD-V Y
No
MD6
Up
Gi0/5
40
MA6_alias (MA6)
40
Static
evc40
Total Local MEPs: 2
Local MIPs: None
Use the show ethernet cfm maintenance-point remote to verify the MEP configuration:
Router# show ethernet cfm maintenance-points remote
-------------------------------------------------------------------------------MPID Domain Name
MacAddress
IfSt PtSt
Lvl Domain ID
Ingress
RDI MA Name
Type Id
SrvcInst
EVC Name
Age
Local MEP Info
-------------------------------------------------------------------------------40
MD6
4055.3989.7869
Up
Up
6
MD6
Gi0/6
MA6
BD-V 30
30
evc30
0s
MPID: 30 Domain: MD6 MA: MA6
30
MD6
4055.3989.7868
Up
Up
6
MD6
Gi0/7
MA6_alias (MA6)
BD-V 40
40
evc40
1s
MPID: 40 Domain: MD6 MA: MA6_alias (MA6)
Total Remote MEPs: 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
152
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
ethernet cfm mep crosscheck Configure the number of seconds that the device waits for
remote MEPs to come up before the crosscheck is started. The
start-delay delay
range is 1 to 65535; the default is 30 seconds.
Step 3
Step 4
Step 6
end
Step 7
ethernet cfm mep crosscheck Enable or disable CFM crosscheck for one or more VLANs or
a port MEP in the domain.
{enable | disable} domain
domain-name {vlan {vlan-id |
domain domain-nameSpecify the name of the created
any} | port}
domain.
vlan {vlan-id | any}Enter the service provider VLAN
ID or IDs as a VLAN-ID (1 to 4094), a range of
VLAN-IDs separated by a hyphen, or a series of VLAN
IDs s}eparated by comma. Enter any for any VLAN.
portIdentify a port MEP.
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
153
Note
Command or Action
Purpose
Step 9
Step 10
copy running-config
startup-config
Use the no form of each command to remove a configuration or to return to the default settings.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
ethernet cfm domain domain-name Define a CFM domain, set the domain level, and enter
ethernet-cfm configuration mode for the domain. The
level level-id
maintenance level number range is 0 to 7.
Step 3
Step 4
continuity-check
Step 5
Step 6
Step 7
end
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
154
Command or Action
Purpose
Step 9
Step 10
copy running-config
startup-config
What to Do Next
Note
Use the no form of each command to remove a configuration or to return to the default settings.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
service {ma-name |
ma-number | vpn-id} port
Step 4
Step 5
continuity-check
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
155
Step 6
Command or Action
Purpose
continuity-check interval
value
Step 7
Step 8
continuity-check static rmep Enable checking of the incoming continuity check message
from a remote MEP that is configured in the MEP list.
Step 9
exit
Step 10
exit
Step 11
interface interface-id
Step 12
Step 13
end
Step 14
Step 15
Step 16
copy running-config
startup-config
What to Do Next
Note
Use the no form of each command to remove a configuration or to return to the default settings.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
156
Note
The efd notify g8032 command is optional for offload cfm sessions. This command must be used under
CFM configuration to notify G.8032 of failures, if any.
Restrictions
CFM offload is not supported on up MEPs.
CFM offload is not supported on xconnect EVC.
Loopback reply (LBR) and loopback trace (LTR) packets are generated at CPU for offloaded sessions.
CFM offload is supported on port-channel EVC and port MEP from Cisco IOS XE Release 3.14 onwards.
CFM offload is not supported on following EVC encapsulation types :
Dot1Q without rewrite
QinQ with Pop1
Default EFP
Dot1ad-dot1Q with Pop1
Untagged EVC
Delay Measurement Message (DMM) is supported for CFM offload sessions from Cisco IOS XE Release
3.15 onwards.
MIP is not supported for CFM offload sessions.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
157
MIP configured for offloaded MEP does not identify remote MEPs. This affects the traceroute and
loopback CFM protocols because the CPU does not receive CCM for the offloaded MEP.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Step 4
service {ma-name |
ma-number | vpn-id vpn }
{vlan vlan-id [direction
down] | port}
Step 5
continuity-check
Step 6
continuity-check interval
value
Step 7
continuity-check
loss-threshold
threshold-value
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
158
Command or Action
Purpose
Step 8
Defines the sampling rate for the offloaded CFM session. The
default is 20,000. The range is 5000 to 65535.
Step 9
Step 10
exit
To verify the information about a remote maintenance point domains or levels or details in the CFM database,
use the show ethernet cfm maintenance-points remote command, as shown in this example:
Router# show ethernet cfm maintenance-points remote
-------------------------------------------------------------------------------MPID Domain Name
MacAddress
IfSt PtSt
Lvl Domain ID
Ingress
RDI MA Name
Type Id
SrvcInst
EVC Name
Age
Local MEP Info
-------------------------------------------------------------------------------2039 d7
7cad.749d.9276
Up
Up
7
d7
Gi0/6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
159
s7
e7
MPID: 2051 Domain: d7 MA: s7
BD-V 200
100
7s
The following sample configuration shows how to configure CFM with hardware offloading for G.8032.
Down MEP between Node 3 and Node 6
!
interface GigabitEthernet0/6
no ip address
media-type auto-select
negotiation auto
service instance 2 ethernet
encapsulation dot1q 50
rewrite ingress tag pop 1 symmetric
bridge-domain 50
!
service instance 100 ethernet e7
encapsulation dot1q 200
rewrite ingress tag pop 1 symmetric
bridge-domain 200
cfm mep domain d7 mpid 2051
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
160
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Step 4
end
Step 5
show running-config
Step 6
What to Do Next
Note
Use the no form of each command to remove a configuration or to return to the default settings.
Note
The Cisco ASR 901 Cisco ASR 901S does not necessarily support all of the commands listed in the
Cisco IOS IP SLA documentation.
This section includes these procedures:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
161
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
ip sla operation-number
Step 3
Step 4
cos operation-number
Step 5
frequencyoperation-number
Step 6
historyoperation-number
Step 7
owneroperation-number
Step 8
Step 9
tagoperation-number
Step 10
thresholdoperation-number
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
162
Command or Action
Purpose
Step 11
timeoutoperation-number
Step 12
exit
Step 13
ip sla
Schedule the time parameters for the IP SLA operation.
scheduleoperation-number[ageout
operation-number Enter the IP SLA operation
operation-number] [life {forever |
number.
operation-number }] [recurring]
[start-time {operation-number}
(Optional) ageoutoperation-numberEnter the
[operation-number |
number of seconds to keep the operation in memory
operation-number] | pending | now
when it is not actively collecting information. The
| afteroperation-number}]
range is 0 to 2073600 seconds. The default is 0
seconds.
(Optional) lifeSet the operation to run indefinitely
(forever) or for a specific number of seconds . The
range is from 0 to 2147483647. The default is 3600
seconds (1 hour)
(Optional) recurringSet the probe to be
automatically scheduled every day.
(Optional) start-timeEnter the time for the operation
to begin collecting information:
To start at a specific time, enter the hour, minute,
second (in 24-hour notation), and day of the
month.
Enter pending to select no information collection
until a start time is selected.
Enter now to start the operation immediately.
Enter afteroperation-numberto show that the
operation should start after the entered time has
elapsed.
Step 14
end
Step 15
Step 16
copy running-config
startup-config
What to Do Next
To remove an IP SLA operation, enter the no ip sla operation-number global configuration command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
163
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
ip sla ethernet-monitor
operation-number
Step 3
Example:
type jitter domain
domain-name vlan vlan-id
[exclude-mpids mp-ids]
[interval
interpacket-interval]
[num-frames number-of
frames transmitted]
Step 4
cos cos-value
Step 5
owner owner-id
Step 6
request-data-size bytes
Step 7
tag text
Step 8
threshold milliseconds
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
164
Command or Action
Purpose
Step 9
timeout milliseconds
Step 10
exit
Step 11
ip sla schedule
operation-number [ageout
seconds] [life {forever |
seconds }] [recurring]
[start-time{hh:mm {:ss}
[month day | day month] |
pending | now | after
hh:mm:ss}]
Step 12
end
Step 13
Step 14
copy running-config
startup-config
What to Do Next
To remove an IP SLA operation, enter the no ip sla operation-number global configuration command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
165
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router# enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
pseudowire-class [pw-class-name]
Example:
Router(config)# pseudowire-class
vlan-xconnect
Step 4
encapsulation mpls
Example:
Step 5
exit
Example:
Router(config-if-srv)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
166
Step 6
Command or Action
Purpose
Example:
Router(config-if-srv)# interface
Gi2/0/2
Step 7
Step 8
Step 9
Example:
Router(config-if-srv)# xconnect
10.0.3.201 123 pw-class vlan-xconnect
Step 10
cfm mep domain domain-name [up | down] Configures a maintenance endpoint (MEP) for a
domain.
mpid mpid-value [cos cos-value]
Example:
Router(config-if-srv)# cfm mep down
mpid 100 domain Core
Step 11
exit
Example:
Router(config-if-srv)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
167
Examples
This example shows how to configure CFM over EVC using cross connect.
ASR901(config)#ethernet cfm ieee
ASR901(config)#ethernet cfm global
ASR901(config)#ethernet cfm domain L5 level 5
ASR901(config-ecfm)# service s1 evc e711
ASR901(config-ecfm-srv)# continuity-check
ASR901(config-ecfm-srv)#exit
ASR901(config-ecfm)#exit
Examples
This example shows how to configure CFM over EFP Interface with Port Channel-Based cross connect Tunnel:
ASR901(config)#ethernet cfm ieee
ASR901(config)#ethernet cfm global
ASR901(config)#ethernet cfm domain L5 level 5
ASR901(config-ecfm)# service s1 evc e711
ASR901(config-ecfm-srv)# continuity-check
ASR901(config-ecfm-srv)#exit
ASR901(config-ecfm)#exit
ASR901(config)#interface GigabitEthernet0/1
ASR901(config-if)# negotiation auto
ASR901(config-if)# no keepalive
ASR901(config-if)# channel-group 1 mode on
ASR901(config-if)#exit
ASR901(config)#interface GigabitEthernet0/70/5
ASR901(config-if)# negotiation auto
ASR901(config-if)# channel-group 1 mode on
ASR901(config-if)#exit
ASR901(config)#int port-channel 1
ASR901(config-if)#service instance 711 ethernet e711
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
168
Verification
Use the following commands to verify a configuration:
Use the show ethernet cfm maintenance-point local commands to verify the CFM over EVC configuration.
This command shows the basic configuration information for CFM.
Router-30-PE1#show ethernet cfm maintenance-point local
Local MEPs:
-------------------------------------------------------------------------------MPID Domain Name
Lvl
MacAddress
Type CC
Domain Id
Dir
Port
Id
MA Name
SrvcInst
EVC name
-------------------------------------------------------------------------------1
L6
6
000a.f393.56d0 XCON Y
L6
Down Gi0/2 N/A
bbb
1
bbb
3
L5
5
0007.8478.4410 XCON Y
L5
Up
Gi0/2 N/A
bbb
1
bbb
Total Local MEPs: 2
Local MIPs:
* = MIP Manually Configured
-------------------------------------------------------------------------------Level Port
MacAddress
SrvcInst
Type
Id
-------------------------------------------------------------------------------7
Gi0/2 0007.8478.4410 1
XCON
N/A
Total Local MIPs: 1
Use the show ethernet cfm maintenance-point remote to verify the MEP configuration:
Router-30-PE1#show ethernet cfm maintenance-point remote
-------------------------------------------------------------------------------MPID Domain Name
MacAddress
IfSt PtSt
Lvl Domain ID
Ingress
RDI MA Name
Type Id
SrvcInst
EVC Name
Age
-------------------------------------------------------------------------------4
L5
000a.f393.56d0
Up
Up
5
L5
Te2/0/0:(2.2.2.2, 1)
bbb
XCON N/A
1
bbb
9s
2
L6
000a.f393.56d0
Up
Up
6
L6
Te2/0/0:(2.2.2.2, 1)
bbb
XCON N/A
1
bbb
1s
Total Remote MEPs: 2
Use the show ethernet cfm mpdb command to verify the catalouge of CC with MIP in intermediate
routers.
PE2#show ethernet cfm mpdb
* = Can Ping/Traceroute to MEP
-------------------------------------------------------------------------------MPID Domain Name
MacAddress
Version
Lvl
Domain ID
Ingress
Expd MA Name
Type Id
SrvcInst
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
169
EVC Name
Age
-------------------------------------------------------------------------------600 * L6
0021.d8ca.d7d0
IEEE-CFM
6
L6
Te2/1:(2.2.2.2, 1)
s1
XCON N/A
1
1
2s
700
L7
001f.cab7.fd01
IEEE-CFM
7
L7
Te2/1:(2.2.2.2, 1)
s1
XCON N/A
1
1
3s
Total Remote MEPs: 2
Use show ethernet cfm error command to view the error report:
PE2#show ethernet cfm error
-------------------------------------------------------------------------------MPID Domain Id
Mac Address
Type
Id Lvl
MAName
Reason
Age
-------------------------------------------------------------------------------- L3
001d.45fe.ca81 BD-V
200 3
s2
Receive AIS
8s
PE2#
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
GigabitEthernet0/9
Step 4
service instance instance-id ethernet Creates a service instance on an interface and defines the
matching criteria.
evc-name
Example:
Router(config-if)# service
instance 1 ethernet evc100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
170
Step 5
Command or Action
Purpose
encapsulation default
Example:
Router(config-if-srv)#
encapsulation default
Step 6
bridge-domain bridge-id
Example:
Router(config-if-srv)#
bridge-domain 99
Step 7
cfm encapsulation {dot1ad vlan-id | Configures connectivity fault management (CFM) Ethernet
frame encapsulation.
dot1q vlan-id} [dot1q vlan-id |
second-dot1q vlan-id]
dot1adIndicates the 802.1ad provider bridges
encapsulation type.
Example:
Router(config-if-srv)# cfm
encapsulation dot1q 75
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
171
!
interface GigabitEthernet0/9
no ip address
negotiation auto
service instance 1 ethernet evc100
encapsulation default
bridge-domain 99
cfm mep domain md2 mpid 111
cfm encapsulation dot1q 75
!
end
Router# show running-config interface gigabitEthernet 0/4
Building configuration...
Current configuration : 69 bytes
!
interface GigabitEthernet0/0
no ip address
negotiation auto
end
Configuring ETH-AIS
Complete the following steps to configure ETH- AIS on the router:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
172
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Step 4
period value
Step 5
exit
Step 6
Step 7
service {short-ma-name |
number MA-number | vlan-id
primary-vlan-id | vpn-id vpn-id}
{vlan vlan-id | port | evc
evc-name}
Step 8
Step 9
Step 10
Step 11
no ais suppress-alarms
Step 12
exit
Step 13
exit
Step 14
interface interface-id
Step 15
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
173
Command or Action
Purpose
Step 16
Step 17
Step 18
end
Step 19
Step 20
Step 21
copy running-config
startup-config
What to Do Next
Use the no form of this commands to return to the default configuration or to remove a configuration. To
disable the generation of ETH-AIS frames, enter the disable config-ais-link-cfm mode command.
This is an example of the output from the show ethernet cfm smep command when Ethernet AIS has been
enabled:
Router# show ethernet cfm smep
SMEP Settings:
-------------Interface: GigabitEthernet1/0/3
LCK-Status: Enabled
LCK Period: 60000 (ms)
Level to transmit LCK: Default
AIS-Status: Enabled
AIS Period: 60000 (ms)
Level to transmit AIS: Default
Defect Condition: AIS
Configuring ETH-LCK
Complete the following steps to configure ethernet locked signal on a switch:
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
ethernet cfm lck link-status Execute SMEP LCK commands by entering config-lck-link-cfm
mode.
global
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
174
Step 3
Command or Action
Purpose
Step 4
period value
Step 5
exit
Step 6
Step 7
service {ma-name |
ma-number | vpn-id vpn}
{vlan vlan-id [direction
down] | port}
Step 8
Step 9
Step 10
(Optional) Set the expiring threshold for the MA. The range is
2 to 255. The default is 3.5.
Step 11
exit
Step 12
exit
Step 13
interface interface-id
Step 14
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
175
Command or Action
Purpose
Step 15
ethernet cfm lck link-status Configure the ETH-LCK transmission period generated by the
SMEP on the interface. Allowable values are 1 second or 60
period value
seconds.
Step 16
ethernet cfm lck link-status Configure the maintenance level for sending ETH-LCK frames
sent by the SMEP on the interface. The range is 0 to 7.
level level-id
Step 17
end
Step 18
Step 20
Step 21
copy running-config
startup-config
To remove the LCK condition from MEP, enter the ethernet cfm lck stop mpid local-mpid domain
domain-name vlan vlan-id privileged EXEC command. To put an interface out of LCK condition, enter the
ethernet cfm lck start interface interface-id direction {inward | outward} privileged EXEC command.
This is an example of the output from the show ethernet cfm smep command when ethernet LCK has been
enabled:
Switch# show ethernet cfm smep
SMEP Settings:
-------------Interface: GigabitEthernet0/3
LCK-Status: Enabled
LCK Period: 60000 (ms)
Level to transmit LCK: Default
AIS-Status: Enabled
AIS Period: 60000 (ms)
Level to transmit AIS: Default
Defect Condition: AIS
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
176
Command
Purpose
Use the commands in Table 14: Displaying CFM Information , on page 177 in the privileged EXEC mode to
display Ethernet CFM information.
Table 14: Displaying CFM Information
Command
Purpose
show ethernet cfm maintenance-points local [detail | domain Displays maintenance points configured on a device.
| interface | level | mep | mip]
show ethernet cfm maintenance-points remote [crosscheck | Displays information about a remote maintenance point domains
or levels or details in the CFM database.
detail | domain | static]
show ethernet cfm mpdb
This is an example of output from the show ethernet cfm domain brief command:
Router# show ethernet cfm domain brief
Domain Name
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
177
level5
level3
test
name
test1
lck
1
2
3
4
5
6
5
3
3
3
2
1
1
1
3
1
1
1
100
100
100
100
100
100Total Services : 1
This is an example of output from the show ethernet cfm errors command:
Router# show ethernet cfm errors
-------------------------------------------------------------------------------MPID Domain Id
Mac Address
Type
Id Lvl
MAName
Reason
Age
-------------------------------------------------------------------------------6307 level3
0021.d7ee.fe80 Vlan
7
3
vlan7
Receive RDI
5s
This is an example of output from the show ethernet cfm maintenance-points local detail command:
Router# show ethernet cfm maintenance-points local detail
Local MEPs:
---------MPID: 7307
DomainName: level3
Level: 3
Direction: Up
Vlan: 7
Interface: Gi0/3
CC-Status: Enabled
CC Loss Threshold: 3
MAC: 0021.d7ef.0700
LCK-Status: Enabled
LCK Period: 60000(ms)
LCK Expiry Threshold: 3.5
Level to transmit LCK: Default
Defect Condition: No Defect
presentRDI: FALSE
AIS-Status: Enabled
AIS Period: 60000(ms)
AIS Expiry Threshold: 3.5
Level to transmit AIS: Default
Suppress Alarm configuration: Enabled
Suppressing Alarms: No
MIP Settings:
------------Local MIPs:
* = MIP Manually Configured
-----------------------------------------------------------------------------Level Port
MacAddress
SrvcInst
Type
Id
-----------------------------------------------------------------------------*5
Gi0/3
0021.d7ef.0700 N/A
Vlan
2,7
This is an example of output from the show ethernet cfm traceroute command:
Router# show ethernet cfm traceroute
Current Cache-size: 0 Hops
Max Cache-size: 100 Hops
Hold-time: 100 Minutes
Use the commands in Table 15: Displaying IP SLA CFM Information, on page 178 in the privileged EXEC
mode to display IP SLA ethernet CFM information.
Table 15: Displaying IP SLA CFM Information
Command
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
178
Command
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
179
OAM Features
The following OAM features are defined by IEEE 802.3ah:
Discovery
Discovery is the first phase of Ethernet OAM and it identifies the devices in the network and their OAM
capabilities. Discovery uses information OAM PDUs. During the discovery phase, the following information
is advertised within periodic information OAM PDUs:
OAM modeConveyed to the remote OAM entity. The mode can be either active or passive and can
be used to determine device functionality.
OAM configuration (capabilities)Advertises the capabilities of the local OAM entity. With this
information a peer can determine what functions are supported and accessible; for example, loopback
capability.
OAM PDU configurationIncludes the maximum OAM PDU size for receipt and delivery. This
information along with the rate limiting of 10 frames per second can be used to limit the bandwidth
allocated to OAM traffic.
Platform identityA combination of an organization unique identifier (OUI) and 32-bits of
vendor-specific information. OUI allocation, controlled by the IEEE, is typically the first three bytes of
a MAC address.
Discovery includes an optional phase in which the local station can accept or reject the configuration of the
peer OAM entity. For example, a node may require that its partner support loopback capability to be accepted
into the management network. These policy decisions may be implemented as vendor-specific extensions.
Link Monitoring
Link monitoring in Ethernet OAM detects and indicates link faults under a variety of conditions. Link
monitoring uses the event notification OAM PDU and sends events to the remote OAM entity when there are
problems detected on the link. The error events include the following:
Error Symbol Period (error symbols per second)The number of symbol errors that occurred during a
specified period exceeded a threshold. These errors are coding symbol errors.
Error Frame (error frames per second)The number of frame errors detected during a specified period
exceeded a threshold.
Error Frame Period (error frames per n frames)The number of frame errors within the last n frames
has exceeded a threshold.
Error Frame Seconds Summary (error seconds per m seconds)The number of error seconds (1-second
intervals with at least one frame error) within the last m seconds has exceeded a threshold.
Since IEEE 802.3ah OAM does not provide a guaranteed delivery of any OAM PDU, the event notification
OAM PDU may be sent multiple times to reduce the probability of a lost notification. A sequence number is
used to recognize duplicate events.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
180
Remote Loopback
An OAM entity can put its remote peer into loopback mode using the loopback control OAM PDU. Loopback
mode helps an administrator ensure the quality of links during installation or when troubleshooting. In loopback
mode, every frame received is transmitted back on the same port except for OAM PDUs and pause frames.
The periodic exchange of OAM PDUs must continue during the loopback state to maintain the OAM session.
The loopback command is acknowledged by responding with an information OAM PDU with the loopback
state indicated in the state field. This acknowledgement allows an administrator, for example, to estimate if
a network segment can satisfy a service-level agreement. Acknowledgement makes it possible to test delay,
jitter, and throughput.
When an interface is set to the remote loopback mode the interface no longer participates in any other Layer
2 or Layer 3 protocols; for example Spanning Tree Protocol (STP) or Open Shortest Path First (OSPF). The
reason is that when two connected ports are in a loopback session, no frames other than the OAM PDUs are
sent to the CPU for software processing. The non-OAM PDU frames are either looped back at the MAC level
or discarded at the MAC level.
From a user's perspective, an interface in loopback mode is in a link-up state.
OAM Messages
Ethernet OAM messages or OAM PDUs are standard length, untagged Ethernet frames within the normal
frame length bounds of 64 to 1518 bytes. The maximum OAM PDU frame size exchanged between two peers
is negotiated during the discovery phase.
OAM PDUs always have the destination address of slow protocols (0180.c200.0002) and an Ethertype of
8809. OAM PDUs do not go beyond a single hop and have a hard-set maximum transmission rate of 10 OAM
PDUs per second. Some OAM PDU types may be transmitted multiple times to increase the likelihood that
they will be successfully received on a deteriorating link.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
181
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
182
Ethernet OAM sessions with sub-second OAM timers reduce the scalability for Ethernet CFM sessions.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
interface interface-id
Step 3
ethernet oam
Step 4
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
183
Command or Action
Purpose
Step 5
end
Step 6
Step 7
copy running-config
startup-config
What to Do Next
Use the no ethernet oam interface configuration command to disable Ethernet OAM on the interface.
Configuration Example
The following example shows how to configure an Ethernet OAM session with sub-second OAM timers on
an interface:
Router> enable
Router# configure terminal
Router(config)# interface gigabitethernet 0/1
Router(config-if)# ethernet oam
Router(config-if)# ethernet oam min-rate 100 ms
Router(config-if)# ethernet oam timeout 500 ms
Router(config-if)# end
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
184
Command or Action
Purpose
Enter supported to enable remote loopback.
Enter timeout type number to set a remote
loopback timeout period. The range is from 1 to
10 seconds.
Step 4
end
Step 5
Step 6
Step 7
copy running-config startup-config (Optional) Save your entries in the configuration file.
What to Do Next
Use the no ethernet oam remote-loopback {supported | timeout} interface configuration command to
disable remote loopback support or remove the timeout setting.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
interface interface-id
Step 3
Step 4
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
185
Command or Action
Step 5
Purpose
Step 6
Note
(Optional) Configure high and low thresholds for error frames that
trigger an error-frame link event.
Enter threshold high high-frames to set a high threshold in
number of frames. The range is 1 to 65535. The default is
none.
Enter threshold high none to disable the high threshold if it
was set. This is the default.
Enter threshold low low-frames to set a low threshold in
number of frames. The range is 0 to 65535. The default is 1.
Enter window milliseconds to set the a window and period
of time during which error frames are counted. The range is
10 to 600 and represents the number of milliseconds in
multiples of 100. The default is 100.
Step 7
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
186
Command or Action
Purpose
Enter window frames to set the a polling window size in
number of frames. The range is 1 to 65535; each value is a
multiple of 10000 frames. The default is 1000.
Step 8
Note
Step 9
Note
Step 10
ethernet oam link-monitor Use the ethernet oam link-monitor transmit-crc command to
transmit-crc {threshold {high configure an Ethernet OAM interface to monitor egress frames
with CRC errors for a period of time.
{highframes | none} | low
low-frames} | window
milliseconds}}
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
187
Command or Action
Purpose
Step 11
[no] ethernet link-monitor on (Optional) Start or stop (when the no keyword is entered)
link-monitoring operations on the interface. Link monitoring
operations start automatically when support is enabled.
Step 12
end
Step 13
Step 14
copy running-config
startup-config
The ethernet oam link-monitor transmit-crc threshold high high-frames none} | low low-frames}} |
window milliseconds} command is visible on the router and you are allowed to enter it, but it is not supported.
Use the no form of this commands to disable the configuration. Use the no form of each command to disable
the threshold setting.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
interface interface-id
Step 3
Step 4
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
188
Command or Action
Purpose
Step 5
Step 6
copy running-config
startup-config
The router does not generate Link Fault or Critical Event OAM PDUs. However, if these PDUs are received
from a link partner, they are processed. The router supports sending and receiving Dying Gasp OAM PDUs
when Ethernet OAM is disabled, the interface is shut down, the interface enters the error-disabled state, or
the router is reloading. It can respond to and generate Dying Gasp PDUs based on loss of power. Use the no
ethernet remote-failure {critical-event | dying-gasp | link-fault} action command to disable the remote
failure indication action.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
template template-name
Step 3
ethernet oam link-monitor (Optional) Configure thresholds for monitoring ingress frames
receive-crc {threshold {high received with cyclic redundancy code (CRC) errors for a period
of time.
high-frames | none} | low
{low-frames}} | window
Enter the threshold high high-frames command to set a high
milliseconds}
threshold for the number of frames received with CRC errors.
The range is 1 to 65535 frames.
Enter the threshold high none command to disable the high
threshold.
Enter the threshold low low-frames command to set a low
threshold in number of frames. The range is 0 to 65535. The
default is 1.
Enter the window milliseconds command to set the a window
and period of time during which frames with CRC errors are
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
189
Command or Action
Purpose
counted. The range is 10 to 1800 and represents the number
of milliseconds in multiples of 100. The default is 100.
Step 4
ethernet oam link-monitor (Optional) Configure high and low thresholds for an error-symbol
period that triggers an error-symbol period link event.
symbol-period {threshold
{high {high symbols | none} |
Enter the threshold high high-symbols command to set a
low {low-symbols}} | window
high threshold in number of symbols. The range is 1 to
symbols}
65535.
Enter the threshold high none command to disable the high
threshold.
Enter the threshold low low-symbols command to set a low
threshold in number of symbols. The range is 0 to 65535. It
must be lower than the high threshold.
Enter the window symbols command to set the window size
(in number of symbols) of the polling period. The range is
1 to 65535 symbols.
Step 5
(Optional) Configure high and low thresholds for error frames that
trigger an error-frame link event.
Enter the threshold high high-frames command to set a high
threshold in number of frames. The range is 1 to 65535. You
must enter a high threshold.
Enter the threshold high none command to disable the high
threshold.
Enter the threshold low low-frames command to set a low
threshold in number of frames. The range is 0 to 65535. The
default is 1.
Enter the window milliseconds command to set the a window
and period of time during which error frames are counted.
The range is 10 to 600 and represents the number of
milliseconds in a multiple of 100. The default is 100.
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
190
Command or Action
Purpose
Enter the window frames command to set the a polling
window size in number of frames. The range is 1 to 65535;
each value is a multiple of 10000 frames. The default is 1000.
Step 7
ethernet oam link-monitor (Optional) Configure frame-seconds high and low thresholds for
triggering an error-frame-seconds link event.
frame-seconds {threshold
{high {high-seconds | none} |
Enter the threshold high high-seconds command to set a
low{ low-seconds }} | window
high threshold in number of seconds. The range is 1 to 900.
milliseconds}
You must enter a high threshold.
Enter the threshold high none command to disable the high
threshold.
Enter the threshold low low-frames command to set a low
threshold in number of frames. The range is 1 to 900. The
default is 1.
Enter the window frames command to set the a polling
window size in number of frames. The range is 100 to 9000;
each value is a multiple of 100 milliseconds. The default is
1000.
Step 8
Step 9
exit
Step 10
interface interface-id
Step 11
source-template
template-name
Step 12
end
Step 13
Step 14
copy running-config
startup-config
The router does not support monitoring egress frames with CRC errors. The ethernet oam link-monitor
transmit-crc {threshold {high {high-frames | none} | low low-frames}} | window milliseconds} command
is visible on the router and you can enter it, but it is not supported. Use the no form of each command to
remove the option from the template. Use the no source-template template-name to remove the source
template association.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
191
Configuration Example
Router# configure terminal
Enter configuration commands, one per line.
Router(config)# interface gigabitEthernet
Router(config-if)# ethernet oam
0/80/1
Command
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
192
0/80/5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
193
Information OAMPDU Tx
Information OAMPDU Rx
Unique Event Notification OAMPDU Tx
Unique Event Notification OAMPDU Rx
Duplicate Event Notification OAMPDU TX
Duplicate Event Notification OAMPDU RX
Loopback Control OAMPDU Tx
Loopback Control OAMPDU Rx
Variable Request OAMPDU Tx
Variable Request OAMPDU Rx
Variable Response OAMPDU Tx
Variable Response OAMPDU Rx
Cisco OAMPDU Tx
Cisco OAMPDU Rx
Unsupported OAMPDU Tx
Unsupported OAMPDU Rx
Frames Lost due to OAM
Local Faults:
------------0 Link Fault records
1 Dying Gasp records
Total dying gasps
: 1
Time stamp
: 23:27:13
0 Critical Event records
Remote Faults:
-------------0 Link Fault records
0 Dying Gasp records
0 Critical Event records
Local event logs:
----------------0 Errored Symbol Period records
0 Errored Frame records
0 Errored Frame Period records
0 Errored Frame Second records
Remote event logs:
-----------------0 Errored Symbol Period records
0 Errored Frame records
0 Errored Frame Period records
0 Errored Frame Second records
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
5549
5914
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
194
0/80/5
Low threshold:
High threshold:
Frame Period Error
Window:
Low threshold:
High threshold:
Frame Seconds Error
Window:
Low threshold:
High threshold:
1 error frame(s)
none
1000 x 10000 frames
1 error frame(s)
599 error frame(s)
700 x 100 milliseconds
1 error second(s)
none
Understanding E-LMI
Ethernet Local Management Interface (E-LMI) is a protocol between the customer-edge (CE) device and the
provider-edge (PE) device. It runs only on the PE-to-CE UNI link and notifies the CE device of connectivity
status and configuration parameters of Ethernet services available on the CE port. E-LMI interoperates with
an OAM protocol, such as CFM, that runs within the provider network to collect OAM status. CFM runs at
the provider maintenance level (UPE to UPE with inward-facing MEPs at the UNI).
OAM manager, which streamlines interaction between any two OAM protocols, handles the interaction
between CFM and E-LMI. This interaction is unidirectional, running only from OAM manager to E-LMI on
the UPE side of the router. Information is exchanged either as a result of a request from E-LMI or triggered
by OAM when it received notification of a change from the OAM protocol. This type of information is relayed:
EVC name and availability status
Remote UNI name and status
Remote UNI counts
You can configure Ethernet virtual connections (EVCs), service VLANs, UNI ids (for each CE-to-PE link),
and UNI count and attributes. You need to configure CFM to notify the OAM manager of any change to the
number of active UNIs and or the remote UNI ID for a given S-VLAN domain.
You can configure the router as a provider-edge device.
Restrictions
E-LMI is not supported for the service instances in which the pseudowire cross-connects are configured.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
195
Configuring E-LMI
For E-LMI to work with CFM, you configure EVCs, EFPs, and E-LMI customer VLAN mapping. Most of
the configuration occurs on the PE device on the interfaces connected to the CE device. On the CE device,
you only need to enable E-LMI on the connecting interface. Note that you must configure some OAM
parameters, for example, EVC definitions, on PE devices on both sides of a metro network.
This section contains the following topics:
Enabling E-LMI
You can enable E-LMI globally or on an interface and you can configure the router as a PE device. Beginning
in privileged EXEC mode, follow these steps to enable for E-LMI on the router or on an interface. Note that
the order of the global and interface commands determines the configuration. The command that is entered
last has precedence.
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
Step 4
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
196
Command or Action
Purpose
Ethernet virtual connections (EVCs). The range is from 1 to
65000; the default is 360.
n393 type numberSet the event counter for the metro
Ethernet network. The range is from 1 to 10; the default is 4.
t391 type numberSet the polling timer on the customer
equipment. A polling timer sends status enquiries and when
status messages are not received, records errors. The range is
from 5 to 30 seconds; the default is 10 seconds.
t392 type numberSet the polling verification timer for the
metro Ethernet network or the timer to verify received status
inquiries. The range is from 5 to 30 seconds, or enter 0 to
disable the timer. The default is 15 seconds.
Step 6
end
Step 7
Step 8
copy running-config
startup-config
Note
What to Do Next
Use the no ethernet lmi global configuration command to globally disable E-LMI. Use the no form of the
ethernet lmi interface configuration command with keywords to disable E-LMI on the interface or to return
the timers to the default settings.
Use the show ethernet lmi commands to display information that was sent to the CE from the status request
poll. Use the show ethernet service commands to show current status on the device.
Command
Purpose
Displays details sent to the CE from the status request poll about
the E-LMI EVC.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
197
Command
Purpose
show ethernet service instance detail | id efp-identifier interface Displays information relevant to the specified Ethernet service
instances (EFPs).
interface-id | interface interface-id
Restrictions
Ethernet loopback is not supported on a routed port.
A single terminal session is initiated at a time over a cross connect or bridge domain.
The maximum total traffic that can be looped back across all sessions combined, is 1GB.
For an internal loopback over bridge domain, the traffic for loopback must have encapsulation that
matches the egress encapsulation. If there is a rewrite operation on the egress EFP, the traffic post the
operation must match the EFP encapsulation.
Dot1q tag-based filtering is not available on the Cisco ASR 901 Cisco ASR 901S router.
Internal Loopback over bridge domain cannot be initiated if SPAN is already active.
Internal Loopback over bridge domain cannot be initiated if Traffic generator is already active.
Loopback is not supported on Fast Ethernet interface.
External loopback is not supported on EFP with VLAN range.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
198
Source and destination address specified in the EXEC command are the MAC fields. These addresses
are used for MAC swap. The source and destination MAC addresses cannot be identical or multicast
MAC addresses.
Source MAC address is mandatory.
External loopback is only supported over bridge domain.
Internal loopback is not supported over a port-channel interface
When Ethernet Loopback is enabled, the L2CP forward and L2CP tunnel protocols are not functional
on any ports.
Internal loopback over cross connect cannot be initiated if the Traffic Generator is already active.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
interface
gigabitEthernet0/1
Router(config)#
Step 4
Example:
Router(config-if)#
service instance
10 ethernet
Step 5
encapsulation dotlq-number
Example:
Router(config-if-srv)#
encapsulation
dot1q 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
199
Command or Action
Step 6
Purpose
Specifies the tag manipulation that is to be performed
on the frame ingress to the service instance. Go to Step
7 if you want to configure Ethernet loopback for a
bridge-domain. Go to Step 8 if you want to configure
rewrite ingress Ethernet loopback for cross connect.
bridge domain-number
Example:
Router(config-if-srv)#
bridge domain
10
Step 8
Router(config-if-srv)# xconnect
1.1.1.1 100 encapsulation mpls
ethernet
loopback permit external
Router(config-if-srv)#
Step 10
ethernet
loopback permit internal
Router(config-if-srv)#
Step 11
end
Example:
Router(config-if-srv)#
Step 12
end
ethernet loopback start local interface Starts Ethernet external or internal loopback process
on the service instance. Destination MAC address is
type number service instance
instance-number { external | internal } an optional field. If destination mac address is not
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
200
Command or Action
Purpose
source mac-address source mac-address provided, the loopback interface MAC address is
assigned to the source MAC address after swapping.
[destination mac-address
destination-mac-address] [timeout
(Optional) Use the timeout time-in-seconds
{time-in-seconds | none}]
command to set a loopback timeout period. The
range is from 1 to 90000 seconds (25 hours). The
Example:
default value is 300 seconds.
ethernet loopback start local
interface gigabitEthernet 0/1 service
instance 10 external source
mac-address 0123.4567.89ab destination
mac-address 255.255.255 timeout 9000
Router#
Step 13
Example:
Configuration Example
This example shows how to configure Ethernet External Loopback for a bridge-domain:
!
interface GigabitEthernet0/0
service instance 201 ethernet evc201
encapsulation dot1q 201
rewrite ingress tag pop 1 symmetric
bridge-domain 201
ethernet loopback permit external
ethernet loopback permit internal
!
ethernet loopback start local interface GigabitEthernet0/0 service instance 201 external
source mac-address 5000.10a1.6ab8 destination mac-address 0000.0000.0202 timeout 9000
!
!
ethernet loopback stop local interface gigabitEthernet 0/0 id 1
!
This example shows how to configure Ethernet Internal Loopback for cross connect:
!
interface GigabitEthernet0/0
service instance 201 ethernet evc201
encapsulation dot1q 201
rewrite ingress tag pop 1 symmetric
xconnect 2.2.2.2 10 encapsulation mpls
ethernet loopback permit external
ethernet loopback permit internal
!
ethernet loopback start local interface GigabitEthernet0/0 service instance 201 internal
source mac-address 5000.10a1.6ab8 destination mac-address 0000.0000.0202 timeout 9000
!
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
201
This following is the example of the output from the show ethernet loopback command:
Router# show ethernet loopback active interface GigabitEthernet0/0 service instance 201
Loopback Session ID
: 1
Interface
: GigabitEthernet0/0
Service Instance
: 201
Direction
: Internal
Time out(sec)
: 300
Status
: on
Start time
: 12:06:35.300 IST Mon Sep 23 2013
Time left
: 00:03:28
Dot1q/Dot1ad(s)
: 201
Second-dot1q(s)
:
Source Mac Address
: 5000.10a1.6ab8
Destination Mac Address : 0000.0000.0202
Ether Type
: Any
Class of service
: Any
Llc-oui
: Any
Total Active Session(s): 1
Total Internal Session(s): 1
Total External Session(s): 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
202
mode is used to measure the throughput and loss at the UNI port. During traffic generation, traffic at other
ports is not impacted by the generated traffic and can continue to switch network traffic.
Figure 7: Traffic Generator Topology over Bridge Domain
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
203
Effective with Cisco IOS release 15.4.(01)S, traffic can be generated over cross connect interface. The following
figure shows the Traffic Generator topology over cross connect describing the traffic flow in the external and
internal modes.
Figure 8: Traffic Generator Topology over cross connect
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
204
Procedure
Command or Action
Purpose
Example:
Router# configure terminal
Example:
Router(config)# ip sla 100p sla 100
Step 3 service-performance type ethernet dest-mac-addr destination Specifies the service performance
mac-address interface type number service-instance number type as ethernet and the destination
MAC address in H.H.H format.
Example:
Router(config-ip-sla)# service-performance type
ethernet dest-mac-addr 0001.0001.0001 interface
gigabitEthernet0/100/5 service-instance 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
205
Command or Action
Purpose
Step 4 aggregation | default | description | duration | exit | frequency Specify the type of service
performance. The following are the
| measurement-type direction | no | profile | signature
options:
Example:
Router(config-ip-sla-service-performance)# profile
traffic direction external
aggregationRepresents the
statistics aggregation.
defaultSet a command to
its defaults.
descriptionDescription of
the operation.
durationSets the service
performance duration
configuration.
frequencyRepresents the
scheduled frequency. The
options available are iteration
and time. The range is 20 to
65535 seconds.
measurement-type
directionSpecifies the
statistics to measure traffic.
The options available are
external or internal; the
default option is Internal. If
you use this option, go to
Step 5.
profileSpecifies the service
performance profile. If you
use the packet or traffic
option, go to Step 7 or Step 9
respectively.
signatureSpecifies the
payload contents.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
206
Command or Action
Purpose
throughputSpecifies the
measurement such as average
rate of successful frame
delivery.
Step 6 exit
Step 7 default | exit | inner-cos | inner-vlan | no | outer-cos | outer-vlan Specifies the packet type. The
following are the options:
| packet-size | src-mac-addr
defaultSet a command to
its defaults
Example:
Router(config-ip-sla-service-performance-packet)#
src-mac-addr 4055.3989.7b56
Step 8 exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
207
Command or Action
Step 9 direction {external | internal}
Example:
Purpose
Specifies the direction of the profile
traffic. The options are external and
internal.
Router(config-ip-sla-service-performance)# profile
traffic direction external
Example:
Router(config-ip-sla-service-performance-traffic)#
rate-step kbps 1000
Step 11 exit
Configuration Examples
This section shows sample configuration examples for traffic generation on Cisco ASR 901 Cisco ASR 901S
router:
ip sla 10
service-performance type ethernet dest-mac-addr 0001.0001.0001 interface
TenGigabitEthernet0/0 service instance 30
measurement-type direction external
loss
throughput
profile packet
outer-vlan 30
packet-size 512
src-mac-addr d48c.b544.93dd
profile traffic direction external
rate-step kbps 1000
frequency time 35
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
208
throughput
profile packet
outer-vlan 10
packet-size 512
src-mac-addr d48c.b544.9600
profile traffic direction internal
rate-step kbps 1000 2000 3000
frequency time 95
EXTERNAL: (to test NNI scenario)
ip sla 2
service-performance type ethernet dest-mac-addr aaaa.bbbb.cccc interface gigabitEthernet0/70/3
service instance 2
measurement-type direction external
loss
throughput
profile packet
outer-vlan 10
packet-size 512
src-mac-addr d48c.b544.9600
profile traffic direction external
rate-step kbps 1000 2000 3000
frequency time 95
The following is an example of the output from the show ip sla statistics command.
show ip sla statistics 10
IPSLAs Latest Operation Statistics
IPSLA operation id: 10
Type of operation: Ethernet Service Performance
Test mode: Traffic Generator
Steps Tested (kbps): 1000
Test duration: 30 seconds
Latest measurement: 01:34:08.636 IST Wed Sep 25 2013
Latest return code: OK
Step 1 (1000 kbps):
Stats:
Tx Packets: 1425 Tx Bytes: 729600
Step Duration: 6 seconds
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
209
Note
Statistics are cumulative over a period of time and not specific to any particular time instance.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
210
CHAPTER
11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
211
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
212
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
213
Ethernet frame delay measurement supports hardware-based timestamping in the ingress direction.
These are the two methods of delay measurement, as defined by the ITU-T Y.1731 standard, One-way ETH-DM
(1DM) and Two-way ETH-DM (2DM). However, the Cisco ASR 901 Cisco ASR 901S router supports only
Two-way ETH-DM.
Two-way Delay Measurement
Two-way frame delay and variation can be measured using DMM and Delay Measurement Reply (DMR)
frames.
Note
Starting with Cisco IOS Release 15.4(2)S, the DMM sessions are enhanced from 32 to 100.
In two-way delay measurements, the sender MEP transmits a frame containing ETH-DM request information
and TxTimeStampf, where TxTimeStampf is the timestamp of the time at which the DMM is sent.
When the receiver MEP receives the frame, it records RxTimeStampf, where RxTimeStampf is the timestamp
of the time at which the frame with ETH-DM request information is received.
The receiver MEP responds with a frame containing ETH-DM reply information and TxTimeStampb, where
TxTimeStampb is the timestamp of the time at which the frame with ETH-DM reply information is sent.
When the sender MEP receives this frame, it records RxTimeStampb, where RxTimeStampb is the timestamp
of the time at which the frame containing ETH-DM reply information is received.
Two-way frame delay is calculated as:
Frame delay = (RxTimeStampb-TxTimeStampf)-(TxTimeStampb-RxTimeStampf)
Note
Discard the frame delay and frame-delay variation measurements when known network topology changes
occur or when continuity and availability faults occur.
For more information on ITU-T Y.1731 performance monitoring, see Configuring IP SLAs Metro-Ethernet
3.0 (ITU-T Y.1731) Operations in the IP SLAs Configuration Guide .
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
214
Single-ended ETH-SLM
Each MEP transmits frames with the ETH-SLM request information to its peer MEP and receives frames with
ETH-SLR reply information from its peer MEP to carry out synthetic loss measurements.
Supported Interfaces
The Cisco ASR 901 Cisco ASR 901S router supports ITU-T Y.1731 performance monitoring on the following
interfaces:
DMM and SLM support on the EVC bridge domain (BD)
DMM and SLM support on the Port-Channel EVC BD
DMM and SLM support on the EVC cross connect
DMM and SLM support on the Port-Channel EVC cross connect
DMM and SLM support on the EVC BD for both the up and down MEPs
SLM support on the EVC cross connect for both the up and down MEPs
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
215
Note
SLM and DMM can be configured for the same EVCs over CFM session. The combined number of CFM,
DMM, and SLM sessions must be within the scale limits, otherwise DMM/SLM probes might get dropped
resulting in a few incomplete measurements.
To display information about remote (target) MEPs on destination devices, use the show ethernet cfm
maintenance-points remote command.
Complete the following steps to configure two-way delay measurement.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip sla operation-number
Example:
Router(config)# ip sla 10
Step 4
ethernet y1731 delay DMM domain Configures two-way delay measurement and enters IP SLA
Y.1731 delay configuration mode.
domain-name {evc evc-id | vlan
vlan-id} {mpid target-mp-id |
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
216
Command or Action
mac-address target-address} cos cos
{source {mpid source-mp-id |
mac-address source-address}}
Example:
Router(config-ip-sla)# ethernet
y1731 delay
DMM domain xxx evc yyy mpid 101
cos 4
source mpid 100
Purpose
DMMSpecifies that the frames sent are Delay
Measurement Message (DMM) synthetic frames.
domain domain-nameSpecifies the name of the
Ethernet maintenance Operations, Administration &
Maintenance (OAM) domain.
evc evc-idSpecifies the EVC identification name.
vlan vlan-idSpecifies the VLAN identification
number. The range is from 1 to 4096.
mpid target-mp-idSpecifies the maintenance endpoint
identification numbers of the MEP at the destination.
The range is from 1 to 8191.
mac-address target-addressSpecifies the MAC
address of the MEP at the destination.
cos cosSpecifies, for this MEP, the class of service
(CoS) that will be sent in the Ethernet message. The
range is from 0 to 7.
sourceSpecifies the source MP ID or MAC address.
mpid source-mp-idSpecifies the maintenance endpoint
identification numbers of the MEP being configured.
The range is from 1 to 8191.
mac-address source-addressSpecifies the MAC
address of the MEP being configured.
Step 5
Step 6
distribution {delay |
delay-variation} {one-way |
two-way} number-of-bins
boundary[,...,boundary]
Example:
Router(config-sla-y1731-delay)#
distribution delay-variation
two-way 5 5000,
10000,15000,20000,-1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
217
Command or Action
Purpose
two-waySpecifies two-way measurement values. This
is the default for a single-ended operation.
number-of-binsSpecifies the number of bins kept
during an aggregate interval. The range is from 1 to 10.
The default is 10.
boundary [,...,boundary]Lists upper boundaries for
bins in microseconds. Minimum number of boundaries
required is one. Maximum allowed value for the
uppermost boundary is -1 microsecond. Multiple values
must be separated by a comma (,). The default value is
5000,10000,15000,20000,25000,30000,35000,40000,45000,
-1.
Step 7
Step 8
Router(config-sla-y1731-delay)#
frame offset 1
Step 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
218
Command or Action
Purpose
owner-idSpecifies the name of the SNMP owner. The
value is from 0 to 255 ASCII characters.
Example:
Router(config-sla-y1731-delay)#
owner admin
Step 13 end
Example:
Router(config-sla-y1731-delay)#
end
What to Do Next
After configuring two-way delay measurement, see the Scheduling IP SLAs Operations, on page 227 to
schedule the operation.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip sla operation-number
Example:
Router(config)# ip sla 11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
219
Step 4
Command or Action
Purpose
Example:
Router(config-ip-sla)# ethernet y1731
delay
DMM domain cisco evc evc10 mac-address
7cad.74dc.e3d6 cos 0 source mac-address
18e7.280b.5883
Step 5
max-delaydelay-period
Example:
Router(config-sla-y1731-delay)#
max-delay 500
Step 6
Router(config-sla-y1731-delay)# frame
interval 100
Step 7
Example:
Router(config-sla-y1731-delay)#
distribution
delay-variation two-way 5
5000,10000,15000,20000,-1
Step 8
Step 9
end
Example:
Router(config-sla-y1731-delay)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
220
To verify whether the remote mep is learnt or not, use the show ethernet cfm maintenance-points remote
command as given in the following example:
Router# show ethernet cfm maintenance-points remote
!The output should show the destination mac-address (for example, the mac-address used in
the configuration example, which is: 7cad.74dc.e3d6)
To verify whether the dmm is working properly, use the show ip sla summary command as given in the
following example:
Router# show ip sla summary | in 11
*11
OK
56 seconds ag
To verify whether the destination is sending replies or not, use the show ip sla statistics command as given
in the following example:
Router# show ip sla statistics 11 details | in Number of measurements
Number of measurements Initiated: 527
Number of measurements completed: 527
To verify whether the xconnect is up, use the show mpls l2transport command as given in the following
example:
Router# show mpls l2transport vc 100
Local intf
------------Gi0/11
Local circuit
Dest address
VC ID
Status
-------------------------- --------------- ---------- ---------Eth VLAN 100
2.2.2.2
100
UP
Router1
! configuration to be applied on this router is given below
configure terminal
interface vlan100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
221
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
222
bridge-domain 40
interface gigabitethernet 0/11
service instance 1 ethernet
encapsulation dot1q 100
xconnect 2.2.2.2 100 encapsulation mpls
mtu 1500
cfm mep domain cisco mpid 101
dmm responder hardware timestamp
exit
router ospf 1
router-id 3.3.3.3
network 10.8.8.0 0.0.0.2555 area 0
network 3.3.3.3 0.0.0.0 area 0
Router 4
! configuration to be applied on this router is given below
configure
terminal
To display information about remote (target) MEPs on destination devices, use the show ethernet cfm
maintenance-points remote command.
Complete the following steps to configure a single-ended SLM.
Note
Cisco IOS Y.1731 implementation allows monitoring of frame loss for frames on an EVC regardless of
the CoS value (any CoS or Aggregate CoS cases). See the "Configuration Examples for IP SLAs
Metro-Ethernet 3.0 (ITU-T Y.1731) Operations" section for configuration information.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
223
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip sla operation-number
Example:
Router(config)# ip sla 11
Step 4
ethernet y1731 loss SLM domain Configures a single-ended synthetic loss measurement and
enters IP SLA Y.1731 loss configuration mode.
domain-name {evc evc-id | vlan
vlan-id} {mpid target-mp-id |
SLMSpecifies that the frames sent are Synthetic Loss
mac-address target-address} cos
Measurement (SLM) frames.
cos {source {mpid source-mp-id |
mac-address source-address}}
domain domain-nameSpecifies the name of the Ethernet
Connectivity Fault Management (CFM) maintenance
domain.
Example:
Router(config-ip-sla)#
ethernet y1731 loss
SLM domain xxx evc yyy mpid
101 cos 4
source mpid 100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
224
Step 5
Command or Action
Purpose
Example:
Router(config-sla-y1731-loss)#
aggregate interval 900
Step 6
availability algorithm
(Optional) Specifies availability algorithm used.
{sliding-window | static-window}
sliding-windowSpecifies a sliding-window control
algorithm.
Example:
Router(config-sla-y1731-loss)#
availability algorithm
static-window
Step 7
Step 8
Step 9
Example:
Router(config-sla-y1731-loss)#
frame size 32
Example:
Router(config-sla-y1731-loss)#
owner admin
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
225
Command or Action
Step 12 exit
Purpose
Exits IP SLA Y.1731 loss configuration mode and enters IP
SLA configuration mode.
Example:
Router(config-sla-y1731-loss)#
exit
Step 13 exit
Example:
Router(config-ip-sla)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
226
Command or Action
Purpose
The default number of 5 consecutive occurrences can be
changed using the occurrences argument. The range is
from 1 to 16.
threshold-type immediate(Optional) When a threshold
violation for the monitored element is met, immediately
perform the action defined by the action-type keyword.
threshold-value upper-threshold
lower-threshold(Optional) Specifies the upper-threshold
and lower-threshold values of the applicable monitored
elements.
Example:
Router(config)# ip sla logging
traps
Step 16 exit
Example:
Router(config)# exit
What to Do Next
After configuring this MEP, see the Scheduling IP SLAs Operations, on page 227 to schedule the operation.
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
227
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ip sla schedule 10
start-time now
Example:
Router(config)# ip sla group schedule
1 3,4,6-9
Step 4
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
228
Note
The Cisco ASR 901 Cisco ASR 901S router supports hardware-based timestamping. Enable the
hardware-based timestamping using the dmm responder hardware timestamp command on the receiver
MEP.
Router-1# show running interface gigabitethernet0/0
interface GigabitEthernet0/0
no ip address
negotiation auto
service instance 1310 ethernet ssvc1310
encapsulation dot1q 1310
rewrite ingress tag pop 1 symmetric
bridge-domain 1310
cfm mep domain sdmm mpid 1310
dmm responder hardware timestamp
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
229
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
230
SLRs:
Rcvd: 517098
Note
The show ip sla history full command is not supported for the ITU-T Y.1731 operations.
Router# show ip sla history interval-statistics
Loss Statistics for Y1731 Operation 2001
Type of operation: Y1731 Loss Measurement
Latest operation start time: *13:48:39.055 IST Tue Mar 19 2013
Latest operation return code: OK
Distribution Statistics:
Interval 1
Start time: *13:48:39.055 IST Tue Mar 19 2013
End time: *13:48:59.055 IST Tue Mar 19 2013
Number of measurements initiated: 198
Number of measurements completed: 198
Flag: OK
Forward
Number of Observations 19
Available indicators: 19
Unavailable indicators: 0
Tx frame count: 190
Rx frame count: 190
Min/Avg/Max - (FLR % ): 0:9/000.00%/0:9
Cumulative - (FLR % ): 000.0000%
Timestamps forward:
Min - *13:48:58.084 IST Tue Mar 19 2013
Max - *13:48:58.084 IST Tue Mar 19 2013
Backward
Number of Observations 19
Available indicators: 19
Unavailable indicators: 0
Tx frame count: 190
Rx frame count: 190
Min/Avg/Max - (FLR % ): 0:9/000.00%/0:9
Cumulative - (FLR % ): 000.0000%
Timestamps backward:
Min - *13:48:58.084 IST Tue Mar 19 2013
Max - *13:48:58.084 IST Tue Mar 19 2013
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
231
Note
Cisco IOS Y.1731 implementation allows monitoring of frame loss for frames on an EVC regardless of
the CoS value (any CoS or Aggregate CoS cases).
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Example:
Router# ip sla on-demand ethernet SLM domain xxx
vlan 12 mpid 34 cos 4 source mpid 23 continuous
aggregation 10 duration 60
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
232
Command or Action
Purpose
Example:
Router# ip sla on-demand ethernet slm
11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
233
Additional References
The following sections provide references to ITU-T Y.1731 Performance Monitoring.
Related Documents
Related Topic
Document Title
IEEE CFM
Using OAM
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
234
Related Topic
Document Title
Standards
Standard
Title
IEEE 802.1ag
ITU-T Y.1731
MEF 17
MIBs
MIB
MIBs Link
CISCO-IPSLA-ETHERNET-MIB
CISCO-RTTMON-MIB
http://www.cisco.com/go/mibs
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
235
Note
Table 18: Feature Information for ITU-T Y.1731 Performance Monitoring, on page 236 lists only the
software release that introduced support for a given feature in a given software release train. Unless noted
otherwise, subsequent releases of that software release train also support that feature.
Table 18: Feature Information for ITU-T Y.1731 Performance Monitoring
Feature Name
Releases
Feature Information
15.3(2)S
15.3(2)S
15.3(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
236
Feature Name
Releases
Feature Information
15.5(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
237
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
238
CHAPTER
12
Overview
An REP segment is a chain of ports connected to each other and configured with a segment ID. Each segment
consists of standard (non-edge) segment ports and two user-configured edge ports. A switch can have only
two ports belonging to the same segment, and each segment port can have only one external neighbor. A
segment can go through a shared medium, but on any link, only two ports can belong to the same segment.
REP is supported only on Layer 2 trunk interfaces.
The following figure shows an example of a segment consisting of six ports spread across four switches. Ports
E1 and E2 are configured as edge ports. When all ports are operational (as in the segment on the left), a single
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
239
port is blocked, shown by the diagonal line. When there is a network failure, as shown on the right of the
diagram, the blocked port returns to the forwarding state to minimize network disruption.
Figure 10: REP Open Segments
The segment shown in the above figure is an open segment; there is no connectivity between the two edge
ports. The REP segment cannot cause a bridging loop, and you can safely connect the segment edges to any
network. All hosts connected to switches inside the segment have two possible connections to the rest of the
network through the edge ports, but only one connection is accessible at any time. If a host cannot access its
usual gateway because of a failure, REP unblocks all ports to ensure that connectivity is available through
the other gateway.
The segment shown in the following figure, with both edge ports located on the same switch, is a ring segment.
In this configuration, there is connectivity between the edge ports through the segment. With this configuration,
you can create a redundant connection between any two switches in the segment.
Figure 11: REP Ring Segment
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
240
In case of a link failure, the alternate ports are unblocked as quickly as possible. When the failed link
comes back up, a logically blocked port per VLAN is selected with minimal disruption to the network.
You can construct almost any type of network based on REP segments. REP also supports VLAN
load-balancing, controlled by the primary edge port but occurring at any port in the segment.
In access ring topologies, the neighboring switch might not support REP, as shown in the following figure.
In this case, you can configure the non-REP facing ports (E1 and E2) as edge no-neighbor ports. These ports
inherit all properties of edge ports, and you can configure them the same as any edge port, including configuring
them to send STP or REP topology change notices to the aggregation switch. In this case the STP topology
change notice (TCN) that is sent is a multiple spanning-tree (MST) STP message.
Figure 12: No-neighbor Topology
Restrictions
You must configure each segment port; an incorrect configuration can cause forwarding loops in the
networks.
REP can manage only a single failed port within the segment; multiple port failures within the REP
segment cause loss of network connectivity.
You should configure REP only in networks with redundancy. Configuring REP in a network without
redundancy causes loss of connectivity.
BFD and REP together are not recommended on Cisco ASR 901 Cisco ASR 901S Router while sharing
the same link.
Layer 3 over REP with VLAN load balancing is not recommended on Cisco ASR 901 Cisco ASR 901S
Router.
Link Integrity
REP does not use an end-to-end polling mechanism between edge ports to verify link integrity. It implements
local link failure detection. The REP Link Status Layer (LSL) detects its REP-aware neighbor and establishes
connectivity within the segment. All VLANs are blocked on an interface until it detects the neighbor. After
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
241
the neighbor is identified, REP determines which neighbor port should become the alternate port and which
ports should forward traffic.
Each port in a segment has a unique port ID. The port ID format is similar to that used by the spanning tree
algorithm: a port number (unique on the bridge), associated to a MAC address (unique in the network). When
a segment port is coming up, its LSL starts sending packets that include the segment ID and the port ID. The
port is declared operational after it performs a three-way handshake with a neighbor in the same segment.
A segment port does not become operational if:
No neighbor has the same segment ID.
More than one neighbor has the same segment ID.
The neighbor does not acknowledge the local port as a peer.
Each port creates an adjacency with its immediate neighbor. After the neighbor adjacencies are created, the
ports negotiate to determine one blocked port for the segment, the alternate port. All other ports become
unblocked. By default, REP packets are sent to a BPDU class MAC address. The packets are dropped by
devices not running REP.
Fast Convergence
Because REP runs on a physical link basis and not a per-VLAN basis, only one hello message is required for
all VLANs, reducing the load on the protocol. We recommend that you create VLANs consistently on all
switches in a given segment and configure the same allowed VLANs on the REP trunk ports. To avoid the
delay introduced by relaying messages in software, REP also allows some packets to be flooded to a regular
multicast address. These messages operate at the hardware flood layer (HFL) and are flooded to the whole
network, not just the REP segment. Switches that do not belong to the segment treat them as data traffic. You
can control flooding of these messages by configuring a dedicated administrative VLAN for the whole domain.
The estimated convergence recovery time on fiber interfaces is less than 200 ms for the local segment with
200 VLANs configured. Convergence for VLAN load balancing is 300 ms or less.
Note
Use rep platform vlb segment command on every Cisco ASR 901 router participating in the REP segment.
Enter the neighbor offset number of a port in the segment, which identifies the downstream neighbor
port of an edge port. The neighbor offset number range is 256 to +256; a value of 0 is invalid. The
primary edge port has an offset number of 1; positive numbers above 1 identify downstream neighbors
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
242
of the primary edge port. Negative numbers identify the secondary edge port (offset number -1) and its
downstream neighbors.
Note
You configure offset numbers on the primary edge port by identifying the downstream position from the
primary (or secondary) edge port. Do not enter an offset value of 1 because that is the offset number of
the primary edge port.
Figure 13: Neighbor Offset Numbers in a Segment , on page 243 shows neighbor offset numbers for a segment
where E1 is the primary edge port and E2 is the secondary edge port. The red numbers inside the ring are
numbers offset from the primary edge port; the black numbers outside the ring show the offset numbers from
the secondary edge port. Note that you can identify all ports (except the primary edge port) by either a positive
offset number (downstream position from the primary edge port) or a negative offset number (downstream
position from the secondary edge port). If E2 became the primary edge port, its offset number would then be
1, and E1 would be -1.
By entering the preferred keyword to select the port that you previously configured as the preferred
alternate port with the rep segment segment-id preferred interface configuration command.
Figure 13: Neighbor Offset Numbers in a Segment
When the REP segment is complete, all VLANs are blocked. When you configure VLAN load balancing,
you must also configure triggers in one of two ways:
Manually trigger VLAN load balancing at any time by entering the rep preempt segment segment-id
privileged EXEC command on the router that has the primary edge port.
Configure a preempt delay time by entering the rep preempt delay seconds interface configuration
command. After a link failure and recovery, VLAN load balancing begins after the configured preemption
time period elapses. Note that the delay timer restarts if another port fails before the time elapses.
Note
When VLAN load balancing is configured, it does not start working until triggered by either manual
intervention or a link failure and recovery.
When VLAN load balancing is triggered, the primary edge port sends a message to alert all interfaces in the
segment about the preemption. When the secondary port receives the message, it is reflected into the network
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
243
to notify the alternate port to block the set of VLANs specified in the message and to notify the primary edge
port to block the remaining VLANs.
You can also configure a particular port in the segment to block all VLANs. Only the primary edge port
initiates VLAN load balancing, which is not possible if the segment is not terminated by an edge port on each
end. The primary edge port determines the local VLAN load balancing configuration.
Reconfigure the primary edge port to reconfigure load balancing. When you change the load balancing
configuration, the primary edge port again waits for the rep preempt segment command or for the configured
preempt delay period after a port failure and recovery before executing the new configuration. If you change
an edge port to a regular segment port, the existing VLAN load balancing status does not change. Configuring
a new edge port might cause a new topology configuration.
Note
The roles of primary and secondary edge ports is Alt when VLB is enabled. Use show rep topology
command to check the roles of primary and secondary edge ports.
REP Ports
Ports in REP segments are in the Failed, Open, or Alternate states. The various states REP ports go through
are as follows:
A port configured as a regular segment port starts as a failed port.
After the neighbor adjacencies are determined, the port changes to alternate port state, blocking all
VLANs on the interface. Blocked port negotiations occur and when the segment settles, one blocked
port remains in the alternate role, and all other ports become open ports.
When a failure occurs in a link, all ports move to the open state. When the alternate port receives the
failure notification, it changes to the open state, forwarding all VLANs.
A regular segment port converted to an edge port, or an edge port converted to a regular segment port, does
not always result in a topology change. If you convert an edge port into a regular segment port, VLAN load
balancing is not implemented unless it has been configured. For VLAN load balancing, you must configure
two edge ports in the segment.
A segment port reconfigured as a spanning tree port restarts according to the spanning tree configuration. By
default, this is a designated blocking port. If PortFast is configured or if STP is disabled, the port goes into
the forwarding state.
For instructions on how to configure REP, see Configuring Resilient Ethernet Protocol, on page 245.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
244
Note
The explicit configuration of EFP gives you the flexibility to choose the bridge domain of your choice.
You should configure two edge ports in the segment, one as the primary edge port and the other, by default,
the secondary edge port. A segment has only one primary edge port. If you configure two ports in a segment
as the primary edge port, for example ports on different switches, the REP selects one to serve as the segment
primary edge port. You can also optionally configure where to send segment topology change notices (STCNs)
and VLAN load balancing messages.
This section contains the following topics:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
245
If you connect an STP network to the REP segment, be sure that the connection is at the segment edge.
An STP connection that is not at the edge could cause a bridging loop because STP does not run on REP
segments. All STP BPDUs are dropped at REP interfaces.
You must configure all ports in the segment with the same set of allowed VLANs, or a misconfiguration
occurs.
REP ports follow these rules:
There is no limit to the number of REP ports on a switch; however, only two ports on a switch can
belong to the same REP segment.
If only one port on a switch is configured in a segment, the port should be an edge port.
If two ports on a switch belong to the same segment, they must be both edge ports, both regular
segment ports, or one regular port and one edge no-neighbor port. An edge port and regular segment
port on a switch cannot belong to the same segment.
If two ports on a switch belong to the same segment and one is configured as an edge port and one
as a regular segment port (a misconfiguration), the edge port is treated as a regular segment port.
REP interfaces come up and remain in a blocked state until notified that it is safe to unblock. You need
to be aware of this to avoid sudden connection losses.
You should configure service instance with encapsulation corresponding to the REP admin VLAN and
associate it to arbitratory Bridge Domain. This explicit configuration of EFP gives you the flexibility to
choose the bridge domain of your choice.
REP sends all LSL PDUs in untagged frames on the native VLAN. The BPA message sent to the Cisco
multicast address is sent on the administration VLAN, which is VLAN 1 by default.
You can configure the duration to keep REP interface alive without receiving a hello message from a
neighbor using the rep lsl-age-timer value interface configuration command. Valid values range from
120 ms to 10000 ms. When this command is configured, the hello timer is set to the age-timer value
divided by three. In normal REP operation, three LSL hellos are sent before the age-timer on the peer
switch expires.
You should configure the rep platform fast-lsl enable command to support the REP sessions with LSL
timers that are less than one second long. This command helps to detect the link failures in copper or
microwave ports faster as the link failure detection takes longer time for these ports. Configuring the
rep platform fast-lsl enable command helps to get optimal performance for copper or microwave ports.
When this command is configured, you can expect only subsecond convergence for REP. The subsecond
convergence period is also applicable for normal REP sessions, if fast LSL is configured.
REP ports cannot be configured as one of these port types:
SPAN destination port
Private VLAN
Tunnel port
Access port
There is a maximum of 128 REP segments per router.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
246
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# rep admin vlan 1
Step 4
end
Example:
Router(config)# end
Step 5
show interface [interface-id ] rep [detail] Displays the REP configuration and status for a
specified interface.
Example:
Router# show interface
gigabitethernet0/1 rep detail
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
247
Step 6
Command or Action
Purpose
Example:
Router# copy running-config startup
config
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Router(config)# interface
port-channel 1
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
248
Step 5
Command or Action
Purpose
Example:
Router(config-if)# rep segment
1 edge preferred
Note
Step 6
Step 7
Example:
Router(config-if)# rep stcn
segment 2-5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
249
Command or Action
Purpose
Enter stp to send STCNs to STP networks.
Step 8
Step 9
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
250
Command or Action
Step 10 rep preempt delay seconds
Example:
Purpose
(Optional) Configures a preempt time delay. Use this command
if you want VLAN load balancing to automatically trigger after
a link failure and recovery. The time delay range is 15 to 300
seconds. The default is manual preemption with no time delay.
Router(config-if) rep
lsl-age-timer 5000
Step 13 end
Example:
Router(config-if)# end
Example:
Router# show rep topology
segment 1
Example:
Router# copy running-config
startup config
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
251
In access ring topologies, the neighboring switch might not support Figure 14: Dual Edge No-neighbor
Topology, on page 252 Figure 12-5 . In this case, you can configure the non-REP facing ports (E1 and E2)
as edge no-neighbor ports. These ports inherit all properties of edge ports, and you can configure them the
same as any edge port, including configuring them to send STP or REP topology change notices to the
aggregation switch. In this case the STP topology change notice (TCN) that is sent is a multiple spanning-tree
(MST) STP message.
Complete these steps to enable and configure REP as dual edge no-neighbor port:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router>
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
252
Step 2
Command or Action
Purpose
configure terminal
Example:
Router#
configure
terminal
Step 3
interface interface-id
Example:
Router(config)#
interface port-channel
1
Step 4
rep segment
Enables REP on the interface, and identifies a segment number. The
segment-idedgeno-neighbor segment ID range is from 1 to 1024.
[primary | preferred
Note
You must configure two edge ports, including one primary
edge port for each segment.
These are the optional keywords:
Example:
Router(config-if)# rep
segment 1 edge
no-neighbor preferred
Note
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
253
What to Do Next
Note
For configuring REP LSL timer and VLB, see Configuring REP Interfaces, on page 248.
Cisco ASR 901 Cisco ASR 901S Dual Rep Edge No-Neighbor Topology Example
The following configuration example shows a Cisco ASR 901 Cisco ASR 901S router running with Dual
REP Edge No-Neighbor and two Cisco 7600 series routers running as non-REP devices.
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
254
7600_1
interface Port-channel69
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
!
interface GigabitEthernet3/25
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet3/26
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet3/35
ip address 3.3.3.2 255.255.255.0
!
interface GigabitEthernet3/36
ip address 5.5.5.2 255.255.255.0
!
interface GigabitEthernet5/2
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan2
ip address 1.1.1.2 255.255.255.0
!
ip route 2.2.2.0 255.255.255.0 1.1.1.1
ip route 4.4.4.0 255.255.255.0 1.1.1.1
7600_2
interface Port-channel69
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
!
interface GigabitEthernet7/25
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet7/26
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet5/2
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
255
!
interface Vlan1
no ip address
!
interface Vlan2
ip address 1.1.1.3 255.255.255.0
Note
Ethernet over Multiprotocol Label Switching (EoMPLS) is supported on the Cisco ASR 901 Cisco ASR
901S router for Cisco IOS Release 15.2(2)SNG and later releases.
Complete these steps on the switch that has the segment primary edge port to manually trigger VLAN load
balancing on a segment:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
256
Step 5
Command or Action
Purpose
Example:
Router# show rep topology
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
end
Example:
Router(config)# end
Step 5
show running-config
Example:
Router# show running-config
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
257
Step 6
Command or Action
Purpose
Example:
Router# copy running-config
startup config
Monitoring REP
Complete the following steps to monitor the REP configuration:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Example:
Router# show interface
gigabitethernet0/1 rep detail
Step 3
Example:
Router# show rep topology
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
258
This example shows how to configure the same configuration when the interface has no external REP neighbor:
Router# configure terminal
Router(conf)# interface gigabitethernet0/1
Router(config-if)# rep segment 1 edge no-neighbor primary
Router(config-if)# rep stcn segment 2-5
Router(config-if)# rep block port 0009001818D68700 vlan all
Router(config-if)# rep preempt delay 60
Router(config-if)# rep lsl-age-timer 6000
Figure 15: Example of VLAN Blocking, on page 260 shows how to configure the VLAN blocking configuration.
The alternate port is the neighbor with neighbor offset number 4. After manual preemption, VLANs 100 to
200 are blocked at this port and all other VLANs are blocked at the primary edge port E1 (Gigabit Ethernet
port 0/1).
Router# configure terminal
Router(config)# interface gigabitethernet0/1
Router(config-if)# rep
segment 1 edge primary
Router(config-if)# rep block port 4 vlan 100-200
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
259
Router(config-if)# end
Router(config)# rep platform vlb segment 1 vlan 100-200
enable
Router#
configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
260
Admin-vlan: 100
Preempt Delay Timer: disabled
Load-balancing block port: none
Load-balancing block vlan: none
STCN Propagate to: none
LSL PDU rx: 3322, tx: 1722
HFL PDU rx: 32, tx: 5
BPA TLV rx: 16849, tx: 508
BPA (STCN, LSL) TLV rx: 0, tx: 0
BPA (STCN, HFL) TLV rx: 0, tx: 0
EPA-ELECTION TLV rx: 118, tx: 118
EPA-COMMAND TLV rx: 0, tx: 0
EPA-INFO TLV rx: 4214, tx: 4190
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
261
!
interface Vlan2
ip address 1.1.1.1 255.255.255.0
no ptp enable
!
interface Vlan3
ip address 2.2.2.2 255.255.255.0
no ptp enable
!
interface Vlan3
ip address 4.4.4.2 255.255.255.0
no ptp enable
!
ip route 3.3.3.0 255.255.255.0 1.1.1.4
ip route 5.5.5.0 255.255.255.0 1.1.1.4
ASR_2
interface GigabitEthernet0/0
service instance 1 ethernet
encapsulation dot1q 1
rewrite ingress tag pop 1 symmetric
bridge-domain 1
!
service instance 2 ethernet
encapsulation dot1q 2
rewrite ingress tag pop 1 symmetric
bridge-domain 2
!
rep segment 1
interface GigabitEthernet0/1
service instance 1 ethernet
encapsulation dot1q 1
rewrite ingress tag pop 1 symmetric
bridge-domain 1
!
service instance 2 ethernet
encapsulation dot1q 2
rewrite ingress tag pop 1 symmetric
bridge-domain 2
!
rep segment 1
!
interface Vlan1
ip address 172.18.44.239 255.255.255.0
no ptp enable
!
interface Vlan2
ip address 1.1.1.2 255.255.255.0
no ptp enable
7600_1
interface Port-channel69
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
!
interface GigabitEthernet3/25
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet3/26
switchport
switchport trunk encapsulation dot1q
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
262
7600_2
interface Port-channel69
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
!
interface GigabitEthernet5/2
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
rep segment 1 edge
!
interface GigabitEthernet7/25
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface GigabitEthernet7/26
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1,2
switchport mode trunk
channel-group 69 mode on
!
interface Vlan1
no ip address
!
interface Vlan2
ip address 1.1.1.3 255.255.255.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
263
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
264
CHAPTER
13
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
265
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
266
Changing an EVC service instance to a VLAN that has not been defined in MST 1 will result in mapping
of EVC port to MST 0.
The peer router of the EVC port must also be running MST.
MST is supported only on EVC BD. EVCs without BD configuration will not participate in MST.
When an MST is configured on the outer VLAN, you can configure any number of service instances
with the same outer VLAN as shown in the following configuration example.
nPE1#sh run int gi0/5
Building configuration...
Current configuration : 373 bytes
!
interface GigabitEthernet0/5
description connected to CE1
no ip address
service instance 100 ethernet
encapsulation dot1q 100 second-dot1q 1
bridge-domain 100
!
service instance 101 ethernet
encapsulation dot1q 100 second-dot1q 2
bridge-domain 101
!
service instance 102 ethernet
encapsulation dot1q 100 second-dot1q 120-140
bridge-domain 102
!
end
nPE1#sh run int gi0/6
Building configuration...
Current configuration : 373 bytes
!
interface GigabitEthernet0/6
description connected to CE1
no ip address
service instance 100 ethernet
encapsulation dot1q 100 second-dot1q 1
bridge-domain 100
!
service instance 101 ethernet
encapsulation dot1q 100 second-dot1q 2
bridge-domain 101
!
service instance 102 ethernet
encapsulation dot1q 100 second-dot1q 120-140
bridge-domain 102
!
end
nPE1#sh span vlan 100
MST0
Spanning tree enabled protocol mstp
Root ID
Priority
32768
Address
0018.742f.3b80
Cost
0
Port
2821 (GigabitEthernet12/5)
Hello Time
2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
32768 (priority 32768 sys-id-ext 0)
Address
001a.303c.3400
Hello Time
2 sec Max Age 20 sec Forward Delay 15 sec
Interface
Role Sts Cost
Prio.Nbr Type
------------------- ---- --- --------- -------- -------------------------------Gi12/5
Root FWD 20000
128.2821 P2p
Gi12/6
Altn BLK 20000
128.2822 P2p
nPE1#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
267
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
268
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router# enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
Example:
Router(config-if)# service instance
101 ethernet
Step 5
Router(config-if-srv)# encapsulation
dot1q 13
Step 6
Router(config-if-srv)# bridge-domain
12
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
269
Verification
Use this command to verify the configuration:
Router# show spanning-tree vlan 2
MST0
Spanning tree enabled protocol mstp
Root ID
Priority
32768
Address
0009.e91a.bc40
This bridge is the root
Hello Time
2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
32768 (priority 32768 sys-id-ext 0)
Address
0009.e91a.bc40
Hello Time
2 sec Max Age 20 sec Forward Delay 15 sec
Interface
Role Sts Cost
Prio.Nbr Type
------------------- ---- --- --------- -------- -------------------------------Gi4/1
Desg FWD 20000
128.1537 P2p
Gi4/3
Back BLK 20000
128.1540 P2p
In this example, interface gi4/1 and interface gi4/3 are connected back-to-back. Each has a service instance
(EFP) attached to it. The EFP on both interfaces has an encapsulation VLAN ID of 2. Changing the VLAN
ID from 2 to 8 in the encapsulation directive for the EFP on interface gi4/1 stops the MSTP from running in
the MST instance to which the old VLAN is mapped and starts the MSTP in the MST instance to which the
new VLAN is mapped:
Router(config-if)# interface g4/1
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encap dot1q 8
Router(config-if-srv)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
270
In this example, interface gi4/3 (with an EFP that has an outer encapsulation VLAN ID of 2 and a bridge
domain of 100) receives a new service:
Router# enable
Router# configure terminal
Router(config)# interface g4/3
Router((config-if)# service instance 2 ethernet
Router((config-if-srv)# encap dot1q 2 second-dot1q 100
Router((config-if-srv)# bridge-domain 200
Now there are two EFPs configured on interface gi4/3 and both of them have the same outer VLAN 2.
interface GigabitEthernet4/3
no ip address
service instance 1 ethernet
encapsulation dot1q 2
bridge-domain 100
!
service instance 2 ethernet
encapsulation dot1q 2 second-dot1q 100
bridge-domain 200
The preceding configuration does not affect the MSTP operation on the interface; there is no state change for
interface gi4/3 in the MST instance it belongs to.
Router# show spanning-tree mst 1
##### MST1
vlans mapped:
2
Bridge
address 0009.e91a.bc40 priority
32769 (32768 sysid 1)
Root
this switch for MST1
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------Gi4/3
Desg FWD 20000
128.1540 P2p
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
271
Troubleshooting Tips
Table 19: Troubleshooting Scenarios
Problem
Solution
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
272
Problem
Solution
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
273
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
274
CHAPTER
14
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
275
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
276
CHAPTER
15
Configuring EoMPLS
The Cisco ASR 901 Cisco ASR 901S router supports EoMPLS, a subset of AToM that uses a tunneling
mechanism to carry Layer 2 Ethernet traffic. Ethernet Over MPLS (EoMPLS) encapsulates Ethernet frames
in MPLS packets and forwards them across the MPLS network. In addition to dot1q, untagged, and default
encapsulation support for an Ethernet Virtual Connection (EVC) with cross connect, effective with Cisco
IOS Release 15.4(2)S, the Cisco ASR 901 Cisco ASR 901S router supports dot1ad encapsulation for the
EVC with cross connect.
Understanding EoMPLS, page 277
Configuring EoMPLS, page 279
EoMPLS Configuration Example, page 280
Configuring EVC Default Encapsulation with xconnect, page 281
Configuring Pseudowire Redundancy, page 283
Port-Based EoMPLS, page 284
Feature Information for Configuring EoMPLS, page 285
Understanding EoMPLS
EoMPLS encapsulates Ethernet frames in MPLS packets and forwards them across the MPLS network. Each
frame is transported as a single packet, and the PE routers connected to the backbone add and remove labels,
as appropriate, for packet encapsulation:
The ingress PE router receives an Ethernet frame and encapsulates the packet by removing the preamble,
the Start Frame Delimiter (SFD), and the frame check sequence (FCS). The rest of the packet header is
not changed.
The ingress PE router adds a point-to-point virtual connection (VC) label and a label-switched path
(LSP) tunnel label for normal MPLS routing through the MPLS backbone.
The network core router uses the LSP tunnel label to move the packet through the MPLS backbone and
does not distinguish Ethernet traffic from other types of packets in the MPLS backbone.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
277
Configuring EoMPLS
Restrictions for EoMPLS
At the other end of the MPLS backbone, the egress PE router receives the packet and de-encapsulates
the packet by removing the LSP tunnel label, if present. The PE router also removes the VC label from
the packet.
The PE router updates the header, if necessary, and sends the packet out of the appropriate interface to
the destination switch.
The MPLS backbone uses the tunnel labels to transport a packet between the PE routers. The egress PE router
uses the VC label to select the outgoing interface for the Ethernet packet. Because EoMPLS tunnels are
unidirectional, for bidirectional EoMPLS, you should configure one tunnel in each direction.
The point-to-point VC requires you to configure VC endpoints at the two PE routers. Only the PE routers at
the ingress and egress points of the MPLS backbone know about the VCs dedicated to transporting Layer 2
traffic. Other routers do not have table entries for these VCs.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
278
Configuring EoMPLS
Configuring EoMPLS
Configuring EoMPLS
Complete the following steps to configure EoMPLS:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface interface-id
Example:
Router(config)# interface
gigabitethernet 0/1
Example:
Router(config-if)# ethernet
dot1ad nni
Step 5
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
279
Configuring EoMPLS
EoMPLS Configuration Example
Command or Action
Step 7
Purpose
rewrite ingress tag pop 1 symmetric (Optional) Specifies that encapsulation modification to occur
on packets at ingress.
Example:
Router(config-if-srv)#rewrite
ingress
tag pop 1 symmetric
Step 8
Example:
Router(config-if-srv)# xconnect
192.168.1.8 101
encapsulation mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
280
Configuring EoMPLS
Configuring EVC Default Encapsulation with xconnect
!
no ip http server
ip route 10.0.0.0 255.0.0.0 10.104.99.1
!
logging esm config
!
mpls ldp router-id Loopback0 force
!
!
end
Note
When default encapsulation is configured on xconnect, the Cisco ASR 901 Cisco ASR 901S router does
not support untagged encapsulation on the bridge domain of the same interface.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
GigabitEthernet0/4
Step 4
service instance instance-id ethernet Creates a service instance on an interface and defines the
matching criteria.
Example:
Router(config-if)# service
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
281
Configuring EoMPLS
Verifying EVC Default Encapsulation with xconnect
Command or Action
Purpose
instance
10 ethernet
Step 5
encapsulation default
Example:
Router(config-if)# encapsulation
default
Step 6
Example:
Router(config-if-srv)# xconnect
1.1.1.1
100 encapsulation mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
282
Configuring EoMPLS
Configuring Pseudowire Redundancy
Configuration Commands
Complete the following steps to configure pseudowire redundancy:
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
Step 3
service instance 101 ethernet Configures a service instance and enters the service instance
configuration mode.
Step 4
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
283
Configuring EoMPLS
Port-Based EoMPLS
Command or Action
Purpose
Although the symmetric keyword seems to be
optional, you must enter it for rewrite to function
correctly.
Binds the VLAN attachment circuit to an AToM pseudowire
for EoMPLS.
Note
Step 6
Step 7
Step 8
end
Port-Based EoMPLS
The port mode allows a frame coming into an interface to be packed into an MPLS packet and transported
over the MPLS backbone to an egress interface. The entire ethernet frame without the preamble or frame
check sequence (FCS) is transported as a single packet. To configure port mode, use the xconnect command
in the main interface mode and specify the destination address and the VC ID. The syntax and semantics of
the xconnect command are the same as for all other transport types. Each interface is associated with one
unique pseudowire VC label.
Complete the following steps to configure port-based EoMPLS:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router>
Step 2
enable
configure terminal
Example:
Router>
configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
284
Configuring EoMPLS
Feature Information for Configuring EoMPLS
Step 3
Command or Action
Purpose
Example:
Router(config)#
interface GigabitEthernet
0/2
Example:
Router(config-if)#
Step 4
Example:
What to Do Next
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 20: Feature Information for EoMPLS
Feature Name
Releases
Feature Information
Configuring EoMPLS
15.1(2)SNI
15.4(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
285
Configuring EoMPLS
Feature Information for Configuring EoMPLS
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
286
CHAPTER
16
Note
Cisco ASR 901 Cisco ASR 901S does not support VRF on TDM interfaces.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
287
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
288
!
!
!
!
!
!
!
!
interface Loopback2
no ip address
!
interface Loopback100
ip address 111.0.0.1 255.255.255.255
!
interface GigabitEthernet0/0
no negotiation auto
!
interface GigabitEthernet0/1
no negotiation auto
!
interface GigabitEthernet0/2
no negotiation auto
!
interface GigabitEthernet0/3
no negotiation auto
!
interface GigabitEthernet0/4
no negotiation auto
!
interface GigabitEthernet0/5
media-type sfp
no negotiation auto
cdp enable
service instance 2 ethernet
encapsulation dot1q 2
rewrite ingress tag pop 1 symmetric
bridge-domain 2
!
!
interface GigabitEthernet0/6
no negotiation auto
service instance 10 ethernet
encapsulation dot1q 20
bridge-domain 120
!
!
interface GigabitEthernet0/7
load-interval 30
media-type sfp
no negotiation auto
cdp enable
service instance 300 ethernet
encapsulation dot1q 300
rewrite ingress tag pop 1 symmetric
bridge-domain 300
!
!
interface GigabitEthernet0/8
no negotiation auto
!
interface GigabitEthernet0/9
load-interval 30
no negotiation auto
service instance 10 ethernet
encapsulation dot1q 301
rewrite ingress tag pop 1 symmetric
bridge-domain 301
!
!
interface GigabitEthernet0/10
no negotiation auto
ethernet dot1ad nni
service instance 1 ethernet
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
289
encapsulation dot1ad 30
rewrite ingress tag pop 1 symmetric
!
!
interface GigabitEthernet0/11
no negotiation auto
!
interface ToP0/12
no negotiation auto
!
interface FastEthernet0/0
no ip address
full-duplex
!
interface Vlan1
!
interface Vlan2
ip vrf forwarding customer_2
ip address 2.2.1.1 255.255.255.0
!
interface Vlan300
ip address 1.0.0.1 255.255.255.0
mpls ip
!
interface Vlan301
ip address 11.0.0.1 255.255.255.0
mpls ip
!
router ospf 22
router-id 1.0.0.1
redistribute connected subnets
network 1.0.0.0 0.0.0.255 area 23
network 11.0.0.0 0.0.0.255 area 23
!
router bgp 1
bgp log-neighbor-changes
neighbor 111.0.1.1 remote-as 1
neighbor 111.0.1.1 update-source Loopback100
!
address-family ipv4
redistribute connected
neighbor 111.0.1.1 activate
neighbor 111.0.1.1 send-community both
exit-address-family
!
address-family vpnv4
neighbor 111.0.1.1 activate
neighbor 111.0.1.1 send-community both
exit-address-family
!
address-family ipv4 vrf cust
redistribute static
aggregate-address 190.0.0.0 255.0.0.0 summary-only
redistribute connected
neighbor 2.2.1.2 remote-as 100
neighbor 2.2.1.2 activate
exit-address-family
!
ip forward-protocol nd
!
!
no ip http server
!
logging esm config
cdp run
!
mpls ldp router-id Loopback100 force
!
!
control-plane
!
!
line con 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
290
line con 1
transport preferred lat pad telnet rlogin udptn mop ssh
transport output lat pad telnet rlogin udptn mop ssh
line vty 0 4
login
!
exception data-corruption buffer truncate
exception crashinfo buffersize 128
!
end
Provider Configuration
Router_1#show running-config interface gigabitEthernet 4/150/0
Building configuration...
Current configuration : 80 bytes
!
interface GigabitEthernet4/150/0
ip address 9.0.0.1 255.255.255.0
mpls ip
end
Router_1#show running-config interface gigabitEthernet 4/160/1
Building configuration...
Current configuration : 91 bytes
!
interface GigabitEthernet4/160/1
ip address 1.0.0.2 255.255.255.0
mpls ip
end
Router_1#
mpls ldp router-id Loopback2 force
Router_1#show running-config partition router bgp 1
Building configuration...
Current configuration : 664 bytes
!
Configuration of Partition - router bgp 1
!
!
!
router bgp 1
bgp log-neighbor-changes
neighbor 100.0.0.1 remote-as 1
neighbor 100.0.0.1 update-source Loopback2
neighbor 100.0.1.1 remote-as 1
neighbor 100.0.1.1 update-source Loopback2
!
address-family ipv4
no synchronization
neighbor 100.0.0.1 activate
neighbor 100.0.0.1 send-community both
neighbor 100.0.1.1 activate
neighbor 100.0.1.1 send-community both
no auto-summary
exit-address-family
!
address-family vpnv4
neighbor 100.0.0.1 activate
neighbor 100.0.0.1 send-community both
neighbor 100.0.1.1 activate
neighbor 100.0.1.1 send-community both
exit-address-family
!
!
end
Router_1#
Router_1#show running-config partition router ospf 1
Building configuration...
Current configuration : 197 bytes
!
Configuration of Partition - router ospf 1
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
291
!
!
router ospf 1
log-adjacency-changes
redistribute connected subnets
network 1.0.0.0 0.0.0.255 area 0
network 9.0.0.0 0.0.0.255 area 0
!
!
end
PE2 Configuration
Interface details
Router_3#show running-config interface gigabitEthernet 6/30/1
Building configuration...
Current configuration : 79 bytes
!
interface GigabitEthernet6/30/1
ip address 9.0.0.2 255.255.255.0
mpls ip
end
Router_3#show running-config interface gigabitEthernet 6/60/2
Building configuration...
Current configuration : 107 bytes
!
interface GigabitEthernet6/60/2
ip vrf forwarding customer_red
ip address 20.20.30.100 255.255.255.0
end
Router_3#show running-config interface gigabitEthernet 6/20/0
Building configuration...
Current configuration : 136 bytes
!
interface GigabitEthernet6/20/0
ip vrf forwarding customer_green
ip address 20.20.30.99 255.255.255.0
speed nonegotiate
mpls ip
end
Router_3#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
292
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
293
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
294
CHAPTER
17
LSP Ping
MPLS LSP ping uses MPLS echo request and reply packets, similar to Internet Control Message Protocol
(ICMP) echo request and reply messages, to validate an LSP. ICMP echo request and reply messages validate
IP networks; MPLS OAM echo and reply messages validate MPLS LDP networks. The LSP ping and trace
functions use IPv4 UDP packets with UDP port number 3503. You can use MPLS LSP ping to validate IPv4
LDP or Forwarding Equivalence Classes (FECs) by using the ping mpls privileged EXEC command. The
MPLS echo request packet is sent to a target router by using the label stack associated with the FEC to be
validated.
The source address of the LSP echo request is the IP address of the LDP router generating the LSP request.
The destination IP address is a 127.x.y.z/8 address, which prevents the IP packet from being switched to its
destination if the LSP is broken. The 127.0.0.x destination address range prevents the OAM packets from
exiting the egress provider-edge router, which keeps them from leaking from the service-provider network
to the customer network.
In response to an MPLS echo request, an MPLS echo reply is forwarded as an IP packet by using IP, MPLS,
or a combination of both. The source address of the MPLS echo-reply packet is an address obtained from the
router generating the echo reply. The destination address is the source address of the router that originated
the MPLS echo-request packet. The MPLS echo-reply destination port is the echo-request source port.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
295
LSP Traceroute
MPLS LSP traceroute also uses MPLS echo request and reply packets to validate an LSP. You can use MPLS
LSP traceroute to validate LDP IPv4 by using the trace mpls privileged EXEC command. The traceroute
time-to-live (TTL) settings force expiration of the TTL along an LSP. MPLS LSP traceroute incrementally
increases the TTL value in its MPLS echo requests (TTL = 1, 2, 3, 4) to discover the downstream mapping
of each successive hop. The transit router processing the MPLS echo request returns an MPLS echo reply
containing information about the transit hop in response to the TTL-expired MPLS packet. The MPLS echo
reply destination port is sent to the echo request source port.
Note
The Cisco ASR 901 Cisco ASR 901S router does not support Control Channel Type 1 and 3.
Connectivity verification type defines a bitmask that indicates the types of CV packets and protocols that can
be sent on the specified control channel.
The LSP ping over pseudowire uses the same label stack as used by the pseudowire data path. Basically it
contains the virtual circuit (VC) label and tunnel labels.
Note
On Cisco ASR 901 Cisco ASR 901S , for a default MTU of 1500 bytes, IOS supports MPLS ping up to
1486 bytes. For MPLS ping with size more than 1486 bytes to work in Cisco ASR 901 Cisco ASR 901S
, the MTU setting on the SVI has to be adjusted to be more than 1500 bytes.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
296
Purpose
ping mpls ipv4 destination-address destination-mask To verify LSP path from Cisco ASR 901 Cisco ASR
901S to remote peer. The keywords have these
meanings:
destination-address destination-mask Specify
the address and network mask of the target FEC.
Purpose
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
297
Purpose
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
298
CHAPTER
18
Note
Cisco ASR 901 Cisco ASR 901S router supports IP routing on SVI interfaces.
Note
Cisco ASR 901 Cisco ASR 901S router does not support IGP fast timers.
Note
The maximum number of prefixes supported in Cisco ASR 901 Cisco ASR 901S router is 12000.
Note
The maximum number of SVI's supported in Cisco ASR 901 Cisco ASR 901S router is 250.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
299
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
300
CHAPTER
19
Understanding BFD
Cisco supports the BFD asynchronous mode, in which two routers exchange BFD control packets to activate
and maintain BFD neighbor sessions. To create a BFD session, you must configure BFD on both systems (or
BFD peers). After you enable BFD on the interface and the router level for the appropriate routing protocols,
a BFD session is created, BFD timers are negotiated, and the BFD peers begin to send BFD control packets
to each other at the negotiated interval.
Configuring BFD
This section contains the following topics:
For more information about BFD, refer to the IP Routing: BFD Configuration Guide, Cisco IOS Release
15.1S .
Note
Cisco ASR 901 Cisco ASR 901S supports BFD echo mode.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
301
BFD and REP together are not recommended on Cisco ASR 901 Cisco ASR 901S Router while sharing
the same link.
After enabling BFD on an interface, if you configure an IPV4 static route with BFD routing through
this interface, and if the IPV4 BFD session does not get established, unconfigure BFD on the given
interface, and configure it again. The BFD session comes up.
When you move the BFD configuration saved in flash memory to the running configuration, BFD session
is re-established.
When BFD is configured on a port from which more than 70% of line rate data traffic is egressing, there
is a drop in control packets including BFD packets. To avoid BFD packet drop, you have to configure
QoS policies that give higher priority for both CPU generated BFD packets and BFD echo reply packets.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface vlan1
Step 4
ip ospf bfd
Step 5
Step 6
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
302
What to Do Next
Note
You can also use the show bfd neighbors and show ip ospf commands to display troubleshooting
information about BFD and OSPF.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
bfd all-interfaces
Step 5
exit
Example:
Router(config)# exit
What to Do Next
Note
You can disable BFD on a single interface using the ip ospf bfd disable command when configuring the
relevant interface.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
303
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Step 5
exit
Example:
Router(config)# exit
Step 6
Example:
show ip bgp neighbor
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
304
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface vlan1
Step 4
Step 5
isis bfd
Step 6
exit
Example:
Router(config)# exit
What to Do Next
Note
You can use the show bfd neighbors and show clns interface commands to verify your configuration.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface vlan1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
305
Command or Action
Purpose
Step 4
Step 5
bfd all-interfaces
Step 6
exit
Example:
Router(config)# exit
Step 7
interface vlan1
Example:
Router(config-if) ip router
isis [tag]
exit
Example:
Router(config)# exit
What to Do Next
Note
You can use the show bfd neighbors and show clns interface commands to verify your configuration.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
306
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Step 5
Step 6
exit
Example:
Router(config-if)# exit
Step 7
Step 8
What to Do Next
Note
You can use the show ip static route command to verify your configuration.
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
307
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
308
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
309
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
310
CHAPTER
20
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
To select and configure a card type, complete the following steps:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
311
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
card type {e1 | t1} slot subslot Sets the card type. The command has the following syntax:
Example:
Router(config)# card type
e1 0 0
Step 4
exit
Example:
Router(config)# exit
Configuring E1 Controllers
Perform a basic E1 controller configuration by specifying the E1 controller, entering the clock source, specifying
the channel-group, configuring the serial interface, configuring PPP encapsulation, and enabling keepalive
packets. You might also need to enter other configuration commands, depending on the requirements for your
system configuration and the protocols you plan to route on the interface.
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
To configure the E1 controllers, complete the following steps in the global configuration mode:
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
312
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
controller e1 slot/port
Example:
Router(config)# controller e1
0/0
Router(config-controller)#
Step 4
Example:
Router(config-controller)#
framing crc4
Step 5
linecode hdb3
Example:
Router(config-controller)#
linecode hdb3
Step 6
channel-group channel-no timeslots Specifies the channel-group and time slots to be mapped.
After you configure a channel-group, the serial interface
timeslot-list speed {64}
is automatically created. The syntax is:
Example:
Router(config-controller)#
channel-group 0
timeslots 1-31 speed 64
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
313
Step 7
Command or Action
Purpose
exit
Example:
Router(config)# exit
Step 8
Example:
Step 9
encapsulation ppp
Example:
Router(config-if)# encapsulation
ppp
Step 10
Router(config-if)# keepalive
[period [retries]]
Step 11
end
Example:
Router# end
Alarm
Support
AIS
Yes
LOF
No
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
314
Note
Alarm
Support
LOS
Yes
RAI
No
Support for Unframed E1 is available only on Cisco ASR 901 Routers using the AdvancedMetroIPAccess
license.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller e1 0/0
Step 4
Note
Router(config-controller)#
channel-group 0 unframed
Configuring T1 Controllers
Use the following steps to perform a basic T1 controller configuration: specifying the T1 controller, specifying
the framing type, specifying the line code form, specifying the channel-group and time slots to be mapped,
configuring the cable length, configuring the serial interface, configuring PPP encapsulation, and enabling
keepalive packets. You might also need to enter other configuration commands, depending on the requirements
for your system configuration and the protocols you plan to route on the interface.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
315
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
To configure the T1 interfaces, complete the following steps in the global configuration mode:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Step 2
configure terminal
Example:
Step 3
controller t1 slot/subslot
Example:
Router(config-controller)# controller
t1 0/0
Step 4
framing esf
Example:
Router(config-controller)# framing
esf
Step 5
linecode line-code
Example:
Router(config-controller)# linecode
b8zs
Step 6
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
316
Command or Action
Purpose
Example:
Router(config-controller)#
cablelength long -15db
Step 8
exit
Example:
Router(config-controller)#
Step 9
exit
Example:
Router(config)#
0/1:0
Step 10
interface serial
encapsulation ppp
Example:
Router(config-if)#
ppp
Step 11
encapsulation
Step 12
keepalive 5 6
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
317
0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs
Troubleshooting Controllers
This line card supports local and network T1/E1 loopback modes, and remote T1 loopback modes for testing,
network fault isolation, and agency compliance. You can test T1/E1 lines in local and network loopback
modes. You can also test T1 lines in remote mode.
Note
The ASR901 supports activating or deactivating payload and line loopback modes using FDL in ESF
framing mode as defined in the T1.403 ANSI standard. The implementation confirms to ANSI T1.403-1999,
sections 9.4.2.1 and 9.4.2.2. The ASR901 only accepts remotely initiated loopback requests and does not
support initiation of FDL remote loopback requests.
Note
Bit-error-rate testing and loopbacks are used to resolve problems and test the quality of T1/E1 links.
Troubleshooting E1 Controllers
To troubleshoot the E1 line card, complete the following steps in the controller configuration mode:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router# enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
controller e1slot/subslot
Example:
Router(config-controller)#
controller e1 0/0
Step 4
loopback {local | network {line| Sends the packets from a port in local loopback to the remote
end.
payload}}
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
318
Command or Action
Purpose
localConfigures the line card to loop the transmitted
traffic back to the line card as E1 received traffic and
transmits AIS to the remote receiver.
Example:
Router(config-controller)#
loopback network line
Step 5
exit
Example:
Router(config-controller)#
exit
Troubleshooting T1 Controllers
To troubleshoot the T1 line card, complete the following steps in the controller configuration mode:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router# enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
controller t1 slot/subslot
Example:
Router(config-controller)#
controller t1 0/0
subslot0.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
319
Command or Action
Step 4
Purpose
loopback {diagnostic | local {line| Sends the packets from a port in local loopback to the remote
end.
payload}}
Example:
Router(config-controller)#
loopback local line
Step 5
exit
Example:
Router(config-controller)#
exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
320
CHAPTER
21
Configuring Pseudowire
Cisco Pseudowire Emulation Edge-to-Edge (PWE3) allows you to transport traffic using traditional services
such as E1/T1 over a packet-based backhaul technology such as MPLS or IP. A pseudowire (PW) consists
of a connection between two provider edge (PE) devices that connects two attachment circuits (ACs), such
as ATM VPIs/VCIs or E1/T1 links.
Finding Feature Information, page 321
Understanding Pseudowires, page 322
Hot Standby Pseudowire Support for ATM/IMA, page 323
Configuring Pseudowire, page 323
Configuring L2VPN Pseudowire Redundancy, page 337
Configuring Hot Standby Pseudowire Support for ATM/IMA, page 340
TDM Local Switching, page 345
Configuration Example for Local Switching, page 347
Configuration Examples of Hot Standby Pseudowire Support for ATM/IMA, page 347
Configuration Examples for Pseudowire, page 348
Additional References, page 352
Feature Information for Configuring Pseudowire, page 354
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
321
Configuring Pseudowire
Understanding Pseudowires
Understanding Pseudowires
Pseudowires (PWs) manage encapsulation, timing, order, and other operations in order to make it transparent
to users; the PW tunnel appears as an unshared link or circuit of the emulated service.
There are limitations that impede some applications from utilizing a PW connection.
Cisco supports the following standards-based PWE types:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
322
Configuring Pseudowire
Hot Standby Pseudowire Support for ATM/IMA
For instructions on how to create an EoMPLS PW, see Configuring Transportation of Service Using Ethernet
over MPLS, on page 336.
Limitations
When configuring an EoMPLS pseudowire on the Cisco ASR 901 Cisco ASR 901S , you cannot
configure an IP address on the same interface as the pseudowire.
Layer 2 Tunneling Protocol, version 2 and 3 (L2TPv2 and L2TPv3) is not supported on the Cisco ASR
901 Cisco ASR 901S series routers.
Configuring Pseudowire
This section describes how to configure pseudowire on the Cisco ASR 901 Cisco ASR 901S . The Cisco
ASR 901 Cisco ASR 901S supports pseudowire connections using CESoPSN. The following sections describe
how to configure pseudowire connections.
For full descriptions of each command, see the Cisco ASR 901 Cisco ASR 901S Series Aggregation Services
Command Reference Guide.
For pseudowire configuration examples, see Configuration Examples for Pseudowire, on page 348.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
323
Configuring Pseudowire
Configuring Pseudowire Classes
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
pseudowire-class class-name
Example:
Router(config)# pseudowire-class
newclass
Step 4
encapsulation mpls
Example:
Router(config-pw-class)# encapsulation
mpls
Step 5
Step 6
cem group-number
Example:
Router(config-if)# cem 0
Step 7
What to Do Next
Note
You cannot use the encapsulation mpls parameter with the pw-class parameter.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
324
Configuring Pseudowire
Configuring CEM Classes
Note
The use of the xconnect command can vary depending on the type of pseudowire you configure.
Note
Cisco IOS release 15.3(3)S automatically enables forward-alarm ais configuration (under the
config-controller configuration mode). To disable this configuration, use the no forward-alarm ais
command.
The forward-alarm ais configuration is applicable only for CESoP. It is not supported for SAToP.
You must run the no forward-alarm ais command before using CESoP with controllers in loopback
(either through loopback command under controller or by using a physical loopback jack).
Though the forward-alarm ais command (and its no form) was not supported in previous releases, the
Cisco ASR 901 Cisco ASR 901S router behaved as if this command was configured under the controller
interface.
Complete the following steps to configure a CEM class:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# class cem mycemclass
Step 4
payload-size size
Example:
Router(config-cem-class)# payload-size
512
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
325
Configuring Pseudowire
Configuring CEM Classes
Step 5
Command or Action
Purpose
dejitter-buffer size
Example:
Router(config-cem-class)#
dejitter-buffer 10
Step 6
idle-pattern size
Example:
Router(config-cem-class)# idle-pattern
0x55
Step 7
exit
Example:
Router(config-cem-class)# exit
Step 8
Example:
Note
Step 9
no ip address
Example:
Router(config-if)# no ip address
Step 10
cem group-number
Example:
Router(config-if)# cem 0
Step 11
Example:
Router(config-if-cem)# cem class
mycemclass
Step 12
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
326
Configuring Pseudowire
Configuring a Backup Peer
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface cem0/0
Step 4
cem group-number
Example:
Router(config-if)# cem 0
Step 5
xconnect peer-loopback-ip-address
encapsulation mpls
Example:
Router(config-if-cem)# xconnect
10.10.10.20 encapsulation mpls
Step 6
Example:
Router(config-if-cem-xconn)# backup
peer 10.10.10.12 10 344
Step 7
backup delay enable-delay [disable-delay | Specifies the delay before the router switches
pseudowire traffic to the backup peer VC.
never]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
327
Configuring Pseudowire
Configuring Structure-Agnostic TDM over Packet
Command or Action
Purpose
Where:
Example:
Router(config-if-cem-xconn)# backup
delay30 never
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router>
Step 2
enable
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller t1 0/4
Step 4
Router(config-if)# cem-group 4
unframed
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
328
Configuring Pseudowire
Configuring Structure-Agnostic TDM over Packet
Step 6
Command or Action
Purpose
no ip address
Example:
Router(config)# no ip address
Step 7
cem group-number
Example:
Router(config-if)# cem 4
Step 8
Router(config-if-cem)# xconnect
30.30.30.2 304 encapsulation mpls
Step 9
exit
Example:
Router(cfg-if-cem-xconn)# exit
What to Do Next
Note
When creating IP routes for a pseudowire configuration, we recommend that you build a route from the
xconnect address (LDP router-id or loopback address) to the next hop IP address, such as ip route 30.30.30.2
255.255.255.255 1.2.3.4.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
329
Configuring Pseudowire
Configuring Structure-Agnostic TDM over Packet
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
encapsulation udp
Example:
Router(config-pw-class)#
encapsulation udp
Step 5
Example:
Router(config-pw-class)# ip local
interface Loopback 1
Step 6
Example:
Router(config-pw-class)# ip tos
value 100
Step 7
ip ttl number
Example:
Router(config-pw-class)# ip ttl 100
Step 8
Example:
Router(config)# controller [e1|t1]
0/0
Step 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
330
Configuring Pseudowire
Configuring Structure-Agnostic TDM over Packet
Step 10
Command or Action
Purpose
exit
Example:
Router(config-controller)# exit
Step 11
Step 12
no ip address
Example:
Router(config)# no ip address
Step 13
cem group-number
Example:
Router(config-if)# cem 4
Step 14
Step 15
Example:
Router(config-if-cem-xconn)# udp
port local 49150 remote 55000
Step 16
exit
Example:
Router(config-if-cem-xconn)# exit
Step 17
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
331
Configuring Pseudowire
Configuring Circuit Emulation Service over Packet-Switched Network
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller [e1 |
t1] 0/0
Step 4
Step 5
exit
Example:
Router(config-controller)# exit
Step 6
Example:
Router(config)# interface CEM0/5
Step 7
cem group-number
Example:
Router(config-if-cem)# cem 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
332
Configuring Pseudowire
Configuring Circuit Emulation Service over Packet-Switched Network
Command or Action
Step 8
Step 9
Purpose
xconnect ip-address encapsulation mpls Binds an attachment circuit to the CEM interface to
create a pseudowire. This example creates a
pseudowire by binding the CEM circuit 5 to the
Example:
remote peer 30.30.30.2.
Router(config-if-cem)# xconnect
30.30.30.2 305 encapsulation mpls
Note
exit
Example:
Router(config-if-cem-xconn)# exit
Step 10
end
Example:
Router(config-if-cem)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
333
Configuring Pseudowire
Configuring Circuit Emulation Service over Packet-Switched Network
Step 4
Command or Action
Purpose
encapsulation udp
Example:
Router(config-pw-class)#
encapsulation udp
Step 5
Step 6
Example:
Router(config-pw-class)# ip tos
value 100
Step 7
ip ttl number
Example:
Router(config-pw-class)# ip ttl 100
Step 8
exit
Example:
Router(config-pw-class)# exit
Step 9
Example:
Router(config)# controller e1 0/0
Step 10
cem-group
5 timeslots 1-24
Step 11
exit
Example:
Router(config-controller)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
334
Configuring Pseudowire
QoS for CESoPSN over UDP and SAToP over UDP
Step 12
Command or Action
Purpose
Example:
Router(config)# interface cem 0/5
Step 13
no ip address
Example:
Router(config)# no ip address
Step 14
cem group-number
Example:
Router(config-if)# cem 5
Step 15
Step 16
Example:
Router(config-if-cem-xconn)# udp
port local 49150 remote 55000
Step 17
end
Example:
Router(config-if-cem)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
335
Configuring Pseudowire
Configuring Transportation of Service Using Ethernet over MPLS
IP Precedence setting at the service policy is applied. Hence, the service-policy overrides the Qos configuration
that is set through the pseudowire-class.
Example
Router(config)#pseudowire-class pw-udp
Router(config-pw-class)#ip tos value tos-value
Router(config)#policy-map policy-Qos
Router(config-pmap)#class class-default
Router(config-pmap-c)#set ip precedence precedence-value
Router(config-pmap-c)#set ip dscp dscp-value
Router(config-pmap-c)#set qos-group qos-group-value
Router(config)#interface cem 0/0
Router(config-if)#cem 0
Router(config-if-cem)#service-policy input policy-Qos
Router(config-if-cem)#xconnect 180.0.0.201 29 pw-class pw-udp
Router(cfg-if-cem-xconn)#udp port local 49152 remote 49152
The set qos-group command is used to set the mpls experimental bit for the vc label, if no action on egress
is copied to the outer mpls label experimental bit.
Note
For details on configuring QoS in Cisco ASR 901, see Configuring QoS, on page 427.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router#
Step 3
configure terminal
interface GigabitEthernetslot/port
Example:
interface
GigabitEthernet0/2
Router(config)#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
336
Configuring Pseudowire
Configuring L2VPN Pseudowire Redundancy
Command or Action
Step 4
Purpose
service instance instance-number ethernet Configures a service instance and enters the service
instance configuration mode.
Example:
Router(config-if)#
ethernet
Step 5
Example:
Router(config-if-srv)#
encapsulation
dot1q 101
Step 6
Router(config-if-srv)#
rewrite ingress
Step 7
xconnect
11.205.1.1 141 encapsulation mpls
Router(config-if-srv)#
Step 8
end
Example:
Router(config-if-srv)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
337
Configuring Pseudowire
Configuring L2VPN Pseudowire Redundancy
Configure pseudowire redundancy by configuring two pseudowires for the CEM interface: a primary pseudowire
and a backup (standby) pseudowire. If the primary pseudowire goes down, the router uses the backup
pseudowire in its place. When the primary pseudowire comes back up, the backup pseudowire is brought
down and the router resumes using the primary.
The following figure shows an example of pseudowire redundancy.
Note
You must configure the backup pseudowire to connect to a different router than the primary pseudowire.
Complete the following steps to configure pseudowire redundancy on a CEM interface.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Selects an E1 or T1 controller.
Example:
Router(config)# controller t1 0/1
Step 4
cem-group group-number {unframed Creates a CEM interface and assigns it a CEM group
number.
| timeslots} timeslot
Example:
Router(config-controller)#
cem-group 5 timeslots 30
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
338
Configuring Pseudowire
Configuring L2VPN Pseudowire Redundancy
Command or Action
Purpose
Example:
Router(config-controller)# framing
esf
Step 6
exit
Example:
Router(config-controller)#
Step 7
exit
Example:
Router(config)# interface cem 0/0
Step 8
cem group-number
Example:
Router(config-if)# cem 0
Step 9
Step 10
Step 11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
339
Configuring Pseudowire
Example: Pseudowire Redundancy
Command or Action
Purpose
after the primary pseudowire VC goes down. The
range is 0 to 180.
Example:
Router(config-if-xcon)# backup
delay 30 60
Note
Both the primary and backup pseudowires must be provisioned for the Hot Standby Pseudowire Support
feature to work.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
340
Configuring Pseudowire
Configuring ATM/IMA Pseudowire Redundancy in PVC Mode
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
interface interface-name
Example:
Router(config)# interface
ATM0/IMA1
Step 4
Step 5
Router(config-if)# encapsulation
aa10
Step 6
Step 7
backup peer peer-router-ip-addr vcid Specifies a redundant peer for a pseudowire virtual circuit
(VC).
Example:
Router(config-if-xconn)# backup
peer 170.0.0.201 200
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
341
Configuring Pseudowire
Configuring ATM/IMA Pseudowire Redundancy in PVP Mode
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface interface-name
Example:
Router(config)# interface
ATM0/IMA1
Step 4
Step 5
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
342
Configuring Pseudowire
Configuring ATM/IMA Pseudowire Redundancy in Port Mode
Command or Action
Purpose
peer-router-idIP address of the remote peer router.
Example:
Router(config-if-xconn)# backup
peer 170.0.0.201 200
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface interface-name
Example:
Router(config)# interface
ATM0/IMA1
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
343
Configuring Pseudowire
Configuring ATM/IMA Pseudowire Redundancy in Port Mode
Command or Action
Step 5
Purpose
backup peer peer-router-ip-addr vcid Specifies a redundant peer for a pseudowire virtual circuit
(VC).
Example:
Router(config-if-xconn)# backup
peer 170.0.0.201 200
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
344
Status
---------STANDBY
UP
Configuring Pseudowire
TDM Local Switching
Note
Effective with 15.2(2)SNH1 release, you can configure local switching on the T1 or E1 mode.
Restrictions
Auto-provisioning is not supported.
Out-of-band signaling is not supported.
Redundancy is not supported.
Interworking with other interface types other than CEM is not supported.
The same CEM circuit cannot be used for both local switching and cross-connect.
You cannot use CEM local switching between two CEM circuits on the same CEM interface.
Local switching is not supported in unframed mode.
Local switching with channelized CEM interface is not supported.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
345
Configuring Pseudowire
Configuring TDM Local Switching on a T1/E1 Mode
Modifications to payload size, dejitter buffer, idle pattern, and service policy CEM interface parameters
are not supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface cem0/3
Step 4
Segment 2
State
==========================================================================
1
myconn
CE0/0 CESP 0
UP
Router# show connection all
ID
Name
Segment 1
State
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
346
CE0/1 CESP 0
Segment 2
Configuring Pseudowire
Configuration Example for Local Switching
==========================================================================
1
myconn
CE0/0 CESP 0
UP
2
myconn 1
CE0/1 CESP 1
CE0/0 CESP 1
Router# show connection name myconn
Connection: 1 - myconn
Current State: UP
Segment 1: CEM0/0 CESoPSN Basic 0 up
Segment 2: CEM0/1 CESoPSN Basic 0 up
Router# show connection id 1
Connection: 1 - myconn
Current State: UP
Segment 1: CEM0/0 CESoPSN Basic 0 up
Segment 2: CEM0/1 CESoPSN Basic 0 up
CE0/1 CESP 0
UP
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
347
Configuring Pseudowire
Example: Configuring ATM/IMA Pseudowire Redundancy in PVP Mode
ASR_A
!
version 12.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
!
hostname asr_A
!
boot-start-marker
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
348
Configuring Pseudowire
Example: TDM over MPLS Configuration-Example
boot-end-marker
!
card type e1 0 0
enable password xxx
!
no aaa new-model
clock timezone est -5
!
ip cef
!
controller E1 0/0
clock source internal
cem-group 0 timeslots 1-31
description E1 CESoPSN example
!
controller E1 0/1
clock source internal
cem-group 1 unframed
description E1 SATOP example
!
controller E1 0/4
clock source internal
cem-group 4 unframed
description E1 SATOP example
!
controller E1 0/5
clock source internal
cem-group 5 timeslots 1-24
description E1 CESoPSN example
!
interface Loopback0
ip address 30.30.30.1 255.255.255.255
!
interface GigabitEthernet0/1
no negotiation auto
service instance 2 ethernet
encapsulation untagged
bridge-domain 100
!
!
interface CEM0/0
no ip address
cem 0
xconnect 30.30.30.2 300 encapsulation
!
!
interface CEM0/1
no ip address
cem 1
xconnect 30.30.30.2 301 encapsulation
!
!
interface CEM0/4
no ip address
cem 4
xconnect 30.30.30.2 304 encapsulation
!
!
interface CEM0/5
no ip address
cem 5
xconnect 30.30.30.2 305 encapsulation
!
!
interface Vlan100
ip address 50.50.50.1 255.255.255.0
mpls ip
!
router ospf 1
network 50.50.50.0 0.0.0.255 area 0
network 30.30.30.1 0.0.0.0 area 0
!
no ip http server
mpls
mpls
mpls
mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
349
Configuring Pseudowire
Example: TDM over MPLS Configuration-Example
no ip http secure-server
!
line con 0
password xxx
login
line aux 0
password xxx
login
no exec
line vty 0 4
password xxx
login
!
network-clock input-source 1 external 0/0/0
end
e1 crc4
ASR_B
!
version 12.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
!
hostname asr_B
!
boot-start-marker
boot-end-marker
!
card type e1 0 0
enable password xxx
!
no aaa new-model
clock timezone est -5
!
ip cef
!
controller E1 0/0
clock source internal
cem-group 0 timeslots 1-31
description E1 CESoPSN example
!
controller E1 0/1
clock source internal
cem-group 1 unframed
description E1 SATOP example
!
controller E1 0/4
clock source internal
cem-group 4 unframed
description T1 SATOP example
!
controller E1 0/5
clock source internal
cem-group 5 timeslots 1-24
description T1 CESoPSN example
!
interface Loopback0
ip address 30.30.30.2 255.255.255.255
!
interface GigabitEthernet0/1
no negotiation auto
service instance 2 ethernet
encapsulation untagged
bridge-domain 100
!
!
interface CEM0/0
no ip address
cem 0
xconnect 30.30.30.1 300 encapsulation mpls
!
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
350
Configuring Pseudowire
Example: CESoPSN with UDP
interface CEM0/1
no ip address
cem 1
xconnect 30.30.30.1 301 encapsulation mpls
!
!
interface CEM0/4
no ip address
cem 4
xconnect 30.30.30.1 304 encapsulation mpls
!
!
interface CEM0/5
no ip address
cem 5
xconnect 30.30.30.1 305 encapsulation mpls
!
!
interface Vlan100
ip address 50.50.50.2 255.255.255.0
mpls ip
!
router ospf 1
network 50.50.50.0 0.0.0.255 area 0
network 30.30.30.2 0.0.0.0 area 0
!
no ip http server
no ip http secure-server
!
line con 0
password xxx
login
line aux 0
password xxx
login
no exec
line vty 0 4
password xxx
login
!
network-clock input-source 1 controller e1 0/0
end
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
351
Configuring Pseudowire
Example: Ethernet over MPLS
Additional References
The following sections provide references related to Psuedowire.
Related Documents
Related Topic
Document Title
http://www.cisco.com/en/US/docs/ios/mcl/
allreleasemcl/all_book.html Cisco IOS Master
Commands List, All Releases
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
352
Configuring Pseudowire
Additional References
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
353
Configuring Pseudowire
Feature Information for Configuring Pseudowire
Note
Table 22: Feature Information for Configuring Pseudowire, on page 354 lists only the software release
that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Table 22: Feature Information for Configuring Pseudowire
Feature Name
Releases
Feature Information
Configuring Pseudowire
15.2(2)SNH1
15.3(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
354
CHAPTER
22
Configuring Clocking
This chapter provides information about configuring clocking on the Cisco ASR 901 Cisco ASR 901S
Series Aggregation Services Router.
Configuring Clocking, page 355
Restrictions, page 355
Configuring Network Clock for Cisco ASR 901 Cisco ASR 901S Router, page 356
Configuring PTP for the Cisco ASR 901 Cisco ASR 901S Router, page 370
Configuring Clocking
This chapter provides information about configuring clocking on the Cisco ASR 901 Cisco ASR 901S Series
Aggregation Services Router.
Restrictions
External interfaces like Building Integrated Timing Supply (BITS) and 1 Pulse Per Second (1PPS) have
only one port. These interfaces can be used as either an input interface or output interface at a given
time.
The line to external option is not supported for external Synchronization Supply Unit (SSU).
Time-of-Day (ToD) is not integrated to the router system time. ToD input or output reflects only the
PTP time, not the router system time.
Revertive and non-revertive modes work correctly only with two clock sources.
BITS cable length option is supported via platform timing bits line-build-out command.
There is no automatic recovery from out-of-resource (OOR) alarms. OOR alarms must be manually
cleared using clear platform timing oor-alarms command.
If copper Gigabit Ethernet port is selected as the input clock source, the link must be configured as a
IEEE 802.3 link-slave, using synce state slave command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
355
Configuring Clocking
Configuring Network Clock for Cisco ASR 901 Cisco ASR 901S Router
BITS reports loss of signal (LOS) only for Alarm Indication Signal (AIS), LOS, and loss of frame (LOF)
alarms.
The clock source line command does not support loop timing in T1/E1 controllers. However, the clock
can be recovered from T1/E1 lines and used to synchronize the system clock using the network-clock
input-source priority controller E1/T1 0/x command.
Adaptive clocking is not supported in Cisco ASR 901 Cisco ASR 901S router.
The show network-clocks command is not supported in Cisco ASR 901 Cisco ASR 901S Router.
Do not use network-clock synchronization command while configuring 2dmm, as it is not supported.
If you proceed with the unsupported configuration, it will show junk values.
Configuring Network Clock for Cisco ASR 901 Cisco ASR 901S
Router
Cisco ASR 901 Cisco ASR 901S router supports time, phase and frequency awareness through ethernet
networks; it also enables clock selection and translation between the various clock frequencies.
If Cisco ASR 901 Cisco ASR 901S interoperates with devices that do not support synchronization,
synchronization features can be disabled or partially enabled to maintain backward compatibility.
The network clock can be configured in global configuration mode and interface configuration mode:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
network-clock synchronization
automatic
Example:
Router(config)#
network-clock synchronization
automatic
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
356
Configuring Clocking
Configuring Network Clock in Global Configuration Mode
Step 4
Command or Action
Purpose
network-clock eec {1 | 2 }
Example:
Router(config)# network-clock
eec 1
Step 5
Step 6
network-clock hold-off {0 |
50-10000} global
Note
Example:
Router(config)# network-clock
hold-off
75 global
Step 7
network-clock external
Overrides hold-off timer value for external interface.
slot/card/port hold-off {0 | 50-10000} Note
Displays a warning message for values above 1800
ms, as waiting longer causes the clock to go into
Example:
the holdover mode.
Router(config)# network-clock
external
3/1/1 hold-off 300
Step 8
network-clock wait-to-restore
0-86400 global
Example:
Router(config)# network-clock
external
wait-to-restore 1000 global
Step 9
network-clock input-source
priority { interface interface-name
slot/port | top slot/port | {external
slot/card/port [t1{sf| efs| d4} | e1
[crc4| fas| cas[crc4] | 2048k | 10m]}}
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
357
Configuring Clocking
Configuring Network Clock in Global Configuration Mode
Command or Action
Purpose
Example:
Router(config)# network-clock
input-source 1
nterface top 0/12
Example:
Example for GPS Interface
Router(config)# network-clock
input-source 1
external 0/0/0 10m
2 MHz signal
Default for Europe or Option I is e1 crc4 if the signal
type is not specified.
Default for North America or Option II is t1 esf if
signal type is not specified.
Example:
Router(config)# network-clock
input-source 10
controller e1 0/12
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
358
Configuring Clocking
Configuring Network Clock in Interface Configuration Mode
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface
Example:
Router(config)# interface
Step 4
synchronous mode
Example:
Note
Step 5
Example:
Note
Router(config-if)# network-clock
hold-off 1000
Step 6
Caution
Router(config-if)#network-clock
wait-to-restore 1000
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
359
Configuring Clocking
Understanding SSM and ESMC
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
360
Configuring Clocking
Configuring ESMC in Global Configuration Mode
QL-disabled mode
In the QL-disabled mode, the following parameters contribute to the selection process:
Signal failure
Priority
External commands
If no external commands are active, the algorithm selects the reference (for clock selection) with the highest
priority that does not experience a signal fail condition.
For multiple inputs having the same highest priority, the existing reference is maintained (if it belongs to this
group), otherwise an arbitrary reference from this group is selected.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
361
Configuring Clocking
Configuring ESMC in Interface Configuration Mode
Step 3
Command or Action
Purpose
Example:
Router(config)# network-clock
synchronization
mode ql-enabled
Step 4
esmc process
Note
Example:
Step 5
Example:
Router(config)# network-clock
quality-level
rx qL-pRC external 0/0/0 e1 crc4
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
362
Configuring Clocking
Configuring ESMC in Interface Configuration Mode
Step 3
Command or Action
Purpose
interface
Example:
Router(config)# interface
Step 4
Example:
Router(config-if)# esmc mode tx
Step 5
Step 6
Example:
Router(config-if)# esmc mode
ql-disabled
What to Do Next
Note
By disabling Rx on an interface, any ESMC packet received on the interface shall be discarded. By disabling
Tx on an interface, ESMC packets will not be sent on the interface; any pending Switching Message Delay
timers (TSM) are also stopped.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
363
Configuring Clocking
Managing Synchronization
Managing Synchronization
You can manage the synchronization using the following management commands:
Command
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
364
Configuring Clocking
Configuring Synchronous Ethernet for Copper Ports
Command
Purpose
network-clock clear switch {t0 | external slot/card/port Clears the forced switch and manual switch
[10m | 2m]}
commands.
Router(config)# network-clock clear switch
t0
Synchronization Example
Configuration for QL-disabled mode clock selection
network-clock synchronization automatic
network-clock input-source 1 interface ToP0/12
network-clock input-source 2 External 0/0/0 10m
network-clock input-source 20 interface GigabitEthernet0/1
network-clock input-source 21 interface GigabitEthernet0/4
network-clock output-source system 1 External 0/0/0 e1 crc4
!
interface GigabitEthernet0/1
synchronous mode
synce state slave
!
interface GigabitEthernet0/4
negotiation auto
synchronous mode
synce state slave
end
GPS Configuration
10MHz signal
network-clock input-source 1 External 0/0/0 10m
2M signal
network-clock input-source 1 External 0/0/0 2048K
Purpose
Router(config-if)#
Router(config-if)#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
365
Configuring Clocking
Verifying the Synchronous Ethernet configuration
Note
Synchronization on the ethernet copper port is not supported for 10 Mbps speed.
Use the show network-clock synchronization detail command to display all details of network-clock
synchronization parameters at the global and interface levels.
Router# show network-clocks synchronization detail
Symbols:
En - Enable, Dis - Disable, Adis - Admin Disable
NA - Not Applicable
* - Synchronization source selected
# - Synchronization source force selected
& - Synchronization source manually switched
Automatic selection process : Enable
Equipment Clock : 2048 (EEC-Option1)
Clock Mode : QL-Disable
ESMC : Disabled
SSM Option : 1
T0 : External 0/0/0 10m
Hold-off (global) : 300 ms
Wait-to-restore (global) : 0 sec
Tsm Delay : 180 ms
Revertive : Yes
Force Switch: FALSE
Manual Switch: FALSE
Number of synchronization sources: 3
sm(netsync NETCLK_QL_DISABLE), running yes, state 2A
Last transition recorded: (begin)-> 2A (sf_change)-> 2A
Nominated Interfaces
Interface
SigType
Mode/QL
Prio QL_IN ESMC Tx
Internal
NA
NA/Dis
251
QL-SEC
NA
To0/12
NA
NA/En
3
QL-SEC
NA
*External 0/0/0
10M
NA/Dis
1
QL-SEC
NA
Gi0/11
NA
Sync/En
2
QL-DNU
T4 Out
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
366
ESMC Rx
NA
NA
NA
-
Configuring Clocking
Verifying the Synchronous Ethernet configuration
External Interface
SigType
Input
External 0/0/0
E1 CRC4
Internal
Interface:
--------------------------------------------Local Interface: Internal
Signal Type: NA
Mode: NA(Ql-disabled)
SSM Tx: DISABLED
SSM Rx: DISABLED
Priority: 251
QL Receive: QL-SEC
QL Receive Configured: QL Receive Overrided: QL Transmit: QL Transmit Configured: Hold-off: 0
Wait-to-restore: 0
Lock Out: FALSE
Signal Fail: FALSE
Alarms: FALSE
Slot Disabled: FALSE
SNMP input source index: 1
SNMP parent list index: 0
Local Interface: To0/12
Signal Type: NA
Mode: NA(Ql-disabled)
SSM Tx: DISABLED
SSM Rx: ENABLED
Priority: 3
QL Receive: QL-SEC
QL Receive Configured: QL Receive Overrided: QL Transmit: QL Transmit Configured: Hold-off: 300
Wait-to-restore: 0
Lock Out: FALSE
Signal Fail: FALSE
Alarms: FALSE
Slot Disabled: FALSE
SNMP input source index: 2
SNMP parent list index: 0
Local Interface: External 0/0/0
Signal Type: 10M
Mode: NA(Ql-disabled)
SSM Tx: DISABLED
SSM Rx: DISABLED
Priority: 1
QL Receive: QL-SEC
QL Receive Configured: QL Receive Overrided: QL Transmit: QL Transmit Configured: Hold-off: 300
Wait-to-restore: 0
Lock Out: FALSE
Signal Fail: FALSE
Alarms: FALSE
Active Alarms : None
Slot Disabled: FALSE
SNMP input source index: 3
SNMP parent list index: 0
Local Interface: Gi0/11
Signal Type: NA
Mode: Synchronous(Ql-disabled)
ESMC Tx: ENABLED
ESMC Rx: ENABLED
Priority: 2
QL Receive: QL-DNU
QL Receive Configured: QL Receive Overrided: QL Transmit: QL Transmit Configured: -
Prio
1
Squelch
FALSE
AIS
FALSE
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
367
Configuring Clocking
Troubleshooting Tips
Hold-off: 300
Wait-to-restore: 0
Lock Out: FALSE
Signal Fail: FALSE
Alarms: FALSE None
Slot Disabled: FALSE
SNMP input source index: 4
SNMP parent list index: 0
External 0/0/0 e1 crc4's Input:
Internal
Local Interface: Internal
Signal Type: NA
Mode: NA(Ql-disabled)
SSM Tx: DISABLED
SSM Rx: DISABLED
Priority: 1
QL Receive: QL-SEC
QL Receive Configured: QL Receive Overrided: QL Transmit: QL Transmit Configured: Hold-off: 300
Wait-to-restore: 0
Lock Out: FALSE
Signal Fail: FALSE
Alarms: FALSE
Slot Disabled: FALSE
SNMP input source index: 1
SNMP parent list index: 1
Troubleshooting Tips
Note
Before you troubleshoot, ensure that all the network clock synchronization configurations are complete.
The following table provides the troubleshooting scenarios encountered while configuring the synchronous
ethernet.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
368
Configuring Clocking
Troubleshooting Tips
Problem
Clock selection
Solution
Verify that there are no alarms on the interfaces. Use the show
network-clock synchronization detail RP command to confirm.
Use the show network-clock synchronization command to confirm if
the system is in revertive mode or non-revertive mode and verify the
non-revertive configurations as shown in the following example:
Router# show network-clocks synchronization
Symbols: En - Enable, Dis - Disable, Adis - Admin Disable
NA - Not Applicable
* - Synchronization source selected
# - Synchronization source force selected
& - Synchronization source manually switched
Automatic selection process : Enable
Equipment Clock : 2048 (EEC-Option1)
Clock Mode : QL-Disable
ESMC : Disabled
SSM Option : 1
T0 : GigabitEthernet0/4
Hold-off (global) : 300 ms
Wait-to-restore (global) : 300 sec
Tsm Delay : 180 ms
Revertive : Yes<<<<If it is non revertive then it will show NO
here.
The above example does not show the complete command output. For
complete command output, see the example in Verifying the
Synchronous Ethernet configuration, on page 366.
Reproduce the current issue and collect the logs using the debug network-clock
errors, debug network-clock event, and debug network-clock sm RP
commands.
Note
Error message
Interfaces with alarms or OOR cannot be the part of selection process even if
%NETCLK-6-SRC_UPD: it has higher quality level or priority. OOR should be cleared manually. OOR
can be cleared by clear platform timing oor-alarms command.
Synchronization source
10m 0/0/0 status (Critical
Alarms(OOR)) is posted to
all selection process is
displayed.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
369
Configuring Clocking
Configuring PTP for the Cisco ASR 901 Cisco ASR 901S Router
Danger
We suggest you do not use these debug commands without TAC supervision.
Command
debug
debug
debug
debug
debug
Purpose
esmc error
Verify whether the ESMC packets are transmitted
esmc event
and received with proper quality-level values.
esmc packet [interface interface-name>]
esmc packet rx [interface interface-name]
esmc packet tx [interface interface-name]
Configuring PTP for the Cisco ASR 901 Cisco ASR 901S Router
Effective from Cisco IOS Release 15.4 (3) S, the Cisco ASR 901 Cisco ASR 901S Router supports PTP
over Ethernet.
Note
Before configuring PTP, you should set the system time to the current time. See Setting System Time to
Current Time, on page 374 section for configuration details.
This section contains the following topics:
Restrictions, on page 371
Setting System Time to Current Time, on page 374
Configuring PTP Ordinary Clock, on page 374
Configuring PTP in Unicast Mode, on page 379
Configuring PTP in Unicast Negotiation Mode, on page 380
PTP Boundary Clock, on page 382
Verifying PTP modes, on page 386
Verifying PTP Configuration on the 1588V2 Slave in Unicast Mode, on page 389
Verifying PTP Configuration on the 1588V2 Master in Unicast Mode, on page 393
PTP Hybrid Clock, on page 396
SSM and PTP Interaction, on page 403
ClockClass Mapping, on page 404
PTP Redundancy, on page 404
Configuring ToD on 1588V2 Slave, on page 413
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
370
Configuring Clocking
Restrictions
Restrictions
In IP mode only unicast static and unicast negotiation modes are supported. Multicast mode is not
supported.
PTP over Ethernet is supported only in multicast mode.
PTP over Ethernet is not supported in telecom profiles.
PTP slave supports both single and two-step modes. PTP master supports only two-step mode.
VLAN 4093 and 4094 are used for internal PTP communication; do not use VLAN 4093 and 4094 in
your network.
VLAN 4094 is used for internal PTP communication; do not use VLAN 4094 in your network.
Note
Effective from Cisco IOS Release 15.4 (3) S, VLAN 4093 is not reserved for internal
communication. However, every clock-port created picks a VLAN from the free pool
list and reserves it internally for PTP usage only.
Effective from Cisco IOS Release 15.5 (2)S, SVI interface is supported. With this, you can use SVI or
Loopback interface in Cisco ASR 901 Cisco ASR 901S router instead of ToP interface for configuring
1588 interface/IP address.
The 1pps output command is not supported on master ordinary clock.
Sync and Delay request rates should be above 32 pps. The optimum value is 64 pps.
Clock-ports start as master even when they are configured as slave-only. The initial or reset state of the
clock is master. Therefore, the master clock must have higher priority (priority1, priority2) for the slave
to accept the master.
IEEEv2BMCA is supported only in unicast negotiation mode.
IEEEv2BMCA is not supported in multicast and unicast modes.
You should use no transport ipv4 unicastcommand to remove an existing transport configuration
before changing the transport configuration from Loopback to VLAN and vice versa.
You should use no transport ipv4 unicast command when there is change in the IP address of the
interface on which PTP Master is configured.
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
371
Configuring Clocking
IEEEV2 Best Master Clock Algorithm Overview
The following table provides the description of the nodes within a PTP network.
Network Element
Description
Grandmaster
Ordinary Clock
Boundary Clock
Transparent Clock
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
372
Configuring Clocking
IEEEV2 Best Master Clock Algorithm Overview
The Cisco ASR 901 Cisco ASR 901S Router supports IEEEv2 BMCA in following scenarios:
IEEEv2BMCA with Slave Ordinary Clock
IEEEv2BMCA with Hybrid Ordinary Clock
IEEEv2BMCA with Boundary Clock
IEEEv2BMCA with Hybrid Boundary clock
For more information on configuring the BMCA in ordinary and boundary clocks, see Configuring PTP
Ordinary Clock, on page 374 and PTP Boundary Clock, on page 382.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
373
Configuring Clocking
Setting System Time to Current Time
Purpose
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ptp clock ordinary domain domain Configures the PTP clock as an ordinary clock and enters
clock configuration mode.
Example:
Router(config)# ptp clock
ordinary domain 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
374
Configuring Clocking
Configuring PTP Ordinary Clock
Step 4
Command or Action
Purpose
priority1 priority-value
Example:
Router(config-ptp-clk)#
priority1 4
Step 5
priority2 priority-value
Example:
Router(config-ptp-clk)#
priority2 8
Step 6
Router(config-ptp-clk)#
clock-port Master master
Step 7
Example:
Router(config-ptp-port)#
transport ipv4
unicast interface loopback 0
Step 8
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
375
Configuring Clocking
Configuring PTP Ordinary Clock
Step 9
Command or Action
Purpose
Example:
Router(config-ptp-port)# sync
interval -5
Step 10
Step 11
end
Example:
Router(config-ptp-port)# end
Note
PTP redundancy is an implementation on different clock nodes by which the PTP slave clock node interacts
with multiple master ports such as grand master, boundary clock nodes, and so on. A new servo mode is
defined under PTP to support high PDV scenarios (when the PDVs exceed G.8261 standard profiles).
You should use the servo mode high-jitter command to enable this mode on the PTP slave. In servo mode,
convergence time would be longer than usual, as this mode is meant only for frequency synchronization.
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
376
Configuring Clocking
Configuring PTP Ordinary Clock
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ptp clock
ordinary domain 0
Step 4
Sets the clock port to PTP slave mode and enters clock port
configuration mode. In slave mode, the port exchanges timing
packets with a PTP master clock.
Router(config-ptp-clk)#
clock-port Slave slave
Step 5
Example:
Router(config-ptp-port)#
transport ipv4 unicast
interface loopback 0
Step 6
Example:
Router(config-ptp-port)# clock
source 5.5.5.5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
377
Configuring Clocking
Configuring PTP Ordinary Clock
Command or Action
Purpose
Repeat this step for each additional master clock. You can
configure up to four master clocks.
Note
Step 7
Example:
Router(config-ptp-port)# clock
source 8.8.8.1
Step 8
Router(config-ptp-port)#
announce timeout 8
Step 9
Example:
Router(config-ptp-port)#
delay-req interval 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
378
Configuring Clocking
Configuring PTP in Unicast Mode
Step 10
Command or Action
Purpose
Example:
Router(config-ptp-port)# sync
interval -5
Step 11
end
Example:
Router(config-ptp-port)# end
Purpose
Router(config-ptp-clk)# clock-port
Before configuring Cisco ASR 901 Cisco ASR 901S on different modes, you need to configure the loopback
address. The following example shows the configuration of loopback address:
Note
This loopback address cannot be used for any protocol other than PTP. If a VLAN interface is used instead
of loopback, the Vlan IP can be used by other protocols. It does not become dedicated to PTP.
Router(config)#int loopback
Router(config-if)#ip address 8.8.8.2 255.255.255.255
Router(config-if)#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
379
Configuring Clocking
Configuring PTP in Unicast Negotiation Mode
no sh
Router#sh run int loopback
Building configuration...
Current configuration : 72 bytes
!
interface loopback
ip address 8.8.8.2 255.255.255.255
end
!
Note
Ensure that this loopback interface is reachable (using ICMP ping) from remote locations, before assigning
the interface to PTP. Once the interface is assigned to PTP, it does not respond to ICMP pings. However,
If PTP is configured over VLAN, the interface responds to ICMP ping even after it is assigned to PTP.
The following example shows the configuration of Cisco ASR 901 Cisco ASR 901S on the unicast mode:
Router# configure terminal
Router(config)# ptp clock ordinary domain 0
Router(config-ptp-clk) clock-port SLAVE slave
Router(config-ptp-port)# transport ipv4 unicast interface loopback 10
Router(config-ptp-port)# clock-source 8.8.8.1
Purpose
Router(config-ptp-clk)# clock-port
The following example shows the configuration of Cisco ASR 901 Cisco ASR 901S router on the unicast
negotiation mode:
Router# configure terminal
Router(config)# ptp clock ordinary domain 0
Router(config-ptp-clk) clock-port SLAVE slave
Router(config-ptp-port)# transport ipv4 unicast interface loopback 23 negotiation
Router(config-ptp-port)# clock-source 8.8.8.1
Router(config)# ptp clock ordinary domain 0
Router(config-ptp-clk)# clock-port MASTER Master
Router(config-ptp-port)# transport ipv4 unicast interface loopback 23 negotiation
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
380
Configuring Clocking
Configuring PTP in Multicast Mode
Before configuring Cisco ASR 901 Cisco ASR 901S Router on different modes, you need to configure the
bridge domain. The following example shows the configuration of bridge domain and the PTP topology in
multicast mode:
Figure 22: Example for PTP Topology in Multicast Mode
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
381
Configuring Clocking
PTP Boundary Clock
bridge-domain 999
!901
end
RouterA# configure terminal
RouterA(config)# ptp clock ordinary domain 0
RouterA(config-ptp-clk)# clock-port MASTER master
RouterA(config-ptp-port)# transport ethernet multicast bridge-domain 999
RouterB# show run interface gigabitethernet0/3
Building configuration...
Current configuration : 202 bytes
!
interface GigabitEthernet0/3
no ip address
negotiation auto
service instance 1 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 999
! end
RouterB# configure terminal
RouterB(config)# ptp clock ordinary domain 0
RouterB(config-ptp-clk)# clock-port SLAVE slave
RouterB(config-ptp-port)# transport ethernet multicast bridge-domain 999
Note
For PTP over Ethernet support on Cisco ASR 901 Cisco ASR 901S Router, the PTP packets received
from an external interface should be single tagged with pop1 and double tagged with pop2. Also, the
external interface on which the PTP packets are received should have one of the following configurations
on EVC.
No pop
pop 1
pop 2
Untag
Yes
Dot1q
Yes
QinQ
Yes
Dot1ad
Yes
Dot1ad-dot1ad
Yes
Default
Priority
Yes
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
382
Configuring Clocking
PTP Boundary Clock
master, while a master port acts as a master to a remote PTP slave. A PTP boundary clock derives clock from
a master/grand master clock (by acting as a slave) and sends the derived clock to the slaves connected to it
(by acting as a master).
PTP boundary clock starts its own PTP session with a number of downstream slaves. The PTP boundary clock
mitigates the number of network hops and results in packet delay variations in the packet network between
the grand master and slave.
Figure 23: PTP Boundary Clock
The Cisco ASR 901 Cisco ASR 901S PTP boundary clock has the following capabilities:
Support for up to 20 clock ports.
Simultaneous support for static and negotiated clock ports.
Support for up to 36 slaves and 1 master.
Note
If all clock ports created in PTP boundary clock are static, Cisco ASR 901 Cisco ASR 901S supports
only 1 master port and 19 slave ports. However, if one or more slave ports are configured in unicast
negotiation mode, Cisco ASR 901 Cisco ASR 901S can support up to 36 slaves.
Support for dynamic addition and deletion of clock ports. This capability is supported only on boundary
clock master ports.
Support for selecting boundary clock as the clock source.
Note
If PTP boundary clock is configured before installing the 1588BC license, remove the boundary clock
configuration and reconfigure the boundary clock after the license installation.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
383
Configuring Clocking
PTP Boundary Clock
Note
The loopback address configured for PTP port can be used only for PTP functionality. This restriction
applies only for PTP over loopback. VLAN IP can be used by other protocols.
The loopback address configured for PTP port does not respond to pings. However, VLAN address
(if configured for PTP) will respond to pings.
A clock port once configured as master cannot change to slave dynamically, and vice versa.
PTP boundary clock can be configured for only one domain.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ptp clock boundary domain domain Configures the PTP boundary clock and selects the best
master clock. It also acts as the master clock if no better
clocks are detected. Enters clock configuration mode.
Example:
Router(config)# ptp clock
boundary domain 0
Step 4
Router(config-ptp-clk)#
clock-port SLAVE slave
Step 5
Example:
Router(config-ptp-port)#
transport ipv4 unicast
interface loopback 0 negotiation
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
384
Configuring Clocking
PTP Boundary Clock
Command or Action
Purpose
bridge-idIdentifier for the bridge domain instance.
The range is from 1 to 4094.
Note
Step 6
clock source source-address priority Specifies the address of a PTP master clock. You can specify
a priority value as follows:
Example:
Router(config-ptp-port)# clock
source 5.5.5.5
Step 7
clock source source-address priority Specifies the address of an additional PTP master clock;
repeat this step for each additional master clock. You can
configure up to four master clocks.
Example:
Router(config-ptp-port)# clock
source 30.30.30.30 1
Step 8
clock source source-address priority Specifies the address of an additional PTP master clock;
repeat this step for each additional master clock. You can
configure up to four master clocks.
Example:
Router(config-ptp-port)# clock
source 2.2.2.2 2
Step 9
clock source source-address priority Specifies the address of an additional PTP master clock;
repeat this step for each additional master clock. You can
configure up to four master clocks.
Example:
Router(config-ptp-port)# clock
source 50.50.50.50 3
Step 10
Example:
Router(config-ptp-port)# clock
source 133.133.133.133
Step 11
Example:
Note
Router(config-ptp-port)#
clock-port Master master
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
385
Configuring Clocking
Verifying PTP modes
Step 12
Command or Action
Purpose
Example:
Router(config-ptp-port)#
transport ipv4 unicast
interface loopback 0 negotiation
Step 13
exit
Example:
Router(config-ptp-port)#
exit
Use the show ptp clock dataset default command to display the sample output.
Router#show ptp clock dataset default
CLOCK [Ordinary Clock, domain 0]
Two Step Flag: No
Clock Identity: 0x0:A:8B:FF:FF:5C:A:80
Number Of Ports: 1
Priority1: 128
Priority2: 128
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
386
Configuring Clocking
Verifying PTP modes
Domain Number: 0
Slave Only: Yes
Clock Quality:
Class: 13
Accuracy: Greater than 10s
Offset (log variance): 52592
Use the show ptp clock dataset parent domain command to display the sample output.
Router# show ptp clock dataset parent domain 0
CLOCK [Ordinary Clock, domain 0]
Parent Stats: No
Observed Parent Offset (log variance): 65535
Observed Parent Clock Phase Change Rate: 0
Grandmaster Clock:
Identity: 0x0:D0:4:FF:FF:B8:6C:0
Priority1: 128
Priority2: 128
Clock Quality:
Class: 13
Accuracy: Within 1s
Offset (log variance): 52592
Use the show ptp clock dataset time-properties domain command to display the sample output.
Router# show ptp clock dataset time-properties domain 0
CLOCK [Ordinary Clock, domain 0]
Current UTC Offset Valid: TRUE
Current UTC Offset: 33
Leap 59: FALSE
Leap 61: FALSE
Time Traceable: TRUE
Frequency Traceable: TRUE
PTP Timescale: TRUE
Time Source: Internal Oscillator
Boundary Clock
Use the show ptp clock dataset current command to display the sample output.
Router# show ptp clock dataset current
CLOCK [Boundary Clock, domain 0]
Steps Removed: 0
Offset From Master: 0ns
Use the show ptp clock dataset default command to display the sample output.
Router# show ptp clock dataset default
CLOCK [Boundary Clock, domain 0]
Two Step Flag: No
Clock Identity: 0x0:0:0:FF:FE:0:23:45
Number Of Ports: 1
Priority1: 128
Priority2: 128
Domain Number: 0
Slave Only: Yes
Clock Quality:
Class: 248
Accuracy: Within 25us
Offset (log variance): 22272
Use the show ptp clock dataset parent domain command to display the sample output.
Router# show ptp clock dataset parent domain 0
CLOCK [Boundary Clock, domain 0]
Parent Stats: No
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
387
Configuring Clocking
Verifying PTP modes
Use the show ptp clock dataset time-properties domain command to display the sample output.
Router# show ptp clock dataset time-properties domain 0
CLOCK [Boundary Clock, domain 0]
Current UTC Offset Valid: FALSE
Current UTC Offset: 34
Leap 59: FALSE
Leap 61: FALSE
Time Traceable: FALSE
Frequency Traceable: FALSE
PTP Timescale: FALSE
Time Source: Internal Oscillator
Use the show ptp port running detail command to display the details of PTP boundary clock such as master
clock sources added, clock class, and variance.
Router# show ptp port running detail
Router#show ptp port running detail
PORT [SLAVE] CURRENT PTP MASTER PORT
PORT [SLAVE] PREVIOUS PTP MASTER PORT
PORT [SLAVE] LIST OF PTP MASTER PORTS
LOCAL PRIORITY 1
Protocol Address: 22.22.22.22
Clock Identity: 0x40:55:39:FF:FE:89:6F:40
PTSF Status:
Alarm In Stream:
Clock Stream Id: 0
Priority1: 128
Priority2: 128
Class: 58
Accuracy: Within 25us
Offset (log variance): 22272
Steps Removed: 0
LOCAL PRIORITY 2
Protocol Address: 66.66.66.66
Clock Identity: 0x4C:0:82:FF:FE:C7:6F:1C
PTSF Status:
Alarm In Stream:
Clock Stream Id: 0
Priority1: 128
Priority2: 128
Class: 58
Accuracy: Within 25us
Offset (log variance): 22272
Steps Removed: 0
LOCAL PRIORITY 3
Protocol Address: 77.77.77.77
Clock Identity: 0x0:0:0:0:0:0:0:0
PTSF Status: PTSF_SIGNAL_FAIL
Alarm In Stream: ALARM_ANNOUNCE_FAIL
Clock Stream Id: 0
Priority1: 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
388
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Slave in Unicast Mode
Priority2: 0
Class: 0
Accuracy: Unknown
Offset (log variance): 0
Steps Removed: 0
Use the show ptp clock running domain command to display the sample output.
Router#show ptp clock running doman 0
PTP Boundary Clock [Domain 0]
State
Ports
Pkts sent
Pkts rcvd
Redundancy Model
PHASE_ALIGNED
324215
1257513
Hot standby
PORT SUMMARY
PTP
Master
Name
Addr
Tx Mode
Role
Transport
SLAVE
MASTER
unicast
unicast
slave
master
To3/0/2
To3/0/2
State
-
Sessions
1
2
Port
9.9.9.1
Note
The loopback interface assigned to PTP does not respond to ICMP pings. To check route availability,
either do it before assigning the interface to PTP, or remove PTP from the interface and then perform
ICMP ping. For removing PTP, useno transport ipv4 unicast interface loopback interfacecommand.
For PTP over VLAN, ping will work even when interface is assigned to PTP.
Note
The bridge state indicates the extension of previously known state which can be ignored or considered to
be normal. The clock state can get into holdover from bridge state when the packet delay variation is high
on the received PTP packets or the PTP connection is lost. This holdover state indicates that the clock
cannot be recovered from PTP packets as the quality is poor.
Example 1
Router# show ptp clock runn dom 0
PTP Ordinary Clock [Domain 0]
State
Ports
Pkts sent
Pkts rcvd
ACQUIRING
1
5308
27185
PORT SUMMARY
Name
Tx Mode
Role
Transport
State
SLAVE
unicast
slave
Lo10
SESSION INFORMATION
SLAVE [L010] [Sessions 1]
Peer addr
Pkts in
Pkts out
In Errs
Out Errs
3.3.3.3
27185
5308
0
0
Sessions
1
Example 2
Router# show platform ptp state
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
389
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Slave in Multicast Mode
flag = 2
FLL State
:
FLL Status Duration
:
Forward Flow Weight
:
Forward Flow Transient-Free
:
Forward Flow Transient-Free
:
Forward Flow Transactions Used:
Forward Flow Oper. Min TDEV
:
Forward Mafie
:
Forward Flow Min Cluster Width:
Forward Flow Mode Width
:
Reverse Flow Weight
:
Reverse Flow Transient-Free
:
Reverse Flow Transient-Free
:
Reverse Flow Transactions Used:
Reverse Flow Oper. Min TDEV
:
Reverse Mafie
:
Reverse Flow Min Cluster Width:
Reverse Flow Mode Width
:
Frequency Correction
:
Phase Correction
:
Output TDEV Estimate
:
Output MDEV Estimate
:
Residual Phase Error
:
Min. Roundtrip Delay
:
Sync Packet Rate
:
Delay Packet Rate
:
Forward IPDV % Below Threshold:
Forward Maximum IPDV
:
Forward Interpacket Jitter
:
Reverse IPDV % Below Threshold:
Reverse Maximum IPDV
:
Reverse Interpacket Jitter
:
2 (Fast Loop)
7049 (sec)
0.0
900 (900 sec Window)
3600 (3600 sec Window)
23.0 (%)
4254.0 (nsec)
38.0
7550.0 (nsec)
21400.0 (nsec)
100.0
900 (900 sec Window)
3600 (3600 sec Window)
200.0 (%)
487.0 (nsec)
36.0
225.0 (nsec)
450.0 (nsec)
257.0 (ppb)
0.0 (ppb)
1057.0 (nsec)
1.0 (ppb)
0.0 (nsec)
45.0 (nsec)
65 (pkts/sec)
65 (pkts/sec)
0.0
0.0 (usec)
0.0 (usec)
0.0
0.0 (usec)
0.0 (usec)
Note
For a OC-Slave configured in PTP over ethernet in the multicast mode, clock source details cannot be
specified. The show ptp port running detail command shows all the four master clock details. However,
the details of those master clocks that are having a session with the slave clock will be constantly updated.
In the following example two OC-MASTER clocks are having session with a OC-SLAVE.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
390
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Slave in Multicast Mode
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
391
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Slave in Multicast Mode
negotiation auto
synchronous mode
synce state slave
service instance 2 ethernet
encapsulation dot1q 33
rewrite ingress tag pop 1 symmetric
bridge-domain 77
!
service instance 17 ethernet
encapsulation untagged
bridge-domain 17
!
end
Router# show platform ptp stats detailed
Statistics for PTP clock 0
###############################
Number of ports : 1
Pkts Sent
: 4793
Pkts Rcvd
: 26531
Pkts Discarded : 0
LAST FLL STATE
###################
Normal loop : Number of Transitions = 0 and Last transition at : 00:00:00.000 UTC Mon Jan
1 1900
Bridge state: Number of Transitions = 0 and Last transition at : 00:00:00.000 UTC Mon Jan
1 1900
Holdover state : Number of Transitions = 1 and Last transition at : 12:08:38.774 UTC Thu
Jun 19 2014
Statistics for PTP clock port 1
##################################
Pkts Sent
: 4793
Pkts Rcvd
: 26531
Pkts Discarded
: 0
Signals Rejected : 0
Statistics for L2 Multicast packets
###################################
Multicast address : 011b.1900.0000
Announces Sent
: 0
Syncs Sent
: 0
Follow Ups Sent
: 0
Delay Reqs Sent
: 4793
Delay Resps Sent : 0
Signals Sent
: 0
Packets Discarded : 0
Statistics for peer 1
########################
L2 address
: 4055.3989.728b
Announces Sent
: 0
Announces Rcvd
: 37
Syncs Sent
: 0
Syncs Rcvd
: 4752
Follow Ups Sent
: 0
Follow Ups Rcvd
: 4752
Delay Reqs Sent
: 0
Delay Reqs Rcvd
: 0
Delay Resps Sent : 0
Delay Resps Rcvd : 4753
Mgmts Sent Rcvd
: 0
Mgmts Rcvd
: 0
Signals Sent
: 0
Signals Rcvd
: 0
Packets Discarded : 0
Statistics for peer 2
########################
L2 address
: 4055.3989.78a3
Announces Sent
: 0
Announces Rcvd
: 31
Syncs Sent
: 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
392
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Master in Unicast Mode
Syncs Rcvd
Follow Ups Sent
Follow Ups Rcvd
Delay Reqs Sent
Delay Reqs Rcvd
Delay Resps Sent
Delay Resps Rcvd
Mgmts Sent Rcvd
Mgmts Rcvd
Signals Sent
Signals Rcvd
Packets Discarded
:
:
:
:
:
:
:
:
:
:
:
:
4069
0
4069
0
0
0
4068
0
0
0
0
0
Use the show ptp clock running domain command to display the PTP clock configuration:
Router# show ptp clock running domain 0
PTP Ordinary Clock [Domain 0]
State
Ports
Pkts sent
FREQ_LOCKED
1
1757273
599954
PORT SUMMARY
Name
Tx Mode
Role
Transport
o
unicast
master
Lo20
SESSION INFORMATION
o [Lo20] [Sessions 5]
Peer addr
Pkts in
Pkts out
In Errs
9.9.9.14
120208
344732
0
0
9.9.9.13
120159
344608
0
0
9.9.9.11
120148
343955
0
0
9.9.9.12
119699
342863
0
0
9.9.9.10
119511
342033
0
0
Pkts rcvd
State
Master
Sessions
5
Out Errs
Use the show platform ptp stats command to display the PTP statistics:
Statistics for PTP clock 0
###############################
Number of ports : 1
Pkts Sent : 1811997
Pkts Rcvd : 619038
Pkts Discarded : 0
Statistics for PTP clock port 1
##################################
Pkts Sent : 1811997
Pkts Rcvd : 619038
Pkts Discarded : 0
Signals Rejected : 0
Statistics for peer 1
########################
IP addr : 9.9.9.14
Pkts Sent : 355660
Pkts Rcvd : 124008
Statistics for peer 2
########################
IP addr : 9.9.9.13
Pkts Sent : 355550
Pkts Rcvd : 123973
Statistics for peer 3
########################
IP addr : 9.9.9.11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
393
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Master in Multicast Mode
Use the show ptp clock running domain command to display the PTP clock configuration:
Router# show ptp clock running domain 0
PTP Boundary Clock [Domain 0]
State
Ports
Pkts sent
Pkts rcvd
Redundancy Mode
PHASE_ALIGNED
242559956
189887918
Track all
PORT SUMMARY
Name
Tx Mode
SLAVE unicast
MASTER mcast
Role
Transport
State
Sessions
PTP Master
Port Addr
slave
master
Lo45
Ethernet
Slave
Master
1
1
40.40.40.1
-
SESSION INFORMATION
SLAVE [Lo45] [Sessions 1]
Peer addr
Pkts in
Pkts out
In Errs
Out Errs
40.40.40.1
132729502
44138439
Pkts in
[BD 1
] 960676
Pkts out
In Errs
Out Errs
960676
Use the show platform ptp state command to display the PTP servo state:
FLL State
FLL Status Duration
Forward
Forward
Forward
Forward
Forward
Forward
: 3 (Normal Loop)
: 687618 (sec)
Flow Weight
:
Flow Transient-Free
:
Flow Transient-Free
:
Flow Transactions Used:
Flow Oper. Min TDEV
:
Mafie
:
47.0
900 (900 sec Window)
3600 (3600 sec Window)
200.0 (%)
5.0 (nsec)
0.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
394
Configuring Clocking
Verifying PTP Configuration on the 1588V2 Master in Multicast Mode
Flow Weight
:
Flow Transient-Free
:
Flow Transient-Free
:
Flow Transactions Used:
Flow Oper. Min TDEV
:
Mafie
:
Flow Min Cluster Width:
Flow Mode Width
:
52.0
900 (900 sec Window)
3600 (3600 sec Window)
200.0 (%)
6.0 (nsec)
0.0
7500.0 (nsec)
100.0 (nsec)
Frequency Correction
Phase Correction
: 54.836 (ppb)
: 0.0 (ppb)
: 6.0 (nsec)
: 0.0 (ppb)
: 3.206 (nsec)
: 14.0 (nsec)
: 64 (pkts/sec)
: 64 (pkts/sec)
Use the show platform ptp stats detailed command to display the PTP statistics:
Router#sh platform ptp stats detailed
Statistics for PTP clock 0
###############################
Number of ports : 2
Pkts Sent
: 242525543
Pkts Rcvd
: 189865083
Pkts Discarded : 0
LAST FLL STATE
###################
Normal loop : Number of Transitions = 1 and Last transition at : 15:51:16.155 UTC Mon Apr
21 2014
Bridge state: Number of Transitions = 0 and Last transition at : 00:00:00.000 UTC Mon Jan
1 1900
Holdover state : Number of Transitions = 0 and Last transition at : 00:00:00.000 UTC Mon
Jan 1 1900
Statistics for PTP clock port 1
##################################
Pkts Sent
: 44132739
Pkts Rcvd
: 132712363
Pkts Discarded
: 0
Signals Rejected : 0
Statistics for peer 1
########################
IP address
: 40.40.40.1
Announces Sent
: 0
Announces Rcvd
: 344686
Syncs Sent
: 0
Syncs Rcvd
: 44119383
Follow Ups Sent
: 0
Follow Ups Rcvd
: 44119383
Delay Reqs Sent
: 44119179
Delay Reqs Rcvd
: 0
Delay Resps Sent : 0
Delay Resps Rcvd : 44115351
Mgmts Sent Rcvd
: 0
Mgmts Rcvd
: 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
395
Configuring Clocking
PTP Hybrid Clock
Signals Sent
: 13560
Signals Rcvd
: 13560
Packets Discarded : 0
Statistics for PTP clock port 2
##################################
Pkts Sent
: 198392804
Pkts Rcvd
: 57152720
Pkts Discarded
: 0
Signals Rejected : 0
Statistics for L2 Multicast packets
###################################
Multicast address : 011b.1900.0000
Announces Sent
: 343722
Syncs Sent
: 83733919
Follow Ups Sent
: 83733919
Delay Reqs Sent
: 0
Delay Resps Sent : 0
Signals Sent
: 0
Packets Discarded : 0
Statistics for peer 2
########################
L2 address
: 4c00.8287.1d33
Announces Sent
: 0
Announces Rcvd
: 0
Syncs Sent
: 0
Syncs Rcvd
: 0
Follow Ups Sent
: 0
Follow Ups Rcvd
: 0
Delay Reqs Sent
: 0
Delay Reqs Rcvd
: 954979
Delay Resps Sent : 954979
Delay Resps Rcvd : 0
Mgmts Sent Rcvd
: 0
Mgmts Rcvd
: 0
Signals Sent
: 0
Signals Rcvd
: 0
Packets Discarded : 0
Note
In Master node, the Delay Resps packet sent to a specific peer is a response to the Delay Reqs packet.
Hence, the sh platform ptp stats detailed command displays the details of both the sent and received
packets.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
396
Configuring Clocking
PTP Hybrid Clock
Note
Hybrid mode is not supported when PTP ordinary clock is in the master mode.
Hybrid clock is not supported with ToP as network-clock. It needs a valid physical clock source, for
example, Sync-E/BITS/10M/TDM.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ptp clock
ordinary domain 0
Step 4
Router(config-ptp-clk)#
clock-port Slave slave
Step 5
Example:
Router(config-ptp-port)#
transport ipv4
unicast interface loopback 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
397
Configuring Clocking
PTP Hybrid Clock
Step 6
Command or Action
Purpose
Example:
Router(config-ptp-port)#
clock source 5.5.5.5
Step 7
Example:
Router(config-ptp-port)#
clock source 8.8.8.1
Step 8
Router(config-ptp-port)#
announce timeout 8
Step 9
Example:
Router(config-ptp-port)#
delay-req interval 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
398
Configuring Clocking
PTP Hybrid Clock
Command or Action
Purpose
-51 packet every 1/32 seconds, or 32 packets per
second.
-61 packet every 1/64 seconds, or 64 packets per
second.
-71 packet every 1/128 seconds, or 128 packets per
second.
The default is -6.
Step 10
Step 11
end
Example:
Router(config-ptp-port)# end
Note
Hybrid clock is not supported with ToP as network-clock. It needs a valid physical clock source, for
example, Sync-E/BITS/10M/TDM.
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
399
Configuring Clocking
PTP Hybrid Clock
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Router(config-ptp-clk)#
clock-port SLAVE slave
Step 5
Example:
Router(config-ptp-port)#
transport ipv4 unicast
interface loopback 0
negotiation
Step 6
Example:
Router(config-ptp-port)#
clock source 5.5.5.5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
400
Configuring Clocking
PTP Hybrid Clock
Command or Action
Purpose
2Assigns a priority value of 2.
3Assigns a priority value of 3.
Repeat this step for each additional master clock. You can
configure up to four master clocks.
Note
Step 7
Example:
Router(config-ptp-port)#
clock source 133.133.133.133
Step 8
Sets the clock port to PTP master mode. In master mode, the
port exchanges timing packets with PTP slave devices.
Example:
Note
Router(config-ptp-port)#
clock-port Master master
Step 9
Router(config-ptp-port)#
transport ipv4 unicast
interface Loopback 1
negotiation
Note
Step 10 exit
Example:
Router(config-ptp-port)#
exit
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
401
Configuring Clocking
Configuration Examples for BMCA
Use the show ptp clock running domain command to display the sample output.
Router# show ptp clock running domain
PTP Ordinary Clock [Domain 20] [Hybrid]
State
Ports
Pkts sent
Pkts rcvd
PHASE_ALIGNED 1
27132197
81606642
PORT SUMMARY
Name Tx Mode
SLAVE unicast
Role
slave
Transport
Lo17
State
Slave
Sessions
1
Redundancy Mode
Track all
PTP Master
Port Addr
17.17.1.1
Use the show platform ptp channel_status command to display the sample output after PTP is in normal state.
Router#show platform ptp channel_status
Configured channels : 2
channel[0]: type=0, source=0, frequency=0, tod_index=0, freq_prio=5
time_enabled=y, freq_enabled=y, time_prio=1 freq_assumed_QL=0
time_assumed_ql=0, assumed_ql_enabled=n
channel[1]: type=6, source=17, frequency=0, tod_index=0, freq_prio=2
time_enabled=n, freq_enabled=y, time_prio=0 freq_assumed_QL=0
time_assumed_ql=0, assumed_ql_enabled=n
Channel 0:
Frequency
Time
--------------------------------------Status OK
OK
Weight
0
100
QL
9
9
--------------------------------------QL is not read externally.
Fault status: 00000000
Channel 1:
Frequency
Time
--------------------------------------Status OK
Disabled
Weight
100
0
QL
9
9
--------------------------------------QL is not read externally.
Fault status: 00000000
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
402
Configuring Clocking
SSM and PTP Interaction
Note
The ordinary clock and boundary clock configurations remain the same for both hybrid clock and hybrid
boundary clock. Change the PTP domain configuration to ptp clock ordinary domain 0 hybrid for a hybrid
clock and ptp clock boundary domain 0 hybrid for a hybrid boundary clock. An appropriate frequency
source (SyncE) will be enabled for the hybrid mode.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
403
Configuring Clocking
ClockClass Mapping
ClockClass Mapping
The Cisco ASR 901 Cisco ASR 901S router supports two methods of mapping PTP ClockClass to
SSM/QL-value:
Telecom Profile based on ITU-T G.8265.1/Y.1365.1 PTP (Telecom) Profile for Frequency
Synchronization [2]
Default method of calculating clockClass based on IEEE 1588v2 PTP specification.
Telecom Profiles
The Telecom Profile specifies an alternative algorithm for selecting between different master clocks, based
on the quality level (QL) of master clocks and on a local priority given to each master clock. Release 3.11
introduces support for telecom profiles using a new configuration method, which allow you to configure a
clock to use the G.8265.1 recommendations for establishing PTP sessions, determining the best master clock,
handling SSM, and mapping PTP classes.
PTP Redundancy
PTP redundancy is an implementation on different clock nodes by which the PTP slave clock node achieves
the following:
Interact with multiple master ports such as grand master, boundary clock nodes, and so on.
Open PTP sessions.
Select the best master from the existing list of masters (referred to as the primary PTP master port or
primary clock source).
Switch to the next best master available in case the primary master fails, or the connectivity to the primary
master fails.
Note
The Cisco ASR 901 Cisco ASR 901S Series Router supports unicast-based timing as specified in the
1588-2008 standard. Hybrid mode is not supported with PTP 1588 redundancy.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
404
Configuring Clocking
PTP Redundancy
Note
Telecom profile is not applicable for boundary clocks. It is only applicable for ordinary clocks.
Hybrid mode with OC-MASTER is not supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ptp clock
ordinary domain 4
Step 4
clock-port port-name {master | slave} Sets the clock port to PTP slave mode and enters clock
port configuration mode. In slave mode, the port
profile g8265.1
exchanges timing packets with a PTP master clock.
Example:
Router(config-ptp-clk)#
clock-port Slave slave
Step 5
Example:
Router(config-ptp-port)#
transport ipv4
unicast interface loopback 0
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
405
Configuring Clocking
PTP Redundancy
Step 6
Command or Action
Purpose
Example:
Router(config-ptp-port)# clock
source 8.8.8.1
Router(config-ptp-port)# clock
source 8.8.8.2 1
Step 8
Router(config-ptp-port)# clock
source 8.8.8.3 2
Step 9
Router(config-ptp-port)# clock
source 8.8.8.4 3
Step 10
end
Example:
Router(config-ptp-port)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
406
Configuring Clocking
PTP Redundancy
Note
Telecom profile is not applicable for boundary clocks. It is only applicable for ordinary clocks.
Hybrid mode with OC-MASTER is not supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ptp clock
ordinary domain 4
Step 4
Sets the clock port to PTP master and enters clock port
configuration mode. In master mode, the port exchanges
timing packets with a PTP slave devices.
Example:
Router(config-ptp-clk)#
clock-port
Master master profile g8265.1
Step 5
Example:
Router(config-ptp-port)#
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
407
Configuring Clocking
PTP Redundancy
Command or Action
Purpose
transport ipv4
unicast interface loopback 0
Step 6
end
Example:
Router(config-ptp-port)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
408
Configuring Clocking
PTP Redundancy
Use the show ptp clock running domain command to display the sample output.
Router#show ptp clock running domain 10
PTP Ordinary Clock [Domain 10]
State
Ports
Pkts sent
PHASE_ALIGNED 1
22459694
PORT SUMMARY
Name Tx Mode
SLAVE unicast
Role
slave
Transport
State
Lo40
Slave
SESSION INFORMATION
Pkts out
20011138
In Errs
0
Pkts rcvd
67364835
Redundancy Mode
Track all
Sessions
1
PTP Master
Port Addr
4.4.4.3
Out Errs
0
Caution
The time-properties command does not perform any input validation; use this command with caution.
The following is an example of the time-properties command:
Router(config-ptp-clk)# time-properties atomic-clock timeScaleTRUE currentUtcOffsetValidTRUE
leap59TRUE leap61FALSE 34
slave#show ptp clock dataset time-properties
CLOCK [Ordinary Clock, domain 0]
Current UTC Offset Valid: TRUE
Current UTC Offset: 34
Leap 59: TRUE
Leap 61: FALSE
Time Traceable: TRUE
Frequency Traceable: TRUE
PTP Timescale: TRUE
Time Source: Atomic
The values of Time Traceable and Frequency Traceable are determined dynamically.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
409
Configuring Clocking
VRF-Aware Precision Time Protocol
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip vrf vrf-name
Example:
Step 4
rd route-distinguisher
Example:
Router(config-vrf)# rd 100:1
Step 5
route-target export
route-target-ext-community
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
410
Configuring Clocking
VRF-Aware Precision Time Protocol
Command or Action
Example:
Router(config-vrf)#
route-target export 100:1
Step 6
route-target import
route-target-ext-community
Example:
Router(config-vrf)#
route-target import 100:1
Step 7
Purpose
route-target-ext-community An autonomous system
number (ASN) and an arbitrary number (for example,
100:1) or an IP address and an arbitrary number (for
example, 192.168.122.15:1). Enter the
route-distinguisher value specified in Step 4.
Creates lists of import route-target-extended communities
for the specified VRF.
route-target-ext-community An autonomous system
number (ASN) and an arbitrary number (for example,
100:1), or an IP address and an arbitrary number (for
example, 192.168.122.15:1). Enter the
route-distinguisher value specified in Step 4.
Exits VRF configuration mode.
exit
Example:
Router(config-vrf)# exit
Step 8
interface vlanvlan-id
Example:
Router(config)# interface vlan
4
Step 9
Step 10
Step 11
exit
Example:
Router(config-if)# exit
Step 12
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
411
Configuring Clocking
VRF-Aware Precision Time Protocol
Command or Action
Purpose
vrf-name Name assigned to the VRF. Enter the value
specified in Step 3.
Step 13
network ip-address wildcard-mask Configures the interfaces on which OSPF runs and defines
the area ID for those interfaces.
area area-id
Example:
Router(config-router)# router
ospf 2 vrf green
ip-address IP address
wildcard-maskIP-address-type mask that includes
optional bits.
area-idArea that is to be associated with the OSPF
address range. It can be specified as either a decimal
value or as an IP address. If you intend to associate
areas with IP subnets, you can specify a subnet address
as the value of the area-id argument.
Note
Repeat this step to configure different
interfaces on which OSPF runs, and to define
the area ID for those interfaces.
Step 14
exit
Example:
Router(config-router)# exit
Examples
The following is a sample configuration of VRF-aware PTP:
!
ip vrf green
rd 100:1
route-target export 100:1
route-target import 100:1
!
!
interface Vlan4
ip vrf forwarding green
ip address 4.4.4.2 255.255.255.0
mpls ip
!
interface Loopback4
ip vrf forwarding green
ip address 50.50.50.50 255.255.255.255
!
router ospf 2 vrf green
network 4.4.4.0 0.0.0.255 area 2
network 50.50.50.50 0.0.0.0 area 2
!
!
end
ptp clock ordinary domain 0
Clock-port slave slave
Transport ipv4 unicast interface loopback 4 negotiation
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
412
Configuring Clocking
Configuring ToD on 1588V2 Slave
Purpose
1pps-out 1 PPS offset in ns pulse width pulse width Configures 1 PPS output parameters.
unit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
413
Configuring Clocking
1588v2 Phase Asymmetry Correction
The following diagram indicates the design statement of asymmetry correction at a high level.
Figure 24: 1588v2 Phase Asymmetry Correction
When the BMCA algorithm selects a new master, the previous recovered servo-reported phase offset is saved
as fixed-phase-offset and a flag is set to indicate to use this value instead of the servo-reported phase offset.
This results in phase holdover from the previous master until the path to new master is available. The BMCA
master and the servo events portray a path to the new master by comparing the fixed-phase-offset value to
the servo-reported phase offset from the new master. The delta phase is computed and applied to servo, which
enables the servo to come out of phase holdover.
For certain failures over one path, the delay asymmetry could differ by up to 4 usec after restoration, which
would shift the phase or time by up to 2 usec. The valid path continues to provide an accurate phase or time.
The root cause for this behavior is the underlying optical network that causes the asymmetry variation and
forces the system to do an internal allocation during a disruption. When a link goes down, the underlying
optical network fails to allow the same buffer, causing the variation.
In the following scenarios, the asymmetry is corrected after an optical link disruption, based on the persistent
PTP link:
Initially, the symmetry is corrected based on measurements and manual adjustment on the router. For that:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
414
Configuring Clocking
1588v2 Phase Asymmetry Correction
Note
The initial path asymmetry is compensated by using an external measurement device and compensates
the 1pps offset.
In Scenario 1, the optical link 1 goes down and comes back after a while. Here:
Time is persistent on Link 2 and is used as ACTIVE.
When Link 1 comes back; time from this link is marked as suspicious.
Asymmetry is adjusted based on Link 2, enabling it to be in sync with Link 1.
Link 1 is marked as ACTIVE.
Link 2 is marked as STANDBY.
In Scenario 2, the optical link 2 goes down and comes back after a while. Here:
Time is persistent on Link 2 and is used as ACTIVE.
When Link 2 comes back; time from this link is marked as suspicious.
Asymmetry is adjusted based on Link 1, enabling it to be in sync with Link 2.
Link 2 is marked as ACTIVE.
Link 1 is marked as STANDBY.
Note
Both the above scenarios requires use of phase holdover mode, which becomes active when there is a
Master switch. After the old link is restored, the SERVO learns the new path and applies the correction.
The PTP phase symmetry correction feature is supported only on IEEE1588v2 BMCA.
Delay asymmetry value should be enabled on the available master clock source if reference master is
removed.
The delay asymmetry in the network should be measured exactly before its applied on the clock source.
Phase asymmetry is not supported in Hybrid Slave clock, Hybrid boundary clock, Telecom profile and
PTP over Ethernet.
Phase asymmetry (phase correction and path asymmetry) is supported only in Ordinary Slave clock and
Boundary Clock slave.
Exact delay asymmetry value should be measured from the network path to the master source before its
applied on clock source.
The clock sources should be enabled with delay-asymmetry value configuration measured from the
network path.
The router supports phase asymmetry correction feature for a maximum of four BMCA clock sources.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
415
Configuring Clocking
1588v2 Phase Asymmetry Correction
A syslog message is generated for every phase correction change applied by phase correction feature.
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ptp clock ordinary domain
0
Step 4
asymmetry-compensation
Example:
Router(config-ptp-clk)#
asymmetry-compensation
Step 5
Step 6
Example:
Router(config-ptp-port)# transport ipv4
unicast interface Lo1 negotiation
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
416
Configuring Clocking
Troubleshooting Tips
Command or Action
Step 8
Purpose
Step 9
Troubleshooting Tips
Use the following debug commands to troubleshoot the PTP configuration on the Cisco ASR 901 Cisco ASR
901S router:
Danger
We suggest you do not use these debug commands without TAC supervision.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
417
Configuring Clocking
Troubleshooting Tips
Command
Purpose
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
418
CHAPTER
23
Note
Cisco IOS IP SLA for VoIP, ICMP Jitter, Gatekeeper and Data Link Switching Plus (DLSw+) features
are not supported in Cisco ASR 901 Cisco ASR 901S router.
Configuring IPSLA Path Discovery, page 419
Two-Way Active Measurement Protocol, page 423
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
419
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
mpls discoveryvpnnext-hop
Example:
Note
Step 4
Step 5
auto ip slampls-lsp-monitor
operation-number
Example:
Router(config)# auto ip sla
mpls-lsp-monitor 1
Step 6
Router(config-auto-ip-sla-mpls)#
type echo ipsla-vrf-all
What to Do Next
Configuration Parameters
Router(config)#auto ip sla mpls-lsp-monitor 1
Router(config-auto-ip-sla-mpls)#?
Auto IP SLAs MPLS LSP Monitor entry configuration commands:
exit Exit IP SLAs MPLSLM configuration
type Type of entry
Router(config-auto-ip-sla-mpls)#type ?
echo
Perform MPLS LSP Ping operation
pathEcho Perform MPLS LSP Trace operation
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
420
Router(config-auto-ip-sla-mpls)#type pathEcho ?
ipsla-vrf-all Configure IP SLAs MPLS LSP Monitor for all VPNs
vrf
vrf Name
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
421
Index Destination
1
2.2.2.2
Router#show
ip sla mpls-lsp-monitor neighbors
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
422
Downstream
Label Stack
29
21
Although each entity is separate, the protocol allows for logical merging of the roles on a single device.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
423
Configuring TWAMP
The TWAMP server and reflector functionality are configured on the same device. This section contains the
following topics:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
port port-number
Example:
Router(config-twamp-srvr)# port
9000
Step 5
Router(config-twamp-srvr)# timer
inactivity 300
Step 6
end
Example:
Router(config-twamp-srvr)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
424
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ip sla server twamp
Step 4
Router(config-twamp-srvr)# timer
inactivity 300
Step 5
end
Example:
Router(config-twamp-srvr)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
425
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
426
CHAPTER
24
Configuring QoS
This chapter describes how to configure quality of service (QoS) by using the modular QoS CLI (MQC) on
the Cisco ASR 901 Cisco ASR 901S router. With QoS, you can provide preferential treatment to certain
types of traffic at the expense of others. When QoS is not configured, the router offers the best-effort service
to each packet, regardless of the packet contents or size. It sends the packets without any assurance of
reliability, delay bounds, or throughput. MQC provides a comprehensive hierarchical configuration framework
for prioritizing or limiting specific streams of traffic.
Note
IPv6 QoS is supported only from Cisco IOS Release 15.2(2)SNG onwards.
Finding Feature Information, page 427
Understanding QoS, page 428
Configuring QoS, page 452
QoS Treatment for Performance-Monitoring Protocols, page 495
Extending QoS for MLPPP, page 497
Verifying MPLS over MLPPP Configuration, page 513
ARP-based Classification, page 516
ICMP-based ACL, page 519
Policy for DHCP Control Packet, page 524
Troubleshooting Tips, page 525
Additional References, page 529
Feature Information for Configuring QoS, page 530
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
427
Configuring QoS
Understanding QoS
about the features documented in this module, and to see a list of the releases in which each feature is supported,
see the Feature Information for Configuring QoS, on page 530.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on Cisco.com is not
required.
Understanding QoS
Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority and
an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an equal chance
of being dropped.
When you configure the QoS feature, you can select specific network traffic, prioritize it according to its
relative importance, and use traffic-management techniques to provide preferential treatment. Implementing
QoS in your network makes network performance more predictable and bandwidth utilization more effective.
Figure 27: Modular QoS CLI Model, on page 428 shows the MQC QoS CLI model.
Figure 27: Modular QoS CLI Model
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
428
Configuring QoS
Modular QoS CLI
For tunneling technologies, such as EoMPLS pseudowires and L3VPN, additional defaults are in place to
propagate QoS. These are described below:
Default QoS for Traffic from Internal Ports
The Cisco ASR 901 Cisco ASR 901S Router does not allow policy maps to be applied to internal ports, such
as the Ethernet or PCI ports to the CPU, or the Ethernet ports to the timing CPU or the Winpath.
The Cisco ASR 901 Cisco ASR 901S Router generally treats these internal ports as trusted. The Cisco ASR
901 Cisco ASR 901S Router defaults to propagate the priority from the received frame, as described below:
By default, the QoS-group (internal-priority) applied to every packet from an internal port is equal to the
priority received in the 802.1Q VLAN tag received on that packet.
If a packet is received on one of the internal interfaces that do not have a VLAN tag attached, a VLAN tag is
added internally, with the priority value copied from the ip-precedence field (in case of IP packets), and zero
(in case on non-IP packets).
The default QoS-group (internal priority) for internal queue assignment and for propagating QoS information
to MPLS EXP, is set equal to the priority of the outer VLAN tag (either the original or the default value) on
the received frame.
For tunneling technologies, such as EoMPLS pseudowires and L3VPN, additional defaults are in place to
propagate QoS as follows:
For MPLS-based L3 VPN and for the EoMPLS (both VPWS and VPLS), upon imposition of the first
(bottom of stack) MPLS label, MPLS EXP values are equal to the value is specified in the internal QoS
group setting (internal priority).
When adding additional MPLS labels to an existing stack, the default MPLS EXP values are set to the
match QoS group value.
This section contains the following topics:
Procedure
Step 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
429
Configuring QoS
Input and Output Policies
type numberof the specified criteria. A match-all class map can contain only one match statement, but
a match-any class map can contain multiple match statements.
If you do not enter match-all or match-any, the default is to match
all.
Use the policy-map class-map configuration commands to specify criteria for classifying packets. If a
packet matches the specified criteria, that packet is considered a member of the class and is forwarded
according to the QoS specifications set in the traffic policy. Packets that fail to meet any of the matching
criteria are classified as members of the default traffic class.
Note
Step 2
Create a traffic policy to associate the traffic class with one or more QoS features.
Use the policy-maptype number global configuration command to create a traffic policy and to enter
policy-map configuration mode. A traffic policy defines the QoS features to associate with the specified traffic
class. A traffic policy contains three elements: a name, a traffic class (specified with the class policy-map
configuration command), and the QoS policies configured in the class.
Name the traffic policy in the policy-map command line to enter policy-map configuration mode.
In policy-map configuration mode, enter the name of the traffic class used to classify traffic to the
specified policy, and enter policy-map class configuration mode.
In policy-map class configuration mode, you can enter the QoS features to apply to the classified traffic.
These include using the set, police, or police aggregate commands for input policy maps or the
bandwidth, priority, or shape average commands for output policy maps.
A packet can match only one traffic class within a traffic policy. If a packet matches more than one
traffic class in the traffic policy, the first traffic class defined in the policy is used. To configure more
than one match criterion for packets, you can associate multiple traffic classes with a single traffic
policy.
Attach the traffic policy to an interface.
Use the service-policy interface configuration command to attach the policy map to an interface for packets
entering or leaving the interface. You must specify whether the traffic policy characteristics should be applied
to incoming or outgoing packets. For example, entering the service-policy output class1 interface configuration
command attaches all the characteristics of the traffic policy named type number to the specified interface.
All packets leaving the specified interface are evaluated according to the criteria specified in the traffic policy
named type number.
Note
Step 3
Note
If you enter the no policy-map configuration command or the no policy-map policy-map-name global
configuration command to delete a policy map that is attached to an interface, a warning message
appears that lists any interfaces from which the policy map is being detached. For example: Warning:
Detaching Policy test1 from Interface GigabitEthernet0/1 The policy map is then detached and deleted.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
430
Configuring QoS
Input and Output Policies
Input policies and output policies have the same basic structure; the difference is in the characteristics that
they regulate. Figure 28: Input and Output Policy Relationship, on page 431 shows the relationship of input
and output policies.
You can configure a maximum of 32 policy maps.
You can apply one input policy map and one output policy map to an interface.
Figure 28: Input and Output Policy Relationship
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
431
Configuring QoS
Access Control Lists
An output policy map attached to an egress port can match only the packets that have already been matched
by an input policy map attached to the ingress port for the packets. You can attach an output policy map to
any or all the ports on the router. The router supports configuration and attachment of a unique output policy
map for each port. There are no limitations on the configurations of bandwidth, priority, or shaping.
Restrictions
The Loopback feature should not be enabled when Layer 2 Control Protocol Forwarding is enabled.
The following Cisco IOS Keywords are not supported on the Cisco ASR 901 Cisco ASR 901S
Routermatch-any, ip-options, logging, icmp-type/code, igmp type, dynamic, reflective, evaluate.
The icmp-type/code keyword is supported from Cisco IOS Release 15.5(2)S, as part of the support for
ICMP based ACL feature.
Ingress PACL and RACL support TCP/UDP port range; egress ACLs are not supported.
Sharing access lists across interfaces is not supported.
ACLs are not supported on management port (Fast Ethernet) and serial interfaces.
Devices in the management network (network connected to the Fast Ethernet port) cannot be accessed
from any other port. If the default route is configured on the Cisco ASR 901 Cisco ASR 901S to fast
ethernet interface (Fa0/0), all the routed packets will be dropped. However, this configuration could
keep the CPU busy and affect overall convergence.
Compiled ACLs are not supported in Cisco ASR 901 Cisco ASR 901S Router.
ACLs are not supported on EVC interfaces.
ACLs are not supported on interface loopback interfaces.
Classification
Classification distinguishes one kind of traffic from another by examining the fields in the packet header.
When a packet is received, the router examines the header and identifies all the key packet fields. A packet
can be classified based on the DSCP, the CoS, or the IP precedence value in the packet, or by the VLAN ID.
Figure 29: QoS Classification Layers in Frames and Packets, on page 433 shows the classification information
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
432
Configuring QoS
Classification
carried in a Layer 2 or a Layer 3 IP packet header, using six bits from the deprecated IP type of service (ToS)
field to carry the classification information.
The classification information carried in a Layer 2 or Layer 3 IP packet is as follows:
On ports configured as Layer 2 IEEE 802.1Q trunks, all the traffic is in 802.1Q frames except for traffic
in the native VLAN. Layer 2 802.1Q frame headers have a 2-byte Tag Control Information field that
carries the CoS value, called the User Priority bits, in the three most-significant bits, and the VLAN ID
value in the 12 least-significant bits. Other frame types cannot carry Layer 2 CoS values.
Layer 2 CoS values range from 0 to 7.
Layer 3 IP packets can carry either an IP precedence value or a DSCP value. QoS supports the use of
either value because DSCP values are backward compatible with IP precedence values.
IP precedence values range from 0 to 7. DSCP values range from 0 to 63.
Output re-marking is based on the Layer 2 or Layer 3 marking type, marking value, and packet type.
Figure 29: QoS Classification Layers in Frames and Packets
Class Maps
Use an MQC class map to name a specific traffic flow (or class) and to isolate it from all other traffic. A class
map defines the criteria used to match against a specific traffic flow to further classify it. If you wish to classify
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
433
Configuring QoS
Classification
more than one type of traffic, you can create another class map and use a different name. When you use the
class-map command with a class-map name, the router enters the class-map configuration mode. In this mode,
you define the match criteria for the traffic by using the match class-map configuration command. After a
packet is matched against the class-map criteria, it is acted on by the associated action specified in a policy
map.
You can match more than one criterion for classification. You can also create a class map that requires that
all the matching criteria in the class map be in the packet header by using the class map match-all class-map
name global configuration command and enter class map configuration mode.
Note
You can configure only one match entry in the match-all class map.
You can use the class map match-any class-map name global configuration command to define a
classification with any of the listed criteria.
Note
If you do not enter match-all or match-any , the default is to match all. A match-all class map cannot
have more than one classification criterion (match statement). A class map with no match condition has
a default of match all.
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
434
Configuring QoS
Classification
This example shows how to create a class map to match a CoS value of 5:
Router(config)# class-map premium
Router(config-cmap)# match cos 5
Router(config-cmap)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
435
Configuring QoS
Classification
cs3
cs4
cs5
cs6
cs7
default
ef
Note
Match
Match
Match
Match
Match
Match
Match
packets
packets
packets
packets
packets
packets
packets
with
with
with
with
with
with
with
CS3(precedence 3) dscp
CS4(precedence 4) dscp
CS5(precedence 5) dscp
CS6(precedence 6) dscp
CS7(precedence 7) dscp
default dscp (000000)
EF dscp (101110)
(011000)
(100000)
(101000)
(110000)
(111000)
For more information on DSCP prioritization, see RFC-2597 (AF per-hop behavior), RFC-2598 (EF), or
RFC-2475 (DSCP).
Classification Comparisons
Table 24: Typical Traffic Types , on page 436 shows the recommended IP DSCP, IP precedence, and CoS
values for typical traffic types.
Table 24: Typical Traffic Types
Traffic Type
DSCP Per-Hop
DSCP (Decimal)
IP Precedence
CoS
Voice-bearerTraffic in EF
a priority queue or the
queue with the highest
service weight and
lowest drop priority.
46
Voice
controlSignalling
traffic related to call
setup from a voice
gateway or a voice
application server.
AF31
26
34
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
436
Configuring QoS
Classification
Traffic Type
DSCP Per-Hop
DSCP (Decimal)
IP Precedence
CoS
Streaming
AF13
videoRelatively high
bandwidth applications
with a high tolerance for
loss, delay, and delay
variation. Usually
considered more
important than regular
background applications
such as e-mail and web
browsing.
14
Mission-critical date
AF21
(gold
AF22
data)Delay-sensitive
AF23
applications critical to
the operation of an
enterprise, classified as:
18
20
22
10
12
14
Level 1
Level 2
Level 3
Less critical data (silver AF11
data)Noncritical, but AF12
relatively important data,
AF13
classified as:
Level 1
Level 2
Level 3
Best-effort data (bronze Default
data)Other traffic,
including all the
noninteractive traffic,
regardless of importance.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
437
Configuring QoS
Classification
Traffic Type
DSCP Per-Hop
Less-than-best-effort
dataNoncritical,
bandwidth-intensive data
traffic given the least
preference. This is the
first traffic type to be
dropped, and includes
these levels:
DSCP (Decimal)
IP Precedence
CoS
Level 1
Level 2
Level 3
You can use QoS groups to aggregate multiple input streams across input classes and policy maps for the
same QoS treatment on the egress port. Assign the same QoS group number in the input policy map to all the
streams that require the same egress treatment, and match the QoS group number in the output policy map to
specify the required queuing and scheduling actions.
You can also use QoS groups to identify traffic entering a particular interface if the traffic has to be treated
differently at the output based on the input interface.
You can use QoS groups to configure per-port, per-VLAN QoS output policies on the egress interface for
bridged traffic on the VLAN. Assign a QoS group number to a VLAN on the ingress interface by configuring
a per-port, per-VLAN input policy. Then use the same QoS-group number for classification at the egress.
Because the VLAN of the bridged traffic does not change during forwarding through the router, the QoS-group
number assigned to the ingress VLAN can be used on the egress interface to identify the same VLAN.
You can independently assign QoS-group numbers at the ingress to any combination of interfaces, VLANs,
traffic flows, and aggregated traffic. To assign QoS-group numbers, configure a QoS group marking in an
input policy map, along with any other marking or policing actions required in the input policy map for the
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
438
Configuring QoS
Classification
same service class. This allows the input marking and policing functions to be decoupled from the egress
classification function if necessary because only the QoS group must be used for egress classification.
This example identifies specific packets as part of QoS group 1 for later processing in an output policy:
Router(config)# policy-map in-gold-policy
Router(config-pmap)# class in-class1
Router(config-pmap-c)# set qos-group 1
Router(config-cmap-c)# exit
Router(config-cmap)# exit
Use the set qos-group command only in an input policy. The assigned QoS group identification is subsequently
used in an output policy with no mark or change to the packet. Use the match qos-group in the output policy.
Note
Note
A per-port, per-VLAN parent-level class map supports only the class-default class; you should configure
with a single rate policer. A flat policy can have multiple classes with match VALN and any action.
Note
You can configure only class default in the parent level of a per-port, per-VLAN hierarchical policy map.
In this example, the class maps in the child-level policy map specify the matching criteria for voice, data, and
video traffic, and the child policy map sets the action for input policing each type of traffic. The parent-level
policy map specifies the VLANs to which the child policy maps are applied on the specified port.
Router(config)# class-map match-any dscp-1 data
Router(config-cmap)# match ip dscp 1
Router(config-cmap)# exit
Router(config)# class-map match-any dscp-23 video
Router(config-cmap)# match ip dscp 23
Router(config-cmap)# exit
Router(config)# class-map match-any dscp-63 voice
Router(config-cmap)# match ip dscp-63
Router(config-cmap)# exit
Router(config)# policy-map customer-1-ingress
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
439
Configuring QoS
Table Maps
Note
You can also enter the match criteria as match vlan 100 200 300 in the child-level policy map.
Router(config)# policy-map child policy-1
Router(config-pmap)# class dscp-63 voice
Router(config-pmap-c)# police cir 10000000 bc 50000
Router(config-pmap-c)# conform-action set-cos-transmit 5
Router(config-pmap-c)# exceed-action drop
Router(config-pmap-c)# exit
Router(config-pmap)# class dscp-1 data
Router(config-pmap-c)# set cos 0
Router(config-pmap-c)# exit
Router(config-pmap)# class dscp-23 video
Router(config-pmap-c)# set cos 4
Router(config-pmap-c)# set ip precedence 4
Router(config-pmap-c)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service instance 100 ethernet
Router(config-if)# encapsulation dot1q 100
Router(config-if)# service-policy input customer-1-ingress
Router(config-if)# rewrite ingress tag pop 1 symmetric
Router(config-if)# bridge-domain 100
Restrictions
Only named ACLs are supported in Layer 4 ACL-based QoS.
The not operation is not supported in Layer 4 ACL-based QoS.
Layer 4 ACL-based QoS is not supported on a multilink interface and BCPoMLPPP.
Table Maps
You can use table maps to manage a large number of traffic flows with a single command. You can specify
table maps in the set commands and use them as mark-down mapping for the policers. You can also use table
maps to map an incoming QoS marking to a replacement marking without having to configure a large number
of explicit matches and sets. Table maps are used only in input policy maps.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
440
Configuring QoS
Policing
The Cisco ASR 901 Cisco ASR 901S Router supports a maximum of 32 unique table maps. You can enter
up to 64 different map fromto entries in a table map. These table maps are supported on the router:
Cos to QoS-group
QoS-group to mpls experimental topmost
Table maps modify only one parameter (CoS, IP precedence, or DSCP, whichever is configured) and are only
effective when configured with a set command in a policy map.
Policing
After a packet is classified, you can use policing, as shown in Figure 31: Policing of Classified Packets, on
page 441 to regulate the class of traffic. The policing function limits the amount of bandwidth available to a
specific traffic flow or prevents a traffic type from using excessive bandwidth and system resources. A policer
identifies a packet as being in or out of profile by comparing the rate of the inbound traffic to the configuration
profile of the policer and traffic class. Packets that exceed the permitted average rate or burst rate are out of
profile or nonconforming . These packets are dropped or modified (marked for further processing), depending
on the policer configuration.
Policing is used primarily on the receiving interfaces. You can attach a policy map to a policer only in an
input service policy. The only policing allowed in an output policy map is in priority classes (see the
Unconditional Priority Policing, on page 443).
Figure 31: Policing of Classified Packets
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
441
Configuring QoS
Policing
Individual Policing
Individual policing applies only to input policy maps. In the policy-map configuration mode, use the class
command followed by the class map name, and enter the policy-map class configuration mode. Effective
Cisco IOS Release 15.3(3)S, the Cisco ASR 901 Cisco ASR 901S Router supports policing ingress traffic
over the cross-connect EVC, similar to the bridge domain service policy.
Use the police policy-map class configuration command to define the policer, the committed rate limitations
of the traffic, committed burst size limitations of the traffic, and the action to take for a class of traffic that is
below the limits (conform-action) and above the limits (exceed-action). If you do not specify burst size (bc),
the system calculates an appropriate burst size value. The calculated value is appropriate for most applications.
To make the policy map effective, attach it to a physical port by using the service-policy input interface
configuration command. Policing is done only on received traffic, so you can only attach a policer to an input
service policy.
Note
The QoS group precedes the CoS value that is matched in the class map, when the set qos-group command
is used along with MPLS experimental imposition.
Restrictions
Only byte counters are supported.
Only drop and pass counters are supported.
If an ingress cross-connect policer is attached to a physical interface, an ingress cross-connect policer
cannot be attached to EVCs under the specific physical port.
Applying or removing a policy-map on a cross-connect interface requires shutdown or no shutdown
on the interface.
User class-based MPLS experimental imposition is supported only for user classes based on CoS match.
Only policy maps on 254 ingress cross-connect interfaces are supported.
Dynamic modification of policy maps (modifying a policy map or a class map while it is attached to an
interface) is not supported for the policy maps applied on cross-connect.
Configuration Examples
The following is a sample configuration of basic policing for all the traffic received with a CoS of 4. The first
value following the police command limits the average traffic rate to 10, 000,000 bits per second (bps); the
second value represents the additional burst size (10 kilobytes). The policy is assigned to Gigabit Ethernet
port 1.
Router(config)# class-map video-class
Router(config-cmap)# match cos 4
Router(config-cmap)# exit
Router(config)# policy-map video-policy
Router(config-pmap)# class video-class
Router(config-pmap-c)# police 10000000 10000
Router(config-pmap-c-police)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
442
Configuring QoS
Policing
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service-policy input video-policy
Router(config-if)# exit
The following is a sample configuration that shows the policing of traffic over cross-connect EVC:
Router(config)# interface GigabitEthernet0/3
Router(config-if)# service instance 22 ethernet
Router(config-if-svr)# encapsulation dot1q 22
Router(config-if-svr)# rewrite ingress tag pop 1 symmetric
Router(config-if-svr)# xconnect 1.1.1.1 100 encapsulation mpls
Router(config-if-svr)# service-policy input policy1
Router(config-if-svr)# exit
You can use the conform-action and exceed-action policy-map class configuration commands or the
conform-action and exceed-action policy-map class police configuration commands to specify the action to
be taken when a packet conforms to or exceeds the specified traffic rate.
Conform actions involve sending the corresponding packet without modifications, setting a new CoS, DSCP,
or IP precedence value, or setting up a QoS group value for classification at the egress. Exceed actions involve
dropping the packet, sending the packet without modification, setting a new CoS, DSCP, or IP precedence to
a value, or setting a QoS group value for classification at the egress.
You can configure each marking action by using explicit values, table maps, or a combination of both. Table
maps list specific traffic attributes and map (or convert) them to other attributes.
You can configure multiple conform and exceed actions simultaneously for each service class.
After you create a table map, configure a policy-map policer to use the table map.
Note
In Cisco ASR 901 Cisco ASR 901S router, the fromtype action in the table map must be cos.
To configure multiple actions in a class, you can enter multiple conform or exceed action entries in the
policy-map class police configuration mode, as in this example:
Router(config)# policy-map map1
Router(config-pmap)# class class1
Router(config-pmap-c)# police 100000 500000
Router(config-pmap-c-police)# conform-action set-cos-transmit 4
Router(config-pmap-c-police)# conform-action set-qos-transmit 4
Router(config-pmap-c-police)# exceed-action set-cos-transmit 2
Router(config-pmap-c-police)# exceed-action set-qos-transmit 2
Router(config-pmap-c-police)# exit
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
443
Configuring QoS
Marking
Note
You cannot configure a policer-committed burst size for an unconditional priority policer because any
configured burst size is ignored.
This example shows how to use the priority percent command to configure out-class1 as the priority queue,
with traffic going to the queue limited to 20,000,000 bps so that the priority queue never uses more than that.
Traffic above that rate is dropped. This allows other traffic queues to receive some port bandwidth, in this
case, a minimum bandwidth guarantee of 50 percent and 20 percent. The class-default class queue gets the
remaining port bandwidth.
Router(config)# policy-map policy1
Router(config-pmap)# class out-class1
Router(config-pmap-c)# priority percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class2
Router(config-pmap-c)# bandwidth percent 50
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class3
Router(config-pmap-c)# bandwidth percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service-policy output policy1
Router(config-if)# exit
Egress Policing
Egress policing can be classified based on QoS groups, DSCP, and IP precedence value. For QoS groups to
work at egress, you should map the traffic at ingress to a specific QoS group value.
Marking
You can use packet marking in input policy maps to set or modify the attributes for traffic belonging to a
specific class. After network traffic is organized into classes, you use marking to identify certain traffic types
for unique handling. For example, you can change the CoS value in a class or set IP DSCP or IP precedence
values for a specific type of traffic. These new values are then used to determine how the traffic should be
treated. You can also use marking to assign traffic to a QoS group within the router.
Traffic marking is typically performed on a specific traffic type at the ingress port. The marking action can
cause the CoS, DSCP, or precedence bits to be rewritten or left unchanged, depending on the configuration.
This can increase or decrease the priority of a packet in accordance with the policy used in the QoS domain
so that other QoS functions can use the marking information to judge the relative and absolute importance of
the packet. The marking function can use information from the policing function or directly from the
classification function.
You can specify and mark traffic by using the set commands in a policy map for all supported QoS markings
(CoS, IP DSCP, IP precedence, and QoS groups). A set command unconditionally marks the packets that
match a specific class. You then attach the policy map to an interface as an input policy map.
You can also mark traffic by using the set command with table maps. Table maps list specific traffic attributes
and maps (or converts) them to another attribute. A table map establishes a to-from relationship for the attribute
and defines the change to be made.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
444
Configuring QoS
Congestion Management and Scheduling
You can simultaneously configure actions to modify DSCP, precedence, and COS markings in the packet for
the same service along with QoS group marking actions. You can use the QoS group number defined in the
marking action for egress classification.
Note
When you use a table map in an input policy map, the protocol type of the from-type action in the table
map must be the same as the protocol type of the associated classification. If the class map represents a
non-IP classification, the from-type action in the table map must be cos.
Note
Cisco ASR 901 Cisco ASR 901S transparently preserves the ECN bits while marking DSCP.
After you create a table map, configure a policy map to use the table map. See the Congestion Management
and Scheduling, on page 445. Figure 32: Marking of Classified Traffic , on page 445 shows the steps for
marking traffic.
Figure 32: Marking of Classified Traffic
This example uses a policy map to remark a packet. The first marking (the set command) applies to the QoS
default class map that matches all traffic not matched by class AF31-AF33 and sets all traffic to an IP DSCP
value of 1. The second marking sets the traffic in classes AF31 to AF33 to an IP DSCP of 3.
Router(config)# policy-map Example
Router(config-pmap)# class class-default
Router(config-pmap-c)# set ip dscp 1
Router(config-pmap-c)# exit
Router(config-pmap)# class AF31-AF33
Router(config-pmap-c)# set ip dscp 3
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service-policy input Example
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
445
Configuring QoS
Congestion Management and Scheduling
Use the shape average policy-map class configuration command to specify that a class of traffic should have
a maximum permitted average rate. Specify the maximum rate in bits per second.
Class-based weighted fair queuing (CBWFQ)
Use the bandwidth policy-map class configuration command to control the bandwidth allocated to a specific
class. The minimum bandwidth can be specified as percentage.
Priority queuing or class-based priority queuing
Use the priority policy-map class configuration command to specify the priority of a type of traffic over other
types of traffic. You can specify strict priority for high-priority traffic and allocate excess bandwidth, if any,
to other traffic queues, or specify priority with unconditional policing of high-priority traffic, and allocate the
known remaining bandwidth among the other traffic queues.
To configure strict priority, use only the priority policy-map class configuration command to configure
the priority queue. Use the bandwidth remaining percent policy-map class configuration command
for the other traffic classes to allocate the excess bandwidth in the desired ratios.
To configure priority with unconditional policing, configure the priority queue by using the priority
policy-map class configuration command and the police policy-map class configuration command to
unconditionally rate-limit the priority queue. In this case, you can configure the other traffic classes with
the bandwidth command or the shape average command, depending on your requirements
These sections contain additional information about scheduling:
Traffic Shaping
Traffic shaping is a traffic-control mechanism similar to traffic policing. While traffic policing is used in input
policy maps, traffic shaping occurs as traffic leaves an interface. The router can apply class-based shaping to
classes of traffic leaving an interface, and port shaping to all the traffic leaving an interface. Configuring a
queue for traffic shaping sets the maximum bandwidth or peak information rate (PIR) of the queue.
Note
Effective Cisco IOS Release 15.2(2)SNI, the lower limit of the committed burst size (bc) is 1 ms.
Class-Based Shaping
Class-based shaping uses the shape average policy-map class configuration command to limit the rate of
data transmission as the number of bits per second to be used for the committed information rate for a class
of traffic. The router supports separate queues for three classes of traffic. The fourth queue is always the
default queue for the class-default class, unclassified traffic.
Note
In the Cisco ASR 901 Router, configuring traffic shaping automatically sets the minimum bandwidth
guarantee or committed information rate (CIR) of the queue to the same value as the PIR.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
446
Configuring QoS
Congestion Management and Scheduling
This example shows how to configure traffic shaping for outgoing traffic on a Gigabit Ethernet port so that
outclass1 , outclass2 , and outclass3 get a maximum of 50, 20, and 10 Mbps, respectively, of the available
port bandwidth. Theclass-default class gets the remaining bandwidth.
Router(config)# policy-map out-policy
Router(config-pmap)# class classout1
Router(config-pmap-c)# shape average 50000000
Router(config-pmap-c)# exit
Router(config-pmap)# class classout2
Router(config-pmap-c)# shape average 20000000
Router(config-pmap-c)# exit
Router(config-pmap)# class classout3
Router(config-pmap-c)# shape average 10000000
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service-policy output out-policy
Router(config-if)# exit
Port Shaping
To configure port shaping (a transmit port shaper), create a policy map that contains only a default class, and
use the shape average command to specify the maximum bandwidth for a port.
This example shows how to configure a policy map that shapes a port to 90 Mbps, allocated according to the
out-policy policy map configured in the previous example. The service-policy policy map class command is
used to create a child policy to the parent:
Router(config)# policy-map out-policy-parent
Router(config-pmap)# class class-default
Router(config-pmap-c)# shape average 90000000
Router(config-pmap-c)# service-policy out-policy
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service-policy output out-policy-parent
Router(config-if)# exit
Parent-Child Hierarchy
The router also supports parent policy levels and child policy levels for traffic shaping. The QoS parent-child
structure is used for specific purposes, where a child policy is referenced in a parent policy to provide additional
control of a specific traffic type.
The first policy level, the parent level, is used for port shaping. You can specific only one class of type
class-default within the policy. This is an example of a parent-level policy map:
Router(config)# policy-map parent
Router(config-pmap)# class class-default
Router(config-pmap-c)# shape average 50000000
Router(config-pmap-c)# exit
The second policy level, the child level, is used to control a specific traffic stream or class, as shown in this
example:
Router(config)# policy-map child
Router(config-pmap)# class class1
Router(config-pmap-c)# priority
Router(config-pmap-c)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
447
Configuring QoS
Congestion Management and Scheduling
Note
The total of the minimum bandwidth guarantees (CIR) for each queue of the child policy cannot exceed
the total port-shape rate.
This is an example of a parent-child configuration:
Router(config)# policy-map parent
Router(config-pmap)# class class-default
Router(config-pmap-c)# shape average 50000000
Router(config-pmap-c)# service-policy child
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet0/1
Router(config-if)# service-policy output parent
Router(config-if)# exit
Note
When you configure bandwidth in a policy map, you must configure all the rates in the same format. The
total of the minimum bandwidth guarantees (CIR) for each queue of the policy cannot exceed the total
speed of the parent.
When you use the bandwidth policy-map class configuration command to configure a class of traffic as a
percentage of total bandwidth, it represents the minimum bandwidth guarantee (CIR) for that traffic class.
This means that the traffic class gets at least the bandwidth indicated by the command, but is not limited to
that bandwidth. Any excess bandwidth on the port is allocated to each class in the same ratio in which the
CIR rates are configured.
Note
You cannot configure bandwidth as a percentage of total bandwidth when strict priority (priority without
police) is configured for another class in the output policy.
When you use the bandwidth policy-map class configuration command to configure a class of traffic as a
percentage of total bandwidth, it represents the portion of the excess bandwidth of the port that is allocated
to the class. This means that the class is allocated bandwidth only if there is excess bandwidth on the port,
and if there is no minimum bandwidth guarantee for this traffic class.
Note
You can configure bandwidth as a percentage of remaining the bandwidth only when strict priority (priority
without police) is configured for another class in the output policy map.
Note
You cannot configure bandwidth and traffic shaping (shape average) or priority queuing (priority) for
the same class in an output policy map.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
448
Configuring QoS
Congestion Management and Scheduling
This example shows how the classes outclass1 , outclass2 ,outclass3 , and class-default get a minimum of 40
percent, 20 percent, 10 percent, and 10 percent of the total bandwidth, respectively. Any excess bandwidth
is divided among the classes in the same proportion as rated in the CIR.
Router(config)# policy-map out-policy
Router(config-pmap)# class outclass1
Router(config-pmap-c)# bandwidth percent 40
Router(config-pmap-c)# exit
Router(config-pmap)# class outclass2
Router(config-pmap-c)# bandwidth percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# class outclass3
Router(config-pmap-c)# bandwidth percent 10
Router(config-pmap-c)# exit
Router(config-pmap)# class class-default
Router(config-pmap-c)# bandwidth percent 10
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service-policy output out-policy
Router(config-if)# exit
Note
When you configure CIR bandwidth for a class as a percentage of the total bandwidth, any excess bandwidth
remaining after servicing the CIR of all the classes in the policy map is divided among the classes in the
same proportion as the CIR rates. If the CIR rate of a class is configured as 0, that class is also not eligible
for any excess bandwidth, and as a result, receives no bandwidth.
This example shows how to allocate the excess bandwidth among queues by configuring bandwidth for a
traffic class as a percentage of remaining bandwidth. The class outclass1 is given priority queue treatment.
The other classes are configured to get percentages of the excess bandwidth if any, after servicing the priority
queue; outclass2 is configured to get 20 percent, outclass3 to get 30 percent, and the class-default class to get
the remaining 50 percent.
Router(config)# policy-map out-policy
Router(config-pmap)# class outclass1
Router(config-pmap-c)# priority
Router(config-pmap-c)# exit
Router(config-pmap)# class outclass2
Router(config-pmap-c)# bandwidth remaining percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# class outclass3
Router(config-pmap-c)# bandwidth remaining percent 30
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service-policy output out-policy
Router(config-if)# exit
Priority Queuing
You can use the priority policy-map class configuration command to ensure that a particular class of traffic
is given preferential treatment. With strict priority queuing, the priority queue is constantly serviced. All the
packets in the queue are scheduled and sent until the queue is empty. Priority queuing allows traffic for the
associated class to be sent before the packets in the other queues are sent.
Caution
Be careful when using the priority command. Excessive use of strict priority queuing might cause
congestion in other queues.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
449
Configuring QoS
Congestion Management and Scheduling
The router supports strict priority queuing or priority percent policy-map command.
Strict priority queuing (priority without police) assigns a traffic class to a low-latency queue to ensure
that the packets in this class have the lowest possible latency. When this is configured, the priority queue
is continually serviced until it is empty, possibly at the expense of packets in other queues.
Note
You cannot configure priority without policing for a traffic class when traffic shaping or CBWFQ are
configured for another class in the same output policy map.
Use the priority percent policy-map command, or unconditional priority policing , to reduce the
bandwidth used by the priority queue. This is the only form of policing that is supported in output policy
maps. Using this combination of commands configures a maximum rate on the priority queue, and you
can use the bandwidth and shape average policy-map commands for other classes to allocate traffic
rates on other queues. Effective Cisco IOS Release 15.3(2)S, Cisco ASR 901 Router allows configuration
of multiple classes to serve based on priority.
Note
When priority is configured in an output policy map without the priority command, you can only configure
the other queues for sharing by using the bandwidth remaining percent policy-map command to allocate
excess bandwidth.
Restrictions
You can associate the priority command with a single unique class for all the attached output polices
on the router. Efective Cisco IOS Release 15.3(2)S, Cisco ASR 901 Router allows the configuration of
multiple classes with priority percent.
You cannot configure priority and other scheduling action (shape average or bandwidth) in the same
class.
You cannot configure priority queuing for the class-default of an output policy map.
This example shows how to configure the class out-class1 as a strict priority queue so that all the packets in
that class are sent before any other class of traffic. Other traffic queues are configured so that out-class-2 gets
50 percent of the remaining bandwidth and out-class3 gets 20 percent of the remaining bandwidth. The
class-default class receives the remaining 30 percent with no guarantees.
Router(config)# policy-map policy1
Router(config-pmap)# class out-class1
Router(config-pmap-c)# priority
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class2
Router(config-pmap-c)# bandwidth remaining percent 50
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class3
Router(config-pmap-c)# bandwidth remaining percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service-policy output policy1
Router(config-if)# exit
This example shows how to use the priority keyword with the percent command to configure out-class1 as
the priority queue, with the traffic going to the queue limited to 20,000,000 bps so that the priority queue will
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
450
Configuring QoS
Ingress and Egress QoS Functions
never use more than that. Traffic above that rate is dropped. The other traffic queues are configured to use 50
percent and 20 percent of the bandwidth that is left, as shown in the previous example.
Router(config)# policy-map policy1
Router(config-pmap)# class out-class1
Router(config-pmap-c)# priority percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class2
Router(config-pmap-c)# bandwidth percent 50
Router(config-pmap-c)# exit
Router(config-pmap)# class out-class3
Router(config-pmap-c)# bandwidth percent 20
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# interface gigabitethernet 0/1
Router(config-if)# service-policy output policy1
Router(config-if)# exit
The following example shows how to use the priority keyword with the percent command to configure
multiple traffic classes:
Router(config)# policy-map pmap_bckbone
Router(config-pmap)# class VOICE_GRP
Router(config-pmap-c)# priority percent 50
Router(config-pmap-c)# exit
Router(config-pmap)# class CTRL_GRP
Router(config-pmap-c)# priority percent 5
Router(config-pmap-c)# exit
Router(config-pmap)# class E1_GRP
Router(config-pmap-c)# priority percent 55
Router(config-pmap-c)# exit
Router(config-pmap)# class class-default
Router(config-pmap-c)# bandwidth percent 10
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
451
Configuring QoS
Configuring QoS
Configuring QoS
The following sections describe how to configure the QoS features supported by the Cisco ASR 901 Router:
QoS Limitations
The Cisco ASR 901 Router offers different QoS support according to the physical interface and traffic type.
The following sections describe the limitations for each QoS capability on the Cisco ASR 901 Router.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
452
Configuring QoS
QoS Limitations
Set of qos-group (VLAN priority)This is relevant only for Layer 2 Transport over MLPPP
interface.
Requires explicit configuration of class-default with bandwidth percent.
DSCP marking is not supported for the class-default queue.
All the above restrictions are applicable to MPLS over MLPPP and IP over MLPPP, in addition to the following
specific restrictions that apply to QoS policies on MPLS and IP over MLPPP interfaces:
The Cisco ASR 901 Router supports the DSCP marking priority, eight bandwidth queues, link
fragmentation, interleave, and queue limits features for MLPPP egress.
Input policy is not supported.
EXP marking is not supported for the class-default queue.
The following limitations apply to Gigabit Ethernet interfaces:
You can apply only a maximum of two different service policies to the Gigabit Ethernet interfaces.
You can only use the class-default class for HQoS parent service policies applied to egress Gigabit
Ethernet interfaces.
Statistics Limitations
The following statistical QoS limitations apply to the Cisco ASR 901 Router:
Input service policies on the Gigabit Ethernet interface support statistics only in bytes.
PPP and MLPPP interfaces support QoS statistics only in packets.
Output service policies on the Gigabit Ethernet interface support statistics only in bytes.
The 2R3C policer provides exceed-and-violate counters as a single counter.
Marking statistics will not be displayed for any class.
Propagation Limitations
The Cisco ASR 901 Router has the following limitations when propagating QoS values between interfaces:
The following limitation is applicable when traffic ingresses through a GigabitEthernet interface and
egresses through a GigabitEthernet interface:
When traffic is switched at Layer 2, the QoS group is propagated through the router.
The following limitations are applicable when traffic ingresses through any other interface type
(host-generated and PPP) and egresses through the GigabitEthernet interface.
The Precedence bit value is propagated to the CoS bit (for host-generated interface only).
The CoS bit value is mapped 1:1 to the QoS group value.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
453
Configuring QoS
QoS Limitations
See the Sample QoS Configuration, on page 461 section for a sample QoS configuration that accounts for
propagation limitations on the Cisco ASR 901 Router.
Classification Limitations
The following table summarizes the values that you can use to classify traffic based on interface type. The
values are parameters that you can use with the match command.
Table 25: QoS Classification Limitations by Interface
Gigabit Ethernet
PPP
Value
Ingress
Egress
Ingress
Egress
access-group
all
any
class-map
cos
destination-address
discard-class
dscp
flow pdp
frde
frdlci
ip dscp
ip precedence
ip rtp
mpls experimental
not
packet length
precedence
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
454
Configuring QoS
QoS Limitations
protocol
qos-group
source-address
vlan
The following limitations are also applicable when configuring classification on the Cisco ASR 901 Router:
The set qos-group cos command used for trusting CoS is supported only under class-default, as a
stand-alone class in the policy-map. No other user class is supported on the same policy-map. Counters
are not supported for the policy-map.
The following limitations apply to the input Gigabit Ethernet interface QoS policies:
You can use the match vlan command with a maximum of four VLANs. The match vlan command
is supported only for port, EVC, and pseudowire.
You can use the match dcsp command with a maximum of four DSCP values.
The Cisco ASR 901 Router first looks for IP DSCP and then the MPLS experimental imposition
for the MPLS packets.
The following limitations apply to the output Gigabit Ethernet interface QoS policies:
Class maps with queuing action only support matching based on QoS group. This limitation does
not apply to the class-default class map.
You cannot create two matching class maps based on the same QoS group value.
Class-default on the egress supports matching only on qos-group 0.
The following limitation applies to input PPP interfaces:
You can create only up to eight matches in a class map, using DSCP or MPLS Exp values.
Note
The show policy-map interface counters command does not display cumulative queue statistics for
priority classes. It shows only queue statistics for individual priority classes. Similarly, output or marking
counters are not supported.
Marking Limitations
The following table summarizes the values that you can use to mark traffic, based on interface type. The
values are parameters that you can use with the set command.
Gigabit Ethernet
PPP
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
455
Configuring QoS
QoS Limitations
Value
Ingress
Egress
Ingress
Egress
atm-clp
cos
discard-class
dscp
dscp-transmit
ip dscp
ip precedence
mpls experimental
mpls experimental X
imposition
mpls experimental
topmost qos-group
precedence
prec-transmit
qos-group
Gigabit Ethernet
PPP
Value
Ingress
Egress
Ingress
Egress
bandwidth (kbps)
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
456
Configuring QoS
QoS Limitations
bandwidth percent
bandwidth
remaining percent
compression header
ip
drop
fair-queue
priority
priority (kbps)
priority (without
queue-limit)
priority percent
queue-limit (cells)
queue-limit
(packets)
random-detect
discard-class-based
Rate-Limiting Limitations
You can use rate limiting for congestion management on the Cisco ASR 901 Router. The following table
summarizes the rate-limiting parameters that you can use with the police command, according to interface
type. The table uses the following terms:
RateA speed of network traffic, such as a committed information rate (CIR) or peak information rate
(PIR).
ActionsA defined action when traffic exceeds a rate, such as conform-action, exceed-action, or
violate-action.
Table 27: QoS Rate Limiting Limitations by Interface
Gigabit Ethernet
PPP
Policing With
Ingress
Egress
Ingress
Egress
One rate
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
457
Configuring QoS
QoS Limitations
Shaping Limitations
The following table summarizes the values that you can use to mark traffic based on interface type. The values
are parameters that you can use with the shape command.
Table 28: QoS Shaping Limitations by Interface
Gigabit Ethernet
MLPPP
Value
Ingress
Egress
Ingress
Egress
adaptive
average
fecn-adapt
max-buffers
peak
The following limitations also apply to QoS shaping on the Cisco ASR 901 Router:
The following limitations apply to the input Gigabit Ethernet interfaces:
You cannot apply shaping to the class-default class unless you are using hierarchical policy maps
and applying shaping to the parent policy map.
If you are using hierarchical policy maps, you can only apply the class-default class to the parent
policy map.
The following limitations apply to Egress Shaping on the MLPPP interfaces:
Only shape average is supported.
Hierarchical shaping is not supported.
More than one shape in the same policy-map is not allowed.
Shape and bandwidth in the same class is not allowed.
Shape command in default class is not allowed.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
458
Configuring QoS
Improving Feature Scalability
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
459
Configuring QoS
QoS for MPLS over MLPPP and IP over MLPPP
Note
The show policy-map interface multilink bundle-number command shows the combined counters of
the CPU-generated traffic and data traffic if both the data traffic and CPU-generated traffic flow in the
same class.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
460
Configuring QoS
QoS Configuration Guidelines
1 Configuring a Class-map
2 Configuring the Policy-map with Shaping
3 Attaching the Policy-map on the MLPPP Interface
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
461
Configuring QoS
Sample QoS Configuration
For Layer 3 traffic passing between Gigabit Ethernet 0/2 interface and the Gigabit Ethernet 0/0 interface,
the output queue is determined based on the CoS value assigned in the in-qos policy map. (the CoS value
is mapped 1:1 to the QoS group value.)
For traffic passing between other interfaces, the output queue is determined based on the CS fields (top
three bits) of the IP DSCP bits; these bits are copied to the CoS bits, which are mapped 1:1 to the QoS
group value.
The following is a sample configuration for QoS:
Note
The sample configuration is a partial configuration intended to demonstrate the QoS feature.
!
class-map match-all q0
match qos-group 0
class-map match-all q1
match qos-group 1
class-map match-all q2
match qos-group 2
class-map match-all q3
match qos-group 3
class-map match-all q4
match qos-group 4
class-map match-all q5
match qos-group 5
class-map match-all q6
match qos-group 6
class-map match-all q7
match qos-group 7
class-map match-any Voice
match dscp ef
class-map match-any Signaling
match dscp af41
class-map match-any HSDPA
match dscp af11 af12
class-map match-any TCAM1
!translates to 3 TCAM rules because each match in match-any uses one entry
match dscp af21
match cos 3
match mpls experimental topmost
class-map match-all TCAM2
!translates to 1 TCAM rules because all the match-all clauses together take only 1 entry
match dscp af21
match cos 3
match mpls experimental topmost 1
!
policy-map in-qos
class Voice
set cos 5
set qos-group 5
class control_plane
set cos 4
set qos-group 4
class HSDPA
set cos 1
set qos-group 1
!
policy-map out-child
class q5
priority percent 20
class q4
bandwidth remaining percent 20
class q1
bandwidth remaining percent 59
!
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
462
Configuring QoS
Configuring Classification
policy-map out-parent
class class-default
shape average 100000000
service-policy out-child
!
Configuring Classification
Classifying network traffic allows you to organize packets into traffic classes based on whether the traffic
matches specific criteria. Classifying network traffic is the foundation for enabling many QoS features on
your network.
This section contains the following topics:
Procedure
Step 1
Step 2
When the prompt changes to Router , you have entered enable mode.
Step 3
Step 4
Use the class-map command to define a new class map and enter class map configuration mode.
Example:
Router(config)# class-map class1
Step 5
Use the match command to specify the match criteria for the class map. You can define a variety of match
criteria including CoS, DSCP, MPLS Exp, or QoS group value.
Example:
Router(config-cmap)# match qos-group 7
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
463
Configuring QoS
Configuring Classification
Example:
Step 6
Procedure
Step 1
Step 2
When the prompt changes to Router , you have entered enable mode.
Step 3
Step 4
Use the policy-map command to define a new policy map and enter policy map configuration mode.
Example:
Router(config)# policy-map policy1
Router(config-pmap)#
Step 5
Use the class command to specify a traffic class to which the policy applies. This command enters policy-map
class configuration mode, which allows you to define the treatment for the traffic class.
Example:
Router(config-pmap)# class class1
Router(config-pmap-c)#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
464
Configuring QoS
Configuring Classification
Use the bandwidth command to specify the bandwidth allocated for a traffic class attached to the policy map.
You can define the amount of bandwidth in kbps, a percentage of bandwidth, or an absolute amount of
bandwidth. This step is optional.
Note
Example:
Router(config-pmap-c)# bandwidth percent 50
Step 6
Note
You can use the show policy-map command to verify your configuration.
Procedure
Step 1
Step 2
When the prompt changes to Router, you have entered enable mode.
Step 3
Step 4
Specify the interface to which you want to apply the policy map.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
465
Configuring QoS
Configuring Classification
Example:
Router(config)# interface gigabitEthernet0/1
Step 5
Use the service-policy command to attach the policy map to an interface. The input and output parameters
specify the direction in which router applies the policy map.
Example:
Router(config-if)# service-policy output policy1
Step 6
Note
You can use the show policy map interface command to verify your configuration.
For more information about configuring classification, see the Cisco IOS Quality of Service Solutions
Configuration Guide, Release 12.2SR .
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
GigabitEthernet0/3
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
466
Configuring QoS
Configuring Classification
Command or Action
Purpose
instance-id Unique identifier of the instance.
Example:
Router(config-if)# service
instance 22
ethernet
Step 5
Step 6
Example:
Router(config-if-svr)# rewrite
ingress
tag pop 1 symmetric
Step 7
Step 8
Step 9
Example:
Router(config-if-srv)#
service-policy
input policy1
exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
467
Configuring QoS
Configuring Marking
Configuring Marking
Marking network traffic allows you to set or modify the attributes for packets in a defined traffic class. You
can use marking with traffic classification to configure a variety of QoS features for your network.
The Cisco ASR 901 Router marking allows you to modify the following packet attributes:
Differentiated services code point (DSCP) value
Class of service (CoS) value
MPLS Exp bit value
Qos group value (internal)
For instructions on how to configure marking for IP Precedence, DSCP, or CoS value, see the following
sections:
Creating a Class Map for Marking Network Traffic, on page 468
Creating a Policy Map for Applying a QoS Feature to Network Traffic, on page 469
Attaching the Policy Map to an Interface, on page 470
For instructions on how to configure MPLS Exp bit marking, see:
Configuring MPLS Exp Bit Marking using a Pseudowire, on page 471.
Procedure
Step 1
Step 2
When the prompt changes to Router , you have entered enable mode.
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
468
Configuring QoS
Configuring Marking
Example:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Step 4
Use the class-map command to define a new class map and enter class map configuration mode.
Example:
Router(config)# class-map class1
Step 5
Use the match command to specify the match criteria for the class map. You can define a variety of match
criteria including CoS, DSCP, MPLS Exp, or QoS group value.
Example:
Router(config-cmap)# match qos-group 7
Step 6
Procedure
Step 1
Step 2
When the prompt changes to Router , you have entered enable mode.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
469
Configuring QoS
Configuring Marking
Step 3
Step 4
Use the policy-map command to define a policy map and enter policy map configuration mode.
Example:
Router(config)# policy-map policy1
Router(config-pmap)#
Step 5
Use the class command to specify the traffic class for which you want to create a policy and enter policy map
class configuration mode. You can also use the class-default parameter to define a default class.
Example:
Router(config-pmap)# class class1
Router(config-pmap-c)#
Step 6
Use one of the set commands listed in Table 29: set Commands Summary, on page 470 to define a QoS
treatment type.
Table 29: set Commands Summary
Step 7
set Commands
Traffic Attributes
Network Layer
Protocol
set cos
802.1q
set dscp
Layer 3
IP
set qos-group
QoS group ID
Layer 3
IP, MPLS
Note
You can use the show policy-map or show policy-map policy-map class class-name commands to
verify your configuration.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
470
Configuring QoS
Configuring Marking
Example:
Router> enable
Step 2
When the prompt changes to Router, you have entered enable mode.
Step 3
Step 4
Specify the interface to which you want to apply the policy map.
Example:
Router(config)# interface gigabitEthernet0/1
Step 5
Use the service-policy command to attach the policy map to an interface. The input and output parameters
specify the direction in which router applies the policy map.
Example:
Router(config-if)# service-policy input policy1
Step 6
Note
You can use the show policy map interface command to verify your configuration.
Procedure
Step 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
471
Configuring QoS
Configuring Congestion Management
Example:
Router(config)# interface gigabitethernet 0/0
Router(config-if)#
Step 2
Specify an EVC.
Example:
Router(config-if)# service instance 1 ethernet
Router(cfg-if-srv)#
Step 3
Step 4
Use the xconnect command with the service policy that uses the configuration defined in the pseudowire
class.
Example:
Router(cfg-if-srv)# xconnect 10.10.10.1 121
Router(cfg-if-srv)# service-policy in <mark-policy>
For more information about configuring marking, see the Cisco IOS Quality of Service Solutions Configuration
Guide, Release 12.2SR.
Note
The Cisco ASR 901 does not support all of the commands described in the IOS Release 12.2SR
documentation.
Configuration Example
This is a sample configuration example for applying a marking policy to a pseudowire.
policy-map cos-6
class cos-6
police rate percent 5
conform-action transmit
exceed-action drop
set mpls experimental imposition 4
interface GigabitEthernet0/3
no ip address
load-interval 30
negotiation auto
service instance 22 ethernet
encapsulation dot1q 22
rewrite ingress tag pop 1 symmetric
service-policy input cos-6
xconnect 2.2.2.2 22 encapsulation mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
472
Configuring QoS
Configuring Congestion Management
Procedure
Step 1
Step 2
When the prompt changes to Router , you have entered enable mode.
Step 3
Step 4
Step 5
Use the class command to reference the class map that defines the traffic to which the policy map applies.
Example:
Router(config-pmap)# class class1
Step 6
Use the priority command to specify the priority percentage allocated to the traffic class assigned to the policy
map. You can use the burst parameter to configures the network to accommodate temporary bursts of traffic.
Example:
Router(config-pmap-c)# priority percent 10
Step 7
Use the bandwidth command to specify the bandwidth available to the traffic class within the policy map.
You can specify the bandwidth in kbps or by a percentage of bandwidth.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
473
Configuring QoS
Configuring Congestion Management
Example:
Router(config-pmap-c)# bandwidth percent 30
Step 8
Note
You can use the show policy-map, show policy-map policy-map class class-name, or show
policy-map interface commands to verify your configuration.
Note
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
policy-map
Example:
Router(config)# policy-map
policy1
Step 3
class class-name
Example:
Router(config-pmap)# class
class1
Step 4
Example:
Router(config-pmap-c)# priority
percent 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
474
Configuring QoS
Configuring Congestion Management
Step 5
Command or Action
Purpose
Example:
Router(config-pmap-c)# bandwidth
percent 50
Step 6
exit
Configuration Examples
This section shows sample configuration examples for multiple priority queuing on Cisco ASR 901 Cisco
ASR 901S router:
policy-map pmap_bckbone
class VOICE_GRP
priority percent 50
class CTRL_GRP
priority percent 5
class E1_GRP
priority percent 35
class class-default
bandwidth percent 10
Note
You can use the show policy-map, show policy-map policy-map class class-name, or show policy-map
interface commands to verify your configuration.
Procedure
Step 1
A class map contains match criteria against which a packet is checked to determine if it belongs to the class.
You can use class maps to define criteria that are referenced in one or more policy maps. Use the class-map
command to create a class map.
a) class-map class-map name
Example:
Router(config)# class-map class1
Router(config-cmap)#
b) Use the match command to specify the match criteria for the class map. You can define a variety of match
criteria including CoS, DSCP, MPLS Exp, or QoS group value.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
475
Configuring QoS
Configuring Congestion Management
Example:
Router(config-cmap)# match qos-group 7
Step 2
Complete the following steps to configure a policy map and attach it to an interface.
Note
This router does not support queue-limit commands. Only random-detect discard-class-based is
supported on GigabitEthernet Interfaces.
a) Use the policy-map command to define a policy map.
Example:
Router(config)# policy-map policy1
Router(config-pmap)#
b) Use the class command to reference the class map that defines the traffic to which the policy map applies.
Example:
Router(config-pmap)# class class1
Router(config-pmap-c)#
c) Use the bandwidth command to specify the bandwidth allocated for the traffic class.
Example:
Router(config-pmap-c)# bandwidth percent 10
d) Use the exit command to exit the policy map class configuration.
Example:
Router(config-pmap-c)# exit
Router(config-pmap)#
f) Enter configuration for the interface to which you want to apply the policy map.
Example:
Router(config)# interface atm0/ima0
g) Use the service-policy command to apply the service policy to the interface.
Example:
Router(config-if)# service-policy output policy1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
476
Configuring QoS
Configuring Congestion Management
Note
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
policy-map
Define a new policy map and enter policy map configuration mode.
Example:
Example
Example:
Router(config)#
policy-map policy1
Step 3
class
Example:
Router(config-pmap)#
class class1
Step 4
bandwidth
Example:
Router(config-pmap-c)#
bandwidth percent 50
Step 5
[no] random-detect
discard-class-based
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
477
Configuring QoS
Configuring Shaping
Command or Action
Purpose
To disable this feature, use the no form of this command.
Step 6
[no] random-detect
discard-class
Example:
Router(config-pmap-c)#
random-detect
discard-class 2 100 200
10
Note
Note
To return the values to the default for the discard class, use the no
form of this command.
Configuring Shaping
The Cisco ASR 901 supports class-based traffic shaping. Follow these steps to configure class-based traffic
shaping.
Class-based traffic shaping is configured using a hierarchical policy map structure; you enable traffic shaping
on a primary level (parent) policy map and other QoS features such as queuing and policing on a secondary
level (child) policy map.
This section contains the following topics:
Configuring Class-Based Traffic Shaping in a Primary-Level (Parent) Policy Map, on page 479
Configuring the Secondary-Level (Child) Policy Map, on page 479
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
478
Configuring QoS
Configuring Shaping
Procedure
Step 1
Use the policy-map command to specify the policy map for which you want to configure shaping and enter
policy-map configuration mode.
Example:
Router(config)# policy-map output-policy
Step 2
Use the class command to specify the traffic class to which the policy map applies.
Example:
Router(config-pmap)# class class1
Router(config-pmap-c)#
Step 3
Use the shape command to define algorithm and rate used for traffic shaping.
Example:
Router(config-pmap-c)# shape average mean-rate burst-size
Step 4
Use the service-policy command to attach the policy map to the class map.
Example:
Router(config-pmap-c)# service-policy policy-map
Step 5
Note
You can use the show policy-map command to verify your configuration.
For more information about configuring shaping, see Regulating Packet Flow on a Per-Class Basis---Using
Class-Based Traffic Shaping .
Note
This router does not support all of the commands described in the IOS Release 12.2SR documentation.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
479
Configuring QoS
Configuring Ethernet Trusted Mode
Procedure
Step 1
Use the policy-map command to specify the policy map for which you want to configure shaping and enter
policy-map configuration mode.
Example:
Router(config)# policy-map output-policy
Step 2
Use the class command to specify the traffic class to which the policy map applies.
Example:
Router(config-pmap)# class class1
Step 3
Use the bandwidth command to specify the bandwidth allocated to the policy map. You can specify the
bandwidth in kbps, a relative percentage of bandwidth, or an absolute amount of bandwidth.
Example:
Router(config-pmap-c)# bandwidth percent 50
Step 4
For more information about configuring shaping, see Regulating Packet Flow on a Per-Class Basis---Using
Class-Based Traffic Shaping .
Note
The Cisco ASR 901 does not support all of the commands described in the IOS Release 12.2SR
documentation.
Procedure
Step 1
Command or Action
Purpose
configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
480
Configuring QoS
Creating IP Extended ACLs
Command or Action
Step 2
Purpose
access-list
Create an IP extended ACL. Repeat the step as many
access-list-numberpermitaccess-list-number times as necessary.
access-list-number access-list-number
For access-list-number , enter the access list
[precedence access-list-number ] [tos
number. The range is 100 to 199 and 2000 to
access-list-number ] [dscp
2699.
access-list-number ]
For access-list-number , enter the name or
number of an IP protocol. Use the question mark
(?) to see a list of available protocols. To match
any Internet protocol (including ICMP, TCP,
and UDP), enter ip.
The access-list-number is the number of the
network or host sending the packet.
The access-list-number applies wildcard bits to
the source.
The access-list-number is the network or host
number receiving the packet.
The access-list-number applies wildcard bits to
the destination.
You can specify source, destination, and wildcards
as:
The 32-bit quantity in dotted-decimal format.
The keyword any for 0.0.0.0 255.255.255.255
(any host).
The keyword host for a single host 0.0.0.0.
Step 3
ip access-list extendedaccess-list-number
Step 4
end
Step 5
show access-lists
Step 6
What to Do Next
To delete an access list, use the no access-listaccess-list-number global configuration command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
481
Configuring QoS
Using Class Maps to Define a Traffic Class
This example shows how to create an ACL that permits IP traffic from a source host at 10.1.1.1 to a destination
host at 10.1.1.2:
Router(config)# access-list 100 permit ip host 10.1.1.1 host 10.1.1.2
Procedure
Command or Action
Purpose
Step 1
configure terminal
Step 2
class-map [match-all |
match-any] controller
e1slot/subslot
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
482
Configuring QoS
Using Class Maps to Define a Traffic Class
Command or Action
Purpose
A match-all class map cannot have more than one classification
criterion (match statement).
Define the match criterion to classify traffic. By default, no match
criterion is defined.
Note
Step 3
Step 4
end
Step 5
show class-map
Step 6
copy running-config
startup-config
What to Do Next
This example shows how to create a class map called controller e1slot/subslot, which matches incoming
traffic with DSCP values of 10, 11, and 12.
Router(config)# class-map match-any class2
Router(config-cmap)# match ip dscp 10 11 12
Router(config-cmap)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
483
Configuring QoS
Creating a Named Access List
Note
Extended ACLs with extended options like DSCP, fragments, option, precedence, time-range, ToS, and
TTL are not supported. Only ACLs with source and destination IP addresses are supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ip
access-list
standard acl-std
Step 4
permit {source [source-wildcard] Enters access-list configuration mode, and specifies one or more
allowed or denied conditions. This determines whether the
| any} log
packet is passed or dropped.
Example:
Router(config-std-nacl)#
permit 10.10.10.10
255.255.255.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
484
Configuring QoS
Creating a Named Access List
Command or Action
Purpose
(The level of messages logged to the console is controlled
by the logging console command.)
Step 5
exit
Example:
Router(config-std-nacl)# exit
Step 6
class-map class-map-name
Example:
Defines name for the class map and enters class-map config
mode.
class-map-nameName of the class map.
Router(config)# class-map
class-acl-std
Step 7
What to do Next
After creating a standard access list using names, define a policy map and attach it to the interface. See Creating
a Policy Map for Applying a QoS Feature to Network Traffic, on page 464 and Attaching the Policy Map to
an Interface, on page 465 for more details.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
485
Configuring QoS
Verifying Named Access List
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
0.0.0.255
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
486
Configuring QoS
Configuration Example for Named Access List
To verify the ACL-based QoS classification, use the show policy-map command as given below:
Router# show policy-map interface gigabitethernet 0/0
GigabitEthernet0/0
Service-policy input: test
Class-map: test (match-any)
0 packets, 244224 bytes
5 minute offered rate 6000 bps, drop rate 0000 bps
Match: access-group name test
QoS Set
dscp af32
Packets marked 0
No marking statistics available for this class
Class-map: class-default (match-any)
0 packets, 239168 bytes
5 minute offered rate 6000 bps, drop rate 0000 bps
Match: any
Note
In the following configuration, both the ACL and ACL-based QoS are exclusive of each other and are not
related to each other.
Router# show running-config
Building configuration...
Current configuration : 11906 bytes
!
! Last configuration change at 22:51:12 UTC Sun May 13 2001
!
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
!card type command needed for slot/vwic-slot 0/0
enable password lab
!
no aaa new-model
ip cef
!
!
!
!
no ipv6 cef
!
!
mpls label protocol ldp
multilink bundle-name authenticated
!
table-map sach
map from 0 to 0
map from 1 to 1
map from 2 to 2
map from 3 to 3
map from 4 to 3
map from 5 to 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
487
Configuring QoS
Configuration Example for Named Access List
map from 6 to 6
map from 7 to 7
default copy
!
l3-over-l2 flush buffers
!
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
username lab password 0 lab
!
!
!
class-map match-any test
match access-group name test123
class-map match-all test456
match access-group name tes456
class-map match-any test1
match access-group name test123
!
policy-map test
class test456
class class-default
!
!
!
!
!
!
interface Loopback0
ip address 10.10.10.1 255.255.255.255
!
interface Port-channel1
no negotiation auto
!
interface Port-channel8
no negotiation auto
service-policy input test
service instance 2000 ethernet
encapsulation dot1q 2000
rewrite ingress tag pop 1 symmetric
bridge-domain 2000
!
!
interface GigabitEthernet0/0
no negotiation auto
service-policy input test
!
interface GigabitEthernet0/1
shutdown
no negotiation auto
!
interface GigabitEthernet0/2
negotiation auto
channel-group 8 mode active
!
interface GigabitEthernet0/3
no negotiation auto
!
interface GigabitEthernet0/4
negotiation auto
service instance 200 ethernet
encapsulation untagged
bridge-domain 200
!
!
interface GigabitEthernet0/5
negotiation auto
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
488
Configuring QoS
Configuration Example for Named Access List
!
interface GigabitEthernet0/6
no negotiation auto
!
interface GigabitEthernet0/7
no negotiation auto
!
interface GigabitEthernet0/8
negotiation auto
channel-group 8 mode active
!
interface GigabitEthernet0/9
no negotiation auto
!
interface GigabitEthernet0/10
no negotiation auto
!
interface GigabitEthernet0/11
no negotiation auto
!
interface FastEthernet0/0
ip address 10.104.99.152 255.255.255.0
full-duplex
!
interface Vlan1
no ip address
!
interface Vlan108
ip address 11.11.11.1 255.255.255.0
mpls ip
!
interface Vlan200
ip address 10.1.1.2 255.255.255.0
mpls ip
!
interface Vlan2000
ip address 200.1.1.1 255.255.255.0
!
router ospf 1
router-id 10.10.10.1
network 10.10.10.1 0.0.0.0 area 0
network 200.1.1.0 0.0.0.255 area 0
!
router bgp 1
bgp router-id 10.10.10.1
bgp log-neighbor-changes
neighbor 10.1.1.1 remote-as 2
neighbor 10.10.10.50 remote-as 1
neighbor 10.10.10.50 update-source Loopback0
!
ip forward-protocol nd
!
!
no ip http server
ip route 0.0.0.0 0.0.0.0 10.104.99.1
!
ip access-list extended check
deny
ip any any
ip access-list extended tes456
permit ip host 10.1.1.1 192.168.1.0 0.0.0.255
permit ip host 10.1.1.1 192.168.2.0 0.0.0.255
permit ip host 10.1.1.1 192.168.3.0 0.0.0.255
permit ip host 10.1.1.1 192.168.4.0 0.0.0.255
permit ip host 10.1.1.1 192.168.5.0 0.0.0.255
permit ip host 10.1.1.1 192.168.6.0 0.0.0.255
permit ip host 10.1.1.1 192.168.7.0 0.0.0.255
permit ip host 10.1.1.1 192.168.8.0 0.0.0.255
permit ip host 10.1.1.1 192.168.9.0 0.0.0.255
permit ip host 10.1.1.1 192.168.10.0 0.0.0.255
permit ip host 10.1.1.1 192.168.11.0 0.0.0.255
permit ip host 10.1.1.1 192.168.12.0 0.0.0.255
permit ip host 10.1.1.1 192.168.13.0 0.0.0.255
permit ip host 10.1.1.1 192.168.14.0 0.0.0.255
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
489
Configuring QoS
Configuration Example for Named Access List
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
490
Configuring QoS
Configuration Example for Named Access List
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
permit
remark
7
ip
8
ip
9
ip
10
ip
11
ip
12
ip
13
ip
14
ip
15
ip
16
ip
17
ip
18
ip
19
ip
20
ip
21
ip
22
ip
23
ip
24
ip
25
ip
26
ip
27
ip
28
ip
29
ip
30
ip
31
ip
32
ip
33
ip
34
ip
35
ip
36
ip
37
ip
38
ip
39
ip
40
ip
41
ip
42
ip
43
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
491
Configuring QoS
Access Control Lists for IPv6 Traffic Filtering
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
492
Configuring QoS
Access Control Lists for IPv6 Traffic Filtering
Only layer 4 options such as ack, eq, established, fin, gt, lt, psh, ranges, rst, and syn are supported for
IPv6 ALCs.
The scale of IPv6 ACL varies based on the QoS, Layer 4 ACL, multicast, and storm features configured
on the Cisco ASR 901 Router.
Procedure
Command or Action
Purpose
Step 1 enable
Example:
Router> enable
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
493
Configuring QoS
Access Control Lists for IPv6 Traffic Filtering
Command or Action
value][fragments][hbh][log][log-input]
[routing][routing-type routing-number]
[sequence value][time-range name]
Purpose
messages logged to the console is controlled
by the logging console command.)
Example:
Router(config-ipv6-acl)# permit ipv6
host 2001:DB8:0:4::32 any eq telnet
Example:
Router(config-ipv6-acl)# deny tcp host
2001:1::2 eq 30 any dscp af11
Configuration Example
This section shows sample configuration for creating and configuring the IPv6 ACL on the Cisco ASR 901
Cisco ASR 901S router.
ipv6 access-list source
deny tcp host 2001:1::2 eq 30 any dscp af11
permit ipv6 any any
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
494
Configuring QoS
QoS Treatment for Performance-Monitoring Protocols
Step 4
Command or Action
Purpose
Example:
Router(config-if) # ipv6
traffic-filter source in
Configuration Example
This section shows sample configuration for applying the IPv6 ACL on an interface.
int vlan 100
ipv6 traffic-filter source in
end
Cisco IP-SLAs
For information about Cisco IP service level agreements (IP-SLAs), see Understanding Cisco IOS IP SLAs,
page 3-2 .
Marking
By default, the class of service (CoS) marking of CFM traffic (including IP SLAs using CFM probes) is not
changed. This feature cannot change this behavior.
By default, IP traffic marking (including IP SLA and TWAMP probes) is not changed. This feature can change
this behavior.
Queuing
The CFM traffic (including IP SLAs using CFM probes) is queued according to its CoS value and the output
policy map configured on the egress port, similar to normal traffic. This feature cannot change this behavior.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
495
Configuring QoS
QoS Marking for CPU-Generated Traffic
IP traffic (including IP SLA and TWAMP probes) is queued according to the markings specified in the cpu
traffic qos global configuration command and the output policy map on the egress port. If this command is
not configured, all IP traffic is statically mapped to a queue on the egress port.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
496
Configuring QoS
Extending QoS for MLPPP
Configure CoS marking using CoS as the map from value with a table map, using only the default and
copy keywords.
For details about table maps, see the Table Maps, on page 440.
Using the cpu traffic qos global configuration command with table mapping, you can configure multiple
marking and queuing policies to work together or independently. You can queue native VLAN traffic based
on the CoS markings configured using the cpu traffic qos global configuration command.
The cpu traffic qos command specifies the traffic to which it applies: all CPU traffic, only CPU-IP traffic,
or only CPU non-IP traffic. All other traffic is statically mapped to a CPU-default queue on the egress port.
All CFM traffic (including Layer 2 IP SLA probes using CFM) is mapped to classes in the output policy map,
and queued based on their CoS value.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map match-any
class-map-name
Example:
Router(config)#
class-map match-any mplsexp
Step 4
match mpls experimental topmost Matches the experimental (EXP) value in the topmost label
header.
number
Example:
Router(config-cmap)# match mpls
experimental topmost 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
497
Configuring QoS
Configuring Class-map for Matching IP DSCP Value
Command or Action
Purpose
Note
Step 5
exit
Example:
Router(config-cmap)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map match-any
class-map-name
Example:
Router(config)#
class-map match-any matchdscp
Step 4
match ip dscp
[dscp-value...dscp-value]
Example:
Router(config-cmap)# match ip
dscp af11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
498
Configuring QoS
Configuring Class-map for Matching MPLS EXP Bits or IP DSCP Value
Command or Action
Purpose
Note
Step 5
exit
Example:
Router(config-cmap)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map match-any class-map-name Creates a class map to be used for matching packets to
a specified class and to enter QoS class-map
configuration mode:
Example:
Router(config)# class-map
match-any matchdscp
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
499
Configuring QoS
Configuring a Policy-map
Step 5
Command or Action
Purpose
Example:
Router(config-cmap)# match ip dscp
af11
Step 6
exit
Example:
Router(config-cmap)#
exit
Configuring a Policy-map
Complete the following steps to configure a policy-map.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map policy-map-name
Example:
Router(config)# policy-map
mplsomlpppqos
Step 4
class class-name
Example:
Router(config-pmap)#
class mplsexp
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
500
Configuring QoS
Configuring a Policy-map
Step 5
Command or Action
Purpose
Example:
Router(config-pmap-c)#
priority percent 10
Step 6
class class-name
Example:
Router(config-pmap-c)# class
matchdscp
Step 7
Step 8
class class-name
Example:
Router(config-pmap-c)# class
mplsexpvalues
Step 9
Step 10
class class-name
Example:
Router(config-pmap-c)# class
matchdscpvalues
Step 11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
501
Configuring QoS
Attaching the Policy-map to MLPPP Interface
Step 12
Command or Action
Purpose
class class-name
Example:
Router(config-pmap-c)# class
mplsexp_or_dscp
Step 13
Example:
Router(config-pmap-c)# bandwidth
percent 20
Step 14
Example:
Router(config-pmap-c)# set mpls
experimental topmost 1
Step 15
Step 16
Example:
Router(config-pmap-c)# queue-limit
80 packets
Step 17
end
Example:
Router(config-pmap-c)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
502
Configuring QoS
Attaching the Policy-map to MLPPP Interface
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Router(config)# interface
multilink5
Step 4
address IP address.
Example:
Router(config-if)# ip address
84.1.2.3 255.255.255.0
Step 5
load-interval interval
Example:
Router(config-if)# load-interval
30
Step 6
mpls ip
Example:
Router(config-if)# mpls ip
Step 7
keepalive period
Example:
Router(config-if)# keepalive 1
Step 8
ppp multilink
Example:
Router(config-if)# ppp multilink
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
503
Configuring QoS
Re-marking IP DSCP Values of CPU Generated Traffic
Step 9
Command or Action
Purpose
Example:
Step 10
Example:
Router(config-if)# ppp multilink
endpoint string ML3
Step 11
service-policy output policy-map-name Attaches a policy map to an interface that will be used
as the service policy for the interface.
Example:
Router(config-if)# service-policy
output mplsomlpppqos
Step 12
exit
Example:
Router(config-if)#
exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
504
Configuring QoS
Re-marking MPLS EXP Values of CPU Generated Traffic
Step 3
Command or Action
Purpose
Example:
Router(config)#
cpu traffic ppp set ip dscp cs5
Step 4
exit
Example:
Router(config)#
exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
exit
Example:
Router(config)#
exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
505
Configuring QoS
Configuring a Policy-map to Match on CS5 and EXP4
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Router(config)# class-map
match-any dscpcs5
Step 4
Example:
Router(config-cmap)# match ip
dscp cs5
Step 5
class-map match-any class-map-name Creates a class map to be used for matching packets to
a specified class.
Example:
Router(config-cmap)# class-map
match-any exp4
Step 6
Example:
Router(config-cmap)# match mpls
experimental topmost 4
Step 7
policy-map policy-map-name
Example:
Router(config-cmap)# policy-map
dscp_exp
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
506
Configuring QoS
Configuring a Policy-map to Match on CS5 and EXP4
Step 8
Command or Action
Purpose
class class-name
Example:
Router(config-pmap)# class
dscpcs5
Step 9
Step 10
Router(config-pmap-c)# set ip
dscp cs6
Step 11
class class-name
Example:
Router(config-pmap-c)# class exp4
Step 12
Step 13
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
507
Configuring QoS
Attaching the Policy-map to Match on CS5 and EXP4 to MLPPP Interface
Step 14
Command or Action
Purpose
class class-name
Example:
Router(config-pmap-c)# class
class-default
Step 15
Example:
Router(config-pmap-c)# bandwidth
percent 20
Step 16
end
Example:
Router(config-pmap-c)# exit
Note
DSCP CS6 and EXP 6 are default values. If you configure the CPU generated traffic to these values using
CLI, you cannot see them in the output of the show running-configuration command.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
508
Configuring QoS
Configuration Examples for Extending QoS for MPLS over MLPPP
!
!
class-map match-any dscpaf11
match ip dscp af11
!
Configuring a Policy-map
The following example shows a configuration of a policy-map.
Building configuration...
Current configuration : 101 bytes
!
policy-map mplsomlpppqos
class mplsexp
priority percent 10
class mplsexpvalues
set mpls experimental topmost 4
class matchdscp
bandwidth percent 20
class matchdscpvalues
set dscp af41
class mplsexp_or_dscp
bandwidth percent 20
queue-limit 80 packets
set mpls experimental topmost 1
set dscp af11
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
509
Configuring QoS
Configuring Egress Shaping on the MLPPP Interfaces
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-cmap)# match qos-group 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
510
Configuring QoS
Configuring Egress Shaping on the MLPPP Interfaces
What to Do Next
Configure the policy-map with shaping and bandwidth.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map policy-map-name
Example:
Router(config)# policy-map SHAPE_BW
Step 4
class class-name
Example:
Router(config-pmap)# class
QOS-GROUP5
Step 5
Example:
Router(config-pmap)# shape average
100000
What to Do Next
Attach the policy-map on the MLPPP interface.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
511
Configuring QoS
Configuring Egress Shaping on the MLPPP Interfaces
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Disables IP processing.
Example:
Router(config-if)# no ip address
Step 5
Example:
Router(config-if)# service-policy output
SHAPE
Step 6
Example:
Router(config-if)# service instance 111
ethernet
Step 7
Example:
Router(config-if-srv)# encapsulation dot1q
111
Step 8
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
Step 9
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
512
Configuring QoS
Verifying MPLS over MLPPP Configuration
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
513
Configuring QoS
Configuration Guidelines
Building configuration...
Current configuration : 76 bytes
!
class-map match-any mpls_exp1
match mpls experimental topmost 1
!
end
To verify the details of a class-map created for matching IP DSCP values, use the following command as
shown in the example below:
Router# show run class-map dscpaf21
Building configuration...
Current configuration : 60 bytes
!
class-map match-any dscpaf21
match ip dscp af21
!
end
To verify the details of a policy-map, use the following command as shown in the example below:
Router# show run policy-map policy_match_dscpaf11
Building configuration...
Current configuration : 100 bytes
!
policy-map policy_match_dscpaf11
class dscpaf11
set ip dscp af22
priority percent 10
!
end
To verify the details of a policy-map attached to MLPPP interface, use the following command as shown in
the example below:
Router# show policy-map interface multilink3
Multilink3
Service-policy output: match_dscp_exp
Class-map: dscpcs4 (match-any)
0 packets, 0 bytes
30 second offered rate 0000 bps, drop rate 0000 bps
Match: ip dscp cs4 (32)
Queueing
queue limit 38 packets
(queue depth/total drops/no-buffer drops) 0/0/0
(pkts output/bytes output) 0/0
bandwidth 10% (153 kbps)
Class-map: dscpcs6 (match-any)
19 packets, 1889 bytes
30 second offered rate 0000 bps, drop rate 0000 bps
Match: ip dscp cs6 (48)
Queueing
queue limit 38 packets
(queue depth/total drops/no-buffer drops) 0/0/0
(pkts output/bytes output) 0/0
bandwidth 10% (153 kbps)
Configuration Guidelines
This feature must be configured globally for a router; it cannot be configured per-port or per-protocol.
Enter each cpu traffic qos marking action on a separate line.
The cpu traffic qos cos global configuration command configures CoS marking for CPU-generated
traffic by using either a specific CoS value or a table map, but not both. A new configuration overwrites
the existing configuration.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
514
Configuring QoS
Configuration Guidelines
The cpu traffic qos dscp global configuration command configures IP-DSCP marking for CPU-generated
IP traffic by using either a specific DSCP value or a table map, but not both. A new configuration
overwrites the existing configuration.
The cpu traffic qos precedence global configuration command configures IP-precedence marking for
CPU-generated IP traffic by using either a specific precedence value or a table map, but not both. A new
configuration overwrites the existing configuration.
The cpu traffic qos dscp and cpu traffic qos precedence global configuration commands are mutually
exclusive. A new configuration overwrites the existing configuration.
When the cpu traffic qos dscp global configuration command is configured with table maps, you can
configure only one map from value at a timeDSCP, precedence, or CoS. A new configuration
overwrites the existing configuration. Packets marked by this command can be classified and queued
by an output policy map based on the marked DSCP or precedence value.
When the cpu traffic qos precedence global configuration command is configured with table maps,
you can configure only one map from value at a timeDSCP, precedence, or CoS. A new configuration
overwrites the existing configuration. Packets marked by this command can be classified and queued
by an output policy map based on the marked precedence or DSCP value.
You cannot configure a map from value of both DSCP and precedence. A new configuration overwrites
the existing configuration.
When the cpu traffic qos cos global configuration command is configured with table maps, you can
configure two map from values at a timeCoS and either DSCP or precedence.
If the cpu traffic qos cos global configuration command is configured with only a map from value of
DSCP or precedence:
The CoS value of IP packets is mapped by using the DSCP (or precedence) value in the packet
and the configured table map. Packets can be classified and queued by an output policy map based
on the marked CoS value.
The CoS value of non-IP packets remains unchanged.
If the cpu traffic qos cos global configuration command is configured with a map from value of CoS:
The CoS value of IP packets is mapped by using the CoS value in the packet and the configured
table map. Packets can be classified and queued by an output policy map based on the marked CoS
value.
The CoS value of non-IP packets is mapped by using the CoS value in the packet and the configured
table map. Packets can be classified and queued by an output policy map based on the marked CoS
value.
If the cpu traffic qos cos global configuration command is configured with a map from value of DSCP
or precedence and CoS:
The CoS value of IP packets is mapped by using the DSCP or precedence value in the packet and
the configured table map. Packets can be classified and queued by an output policy map based on
the marked CoS value.
The CoS value of non-IP packets is mapped by using the CoS value in the packet and the configured
table map. Packets can be classified and queued by an output policy map based on the marked CoS
value.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
515
Configuring QoS
ARP-based Classification
ARP-based Classification
Address Resolution Protocol Classification
Cisco IOS release 15.5(1)S introduces support for matching Address Resolution Protocol (ARP) protocol on
the Cisco ASR 901 Series Routers. The ARP classification aims at enhancing the existing QoS classification
to include protocol based classification. This feature matches the ARP packets coming to the Gigabit Ethernet
interface and assigns priority percent queue for the packets.
Restrictions
ARP classification can be applied only on the ingress interface.
Supports only on the GigabitEthernet interface and its bundle derivatives (not supported on multilink
interfaces).
Supports only match protocol on the ARP (other protocols are not supported).
Configuring a Class-map
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map class-map-name
Example:
Router(config)# class-map ARP
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
516
Configuring QoS
Configuring ARP Classification
Step 4
Command or Action
Purpose
Example:
Router(config-cmap)# match protocol
arp
What to Do Next
Create a policy map for an interface to specify a service policy.
Verifying a Class-map
To verify the class map configuration, use the show command as shown in the example below:
Router# show class-map ARP
Class Map match-all ARP (id 93)
Match protocol arp
Configuring a Policy-map
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map policy-map-name
Example:
Router(config)# policy-map ARP
Step 4
class class-name
Example:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
517
Configuring QoS
Configuring ARP Classification
Step 5
Command or Action
Purpose
Example:
Router(config-pmap-c)# set
qos-group 5
What to Do Next
Attach the policy map to an input interface.
Verifying a Policy-map
To verify the policy map configuration, use the show commands as shown in the examples below:
Router# show policy-map ARP
Policy Map ARP
Class ARP
set qos-group 5
Attaching a Policy-map
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
518
Configuring QoS
Example: Configuring ARP Classification
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Router(config)# interface
gigabitethernet 0/4
Step 4
Example:
Router(config-if)# service-policy input
ARP
ICMP-based ACL
ICMP-based ACL Overview
The ICMP based ACL feature provides classification based on ICMP message type and message code to filter
the traffic. This feature forms part of ACL based QoS and is implemented for both IPv4 and IPv6. The matching
is done through match on access-group for ACL-based QoS, router ACLs for IPv4 and IPv6 ACLs, and port
ACLs for IPv4 ACLs. This feature is supported on Gigabit Ethernet interfaces and its bundle derivatives.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
519
Configuring QoS
Configuring IPv4 Port ACL for ICMP-based ACL
ICMP-based ACL (IPv6) is supported only on VLAN interface and not on Gigabit Ethernet port and
policy-map.
ICMP-based ACL (IPv4 and IPv6) uses router ACL slice when configured on the VLAN interface.
ICMP-based ACL (IPv4) uses port ACL slice when configured on Gigabit Ethernet port.
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config)# interface gigabitethernet
0/0
Step 5
ip access-group ip-access-list in
Example:
Router(config-if)# ip access-group 125
in
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
520
Configuring QoS
Configuring IPv4 Router ACL for ICMP-based ACL
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 715
Step 4
ip access-group ip-access-list in
Example:
Router(config-if)# ip access-group 125 in
Step 5
exit
Example:
Router(config-if)# exit
Step 6
Example:
Router(config)# interface gigabitethernet
0/0
Step 7
Example:
Router(config-if)# service instance 715
ethernet
Step 8
Step 9
encapsulation
bridge-domain bridge-domain-no
Example:
Router(config-if-srv)#
bridge-domain 715
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
521
Configuring QoS
Configuring ACL-based QoS for ICMP-based ACL
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# class-map match-all
icmpacl
Step 4
Example:
Router(config-cmap)# match access-group
name icmpacl
Step 5
exit
Example:
Router(config-cmap)# exit
Step 6
Example:
Router(config)# interface gigabitethernet
0/0
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
522
Configuring QoS
Configuring IPv6 Router ACL for ICMP-based ACL
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-ipv6-acl)# permit icmp any
any echo-reply
Step 5
exit
Example:
Router(config-ipv6-acl)# exit
Step 6
Example:
Router(config)# interface vlan 715
Step 7
Example:
Router(config-if)# ipv6 traffic-filter
icmpv6acl in
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
523
Configuring QoS
Policy for DHCP Control Packet
To display the ICMP-based ACL configuration on a gigabitethernet interface, use the show running interface
command as shown in the below example:
Router# show running interface gigabitethernet 0/0
Building configuration...
Current configuration : 173 bytes
!
interface GigabitEthernet0/0
no ip address
ip access-group 125 in
negotiation auto
service instance 715 ethernet
encapsulation dot1q 715
bridge-domain 715
!
end
To display the ICMP-based ACL configuration on a VLAN interface, use the show running interface
command as shown in the below example:
Router# show running interface VLAN715
Building configuration...
Current configuration : 108 bytes
!
interface Vlan715
no ip address
ip access-group 125 in
shutdown
ipv6 traffic-filter icmpv6acl in
end
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
524
Configuring QoS
Troubleshooting Tips
Troubleshooting Tips
The on-demand TCAM resource allocation may fail due to the unavailability of resources for the requested
operation. In such scenarios, use the following troubleshooting tips:
1 Run the show platform tcam detailed command to understand the current resource allocation.
2 Use this information to find the features that are allocated resources.
3 Unconfigure the features that are no longer required to free the resources.
Figure 33: Troubleshooting Feature Scalabitlity, on page 525 shows the troubleshooting feature scalability
procedure.
Figure 33: Troubleshooting Feature Scalabitlity
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
525
Configuring QoS
Troubleshooting Tips
The following TCAM commands are used for troubleshooting feature scalability.
Command
Purpose
Use the no form of the debug commands to disable TCAM error printing and TCAM info printing.
Danger
We suggest you do not use the debug commands without TAC supervision.
The following is a sample of the output from the show platform tcam summary command.
Router# show
Ingress
:
Pre-Ingress:
Egress
:
The following is a sample of the output from the show platform tcam detailed command.
Router# show platform tcam detailed
Ingress
: 2/8 slices, 512/2048 entries used
Pre-Ingress: 3/4 slices, 768/1024 entries used
Egress
: 0/4 slices, 0/512 entries used
Slice ID: 1
Stage: Pre-Ingress
Mode: Single
Entries used: 28/256
Slice allocated to: Layer-2 Classify and Assign Group
Slice ID: 4
Stage: Pre-Ingress
Mode: Double
Entries used: 10/128
Slice allocated to: L2CP
Slice ID: 2
Stage: Ingress
Mode: Double
Entries used: 29/128
Slice allocated to: L2 Post-Switch Processing Group
Slice ID: 3
Stage: Ingress
Mode: Single
Entries used: 13/256
Slice allocated to: CESoPSN-UDP, CEF, Layer-3 Control Protocols
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
526
Configuring QoS
Troubleshooting Tips
In the above scenario, you can free up the TCAM rules by unconfiguring the service-policy that is no longer
required or free up a slice by unconfiguring a feature that is no longer required.
Router(config-if-srv)# no service-policy input policy1
Router(config-if-srv)# end
Router#
Router# show platform tcam detailed
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
527
Configuring QoS
Troubleshooting Tips
Ingress
: 8/8 slices, 2048/2048 entries used
Pre-Ingress: 3/4 slices, 768/1024 entries used
Egress
: 0/4 slices, 0/512 entries used
Slice ID: 1
Stage: Pre-Ingress
Mode: Single
Entries used: 29/256
Slice allocated to: Layer-2 Classify and Assign Group
Slice ID: 4
Stage: Pre-Ingress
Mode: Double
Entries used: 11/128
Slice allocated to: L2CP
Slice ID: 2
Stage: Ingress
Mode: Double
Entries used: 27/128
Slice allocated to: L2 Post-Switch Processing Group
Slice ID: 6
Stage: Ingress
Mode: Single
Entries used: 250/256
Slice allocated to: Port ACLs
Slice ID: 5
Stage: Ingress
Mode: Single
Entries used: 500/512
Slice allocated to: Router ACLs
Slice ID: 7
Stage: Ingress
Mode: Double
Entries used: 10/128
Slice allocated to: OAM, Ethernet loopback, Y.1731 DMM
Slice ID: 3
Stage: Ingress
Mode: Double
Entries used: 15/128
Slice allocated to: CESoPSN-UDP, CEF, Layer-3 Control Protocols
Slice ID: 8
Stage: Ingress
Mode: Double
Entries used: 195/256
[after unconfiguring policy1]
Slice allocated to: Quality Of Service
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
528
Configuring QoS
Additional References
Stage: Ingress
Mode: Single
Entries used: 500/512
Slice allocated to: Router ACLs
Slice ID: 7
Stage: Ingress
Mode: Double
Entries used: 10/128
Slice allocated to: OAM, Ethernet loopback, Y.1731 DMM
Slice ID: 3
Stage: Ingress
Mode: Double
Entries used: 15/128
Slice allocated to: CESoPSN-UDP, CEF, Layer-3 Control Protocols
Slice ID: 8
Stage: Ingress
Mode: Double
Entries used: 220/256 [after configuring policy2]
Slice allocated to: Quality Of Service
Additional References
The following sections provide references related to configuring QoS.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
529
Configuring QoS
Feature Information for Configuring QoS
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
Table 30: Feature Information for Configuring QoS, on page 530 lists only the software release that
introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent
releases of that software release train also support that feature.
Table 30: Feature Information for Configuring QoS
Feature Name
Releases
Feature Information
ACL-based QoS
15.2(2)SNH1
15.2(2)SNI
Egress Policing
15.3(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
530
Configuring QoS
Feature Information for Configuring QoS
Feature Name
Releases
Feature Information
15.3(3)S
15.4(1)S
ACL-based QoS
15.4(2)S
15.5(1)S
ARP-based Classification
15.5(1)S
ICMP-based ACL
15.5(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
531
Configuring QoS
Feature Information for Configuring QoS
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
532
CHAPTER
25
Configuring MLPPP
The Multilink Point-to-Point (MLPPP) feature provides load balancing functionality over multiple WAN
links, while providing multivendor interoperability, packet fragmentation and proper sequencing, and load
calculation on both inbound and outbound traffic.
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
533
Configuring MLPPP
Prerequisites
Prerequisites
Cisco IOS Release 15.2(2)SNI or a later release that supports the Multiprotocol Label Switching (MPLS)
over MLPPP feature must be installed previously on the Cisco ASR 901 Series Aggregation Services
Router.
Cisco Express Forwarding (CEF) or distributed Cisco Express Forwarding (dCEF) should be enabled.
MPLS should enabled on PE and P routers.
Before enabling MPLS over MLPPP link, configure the following commands:
mpls label protocol ldp
mpls ip (configure this command over MLPPP link where IP address has been enabled)
Restrictions
TE-FRR/LFA FRR feature is not supported on the MLPPP interface.
Virtual Routing and Forwarding (VRF) configuration is not supported on the MLPPP interface.
You need to shut down and bring up the MLPP interface for the following conditions:
On the fly fragmentation enable or disable
On the fly changes to the fragment size
Link fragmentation interleave
Enabling multiclass
If the CPU command is modified when IS-IS is configured, you should remove and re-apply the
service-policy in MLPPP.
For MLPPP, you can use only up to 1500 maximum transmission unit (MTU) for control plane traffic
from the router. Traffic drop is observed while sending ICMP packets over 1500 MTU with Do not
Fragment (DF) bits.
For data-plane traffic, the MTU configuration has no impact. Though you can configure Multilink
Maximum Received Reconstructed Unit (MRRU) to any value, it does not serve any purpose to configure
it above 1536, as MTU is hardcoded to 1536.
For MPLS backbone, you can use only up to 1492 MTU with DF bit set, which results in 1492 MTU
and 2 MPLS headers with DF. ICMP traffic drop is observed for anything beyond this.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
534
Configuring MLPPP
Distributed Multilink Point-to-Point Protocol Offload
Multiclass MLPPP
The Cisco ASR 901 implementation of dMLPPP also supports Multiclass MLPPP. Multiclass MLPPP is an
extension to MLPPP functionality that allows you to divide traffic passing over a multilink bundle into several
independently sequenced streams or classes. Each multiclass MLPPP class has a unique sequence number,
and the receiving network peer processes each stream independently. The multiclass MLPPP standard is
defined in RFC 2686.
The Cisco ASR 901 supports the following multiclass MLPPP classes:
Class 0- Data traffic that is subject to normal MLPPP fragmentation. Appropriate for non-delay-sensitive
traffic.
Class 1- Data traffic that can be interleaved but not fragmented. Appropriate for delay-sensitive traffic
such as voice.
You can use the QoS configuration to classify the LLQ traffic inorder to prioritize the Class 1 traffic and
bandwidth queues for Class 0 traffic to guarantee bandwidth when multiclass multilink PPP (MCMP) is
enabled.
Note
By default, Multiclass MLPPP is enabled with two classes. Maximum number of classes supported is also
two.
Note
The Cisco ASR 901 does not support some PPP and MLPPP options when the bundle is offloaded to the
network processor; you can retain these options by disabling MLPPP and IPHC offloading for a given
bundle. For more information, see MLPPP Offload, on page 545.
Note
The output for the show ppp multilink command for an offloaded MLPPP bundle differs from the output
for a non-offloaded bundle.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
535
Configuring MLPPP
MPLS over MLPPP
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
536
Configuring MLPPP
Configuring MLPPP Backhaul
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
537
Configuring MLPPP
Configuring the Card Type, E1 and T1 Controllers
Note
In the following procedure, press the Return key after each step unless otherwise noted. At any time, you
can exit the privileged level and return to the user level by entering disable at the Router# prompt.
The Cisco ASR 901 router can support up to 16 E1/T1 connections through the multilink interface, ranging
from 16 bundles of one E1/T1 each to a single bundle containing 16 E1/T1 bundles.
Complete the following tasks to configure a multilink backhaul interface.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
multilink5
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
538
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Command or Action
Purpose
address IP address.
Example:
Step 5
Router(config-if)# ip address
10.10.10.2 255.255.255.0
exit
Example:
Router(config-if)# exit
Configuring MRRU
You should configure the local maximum received reconstructed unit (MRRU) of the multilink bundle to a
value greater than or equal to 1508 bytes(or equal to the maximum packet length expected on the bundle at
any point in time). The maximum MTU supported on the Cisco ASR 901 router is 1536, and MTU drops
occur when the packet length is more than 1536.
Complete the following steps to configure MRRU:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface multilink
multilink-bundle-number
Example:
Router(config)# interface
multilink 1
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
539
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Step 5
Command or Action
Purpose
exit
Example:
Router(config)# exit
Note
The recommended PFC and ACFC handling in the Cisco ASR 901 router is: acfc local request, acfc remote
apply, pfc local request, and pfc remote apply.
Configuring PFC
Complete the following steps to configure PFC handling during PPP negotiation:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface multilink
group-number
Example:
Router(config)# interface
multilink5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
540
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Command or Action
Step 4
Purpose
ppp pfc local {request | forbid} Configures how the router handles PFC in its outbound
configuration requests, use the ppp pfc local command. The
syntax is as follows:
Example:
Router(config-if)# ppp pfc
local request
Step 5
ppp pfc remote {apply | reject Specifies how the router manages the PFC option in
configuration requests received from a remote peer. The syntax
| ignore}
is as follows:
Example:
Router(config-if)# ppp pfc
remote apply
Step 6
exit
Example:
Router(config)# exit
Configuring ACFC
Complete the following steps to configure ACFC handling during PPP negotiation:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
541
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
interface multilink group-number Creates a multilink bundle and enter the interface configuration
mode:
Example:
Router(config)# interface
multilink 5
Step 4
ppp acfc local {request | forbid} Specifies how the router handles ACFC in outbound
configuration requests. The syntax is as follows:
Example:
Router(config-if)# ppp acfc
local request
Step 5
ppp acfc remote {apply | reject | Specifies how the router handles the ACFC option in
configuration requests received from a remote peer. The syntax
ignore}
is as follows:
Example:
Router(config-if)# ppp acfc
remote apply
Step 6
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
542
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Note
If you modify parameters for an MLPPP bundle while it is active, the changes do not take effect until the
Cisco ASR 901 renegotiates the bundle connection.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface multilink
group-number
Example:
1 keepalive
2 ppp multilink group group-number
Router(config-if)#
interface multilink 5
keepalive [period[retries]]
Example:
Router(config-if)#
keepalive 1 5
Step 5
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
543
Configuring MLPPP
Configuring a Multilink Backhaul Interface
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config-if)# interface
serial 0/5:5
Step 4
encapsulation ppp
Example:
Router(config-if)# encapsulation
ppp
Step 5
ppp multilink
Example:
Router(config-if)# ppp multilink
Step 6
Example:
Router(config-if)# ppp multilink
group 5
Step 7
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
544
Configuring MLPPP
Configuring MPLS over the MLPPP on a Serial Interface
MLPPP Offload
By default, the Cisco ASR 901 router offloads processing for distributed MLPPP (dMLPPP) to the network
processor for improved performance. However, the Cisco ASR 901 does not support some dMLPPP settings
on offloaded bundles. The Cisco ASR 901 does not support the following options on offloaded dMLPPP
bundles:
ppp multilink idle-link
ppp multilink queue depth
ppp multilink fragment maximum
ppp multilink slippage
ppp timeout multilink lost-fragment
Note
If you have a bundle that requires the use of these options, contact Cisco support for assistance.
Note
For more information about configuring MLPPP, see the Dial Configuration Guide, Cisco IOS Release
15.0S .
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
545
Configuring MLPPP
Configuring MPLS over the MLPPP on a Serial Interface
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config-if)# interface
Serial0/0:0
no ip address
Example:
Router(config-if)# no ip address
Step 5
encapsulation encapsulation-type
Example:
encapsulation-typeEncapsulation type.
Router(config-if)# encapsulation
ppp
Step 6
ppp multilink
Example:
Router(config-if)# ppp multilink
Step 7
Example:
Router(config-if)# ppp multilink
group 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
546
group-numberMultilink-group number (a
non-zero number).
Configuring MLPPP
Configuring MPLS over MLPPP for OSPF
Step 8
Command or Action
Purpose
exit
Example:
Router(config)#
exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Router(config-if)# ip address
11.11.11.2 255.255.255.0
Example:
Router(config-if)# ip ospf 10
area 0
Step 6
ip-addressIP address.
Example:
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
547
Configuring MLPPP
Configuring MPLS over MLPPP for OSPF
Command or Action
Purpose
null No authentication is used. Useful for
overriding password or message-digest
authentication if configured for an area.
Example:
Router(config-if)# ip ospf
authentication null
Step 7
mpls ip
Example:
Router(config-if)# mpls ip
Step 8
no keepalive
Example:
Router(config-if)# no keepalive
Step 9
Example:
Router(config-if)# ppp pfc local
request
Step 10
Example:
Router(config-if)# ppp pfc remote
apply
Step 11
ppp multilink
Example:
Router(config-if)# ppp multilink
Step 12
Example:
Step 13
Example:
Router(config-if)# ppp multilink
endpoint string 22
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
548
char-stringCharacter string.
Configuring MLPPP
Configuration Examples for MPLS over MLPPP
Step 14
Command or Action
Purpose
exit
Example:
Router(config)#
Step 15
exit
router ospf process-id [vrf vrf-name] Configures an OSPF routing process and enters the
router configuration mode.
Example:
Step 16
Example:
Router(config-router)# network
6.6.6.6 0.0.0.0 area 2
Step 17
exit
Example:
Router(config-router)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
549
Configuring MLPPP
Verifying MPLS over MLPPP Configuration
no keepalive
ppp pfc local request
ppp pfc remote apply
ppp multilink
ppp multilink group 2
ppp multilink endpoint string 22
router ospf 1234
network 6.6.6.6 0.0.0.0 area 2
network 11.11.11.0 0.0.0.255 area 0
network 12.12.12.0 0.0.0.255 area 2
The following example shows a sample configuration of MPLS over MLPPP for a Serial Interface.
Building configuration...
Current configuration : 101 bytes
!
interface Serial0/0:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 2
The following example shows a sample configuration of MCMP enabled in MLPPP with classification based
on DSCP
Configuring the class-map to match on priority queue (DSCP EF). When Priority percent is
configured, it expedites the Class 1 traffic.
class-map match-any DSCP_EF
match ip dscp ef
policy-map BCP_MLPPP
class DSCP_EF
priority percent 10
class class-default
bandwidth percent 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
550
Configuring MLPPP
Additional References
'l' - Label switched with FEC change, 'd' - see DDMAP for return code,
'X' - unknown return code, 'x' - return code 0
Type escape sequence to abort.
0 11.11.11.1 MRU 1500 [Labels: implicit-null Exp: 0]
! 1 11.11.11.2 4 ms
Additional References
The following sections provide references related to MLPPP feature.
Related Documents
Related Topic
Document Title
http://www.cisco.com/en/US/docs/ios/12_2/dial/
configuration/guide/dafppp.html Configuring
Media-Independent PPP and Multilink PPP
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
551
Configuring MLPPP
Feature Information for MLPPP
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
Table 31: Feature Information for MLPPP, on page 552 lists only the software release that introduced
support for a given feature in a given software release train. Unless noted otherwise, subsequent releases
of that software release train also support that feature.
Table 31: Feature Information for MLPPP
Feature Name
Releases
Feature Information
15.2(2)SNI
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
552
CHAPTER
26
Understanding OBFL
OBFL provides a mechanism to store hardware, software, and environment related critical data in a non-volatile
memory, such as flash EPROM or EEPROM on routers. The logging information is used by the TAC team
to troubleshoot and fix hardware issues.
OBFL collects data like temperatures and voltages. It stores the data in a dedicated area of the flash memory
of the router. This data is retrieved by TAC personnel to troubleshoot routers. It can also be analyzed by
back-end software to detect failure patterns, and possibly to recommend specific quality improvements.
Retrieval of the OBFL message
If the hardware is defective and the system cannot boot up, any data in flash is inaccessible. In that case, use
any one of the following methods to recover OBFL data:
Read the flash through JTAG: this requires provisions in hardware design and back-end hardware and
software support tools.
Repair the system; boot it; use the OBFL CLI commands.
Recording OBFL Messages
Data is recorded in any of the following formats:
Continuous information that displays a snapshot of measurements.
Samples in a continuous file, and summary information about the data being collected.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
553
Configuring OBFL
Use the following commands to configure and verify OBFL:
Command
Router(conf)#
Purpose
hw-module
logging onboard
Router(conf)#
hw-module
module 0
logging
onboard
Router> show logging onboard {slot|module}
{slotnumber/subslotnumber|modulenumber}
[status]
Router(conf)#
Example 2
Router # show logging onboard temperature ?
continuous Onboard logging continuous information
detail Onboard logging detailed information
end ending time and date
raw Onboard logging raw information
start starting time and date
status Onboard logging status information
summary Onboard logging summary information
Router# show logging onboard temperature continuous
-------------------------------------------------------------------------------TEMPERATURE CONTINUOUS INFORMATION
-------------------------------------------------------------------------------Sensor | ID |
-------------------------------------------------------------------------------System 1
-------------------------------------------Time Stamp |Sensor Temperature 0C
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
554
MM/DD/YYYY HH:MM:SS | 1
-------------------------------------------03/01/2000 00:06:02 37
03/01/2000 00:16:02 37
03/01/2000 00:05:57 36
Router# show logging onboard voltage continuous
-----------------------------------------------------------------------------------------------------------------VOLTAGE CONTINUOUS INFORMATION
-----------------------------------------------------------------------------------------------------------------Sensor | ID |
-----------------------------------------------------------------------------------------------------------------12.00VA 0
1.50V 1
1.25V 2
12.00VB 3
2.50V 4
1.05V 5
1.20V 6
1.80V 7
-----------------------------------------------------------------------------------------------------------------Time Stamp |Sensor Voltage
MM/DD/YYYY HH:MM:SS | 12.00VA 1.50V 1.25V 12.00VB 2.50V 1.05V 1.20V
1.80V
-----------------------------------------------------------------------------------------------------------------02/24/2000 21:41:58 11.764 1.176 1.176 7.843 2.352 0.784 1.176
1.568
02/24/2000 21:46:00 11.764 1.176 1.176 7.843 2.352 0.784 1.176
1.568
02/25/2000 14:29:53 11.764 1.176 1.176 7.843 2.352 0.784 1.176
1.568
02/25/2000 14:33:54 11.764 1.176 1.176 7.843 2.352 0.784 1.176
1.568
Router# sh logging onboard clilog summary
-------------------------------------------------------------------------------CLI LOGGING SUMMARY INFORMATION
-------------------------------------------------------------------------------COUNT COMMAND
-------------------------------------------------------------------------------1 clear logging onboard
2 hw-module module 0 logging onboard message level 1
1 hw-module module 0 logging onboard message level 2
5 hw-module module 0 logging onboard message level 3
2 no hw-module module 0 logging onboard message level
5 show logging onboard
2 show logging onboard clilog
2 show logging onboard clilog continuous
1 show logging onboard clilog summary
2 show logging onboard continuous
1 show logging onboard environment
9 show logging onboard message
9 show logging onboard message continuous
1 show logging onboard message summary
3 show logging onboard status
1 show logging onboard temperature
1 show logging onboard voltage
1 test logging onboard error 3
1 test logging onboard error1 3
1 test logging onboard try 1
--------------------------------------------------------------------------------
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
555
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
556
CHAPTER
27
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
557
Text Authentication
HSRP and VRRP ignore unauthenticated protocol messages. The default authentication type is text
authentication. HSRP or VRRP authentication protects against false hello packets causing a denial-of-service
attack. For example, suppose Router A has a priority of 120 and is the active router. If a host sends spoof
hello packets with a priority of 130, then Router A stops being the active router. If Router A has authentication
configured such that the spoof hello packets are ignored, Router A remains the active router. Packets are
rejected in any of the following cases:
The authentication schemes differ on the router and in the incoming packets.
Text authentication strings differ on the router and in the incoming packets.
Preemption
Preemption occurs when a virtual router backup with a higher priority takes over another virtual router backup
that was elected to become a virtual router master, and a preemptive scheme is enabled automatically. When
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
558
a newly reloaded router becomes active, despite an active router already existent on the network, it may appear
that preemption is not functioning but that is not true. The newly active router did not receive any hello packets
from the current active router, and the preemption configuration was not factored into the new routers decision
making.
In general, we recommend that all HSRP routers have the following configuration:
standby delay minimum 30 reload 60
The standby delay minimum reload interface configuration command delays HSRP groups from initializing
for the specified time after the interface comes up.
This command is different from the standby preempt delay interface configuration command, which enables
HSRP preemption delay. You can disable the preemptive scheme by using the no vrrp preempt command.
If preemption is disabled, the virtual router backup that is elected to become virtual router master remains the
master until the original virtual router master recovers and becomes the master again.
Configuring HSRP
Complete the following steps to configure HSRP:
Restrictions
HSRP is supported only on IPv4 devices and not on IPv6 devices.
HSRP is supported only on layer 3 SVI interfaces. The configuration is not supported on Gigabit Ethernet
or Fast Ethernet interfaces.
Bidirectional Forwarding Detection (BFD) protocol is not supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
559
Step 4
Command or Action
Purpose
Example:
Router(config-if)# ip address
10.0.0.1 255.255.255.0
Step 5
standby [group-number] timers [msec] hellotime Configures the interval at which packets are
sent to refresh the MAC cache when HSRP
[msec] holdtime
is running.
Example:
Router(config-if)# standby 1 timers 14
Step 6
Example:
Router(config-if)# standby 1 preempt
delay minimum 380
Step 7
Example:
Router(config-if)# standby 1 priority 110
Step 8
Example:
Router(config-if)# standby 1
authentication text authentication 1
Step 9
Example:
Router(config-if)# standby 1
track 100 decrement 20
Step 10
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
560
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
561
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
562
Note
HSRP version 2 is not available for ATM interfaces running LAN emulation.
HSRP version 2 does not interoperate with HSRP version 1. An interface cannot operate both version
1 and version 2 because both versions are mutually exclusive. However, the different versions can
be run on different physical interfaces of the same device. You cannot change from version 2 to
version 1 if you have configured groups above the group number range allowed for version 1 (0 to
255).
HSRP version 2 is supported only on IPv4 devices and not on IPv6 devices.
HSRP version 2 configuration is supported only on layer 3 SVI interfaces. The configuration is not
supported on Gigabit Ethernet or Fast Ethernet interfaces.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
Example:
Device(config)# interface vlan 350
Step 4
standby version {1 | 2}
Example:
Device(config-if)# standby version 2
Step 5
Example:
Device(config-if)# standby 350 priority
100
Step 6
Configures preemption.
Example:
Router(config-if)# standby 350 preempt
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
563
Step 7
Command or Action
Purpose
Configures timers.
Example:
Router(config-if)# standby 350 timers 515
Step 8
Step 9
end
Example:
Device(config-if)# end
Step 10
show standby
Example:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
564
Configuring VRRP
Complete the following steps to configure VRRP:
Restrictions
VRRP is supported only on IPv4 devices and not IPv6 devices.
VRRP is supported only on gigabyte etherchannel interfaces of the Layer 3 SVI.
Bidirectional Forwarding Detection (BFD) protocol is not supported.
MD5 authentication is not supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Vlan10
Step 4
Example:
Router(config-if)# ip address
10.10.10.25 255.255.255.0
Step 5
vrrp [group-number] timers advertise [msec] Configures the interval at which packets are
sent to refresh the MAC cache when VRRP
is running
Example:
Router(config-if)# vrrp 2 timers advertise
2
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
565
Step 7
Command or Action
Purpose
Example:
Router(config-if)# vrrp 2 priority 200
Step 8
Step 9
Example:
Router(config-if)# vrrp 2 track 1
decrement 20
Step 10
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
566
Router(config-if)# end
Where to Go Next
For additional information on configuring HSRP and VRRP, see the documentation listed in the Additional
References section.
Additional References
The following sections provide references related to LLDP feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
567
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
568
Note
Table 32: Feature Information for HSRP and VRRP, on page 569 lists only the software release that
introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent
releases of that software release train also support that feature.
Table 32: Feature Information for HSRP and VRRP
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
569
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
570
CHAPTER
28
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
571
Overview of LLDP
It is an optional element of a protocol stack in the 802 LAN station. LLDP uses the logical link control (LLC)
services to transmit and receive information to and from other LLDP agents. LLC provides a Link Service
Access Point (LSAP) for access to LLDP. Each LLDP frame is transmitted as a single MAC service request.
Each incoming LLDP frame is received at the MAC Service Access Point (MSAP) by the LLC entity as a
MAC service indication.
The LLDP protocol operates through the LLDP agent. The tasks of the LLDP agent are to:
Collect information from the LLDP local system MIB and transmit it periodically.
Receive LLDP frames from neighbors and populate LLDP remote devices MIBs.
LLDP supports a set of attributes used to find the neighbor devices. These attributes are type, length, and
value descriptions of devices, and are referred to as Type Length Value (TLV). LLDP supported devices use
TLVs to send and receive information from their neighbors. Details such as configuration information, device
capabilities, and device identity are also advertised using this protocol.
Configuring LLDP
Complete the following steps to configure LLDP on the Cisco ASR 901 platform:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
572
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# lldp run
Example:
Router(config)# lldp holdtime
100
Example:
Router(config)# lldp reinit 2
Step 4
Example:
Example:
Router(config-if)# lldp
tlv-select
system-description
end
Example:
Router(config-if)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
573
Verifying LLDP
To verify LLDP on the Cisco ASR 901 router, use the show command as shown in the following example.
Router# show lldp ?
entry
errors
interface
neighbors
traffic
|
<cr>
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
574
Where to go Next
For additional information on configuring Multihop BFD, see the documentation listed in the Additional
References section.
Additional References
The following sections provide references related to LLDP feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
575
RFCs
RFC
Title
Technical Assistance
Description
Link
Note
Table 33: Feature Information for LLDP, on page 577 lists only the software release that introduced support
for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that
software release train also support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
576
Feature Name
Releases
Feature Information
LLDP
12.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
577
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
578
CHAPTER
29
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
579
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
580
Step 3
Command or Action
Purpose
Example:
Router(config)# bfd-template
multi-hop mh-template1
Step 4
Router(bfd-config)# interval
min-tx 120 min-rx 100 multiplier 3
Step 5
Step 6
end
Example:
Router(bfd-config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
581
Command or Action
Step 3
Purpose
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
582
Where to Go Next
For additional information on configuring Multihop BFD, see the documentation listed in the Additional
References section.
Additional References
The following sections provide references related to LLDP feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
583
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
Technical Assistance
Description
Link
Note
Table 34: Feature Information for Multihop BFD, on page 585 lists only the software release that introduced
support for a given feature in a given software release train. Unless noted otherwise, subsequent releases
of that software release train also support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
584
Feature Name
Releases
Feature Information
Multihop BFD
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
585
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
586
CHAPTER
30
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
587
When running BERT, your system expects to receive the same pattern that it is transmitting. If traffic
is not being transmitted or received, create a back-to-back loopback BERT on the link or in the network,
and send out a predictable stream to ensure that you receive the same data that was transmitted.
To determine if the remote serial port returns the BERT pattern unchanged, you must manually enable
network loopback at the remote serial port while you configure a BERT pattern to use in the test at
specified time intervals on the local serial port.
Restrictions
BERT affects the functionality of any configured protocol on a controller on which it is initiated. The
configured protocol functionality is resumed after the BERT process is completed or successfully aborted.
BERT is not supported for channelized E1/T1 (per timeslot).
Feature Overview
The BERT feature is used to test the integrity of the physical layer. Using this feature, you can test cables and
diagnose signal problems in the field.
BERT generates a specific pattern on to the egress data stream of a E1/T1 controller and then analyzes the
ingress data stream for the same pattern. The bits that do not match the expected pattern are counted as bit
errors.
The bit error rate (BER) is determined by comparing the erroneous bits received with the total number of bits
received. You can display and analyze the total number of error bits transmitted and the total number of bits
received on the link. You can retrieve error statistics anytime during the BERT.
The ASR 901 router uses Pseudo-Random Binary Sequences (PRBSs) for the BERT. The following table
lists the PRBSs supported on the ASR 901 routers.
Table 35: BERT Pattern Supported in Cisco ASR 901 Routers
BERT Pattern
Description
0s
1s
2^11
2^15
2^20 QRSS
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
588
BERT Pattern
Description
Alt 0s and 1s
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller T1 0/5
Step 4
Router(config-controller)# bert
pattern 0s interval 30
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
589
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller T1 0/5
Step 4
Example:
Router(config-controller)# no bert
pattern
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
590
Configuration Examples
The following is a sample configuration of the BERT feature.
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#controller e1 0/9
Router(config-controller)#bert pattern 2^15 interval 1
Additional References
The following sections provide references related to bit error rate testing.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
591
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 36: Feature Information for Bit Error Rate Testing
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
592
CHAPTER
31
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
593
Feature Overview
Microwave links are often used in Ethernet access ring topologies and the bandwidth provided by the microwave
link depends on environmental factors like fog, rain, and snow, which can drastically affect the bandwidth.
This feature relies on the Ethernet CFM to assess the environmental conditions on either end of the microwave
link and automatically change the modulation to provide optimal bandwidth. The Ethernet CFM monitors the
microwave link bandwidth, and when a link degradation is detected, notifies the router to take action on the
degraded microwave link.
In IP/MPLS, the nodes are unaware of any changes to the bandwidth on the microwave link and the Gigabit
Ethernet connection to the nodes remain constant. To ensure optimal routing and traffic transport across the
access network, a mechanism has been implemented to notify the IP/MPLS access nodes of any ACM events
on the microwave links. This enables microwave radio transceivers, which support ACM, to report link
bandwidth information to an upstream Ethernet switch.
The vendor-specific message (VSM) in Y.1731 is used to notify Cisco routers of ACM events, and the
bandwidth available on the microwave link. Acting on this information, the node can change the Hierarchical
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
594
Quality of Service (H-QoS), adjust the Interior Gateway Protocol (IGP) metric of the link to the new capacity
or remove the degraded link.
H-QoS Policy Adjustment
H-QoS policy adjustment is the process of adjusting the egress H-QoS policy parameters on the IP/MPLS
access node connected to the microwave link. This modifies the parent shaper rate to match the current
bandwidth of the microwave link. It also adjusts the child class parameters to ensure correct priority and
bandwidth-guaranteed traffic.
If the available bandwidth is less than the total bandwidth required by Expedited Forwarding (EF) and Assured
Forwarding (AF) classes, the operator can choose to drop AF class traffic or remove the link from the service.
IGP Metric Adjustment
The IP/MPLS access node can adjust the IGP metric on the microwave link to align it with the available
bandwidth. This will trigger an IGP SPF recalculation, allowing the IGP to get the correct bandwidth for
routing traffic.
Link Removal
Link removal is the process of removing the microwave link from the IGP. This occurs when the bandwidth
loss breaches the threshold set by the operator. It sets off the resiliency mechanisms in the network, and the
degraded link is bypassed, resulting in minimal traffic loss. The degraded link is not brought administratively
down. When it is up, the microwave equipment can signal to the access node about its status and usability.
Benefits
The IP/MPLS access network adapts intelligently to the microwave capacity change by:
optimizing routing
controlling congestion
enabling loss protection.
Microwave ACM changes are signaled through a Y.1731 VSM to the IP/MPLS access node.
The IP/MPLS access node adapts the IGP metric of the link to the new capacity.
The IP/MPLS access node can change the H-QOS policy on the interface with the microwave system
allowing EF traffic to survive.
The IP/MPLS access node can remove a degraded link from SPF triggering a loss protection.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
595
Note
For a ring topology, you should configure CFM between the microwave ODU and the router. You must
configure two VLANs to the two microwave ODUs, to process the vendor specific message (VSM) and
trigger the Embedded Event Manager (EEM).
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-ether-cfm)#
service microwave1 evc V60 vlan
60 direction down
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
596
Step 5
Command or Action
Purpose
continuity-check
Example:
Router(config-ecfm-srv)#
continuity-check
Step 6
exit
Example:
Router(config-ecfm-srv)# exit
Step 7
Example:
Router(config)# ethernet evc V60
Step 8
exit
Example:
Router(config-evc)# exit
Step 9
Example:
Router(config)# interface
GigabitEthernet0/11
Step 10
Example:
Router(config-if)# service
instance 60 ethernet 60
Step 11
Router(config-if)# encapsulation
dot1q 60
Step 12
rewrite ingress tag pop 1 symmetric Specifies the encapsulation adjustment to be performed
on a frame ingressing a service instance.
Example:
Router(config-if)# rewrite
ingress tag pop 1 symmetric
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
597
Command or Action
Purpose
ingress pops a tag, the egress pushes a tag and if the
ingress pushes a tag, the egress pops a tag.
Step 13
bridge-domain bridge-domain-id
Example:
Router(config-if)# bridge-domain
60
Step 14
exit
Example:
Router(config-if)# exit
Note
The EEM script configures the metric on the microwave link and adjusts the QoS policy based on the
Ethernet event parameters. You can download the scripts from the following location:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
598
Step 3
Command or Action
Purpose
Example:
Step 4
Step 5
Step 6
Step 7
action action-id cli command cli-string Specifies the action of executing a Cisco IOS CLI when
an EEM applet is triggered.
Example:
Router(config-applet)# action 458
cli command
"event manager applet ACM61"
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
599
Command or Action
Purpose
cli-stringCLI string to be executed. If the string
contains embedded blanks, enclose it in double
quotation marks.
Step 8
action action-id cli command cli-string Specifies the action of executing a Cisco IOS CLI command
when an EEM applet is triggered.
Example:
Router(config-applet)# action 460
cli command
"event tag event_sd ethernet
microwave sd interface
GigabitEthernet0/10 threshold
$nb"
Step 9
exit
Example:
Router(config-applet)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
600
Step 3
Command or Action
Purpose
Example:
Router(config)# interface vlan
40
Step 4
ethernet event microwave hold-off Configures the settings of the Ethernet microwave event.
seconds
hold-offSpecifies the microwave bandwidth
degradation hold-off time, in seconds. This time is
Example:
used to prevent changes in the state of the network
node as a result of signal degradation (SD)
Router(config-if)# ethernet
event microwave hold-off 30
occurrences.
secondsHold off time, in seconds. The valid values
range from 0 to 600, with a default value of 0.
Step 5
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
601
To display microwave bandwidth statistics of an interface, use the following show command.
Router# show ethernet event microwave statistic [interface]
Microwave Bandwidth Statistics for GigabitEthernet0/0/2
Total VSM Receive Count : 145
Total VSM Drop Count : 0
Number of transitions into Degraded state : 2
Note
You should have one SVI/BD per physical link. Also, one EEM script is required per physical link. In all,
there should be two EEM scripts and two SVI/BDs:
! ACM script
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
602
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
603
action 272
if $_regexp_result eq 1
action 274
add $pri_bw $bw_demand
action 276
multiply $bw_demand 100
action 278
divide $_result $cb_bps
action 279
if $_remainder gt 0
action 280
increment _result
action 281
end
action 282
set match1 "priority percent $_result"
action 283
set match2 "priority percent $_result"
action 284
end
action 286
regexp "bandwidth percent (.*)" $line match
action 288
if $_regexp_result eq 1
action 290
set match1 "$match"
action 292
set match2 "bandwidth percent 1"
action 294
end
action 296
else
action 298
set match1 "$var"
action 300
set match2 "$var"
action 302
end
action 304
append cfg_out1 "$match1 \n"
action 306
append cfg_out2 "$match2 \n"
action 308 end
! Check if there is enough bandwidth on a uwave link
action 310 syslog msg "310: cpmap_bw sum: $cpmap_bw"
action 312 if $cpmap_bw lt $cb_bps
action 314
set cfg_out "$cfg_out1"
action 316 elseif $pri_bw lt $cb_bps
action 318
set cfg_out "$cfg_out2"
action 320 else
action 322
set metric 1000000
action 323
set ifcfg 0
action 324 end
! Configuration of a child QoS policy
action 325 if $ifcfg eq 1
action 326
foreach var "$cfg_out" "\n"
action 328
cli command "$var"
action 330
end
action 331 end
! Configuration of a parent QoS policy
action 332 cli command "policy-map $s1$pmap"
action 334 syslog msg "config 334: policy-map $s1$pmap"
action 336 cli command "class class-default"
action 338 cli command "shape average $cb_bps"
action 340 cli command "service-policy $s1$cpmap"
! Apply the QoS policy on a PHY interface
action 344 cli command "int $_ethernet_intf_name"
action 346 cli command "no service-policy output $pmap"
action 348 cli command "service-policy output $s1$pmap"
action 390 end
! End of the QoS part
! IGP metric block
action 400 if $_eem_mode ge 1
action 402 multiply $n $cb
action 404 divide $_result $nb
action 406 syslog msg "406: cb: $cb nb: $nb result: $_result"
action 408 set m $_result
action 410 syslog msg "m: $m"
action 412 increment n
action 414 subtract $n $m
action 416 multiply $_result $olc
action 418 if $ifcfg eq 0
action 420
set dlc $metric
action 422 else
action 424
set dlc $_result
action 426 end
action 428 syslog msg "428: n:$n m:$m olc:$olc dlc:$dlc result:$_result intf: $ifname"
# action 430 cli command "enable"
# action 432 cli command "conf t"
action 434 cli command "int $ifname"
action 436 cli command "do show run int $ifname"
action 438 string first "ip router isis" "$_cli_result"
action 440 if $_string_result ne "-1"
action 442
cli command "isis metric $dlc"
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
604
action 444
cli command "do show ip ospf int | i $ifname"
action 446
string first "$ifname" "$_cli_result"
action 448 elseif $_string_result ne "-1"
action 450
cli command "ip ospf cost $dlc"
action 452 end
action 454 end
! Adjust the current applet
action 456 syslog msg "The EEM script executed"
action 458 cli command "event manager applet ACM62"
action 460 cli command "event tag event_sd ethernet microwave sd interface
GigabitEthernet0/100/5 threshold $nb"
action 462 if $ppmap eq 0
action 464 if $_eem_mode le 1
action 466
cli command "action 116 set ppmap $pmap"
action 468 end
action 470 end
! End of the script
Additional References
The following sections provide references related to Microwave ACM Signaling and EEM Integration feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
605
MIBs
MIB
MIBs Link
IMA-MIB
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
606
Table 37: Feature Information for Microwave ACM Signaling and EEM Integration
Feature Name
Releases
Feature Information
15.3(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
607
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
608
CHAPTER
32
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
609
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Prerequisites for IPv6 Support on the Cisco ASR 901 Router
about the features documented in this module, and to see a list of the releases in which each feature is supported,
see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on Cisco.com is not
required.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
610
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Information About IPv6 Support on the Cisco ASR 901 Router
Overview of IPv6
IPv6 is the latest version of the Internet Protocol that has a much larger address space and improvements such
as a simplified main header and extension headers. The architecture of IPv6 has been designed to allow existing
IPv4 users to transition easily to IPv6 while providing services such as end-to-end security, quality of service
(QoS), and globally unique addresses.
The larger IPv6 address space allows networks to scale and provide global reachability. The simplified IPv6
packet header format handles packets more efficiently. IPv6 supports widely deployed routing protocols such
as Routing Information Protocol (RIP), Integrated Intermediate System-to-Intermediate System (IS-IS), Open
Shortest Path First (OSPF) for IPv6, and multiprotocol Border Gateway Protocol (BGP). Other available
features include stateless autoconfiguration and enhanced support for Mobile IPv6.
IPv6 is being introduced on the Cisco ASR 901 router to support Long Term Evolution (LTE) rollouts that
provides high-bandwidth data connection for mobile wireless devices. The IPv6 transport utilizes Switch
Virtual Interface (SVI) and Ethernet interfaces. The Cisco ASR 901 router also supports IPv6 addressing on
Loopback interfaces.
It is common for IPv6 addresses to contain successive hexadecimal fields of zeros. To make IPv6 addresses
less complicated, two colons (::) may be used to compress successive hexadecimal fields of zeros at the
beginning, middle, or end of an IPv6 address (the colons represent successive hexadecimal fields of zeros).
Table 38: Compressed IPv6 Address Formats , on page 612 lists compressed IPv6 address formats.
A double colon may be used as part of the ipv6-address argument when consecutive 16-bit values are denoted
as zero. You can configure multiple IPv6 addresses per interface, but only one link-local address.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
611
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
IPv6 Addressing and Discovery
Note
Two colons (::) can be used only once in an IPv6 address to represent the longest successive hexadecimal
fields of zeros. The hexadecimal letters in IPv6 addresses are not case-sensitive.
Table 38: Compressed IPv6 Address Formats
Preferred Format
Compressed Format
Unicast
2001:0:0:0:DB8:800:200C:417A
2001::DB8:800:200C:417A
Loopback
0:0:0:0:0:0:0:1
::1
Unspecified
0:0:0:0:0:0:0:0
::
The loopback address listed in Table 38: Compressed IPv6 Address Formats , on page 612 are used by a node
to send an IPv6 packet to itself. The loopback address in IPv6 functions the same as the loopback address in
IPv4 (127.0.0.1).
Note
The IPv6 loopback address cannot be assigned to a physical interface. A packet that has the IPv6 loopback
address as its source or destination address must remain within the node that created the packet. IPv6
routers do not forward packets that have the IPv6 loopback address as their source or destination address.
The unspecified address listed in Table 38: Compressed IPv6 Address Formats , on page 612 indicates the
absence of an IPv6 address. For example, a newly initialized node on an IPv6 network may use the unspecified
address as the source address in its packets until it receives its IPv6 address.
Note
The IPv6 unspecified address cannot be assigned to an interface. The unspecified IPv6 addresses must
not be used as destination addresses in IPv6 packets or the IPv6 routing header.
An IPv6 address prefix, in the format ipv6-prefix/prefix-length, can be used to represent bit-wise contiguous
blocks of the entire address space. The ipv6-prefix must be in the form documented in RFC 2373 where the
address is specified in hexadecimal using 16-bit values between colons. The prefix length is a decimal value
that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network
portion of the address). For example, 2001:DB8:8086:6502::/32 is a valid IPv6 prefix.
For more information on IPv6 Addressing and Basic Connectivity, see the Implementing IPv6 Addressing
and Basic Connectivity chapter of IPv6 Configuration Guide, at the following location:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-addrg-bsc-con.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
612
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
IPv6 Addressing and Discovery
Static Configuration
Static configuration is the manual process of defining an explicit path between two networking devices. The
administrator of the network manually enters the IPv6 addresses, subnet masks, gateways, and corresponding
MAC addresses for each interface of each router into a table. Static configuration provides more control over
the network but it requires more work to maintain the table. The table must be updated every time routes are
added or changed. Moreover, the static routes must be manually reconfigured if there is a change in the network
topology.
Static configuration provides security and resource efficiency. It uses less bandwidth than dynamic routing
protocols and no CPU cycles are used to calculate and communicate routes. Static routes created by the static
configuration can be redistributed into dynamic routing protocols. However, routes generated by dynamic
routing protocols cannot be redistributed into the static routing table.
Static configuration is useful for smaller networks with only one path to an outside network and in providing
security for a larger network for certain types of traffic or links to other networks that need more control. In
general, most networks use dynamic routing protocols to communicate between networking devices but may
have one or two static routes configured for special cases.
Stateless Autoconfiguration
All interfaces on IPv6 nodes must have a link-local address, which is usually automatically configured from
the identifier for an interface and the link-local prefix FE80::/10. A link-local address enables a node to
communicate with other nodes on the link and can be used to further configure the node.
Nodes can connect to a network and automatically generate global IPv6 addresses without the need for manual
configuration or help of a Dynamic Host Configuration Protocol (DHCP) server.
With IPv6, a router on the link advertises in RA messages any global prefixes, and its willingness to function
as a default router for the link. RA messages are sent periodically and in response to router solicitation
messages, which are sent by hosts at system startup.
A node on the link can automatically configure global IPv6 addresses by appending its interface identifier
(64 bits) to the prefixes (64 bits) included in the RA messages. The resulting 128-bit IPv6 addresses configured
by the node are then subjected to duplicate address detection (DAD) to ensure their uniqueness on the link.
If the prefixes advertised in the RA messages are globally unique, then the IPv6 addresses configured by the
node are also globally unique. Router solicitation messages, which have a value of 133 in the Type field of
the ICMP packet header, are sent by hosts at system startup so that the host can immediately autoconfigure
without needing to wait for the next scheduled RA message.
For more information on IPv6 Addressing and Discovery, see the Implementing IPv6 Addressing and Basic
Connectivity chapter of IPv6 Configuration Guide, at the following location:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-addrg-bsc-con.html
ICMPv6
Internet Control Message Protocol (ICMP) in IPv6 functions the same as ICMP in IPv4. ICMP generates error
messages such as ICMP destination unreachable messages, and informational messages such as ICMP echo
request and reply messages. Additionally, ICMP packets in IPv6 are used in the IPv6 neighbor discovery
process, path MTU discovery, and the Multicast Listener Discovery (MLD) protocol for IPv6.
For more information on ICMPv6, see the Implementing IPv6 Addressing and Basic Connectivity chapter of
IPv6 Configuration Guide, at the following location:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
613
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
IPv6 Addressing and Discovery
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-addrg-bsc-con.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
614
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Routing Protocols
Routing Protocols
The Cisco ASR 901 router supports widely deployed routing protocols such as IS-IS, OSPFv3, and multiprotocol
BGP.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
615
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
QoS for IPv6
Note
Queuing, shaping, scheduling and LLQ is not supported on the ingress path for the Ethernet interfaces.
Policing is not supported on the egress path for GigabitEthernet interfaces.
The QoS implementation for IPv6 environment in the Cisco ASR router is the same as that of IPv4. For more
information on Configuring QoS on the Cisco ASR 901 router, refer the following link:
http://www.cisco.com/en/US/docs/wireless/asr_901/Configuration/Guide/qos.html
For additional information on Implementing QoS for IPv6, refer the following link: http://www.cisco.com/
en/US/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-qos.html
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan
40
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
616
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring a Static IPv6 Route
Step 4
Command or Action
Purpose
ipv6 address
ipv6-address/prefix-length {eui-64 |
link-local | anycast }
Example:
Router(config-if)# ipv6 address
2001:DB8:FFFF::2/64
ipv6 enable
Example:
Router(config-if)# ipv6 enable
Step 6
exit
Example:
Router(config-if)# exit
Step 7
ipv6 unicast-routing
Example:
Router(config)# ipv6
unicast-routing
Step 8
ipv6 cef
Example:
Router(config)# ipv6 cef
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
617
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring a Static IPv6 Route
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface-typeInterface type.
interface-numberInterface number.
administrative-distance(Optional) An administrative
distance. The default value is 1, which gives static routes
precedence over any other type of route except connected
routes.
administrative-multicast-distance(Optional) The distance
used when selecting this route for multicast Reverse Path
Forwarding (RPF).
unicast(Optional) Specifies a route that must not be used
in multicast RPF selection.
multicast(Optional) Specifies a route that must not be
populated in the unicast Routing Information Base (RIB).
tag(Optional) Tag value that is used as a match value
for controlling redistribution via route maps.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
618
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Enabling Stateless Auto-Configuration
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# Interface
fastethernet 0/0
Step 4
Note
For information on how to create a VLAN interface, see the Configuring Ethernet Virtual Connections
document at the following location: http://www.cisco.com/en/US/partner/docs/wireless/asr_901/
Configuration/Guide/swevc.html
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
619
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Implementing IPv6 Addressing on Loopback Interfaces
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# Interface vlan
40
Step 4
Example:
Router(config-if)# ipv6 enable
or
Example:
Router(config-if)# ipv6 address
2000::1/64
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
620
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring ICMPv6 Rate Limiting
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# Interface
loopback 0
Step 4
Example:
Router(config-if)# ipv6 enable
or
Example:
Router(config-if)# ipv6 address
2000::1/64
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
621
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring IPv6 Duplicate Address Detection
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ipv6 icmp
error-interval 1200
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# Interface Vlan 40
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
622
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring IPv6 Neighbor Discovery
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# Interface
fastEthernet 0/0
Step 4
Router(config-if)# ipv6 nd
autoconfig
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
623
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring IPv6 and IPv4 Dual-Stack on the Same VLAN
Command or Action
Purpose
reachable-timeSets the advertised reachability time.
router-preferenceSets the default router preference
value.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
fastEthernet 0/0
Step 4
Example:
Router(config)# ip address
192.168.99.1 255.255.255.0
Step 5
ipv6 address
{ipv6-address/prefix-length |
prefix-name sub-bits/prefix-length}
Example:
Router(config)# ipv6 address
2000::1/64
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
624
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring OSPFv3 for IPv6
Command or Action
Purpose
the prefix (the network portion of the address). A
slash mark must precede the decimal value.
prefix-nameA general prefix, which specifies the
leading bits of the network to be configured on the
interface.
sub-bitsThe subprefix bits and host bits of the
address to be concatenated with the prefixes
provided by the general prefix specified with the
prefix-name argument.
Step 6
ipv6 enable
Example:
Router(config)# ipv6 enable
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
fastEthernet 0/0
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
625
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring IS-IS for IPv6
Command or Action
Purpose
administratively when enabling the OSPFv3 routing
process.
area-idArea that is to be associated with the
OSPFv3 interface.
instance-id(Optional) Instance identifier.
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Enables IS-IS for the specified IS-IS routing process, and enters
router configuration mode.
area-tagName for a routing process.
Step 4
net network-entity-title
Example:
Router(config-router)# net
49.0001.0000.0000.000c.00
Step 5
exit
Example:
Router(config-router)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
626
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring Multiprotocol-BGP for IPv6
Step 6
Command or Action
Purpose
Example:
Router(config)# interface
fastEthernet 0/0
Step 7
ipv6 address
{ipv6-address/prefix-length |
prefix-name
sub-bits/prefix-length}
Example:
Router(config-if)# ipv6
address 2001:DB8::3/64
Step 8
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
627
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring BFD for IPv6
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
Example:
Router(config-router)# no bgp
default ipv4-unicast
Step 5
Example:
Router(config-router)# bgp
router-id 192.168.99.70
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
628
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring BFD for IPv6
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ipv6 route static
bfd vlan 4000 2001::1
interface-typeInterface type.
interface-numberSVI name.
ipv6-addressIPv6 address of the neighbor.
unassociated(Optional) Moves a static BFD
neighbor from associated mode to unassociated
mode.
Procedure
Command or Action
Purpose
Step 1 enable
Example:
Router> enable
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
629
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring BFD for IPv6
Command or Action
Purpose
interface-typeInterface type.
Example:
interface-numberSVI name.
interface-typeInterface type.
interface-numberSVI name.
nexthop-vrf(Optional) Indicator that the next hop is a
VRF.
vrf-name1(Optional) Name of the next-hop VRF.
default(Optional) Indicator that the next hop is the
default.
administrative-distance(Optional) An administrative
distance. The default value is 1, which gives static routes
precedence over any other type of route except connected
routes.
administrative-multicast-distance(Optional) The distance
used when selecting this route for multicast Reverse Path
Forwarding (RPF).
unicast(Optional) Specifies a route that must not be used
in multicast RPF selection.
multicast(Optional) Specifies a route that must not be
populated in the unicast Routing Information Base (RIB).
next-hop-address(Optional) Address of the next hop that
can be used to reach the specified network.
tag tag(Optional) Tag value that is used as a match
value for controlling redistribution via route maps.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
630
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring BFDv6 and OSPFv3
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
bfd all-interfaces
Example:
Router(config-rtr)# bfd
all-interfaces
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
631
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuring BFDv6 for BGP
Step 5
Command or Action
Purpose
end
Example:
Router(config-rtr)# end
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
Step 5
Example:
Router(config-router)# neighbor
10.0.0.1 fall-over bfd
exit
Example:
Router(config-router)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
632
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Implementing QoS for IPv6
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
This section describes how to use the show commands to verify the configuration and operation of the IPv6
Support feature on the Cisco ASR 901 router, and it contains the following topics:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
633
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
634
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
635
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
FF02::1:FF00:4
FF02::1:FF89:4831
MTU is 1500 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is enabled, number of DAD attempts: 1
ND reachable time is 30000 milliseconds (using 30000)
ND advertised reachable time is 0 (unspecified)
ND advertised retransmit interval is 0 (unspecified)
ND router advertisements are sent every 200 seconds
ND router advertisements live for 1800 seconds
ND advertised default router preference is Medium
Hosts use stateless autoconfig for addresses.
Loopback0 is up, line protocol is up
IPv6 is enabled, link-local address is FE80::4255:39FF:FE89:4831
No Virtual link-local address(es):
Global unicast address(es):
FE01:4::4, subnet is FE01:4::/64
Joined group address(es):
FF02::1
FF02::2
FF02::5
FF02::1:FF00:4
FF02::1:FF89:4831
MTU is 1514 bytes
ICMP error messages limited to one every 100 milliseconds
ICMP redirects are enabled
ICMP unreachables are sent
ND DAD is not supported
ND reachable time is 30000 milliseconds (using 30000)
ND RAs are suppressed (periodic)
Hosts use stateless autoconfig for addresses.
To verify the ICMPv6 statistics, use the show ipv6 traffic command in privileged EXEC mode, as shown in
the example.
Router# show ipv6 traffic
IPv6 statistics:
Rcvd: 8 total, 0 local destination
0 source-routed, 0 truncated
0 format errors, 0 hop count exceeded
0 bad header, 0 unknown option, 0 bad source
0 unknown protocol, 0 not a router
0 fragments, 0 total reassembled
0 reassembly timeouts, 0 reassembly failures
Sent: 870 generated, 0 forwarded
0 fragmented into 0 fragments, 0 failed
0 encapsulation failed, 0 no route, 0 too big
0 RPF drops, 0 RPF suppressed drops
Mcast: 8 received, 855 sent
ICMP statistics:
Rcvd: 8 input, 0 checksum errors, 0 too short
0 unknown info type, 0 unknown error type
unreach: 0 routing, 0 admin, 0 neighbor, 0 address, 0 port
0 sa policy, 0 reject route
parameter: 0 error, 0 header, 0 option
0 hopcount expired, 0 reassembly timeout,0 too big
0 echo request, 0 echo reply
0 group query, 0 group report, 0 group reduce
0 router solicit, 0 router advert, 0 redirects
0 neighbor solicit, 0 neighbor advert
Sent: 129 output, 0 rate-limited
unreach: 0 routing, 0 admin, 0 neighbor, 0 address, 0 port
0 sa policy, 0 reject route
parameter: 0 error, 0 header, 0 option
0 hopcount expired, 0 reassembly timeout,0 too big
0 echo request, 0 echo reply
0 group query, 0 group report, 0 group reduce
0 router solicit, 50 router advert, 0 redirects
8 neighbor solicit, 8 neighbor advert
UDP statistics:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
636
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
637
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
2001:300::2
2001:10::2
FE80::200:1FF:FE97:41FE
FE80::21E:4AFF:FE97:5BB
FE80::21E:4AFF:FE97:5BB
FE80::21E:4AFF:FE97:5BB
FE80::21E:4AFF:FE97:5BB
2001:170::2
2001:180::2
2001:190::2
0
0
0
0
0
0
0
0
0
0
72
0
65
25
0
0
0
0
0
0
001e.4a97.05bb
001e.4a97.05bb
0000.0197.41fe
001e.4a97.05bb
001e.4a97.05bb
001e.4a97.05bb
001e.4a97.05bb
001e.4a97.05bb
001e.4a97.05bb
001e.4a97.05bb
STALE
REACH
STALE
STALE
REACH
REACH
STALE
REACH
REACH
REACH
Vl300
Vl10
Vl90
Vl101
Vl10
Vl170
Vl160
Vl170
Vl180
Vl190
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
638
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
639
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
640
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
Used as bestpath:
Used as multipath:
n/a
3
n/a
0
Outbound
Inbound
Local Policy Denied Prefixes:
-------------AS_PATH loop:
n/a
4
Invalid Path:
2
n/a
Total:
2
4
Number of NLRIs in the update sent: max 7, min 0
Last detected as dynamic slow peer: never
Dynamic slow peer recovered: never
Refresh Epoch: 2
Last Sent Refresh Start-of-rib: never
Last Sent Refresh End-of-rib: never
Last Received Refresh Start-of-rib: 01:09:48
Last Received Refresh End-of-rib: 01:09:48
Refresh-In took 0 seconds
Sent
Rcvd
Refresh activity:
------Refresh Start-of-RIB
0
1
Refresh End-of-RIB
0
1
Address tracking is disabled
Connections established 1; dropped 0
Last reset never
Transport(tcp) path-mtu-discovery is enabled
Graceful-Restart is disabled
Connection state is ESTAB, I/O status: 1, unread input bytes: 0
Connection is ECN Disabled
Mininum incoming TTL 0, Outgoing TTL 1
Local host: 2001:101::1, Local port: 57438
Foreign host: 2001:101::2, Foreign port: 179
Connection tableid (VRF): 0
Enqueued packets for retransmit: 0, input: 0 mis-ordered: 0 (0 bytes)
Event Timers (current time is 0x4853F8):
Timer
Starts
Wakeups
Next
Retrans
83
0
0x0
TimeWait
0
0
0x0
AckHold
83
81
0x0
SendWnd
0
0
0x0
KeepAlive
0
0
0x0
GiveUp
0
0
0x0
PmtuAger
10940
10939
0x485427
DeadWait
0
0
0x0
Linger
0
0
0x0
iss: 338855921 snduna: 338858128 sndnxt: 338858128
sndwnd: 15636
irs: 816933509 rcvnxt: 816935775 rcvwnd:
15571 delrcvwnd:
813
SRTT: 300 ms, RTTO: 303 ms, RTV: 3 ms, KRTT: 0 ms
minRTT: 0 ms, maxRTT: 300 ms, ACK hold: 200 ms
Status Flags: none
Option Flags: higher precendence, nagle, path mtu capable
Datagrams (max data segment is 1440 bytes):
Rcvd: 163 (out of order: 0), with data: 86, total data bytes: 2265
Sent: 167 (retransmit: 0 fastretransmit: 0),with data: 167, total data bytes: 8894
LD/RD
6/5
7/6
2/1
RH/RS
Up
Up
Up
State
Up
Up
Up
Int
Vl101
Vl103
Vl150
LD/RD
16/14
12/11
3/2
RH/RS
Up
Up
Up
State
Up
Up
Up
Int
Vl10
Vl101
Vl103
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
641
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Verifying the Configuration of IPv6 Support on the Cisco ASR 901 Router
2001:170::2
2001:180::2
2001:190::2
FE80::21E:4AFF:FE97:5BB
CE1-2009#
8/7
11/10
4/3
13/12
Up
Up
Up
Up
Up
Up
Up
Up
Vl170
Vl180
Vl190
Vl160
Int
Vl101
Vl103
Vl150
Int
Vl10
Vl101
Vl103
Vl170
Vl180
Vl190
Vl160
LD/RD
6/5
7/6
2/1
RH/RS
Up
Up
Up
State
Up
Up
Up
Int
Vl101
Vl103
Vl150
LD/RD
16/14
RH/RS
Up
State
Up
Int
Vl10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
642
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Configuration Examples for IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
2001:101::2
2001:103::2
2001:170::2
2001:180::2
2001:190::2
FE80::21E:4AFF:FE97:5BB
CE1-2009#
12/11
3/2
8/7
11/10
4/3
13/12
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Up
Vl101
Vl103
Vl170
Vl180
Vl190
Vl160
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
643
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Example: Configuring IPv6 Duplicate Address Detection
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
644
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Example: Configuring IPv6 Static Routing
Router-2
interface Loopback555
no ip address
ipv6 address 22::22/64
ipv6 address 555::554/64
ipv6 enable
ipv6 ospf 1 area 0
Router-2
!
interface Loopback30303
no ip address
ipv6 address 4444::4443/64
ipv6 enable
ipv6 ospf 1 area 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
645
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Example: Configuring BFD and OSPFv3 for IPv6
!
ipv6 router ospf 1
router-id 3.3.3.3
area 0 range 4444::/48
!
The following is a sample configuration of bidirectional forwarding detection support for OSPFv3 on all
interfaces:
ipv6 router ospf 1
router-id 1.1.1.1
bfd all-interfaces
interface vlan 4000
ipv6 add 2001::2/64
ipv6 ospf 1 area 0
bfd interval 50 min_rx 50 multiplier 3
Router-2
!
interface Loopback30303
no ip address
ipv6 address 454::454/96
ipv6 address 4444::4443/64
ipv6 enable
ipv6 router isis alpha
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
646
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Example: Configuring Multiprotocol-BGP for IPv6
Router-2
-------ipv6 unicast-routing
ipv6 cef
interface FastEthernet0/0
no ip address
duplex auto
speed auto
ipv6 address 2010:AB8:0:2::/64 eui-64
ipv6 enable
!
router bgp 2
bgp router-id 2.2.2.2
no bgp default ipv4-unicast
bgp log-neighbor-changes
neighbor 2010:AB8:0:2:C600:10FF:FE58:0 remote-as 1
!
address-family ipv6
neighbor 2010:AB8:0:2:C600:10FF:FE58:0 activate
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
647
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Example: Configuring BFD and Multiprotocol-BGP for IPv6
exit-address-family
!i
Router-2
interface Vlan10
ipv6 address 2001:10::2/64
bfd interval 250 min_rx 250 multiplier 3
router bgp 6500
bgp router-id 10.10.10.10
bgp log-neighbor-changes
no bgp default ipv4-unicast
neighbor 2001:10::1 remote-as 5500
neighbor 2001:10::1 fall-over bfd
address-family ipv6
redistribute connected
neighbor 2001:10::1 activate
exit-address-family
Troubleshooting Tips
Problems can occur in the IPv6 functionality due to misconfigurations. To enable IPv6 functionality, you
should enable IPv6 configurations at several places.
Some of the sample troubleshooting scenarios are provided below:
Problem
Solution
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
648
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Where to Go Next
Problem
Solution
The following debug and show commands allows you to troubleshoot the IPv6 configuration.
Debug Commands
Show Commands
debug ipv6
show ipv6
debug ipv6 nd
Where to Go Next
For additional information on IPv6 Support on the Cisco ASR 901 Cisco ASR 901S router, see the
documentation listed in the Additional References section.
Additional References
The following sections provide references related to LLDP feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
649
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Additional References
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
650
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Technical Assistance
Description
Link
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Table 39: Feature Information for IPv6 Support on the Cisco ASR 901 Router , on page 651 lists the release
history for this feature.
Table 39: Feature Information for IPv6 Support on the Cisco ASR 901 Router , on page 651 lists the features
in this module and provides links to specific configuration information.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco
Feature Navigator enables you to determine which software images support a specific software release, feature
set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn . An account on
Cisco.com is not required.
Note
Table 39: Feature Information for IPv6 Support on the Cisco ASR 901 Router , on page 651 lists only the
software release that introduced support for a given feature in a given software release train. Unless noted
otherwise, subsequent releases of that software release train also support that feature.
Table 39: Feature Information for IPv6 Support on the Cisco ASR 901 Router
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
651
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Feature Name
Releases
Feature Information
ICMPv6
15.2(2)SNG
15.2(2)SNG
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
652
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Feature Name
Releases
Feature Information
15.2(2)SNG
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
653
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
654
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
655
IPv6 Support on the Cisco ASR 901 Cisco ASR 901S Router
Feature Information for IPv6 Support on the Cisco ASR 901 Router
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
656
CHAPTER
33
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
657
The TDM over Labeled BGP feature is supported effective with Cisco IOS Release 15.3(3)S. The
configuration and restrictions for this feature are the same as that of Labeled BGP Support.
To configure Labeled BGP Support feature on the Cisco ASR 901 router, perform the steps given below:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
658
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-router)# address family
ipv4
Step 5
neighbor peer-group-name
send-community
Example:
Router(config-router)# neighbor
172.16.70.23 send-community
Step 6
neighborpeer-group-name
peer-group-name
Example:
Router(config-router)# neighbor
172.16.70.23 send-label
Step 7
neighborpeer-group-nameactivate
Example:
Router(config-router)# neighbor
172.16.70.23 activate
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
659
Next Hop
In label/Out label
0.0.0.0
imp-null/nolabel
0.0.0.0
imp-null/nolabel
0.0.0.0
imp-null/nolabel
0.0.0.0
imp-null/nolabel
100.111.14.4
nolabel/558
100.111.14.3
nolabel/560
100.100.13.23/32 0.0.0.0
imp-null/nolabel
100.101.13.23/32 0.0.0.0
imp-null/nolabel
100.111.13.23/32 0.0.0.0
imp-null/nolabel
100.111.13.26/32 100.111.14.3
nolabel/534
100.111.14.4
nolabel/68
100.111.15.1/32 100.111.14.3
nolabel/25
Router# show ip bgp labels
Network
Next Hop
In label/Out label
1.0.0.0
0.0.0.0
imp-null/nolabel
10.13.22.2/31
0.0.0.0
imp-null/nolabel
10.13.23.0/31
0.0.0.0
imp-null/nolabel
10.70.1.0/30
0.0.0.0
imp-null/nolabel
100.100.10.1/32 100.111.14.4
nolabel/563
100.111.14.3
nolabel/556
100.100.13.23/32 0.0.0.0
imp-null/nolabel
100.101.13.23/32 0.0.0.0
imp-null/nolabel
100.111.13.23/32 0.0.0.0
imp-null/nolabel
100.111.13.26/32 100.111.14.4
nolabel/561
100.111.14.3
nolabel/559
100.111.15.1/32 100.111.14.4
nolabel/59
100.111.14.3
nolabel/57
100.111.15.2/32 100.111.14.4
nolabel/62
100.111.14.3
nolabel/52
100.112.1.1/32
100.111.14.4
nolabel/nolabel
100.111.14.3
nolabel/nolabel
100.112.1.2/32
100.111.14.4
nolabel/nolabel
100.111.14.3
nolabel/nolabel
100.112.1.3/32
100.111.14.4
nolabel/nolabel
100.111.14.3
nolabel/nolabel
Router# show ip bgp vpnv4 all label
Network
Next Hop
In label/Out label
Route Distinguisher: 236:236
154.154.236.4/30 100.154.1.1
nolabel/14002
100.154.1.1
nolabel/14002
154.154.236.8/30 100.154.1.1
nolabel/14002
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
660
100.154.1.1
nolabel/14002
154.154.236.12/30
100.154.1.1
nolabel/14002
100.154.1.1
nolabel/14002
154.154.236.16/30
100.154.1.1
nolabel/14002
100.154.1.1
nolabel/14002
154.154.236.20/30
100.154.1.1
nolabel/14002
100.154.1.1
nolabel/14002
154.154.236.24/30
100.154.1.1
nolabel/14002
100.154.1.1
nolabel/14002
Router# show ip vrf interface
Interface
IP-Address
VRF
Vl100
113.23.12.1
LTE12
Router# show ip bgp vpnv4 vrf LTE12 label
Network
Next Hop
In label/Out label
Route Distinguisher: 6666:6666 (LTE12)
113.22.12.0/24
100.111.13.22
nolabel/51
100.111.13.22
nolabel/51
113.23.12.0/24
0.0.0.0
50/nolabel(LTE12)
113.24.12.0/24
100.111.13.24
nolabel/32
100.111.13.24
nolabel/32
115.1.12.0/24
100.111.15.1
nolabel/16024
100.111.15.1
nolabel/16024
154.154.236.4/30 100.154.1.1
nolabel/14002
154.154.236.8/30 100.154.1.1
nolabel/14002
154.154.236.12/30
100.154.1.1
nolabel/14002
154.154.236.16/30
100.154.1.1
nolabel/14002
154.154.236.20/30
100.154.1.1
nolabel/14002
154.154.236.24/30
100.154.1.1
nolabel/14002
Protocol
To verify three Label Support, use the show ip cef vrf command as shown in the following example.
Router# show ip cef vrf LTE12 113.22.12.0 internal
113.22.12.0/24, epoch 0, flags rib defined all labels, RIB[B], refcount 5, per-destination
sharing
sources: RIB
feature space:
IPRM: 0x00018000
LFD: 113.22.12.0/24 0 local labels
contains path extension list
ifnums: (none)
path 13E8A064, path list 13F49DC8, share 1/1, type recursive, for IPv4, flags
must-be-labelled, recursive-via-host
MPLS short path extensions: MOI flags = 0x0 label 51
recursive via 100.111.13.22[IPv4:Default] label 51, fib 141253D8, 1 terminal fib,
v4:Default:100.111.13.22/32
path 12520C8C, path list 13F49C38, share 1/1, type attached nexthop, for IPv4
MPLS short path extensions: MOI flags = 0x0 label 17
nexthop 100.111.14.4 Vlan10 label 17, adjacency IP adj out of Vlan10, addr 10.13.23.1
13734C80
output chain: label 22 label 51 label 17 TAG adj out of Vlan10, addr 10.13.23.1 143EDCA0
!You can see three labels in the output chain; of which 22 is VRF label, 51 is BGP label
!and 17 is LDP label
Additional References
The following sections provide references related to Labeled BGP Support feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
661
Related Documents
Related Topic
Document Title
BGP Commands
Configuring BGP
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
RFC-3107
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
662
Note
Table 40: Feature Information for Labeled BGP Support, on page 663 lists only the software release that
introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent
releases of that software release train also support that feature.
Table 40: Feature Information for Labeled BGP Support
Feature Name
Releases
Feature Information
15.2(2)SNG
15.3(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
663
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
664
CHAPTER
34
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
665
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
666
R2
R2-R6-R7-R3
Backup link
R2-R3
Protected link
R3
Tail-end of tunnel
R2-R3
Primary link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
667
BFD
BFD is a detection protocol designed to provide fast forwarding link failure detection times for all media
types, encapsulations, topologies, and routing protocols. In addition to fast forwarding link failure detection,
BFD provides a consistent failure detection method for network administrators. Because the network
administrator can use BFD to detect forwarding link failures at a uniform rate, rather than the variable rates
for different routing protocol Hello mechanisms, network profiling and planning is easier, and reconvergence
time is consistent and predictable.
Fast Reroute
Fast Reroute is a mechanism for protecting MPLS TE LSPs from link failures by locally repairing the LSPs
at the point of failure. This allows the data to continue to flow on them while their headend routers attempt
to establish new end-to-end LSPs to replace them. FRR locally repairs the protected LSPs by rerouting them
over backup tunnels that bypass failed links.
Link Protection
Backup tunnels that bypass only a single link of the LSPs path provide link protection. They protect LSPs if
a link along their path fails by rerouting the LSPs traffic to the next hop (bypassing the failed link). These
are referred to as next-hop (NHOP) backup tunnels because they terminate at the LSPs next hop beyond the
point of failure.
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
668
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 40
Step 4
Example:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
669
Step 3
Command or Action
Purpose
Example:
Router(config)# no l3-over-l2 flush
buffers
Step 4
asr901-platf-frr enable
Example:
Router(config)# asr901-platf-frr
enable
Step 5
mpls ldp discovery targeted-hello accept Configures the neighbors from which requests for
targeted hello messages may be honored.
Example:
Router(config)# mpls ldp discovery
targeted-hello accept
Step 6
pseudowire-class pw-class-name
Example:
Router(config)# pseudowire-class T41
Step 7
encapsulation encapsulation-type
Example:
Router(config-pw-class)#
encapsulation mpls
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
670
Step 9
Command or Action
Purpose
exit
Example:
Router(config-pw-class)# exit
Step 10
Step 11
mpls ldp igp sync holddown milli-seconds Specifies how long an Interior Gateway Protocol
(IGP) should wait for Label Distribution Protocol
(LDP) synchronization to be achieved.
Example:
Router(config)# mpls ldp igp sync
holddown 1000
Procedure
Step 1
Command or Action
Purpose
pw-class
Example:
Router> enable
Step 2
auto terminal
Example:
Router# configure terminal
Step 3
pseudowire-class pw-class-name
Example:
Router(config)# pseudowire-class
T41
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
671
Step 4
Command or Action
Purpose
no negotiation auto
Example:
Router(config-if)# no
negotiation auto
Step 5
Step 6
Step 7
rewrite ingress tag pop 1 symmetric Specifies the encapsulation adjustment to be performed on
a frame ingressing a service instance.
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
672
Procedure
Step 1
Command or Action
Purpose
mpls-ldp
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
router isis
Example:
Router(config)# router isis
Step 4
Router(config-router)# mpls
traffic-eng router-id Loopback102
Step 5
Step 6
router isis
Example:
Router(config)# router isis
Step 7
net net-1
Example:
Router(config)# net
49.0001.0000.0000.0001.00
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
673
Step 8
Command or Action
Purpose
is-type level-1
Example:
Router(config-router)# is-type
level-1
Step 9
Example:
Router(config-router)#
fast-reroute per-prefix level-1
all
Step 10
Example:
Router(config-router)#
fast-reroute per-prefix level-2
all
Step 11
Example:
Router(config-router)#
fast-reroute remote-lfa level-1
mpls-ldp
Step 12
Example:
Router(config-router)#
fast-reroute remote-lfa level-2
mpls-ldp
Step 13
bfd all-interfaces
Example:
Router(config-router)# bfd
all-interfaces
Step 14
Example:
Router(config-router)# mpls ldp
sync
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
674
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# mpls traffic-eng
auto-tunnel primary onehop
Step 4
Step 5
mpls traffic-eng auto-tunnel primary config Enables IP processing without an explicit address.
unnumbered interface
interfaceInterface on which IP processing
is enabled without an explicit address.
Example:
Step 6
mpls traffic-eng auto-tunnel primary timers Configures the period after a failure to remove
primary autotunnels.
removal rerouted sec
Example:
Router(config)# mpls traffic-eng
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
675
Command or Action
Purpose
auto-tunnel
primary timers removal rerouted 604800
Step 7
mpls traffic-eng auto-tunnel primary config Enables Label Distribution Protocol (LDP) on
primary autotunnels.
mpls ip
Example:
Router(config)# mpls traffic-eng
auto-tunnel
primary config mpls ip
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# mpls traffic-eng
auto-tunnel
backup
Step 4
Example:
Router(config)# mpls traffic-eng
auto-tunnel
backup nhop-only
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
676
Command or Action
Example:
Router(config)# mpls traffic-eng
auto-tunnel
backup tunnel-num min 3 max 400
Step 6
mpls traffic-eng auto-tunnel backup timers Configures how frequently a timer scans the backup
autotunnels and remove tunnels that are not being
removal unused sec
used.
Example:
Router(config)# mpls traffic-eng
auto-tunnel
primary timers removal rerouted 604800
Step 7
Purpose
mpls traffic-eng auto-tunnel backup config Configures a specific unnumbered interface for all
backup auto-tunnels.
unnumbered-interface interface
interfaceInterface for all backup
auto-tunnels. Default interface is Loopback0.
Example:
Router(config)# mpls traffic-eng
auto-tunnel
backup config unnumbered-interface
Loopback0
Note
For targeted mpls session, the head end tunnel should have mpls ip configuration.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
677
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# mpls ldp discovery
targeted-hello accept
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
678
Step 4
Command or Action
Purpose
Example:
Router(config-if)# ip rsvp signalling
hello bfd
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config-if)# ip rsvp signalling
hello bfd
What to Do Next
Verification Examples
Verifying MPLS TE-FRR Configuration
To verify the MPLS TE-FRR configuration, use the show commands given below:
show mpls traffic-eng tunnels brief
show ip rsvp sender detail
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
679
Note
Use the following command to verify whether the LSPs are protected by the appropriate backup tunnels.
Router# show ip rsvp sender detail
PATH:
Tun Dest:
10.10.0.6 Tun ID: 100 Ext Tun ID: 10.10.0.1
Tun Sender: 10.10.0.1 LSP ID: 31
Path refreshes:
arriving: from PHOP 10.10.7.1 on Et0/0 every 30000 msecs
Session Attr:
Setup Prio: 7, Holding Prio: 7
Flags: (0x7) Local Prot desired, Label Recording, SE Style
session Name: R1_t100
ERO: (incoming)
10.10.7.2 (Strict IPv4 Prefix, 8 bytes, /32)
10.10.0.6 (Strict IPv4 Prefix, 8 bytes, /32)
RRO:
10.10.7.1/32, Flags:0x0 (No Local Protection)
10.10.4.1/32, Flags:0x9 (Local Prot Avail/to NNHOP) !Available to NNHOP
10.10.1.1/32, Flags:0x0 (No Local Protection)
Traffic params - Rate: 10K bits/sec, Max. burst: 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size 4294967295 bytes
Fast-Reroute Backup info:
Inbound FRR: Not active
Outbound FRR: No backup tunnel selected
Path ID handle: 50000416.
Incoming policy: Accepted. Policy source(s): MPLS/TE
Status: Proxy-terminated
Use the following command to verify whether the LSPs are protected.
Router# show mpls traffic-eng fast-reroute database
Tunnel head end item frr information:
Protected Tunnel
In-label
intf/label
FRR intf/label
Tunne1l0
Tun
pos5/0:Untagged Tu0:12304
Prefix item frr information:
Prefix
Tunnel In-label
Out intf/label
FRR intf/label
10.0.0.11/32 Tu110
Tun hd
pos5/0:Untagged Tu0:12304
LSP midpoint frr information:
LSP identifier
In-label
Out intf/label
FRR intf/label
10.0.0.12 1 [459]
16
pos0/1:17
Tu2000:19
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
680
Status
ready
Status
ready
Status
ready
BW
BPS:Type
-------0:G
OK?
YES
YES
YES
YES
YES
YES
YES
YES
YES
YES
Backup
Tunnel:Label State Level
Type
------------- ------ ---------Tu1000:24
Ready any-unl Nhop
Method
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
NVRAM
Status
down
up
up
administratively
down
up
administratively
administratively
up
administratively
down
down
down
down
Protocol
down
up
up
down
down
up
down
down
up
down
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
681
GigabitEthernet4/2
Loopback0
Tunnel0
Tunnel65436
Ethernet0
Ethernet1
unassigned
10.0.3.1
10.0.3.1
10.0.3.1
10.3.38.3
unassigned
YES
YES
YES
YES
YES
YES
NVRAM
NVRAM
unset
unset
NVRAM
NVRAM
administratively down
up
up
up
up
administratively down
down
up
up
up
up
down
down
down
down
down
down
down
Protocol
down
up
up
down
down
up
down
down
up
down
down
up
up
up
up
up
down
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
682
Note
Use the following command to verify whether the LSPs are protected by the appropriate backup tunnels.
Router# show ip rsvp sender detail
PATH:
Tun Dest:
10.10.0.6 Tun ID: 100 Ext Tun ID: 10.10.0.1
Tun Sender: 10.10.0.1 LSP ID: 31
Path refreshes:
arriving: from PHOP 10.10.7.1 on Et0/0 every 30000 msecs
Session Attr:
Setup Prio: 7, Holding Prio: 7
Flags: (0x7) Local Prot desired, Label Recording, SE Style
session Name: R1_t100
ERO: (incoming)
10.10.7.2 (Strict IPv4 Prefix, 8 bytes, /32)
10.10.0.6 (Strict IPv4 Prefix, 8 bytes, /32)
RRO:
10.10.7.1/32, Flags:0x0 (No Local Protection)
10.10.4.1/32, Flags:0x9 (Local Prot Avail/to NNHOP) !Available to NNHOP
10.10.1.1/32, Flags:0x0 (No Local Protection)
Traffic params - Rate: 10K bits/sec, Max. burst: 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size 4294967295 bytes
Fast-Reroute Backup info:
Inbound FRR: Not active
Outbound FRR: No backup tunnel selected
Path ID handle: 50000416.
Incoming policy: Accepted. Policy source(s): MPLS/TE
Status: Proxy-terminated
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
683
Use the following command to verify whether the LSPs are protected:
Router# show mpls traffic-eng fast-reroute database
Tunnel head end item frr information:
Protected tunnel
In-label Out intf/label
FRR intf/label
Status
Tunnel500
Tun hd
AT4/0.100:Untagg Tu501:20
ready
Prefix item frr information:
Prefix
Tunnel
In-label Out intf/label
FRR intf/label Status
10.0.0.8/32
Tu500
18
AT4/0.100:Pop ta Tu501:20
ready
10.0.8.8/32
Tu500
19
AT4/0.100:Untagg Tu501:20
ready
10.8.9.0/24
Tu500
22
AT4/0.100:Untagg Tu501:20
ready
LSP midpoint item frr information:
LSP identifier
In-label Out
intf/label
FRR intf/label
Status
Use the following command to verify detailed RSVP-related receiver information currently in the database.
Router# show ip rsvp reservation detail
Reservation:
Tun Dest:
10.1.1.1 Tun ID: 1 Ext Tun ID: 10.1.1.1
Tun Sender: 10.1.1.1 LSP ID: 104
Next Hop: 10.1.1.2 on Gi1/0
Label: 18 (outgoing)
Reservation Style is Shared-Explicit, QoS Service is Controlled-Load
Average Bitrate is 0 bits/sec, Maximum Burst is 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size: 0 bytes
RRO:
10.1.1.1/32, Flags:0x1 (Local Prot Avail/to NHOP)
Label subobject: Flags 0x1, C-Type 1, Label 18
10.1.1.1/32, Flags:0x0 (Local Prot Avail/In Use/Has BW/to NHOP)
Label subobject: Flags 0x1, C-Type 1, Label 16
10.1.1.2/32, Flags:0x0 (No Local Protection)
Label subobject: Flags 0x1, C-Type 1, Label 0
Resv ID handle: CD000404.
Policy: Accepted. Policy source(s): MPLS/TE
Use this command to display hello status and statistics for FRR, reroute (hello state timer), and graceful restart.
Router# show ip rsvp hello
Hello:
RSVP Hello for Fast-Reroute/Reroute: Enabled
Statistics: Disabled
BFD for Fast-Reroute/Reroute: Enabled
RSVP Hello for Graceful Restart: Disabled
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
684
Gi9/47:
RSVP: Enabled
Interface State: Up
Bandwidth:
Curr allocated: 0 bits/sec
Max. allowed (total): 0 bits/sec
Max. allowed (per flow): 0 bits/sec
Max. allowed for LSP tunnels using sub-pools (pool 1): 0 bits/sec
Set aside by policy (total): 0 bits/sec
Signalling:
DSCP value used in RSVP msgs: 0x3F
Number of refresh intervals to enforce blockade state: 4
Authentication: disabled
Key chain: <none>
Type: md5
Window size: 1
Challenge: disabled
FRR Extension:
Backup Path: Configured (or "Not Configured")
BFD Extension:
State: Disabled
Interval: Not Configured
RSVP Hello Extension:
State: Disabled
Refresh Interval: FRR: 200 , Reroute: 2000
Missed Acks:
FRR: 4
, Reroute: 4
DSCP in HELLOs:
FRR: 0x30 , Reroute: 0x30
Use this command to display information about all MPLS traffic engineering link and node protected neighbors
that use the BFD protocol.
Router# show ip rsvp hello bfd nbr
Client Neighbor
I/F
State
FRR
10.0.0.6
Gi9/47 Up
LostCnt
0
LSPs
1
Use this command to display detailed information about all MPLS traffic engineering link and node protected
neighbors that use the BFD protocol:
Router# show ip rsvp hello bfd nbr detail
Hello Client Neighbors
Remote addr 10.0.0.6, Local addr 10.0.0.7
Type: Active
I/F: Gi9/47
State: Up (for 00:09:41)
Clients: FRR
LSPs protecting: 1 (frr: 1, hst upstream: 0 hst downstream: 0)
Communication with neighbor lost: 0
Use this command to display summarized information about all MPLS traffic engineering link and node
protected neighbors that use the BFD protocol.
Router# show ip rsvp hello bfd nbr summary
Client Neighbor
I/F
State LostCnt LSPs
FRR
10.0.0.6
Gi9/47 Up
0
1
Configuration Examples
This section provides sample configuration examples for IPv6 over MPLS: 6PE and 6VPE feature on the
Cisco ASR 901 Cisco ASR 901S router.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
685
http://www.cisco.com/en/US/docs/ios-xml/ios/mp_te_path_protect/configuration/xe-3s/mp-te-frr-node-prot.html
Additional References
The following sections provide references related to IPv6 Multicast feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Series Aggregation Services Router
Command Reference
Cisco ASR 901S Series Aggregation Services Router
Command Reference
Title
RFC 2710
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
686
MIBs
MIB
MIBs Link
None
Technical Assistance
Description
Link
Note
Table 41: Feature Information for MPLS Traffic Engineering - Fast Reroute Link Protection, on page
687 lists only the software release that introduced support for a given feature in a given software release
train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Table 41: Feature Information for MPLS Traffic Engineering - Fast Reroute Link Protection
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
687
Feature Name
Releases
Feature Information
15.2(2)SNG
15.3(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
688
CHAPTER
35
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
689
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
690
CE layer 2 control
protocol tunnel
(end-to-end).
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
691
Note
The configuration defined for LACP impacts all slow protocols, and is applicable to all the options like
peering, forwarding, and tunneling.
Protocol
Packet Type
Default Action
Configuration Option
CDP
Untagged
Peer
Peer/Forward/Tunnel
DTP
Untagged
Peer
Peer/Forward/Tunnel
LACP
Untagged
Peer
Peer/Forward/Tunnel
LLDP
Untagged
Peer
Peer/Forward/Tunnel
STP
Untagged
Peer
Peer/Forward/Tunnel
VTP
Untagged
Peer
Peer/Forward/Tunnel
CDP
Tagged
Drop
Forward/Tunnel
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
692
Protocol
Packet Type
Default Action
Configuration Option
DTP
Tagged
Drop
Forward/Tunnel
LACP
Tagged
Drop
Forward/Tunnel
LLDP
Tagged
Drop
Forward/Tunnel
STP
Tagged
Drop
Forward/Tunnel
VTP
Tagged
Drop
Forward/Tunnel
Note
If an EFP is configured with layer 2 peering, then L2CP packets coming on the EFP is sent to the
CPU for local protocol processing.
Layer2 protocol peering is not supported on port-xconnect.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/6
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
693
Step 5
Command or Action
Purpose
encapsulation encapsulation-type
Example:
Router(config-if-srv)#
encapsulation untagged
Step 6
Router(config-if-srv)# l2protocol
peer lacp
Note
Note
The layer 2 forwarding functionality is supported only on an untagged EFP (Only one untagged EFP
exists per interface).
Forwarding functionality is not supported with dot1q VLAN range encapsulation.
If an interface is configured with layer 2 protocol forwarding, then L2CP packets on the interface
are flooded on to the bridge domain. The flooding follows the translations specified in interface.
Any manipulation of EXP bit is not supported while sending Bridge Protocol Data Units (BPDU)
over xconnect.
L2CP forwarding is supported only on xconnect interfaces/EFPs created over
GigE/TenGig/Port-channel interfaces.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
694
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
Router(config-if)#
l2proto-forward tagged cdp
Step 5
Example:
Router(config-if)# service
instance 20 ethernet
Step 6
encapsulation untagged
Example:
Router(config-if-srv)#
encapsulation untagged
Step 7
Step 8
bridge-domain bridge-id
Example:
Router(config-if-srv)#
bridge-domain 200
Step 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
695
Command or Action
Purpose
Example:
Router(config-if-srv)# xconnect
1.1.1.1 100 encapsulation mpls
Note
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
696
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/4
Step 4
Step 5
encapsulation encapsulation-type
Example:
Router(config-if-srv)#
encapsulation untagged
Step 6
Step 7
bridge-domain bridge-id
Example:
Router(config-if-srv)#
bridge-domain 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
697
Encapsulation: untagged
Interface Dot1q Tunnel Ethertype: 0x8100
State: Up
EFP Statistics:
Pkts In
Bytes In
Pkts Out Bytes Out
0
0
0
0
EFP Microblocks:
****************
Microblock type: Bridge-domain
Bridge-domain: 99
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
698
Configuration Examples
This section provides sample configuration examples for Layer 2 Control Protocol Peering, Forwarding, and
Tunneling feature on the Cisco ASR 901 Cisco ASR 901S routers.
The following is a sample configuration of layer 2 protocol forwarding of tagged BPDUs at the port-channel
interface level.
Current configuration : 270 bytes
!
interface Port-channel1
no negotiation auto
l2proto-forward tagged cdp
service instance 9 ethernet
encapsulation untagged
bridge-domain 9
!
service instance 99 ethernet
encapsulation dot1q 99
rewrite ingress tag pop 1 symmetric
bridge-domain 99
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
699
Note
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
700
The following is a sample configuration of Layer 2 control protocol tunneling for tagged packets.
Note
The configuration given below applies to only one router. Similar configuration has to be applied on two
Cisco ASR 901 Cisco ASR 901S routers.
Building configuration...
Current configuration : 153 bytes
!
interface GigabitEthernet0/110/5
negotiation auto
service instance 10 ethernet
encapsulation dot1q 100
l2protocol tunnel
bridge-domain 50
!
!
interface GigabitEthernet0/1
negotiation auto
service instance 10 ethernet
encapsulation dot1q 100
bridge-domain 50
!
end
The following is a sample configuration of layer 2 protocol tunneling for receiving untagged LLDP packets
from customer nodes and tunneling them tagged over provider network.
Router 1
Building configuration...
Current configuration : 151 bytes
!
interface GigabitEthernet0/1
negotiation auto
service instance 10 ethernet
encapsulation untagged
l2protocol tunnel lldp
bridge-domain 20
!
!
interface GigabitEthernet0/70/5
negotiation auto
service instance 10 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 20
!
end
Router 2
Current configuration : 170 bytes
!
interface GigabitEthernet0/70/4
negotiation auto
service instance 20 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 30
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
701
!
!
interface GigabitEthernet0/60/3
negotiation auto
service instance 20 ethernet
encapsulation untagged
l2protocol tunnel lldp
bridge-domain 30
!
end
Additional References
The following sections provide references related to the Layer 2 Control Protocol Peering, Forwarding, and
Tunneling feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
702
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
Table 43: Feature Information for Layer 2 Control Protocol Peering, Forwarding, and Tunneling, on page
703 lists only the software release that introduced support for a given feature in a given software release
train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Table 43: Feature Information for Layer 2 Control Protocol Peering, Forwarding, and Tunneling
Feature Name
Releases
Feature Information
15.2(2)SNG
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
703
Feature Name
Releases
Feature Information
15.2(2)SNH1
15.4(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
704
CHAPTER
36
Prerequisites
Before testing any IMA implementation, you should terminate the T1 circuits end-to-end.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
705
Restrictions
The following features are not supported:
Native ATM interfaces
IP Routing
VPI or VCI rewrite
1:1 and N:1 (where N > 1) VCC or VPP mode
up and down traps
ATM class of service (CBR, VBR-RT, VBR-nRT, UBR+, and UBR) for VPCs and port-mode
Transmission of AIS on VCCs and VPCs to the customer-edge s, when the pseudowire goes down.
Enabling atm cell payload scrambling for T1
Disabling atm cell payload scrambling for E1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
706
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# card type e1 0 0
Step 4
Example:
Router(config)# controller E1 0/4
Step 5
ima-group ima-group-number
Example:
Router(config-controller)# ima-group
0
Step 6
exit
Example:
Router(config-controller)# exit
Step 7
interface ATMslot/IMAgroup-number
Example:
Router(config-if)# interface
ATM0/IMA0
Step 8
no ip address
Example:
Router(config-if)# no ip address
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
707
Step 9
Command or Action
Purpose
Example:
Router(config-if)# atm bandwidth
dynamic
Step 10
no atm ilmi-keepalive
Example:
Router(config-if)# no atm
ilmi-keepalive
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# card type e1 0 0
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
708
Step 5
Command or Action
Purpose
Example:
Router(config-controller)# clock source
internal
Step 6
ima-group group-number
Example:
Router(config-controller)# ima-group 0
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller E1 0/4
Step 4
interface ATMslot/IMAgroup-number
Example:
Router(config-controller)# interface
ATM0/IMA0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
709
Step 5
Command or Action
Purpose
no ip address
Example:
Router(config-if)# no ip address
Step 6
Example:
Router(config-if)# atm bandwidth
dynamic
Step 7
no atm ilmi-keepalive
Example:
Router(config-if)# no atm
ilmi-keepalive
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface atm0/ima0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
710
Command or Action
Purpose
IMAgroup-numberSpecifies the group
number of the IMA group.
Step 4
Example:
Router(config-if)# xconnect
10.10.10.10 20 encapsulation mpls
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface ATM0/IMA0
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
711
Step 5
Command or Action
Purpose
encapsulation encapsulation-type
Example:
Router(config-if-atm-l2trans-)#
encapsulation aal0
Step 6
Example:
Router(config-if-atm-l2trans-)#
xconnect 25.25.25.25 125
encapsulation mpls
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface ATM0/IMA0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
712
Step 4
Command or Action
Purpose
Example:
Router(config-if)# atm pvp 10
l2transport
Step 5
Example:
Router(config-if-atm-l2trans-pvp)#
xconnect 30.30.30.2 305 encapsulation
mpls
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface ATM0/IMA0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
713
Step 4
Command or Action
Purpose
VPI/VCI l2transport
Example:
Router(config-if)# 100/12 l2transport
Step 5
encapsulation encapsulation-type
Example:
Router(config-if-atm-l2trans-)#
encapsulation aal5
Step 6
Example:
Router(config-if-atm-l2trans-)#
xconnect 25.25.25.25 125 encapsulation
mpls
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
714
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface ATM1/IMA0
Step 4
Example:
Router(config-if)# 100/12
l2transport
Step 5
cbr rate
Example:
Router(config-if-atm-vc)# cbr 16000
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
715
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface
ATMslot/IMAgroup-number
Example:
Router(config)# interface
ATM1/IMA0
Step 4
Specifies the VPI and VCI of the PVC and configures the
PVC in layer 2 transport mode.
Example:
Step 5
ubr rate
Example:
Router(config-if-atm-vc)# ubr
16000
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
716
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Step 5
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
717
Step 3
Command or Action
Purpose
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface ATM1/IMA0
Step 4
Step 5
Example:
Router(config-if-atm-vc)# vbr-rt 600
300 37
Example:
Example:
Router(config-if-atm-vc)# vbr-nrt
600 300 37
Configuration Examples
This section provides sample configuration examples for IMA on the Cisco ASR 901 Cisco ASR 901S
Router:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
718
exit
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
719
1/200 l2transport
cbr 16000
!
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
720
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map policy-map-name
Example:
Router(config)# policy-map mark_qosgroup
Step 4
class class-name
Example:
Router(config-if)# class class-default
Step 5
Example:
Router(config-if)# set qos-group 2
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
721
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface atm0/ima0
Step 4
no ip address
Example:
Router(config-if)# no ip address
Step 5
no atm enable-ilmi-trap
Example:
Router(config-if)# no atm
enable-ilmi-trap
Step 6
Example:
Router(config-if)# pvc 100/100
l2transport
Step 7
encapsulation encapsulation-type
Example:
Router(config-if)# encapsulation aal0
Step 8
Example:
Router(config-if)# service-policy input
mark_qosgroup
Step 9
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
722
Step 10
Command or Action
Purpose
Example:
Router(config-if)# atm pvp 200
l2transport
Step 11
Example:
Router(config-if)# service-policy input
mark_qosgroup
Step 12
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ATMslot/IMAgroup-number
Example:
Router(config)# interface atm0/ima0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
723
Step 4
Command or Action
Purpose
no ip address
Example:
Router(config-if)# no ip address
Step 5
no atm enable-ilmi-trap
Example:
Router(config-if)# no atm
enable-ilmi-trap
Step 6
Example:
Router(config-if)# service-policy input
mark_qosgroup
Step 7
Example:
Router(config-if)# xconnect 25.25.25.25
125 encapsulation mpls
Creating a Table-map
To create a table map for mapping QoS group to MPLS experimental bit, complete the following steps:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
724
Step 3
Command or Action
Purpose
table-map table-name
Example:
Router(config)# table-map qos_exp_table
Step 4
Example:
Router(config-if)# map from 1 to 2
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map map-name
Example:
Router(config)# policy-map pmap_qos_exp
Step 4
class class-default
Example:
Router(config)# class class-default
Step 5
set mpls experimental topmost qos-group table Copies the MPLS EXP value in the incoming
table-map-name
MPLS traffic to the Qos group table.
Example:
Router(config-if)# set mpls experimental
topmost qos-group table qos_exp_table
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
725
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface interface-type
Example:
Router(config)# interface vlan10
Step 4
mtu bytes
Example:
Router(config-if)# mtu 9216
Step 5
Example:
Router(config-if)# ip address
9.0.54.9 255.255.255.0
Step 6
mpls ip
Example:
Router(config-if)# mpls ip
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
726
Additional References
The following sections provide references related to inverse multiplexing over ATM.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
IMA-MIB
RFCs
RFC
Title
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
727
Technical Assistance
Description
Link
Note
Table 44: Feature Information for Inverse Multiplexing over ATM, on page 728 lists only the software
release that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Table 44: Feature Information for Inverse Multiplexing over ATM
Feature Name
Releases
Feature Information
15.2(2)SNH1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
728
CHAPTER
37
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
729
Prerequisites
Cisco IOS Release 15.2(2)SNI or a later release that supports the IPv6 over MPLS: 6PE and 6VPE
feature must be installed previously on the Cisco ASR 901 Series Aggregation Services Router.
Multiprotocol Label Switching (MPLS) in provider backbone devices.
MPLS with Virtual Private Network (VPN) code in provider devices with VPN provider edge (PE)
devices.
Border Gateway Protocol (BGP) in all devices providing a VPN service.
Cisco Express Forwarding switching in every MPLS-enabled device.
Restrictions
The following restrictions are applicable for the IPv6 over MPLS: 6PE and 6VPE feature on the Cisco IOS
Release 15.2(2)SNI.
All the existing MPLS and IPv6 restrictions are applicable, as the base infrastructure of IPv6 and IPv4
MPLS remains the same.
6PE and 6VPE is supported only on the SVI interfaces.
The number of global VRFs supported is the same as that of IPv4, as both the IPv4 and IPv6 VPN
Routing and Forwarding (VRF) share the resources from the global VRF pool.
The number of IPv6 VRFs supported is restricted to 113, though the maximum number of configurable
VRFs are 127.
For the single label per prefix mode allocation, the 6PE and 6VPE scale is limited by the number of
labels available in the box (4000 labels).
Supports only static routes and BGP for IPv6 in VRF context.
Feature Overview
The IPv6 over MPLS: 6PE and 6VPE feature enables the service providers running an MPLS/IPv4 infrastructure
to offer IPv6 services without any major changes in the infrastructure. This feature offers the following options
to the service providers:
Connect to other IPv6 networks accessible across the MPLS core
Provide access to IPv6 services and resources that service provider provides
Provide IPv6 VPN services without going for complete overhaul of existing MPLS/IPv4 core
6PE and 6VPE uses the existing MPLS/IPv4 core infrastructure for IPv6 transport. It enables IPv6 sites to
communicate with each other over an MPLS/IPv4 core network using MPLS label switched paths (LSPs).
This feature relies heavily on multiprotocol Border Gateway Protocol (BGP) extensions in the IPv4 network
configuration on the provider edge (PE) router to exchange IPv6 reachability information (in addition to an
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
730
MPLS label) for each IPv6 address prefix. Edge routers are configured as dual-stack, running both IPv4 and
IPv6, and use the IPv4 mapped IPv6 address for IPv6 prefix reachability exchange.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
731
V6
6PE
PE equipment, connected
to CEs and entry points to
the MPLS clouds, running
a dual stack IPv6/IPv4
(IPv6 to communicate
with CEs)
V4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
732
MPLS forwarding Transports all traffic between all VPN community members across a VPN
service-provider network.
In the MPLS-VPN model a VPN is defined as a collection of sites sharing a common routing table. A customer
site is connected to the service provider network by one or more interfaces, where the service provider associates
each interface with a VPN routing tableknown as the VRF table.
The following figure illustrates an MPLS VPN network.
For more conceptual information on 6PE and 6VPE, see the IPv6 VPN over MPLS guide in the MPLS: Layer
3 VPNs Configuration Guide.
Supported Features
The following 6PE and 6VPE features are supported on the Cisco ASR 901 router effective with Cisco IOS
Release 15.2(2) SNI:
IPv6 VRF support Enabled for supporting 6VPE
MPLS VPN 6VPE and 6PE Provides IPV6 reachability for IPv6 edge routers across an MPLS network
backbone running an IPv4 control plane, without making changes to the software on the MPLS P routers.
6VPE and 6PE with QoS Supports QoS provisioning in 6PE and 6VPE networks by using existing
QoS infrastructure and configuration.
MPLS VPN - VRF command for IPv4 and IPv6 VPN Supports commands that allows users to enable
IPv4 and IPv6 in the same VRF.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
733
Note
All the above features are built upon existing IPv4, IPv6, MPLS and BGP infrastructure in the IOS and
Cisco ASR 901 data plane support.
Scalability Numbers
Table 45: Scalability Numbers for 6PE and 6VPE , on page 734 shows the scalability numbers for the 6PE
and 6VPE feature.
Table 45: Scalability Numbers for 6PE and 6VPE
Interface
Numbers
Number of VRFs
113
About 4000 3
3 This number is limited by the MPLS label usage on the PE router. The maximum number of label space shared between IPv4 and IPv6 is 4000.
Configuring 6PE
Ensure that you configure 6PE on PE routers participating in both the IPv4 cloud and IPv6 clouds. To learn
routes from both clouds, you can use any routing protocol supported on IOS (BGP, OSPF, IS-IS, EIGRP,
Static).
BGP running on a PE router should establish (IPv4) neighborhood with BGP running on other PEs.
Subsequently, it should advertise the IPv6 prefixes learnt from the IPv6 table to the neighbors. The IPv6
prefixes advertised by BGP would automatically have IPv4-encoded-IPv6 addresses as the nexthop-address
in the advertisement.
To configure 6PE, complete the following steps:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
734
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip cef
Example:
Router(config)# ip cef
Step 4
ipv6 cef
Example:
Router(config)# ipv6 cef
Step 5
ipv6 unicast-routing
Example:
Router(config)# ipv6 unicast-routing
Step 6
Step 7
no synchronization
Example:
Router(config-router)# no
synchronization
Step 8
Example:
Router(config-router)# no bgp default
ipv4-unicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
735
Step 9
Command or Action
Purpose
Example:
Router(config-router)# neighbor
10.108.1.2
remote-as 65200
Step 10
Example:
Router(config-router)# neighbor
172.16.2.3
update-source Loopback0
Step 11
address-family ipv6
Example:
Router(config-router)# address-family
ipv6
Step 12
Example:
Router(config-router-af)# neighbor
10.0.0.44
activate
Step 13
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
736
Step 14
Command or Action
Purpose
exit-address-family
Example:
Router(config-router-af)#
exit-address-family
Configuring 6VPE
6VPE requires setting up of IPv6 connectivity from PE to CE routers, MP-BGP peering to the neighboring
PE and MPLS/IPv4 connectivity to the core network using supported routing protocols (like OSPF, IS-IS,
EIGRP, Static) as done in 6PE. In addition, IPv6 VRFs have to be created on the PE routers and attached to
the interfaces connecting to CE routers. IPv6-only or dual-stack(multi-protocol) VRFs support IPv6 VRF
definitions.
To configure 6VPE, perform the tasks given below:
Procedure
Step 1
Command or Action
Purpose
vrf
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
router bgp
Example:
Router(config)# router bgp 100
Step 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
737
Command or Action
Purpose
vrf-name(Optional) A specific VRF table for an
IPv6 address.
Step 5
Router(config-router-af)#
neighbor 10.108.1.2
remote-as 65200
Step 6
Step 7
exit-address-family
Example:
Router(config-router-af)#
exit-address-family
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
738
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
address-family vpnv6
Example:
Router(config-router)# address-family
vpnv6
Step 5
Example:
Router(config-router-af)# neighbor
10.0.0.44
activate
Step 6
Example:
Router(config-router-af)# neighbor
10.108.1.2
send-community extended
Step 7
exit-address-family
Example:
Router(config-router-af)#
exit-address-family
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
739
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
interface ip-address
Example:
interface-nameInterface name.
Step 4
ip addressip-address
Example:
Router(config-if)# ip address
1.1.1.1 255.255.255.0
Step 5
mpls ip
Example:
Router(config-if)# mpls ip
Step 6
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
740
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
address-family ipv6
Example:
Router(config-vrf)# address-family
ipv6
Step 5
exit-address-family
Example:
Router(config-vrf-af)#
exit-address-family
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
741
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
address-family ipv4
Example:
Router(config-vrf)# address-family
ipv4
Step 5
exit-address-family
Example:
Router(config-vrf-af)#
exit-address-family
Step 6
address-family ipv6
Example:
Router(config-vrf)# address-family
ipv6
Step 7
exit-address-family
Example:
Router(config-vrf-af)#
exit-address-family
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
742
Metric LocPrf
0
Weight Path
0
200 ?
32768 ?
32768 ?
32768 ?
To display the parameters and the current state of the active IPv6 routing protocol processes, use the following
show command:
Router# show ipv6 protocols vrf vpe_1
IPv6 Routing Protocol is "connected"
IPv6 Routing Protocol is "bgp 100"
IGP synchronization is disabled
Redistribution:
None
Neighbor(s):
Address
FiltIn FiltOut Weight RoutemapIn RoutemapOut
100::2
To display IPv6 router advertisement (RA) information received from on-link devices, use the following show
command:
Router# show ipv6 route vrf vpe_1
IPv6 Routing Table - vpe_1 - 29 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
B - BGP, R - RIP, H - NHRP, I1 - ISIS L1
I2 - ISIS L2, IA - ISIS interarea, IS - ISIS summary, D - EIGRP
EX - EIGRP external, ND - ND Default, NDp - ND Prefix, DCE - Destination
NDr - Redirect
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2
B
72::/64 [20/0]
via 100::2
B
72:0:0:1::/64 [20/0]
via 100::2
B
72:0:0:2::/64 [20/0]
via 100::2
B
72:0:0:4::/64 [20/0]
via 100::2
B
72:0:0:5::/64 [20/0]
via 100::2
B
72:0:0:6::/64 [20/0]
via 100::2
B
72:0:0:7::/64 [20/0]
via 100::2
B
72:0:0:8::/64 [20/0]
via 100::2
B
72:0:0:9::/64 [20/0]
via 100::2
B
72:0:0:A::/64 [20/0]
via 100::2
B
72:0:0:B::/64 [20/0]
via 100::2
B
72:0:0:C::/64 [20/0]
via 100::2
B
72:0:0:D::/64 [20/0]
via 100::2
B
72:0:0:E::/64 [20/0]
via 100::2
B
72:0:0:F::/64 [20/0]
via 100::2
B
72:0:0:10::/64 [20/0]
via 100::2
B
72:0:0:11::/64 [20/0]
via 100::2
B
72:0:0:12::/64 [20/0]
via 100::2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
743
To display the Cisco Express Forwarding Forwarding Information Base (FIB) associated with an IPv6 Virtual
Private Network (VPN) routing and forwarding (VRF) instance, use the following show command.
Router# show ipv6 cef vrf cisco1
2001:8::/64
attached to GigabitEthernet0/0/1
2001:8::3/128
receive
2002:8::/64
nexthop 10.1.1.2 GigabitEthernet0/1/0 label 22 19
2010::/64
nexthop 2001:8::1 GigabitEthernet0/0/1
2012::/64
attached to Loopback1
2012::1/128
receive
To display IPv6 routing table information associated with a VPN routing and forwarding (VRF) instance, use
the following show command.
Router# show ipv6 route vrf
IPv6 Routing Table cisco1 - 6 entries
Codes: C - Connected, L - Local, S - Static, R - RIP, B - BGP
U - Per-user Static route
I1 - ISIS L1, I2 - ISIS L2, IA - ISIS interarea
O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2
C
2001:8::/64 [0/0]
via ::, GigabitEthernet0/0/1
L
2001:8::3/128 [0/0]
via ::, GigabitEthernet0/0/1
B
2002:8::/64 [200/0]
via ::FFFF:192.168.1.4,
B
2010::/64 [20/1]
via 2001:8::1,
C
2012::/64 [0/0]
via ::, Loopback1
L
2012::1/128 [0/0]
via ::, Loopback1
To display label forwarding information for advertised Virtual Private Network (VPN) routing and forwarding
(VRF) instance routes, use the following show command.
Router# show mpls forwarding-table vrf vpe_1
Local
Label
1760
1761
1762
1764
1765
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
Outgoing
Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
No Label
1778
No Label
Local
Label
1779
Outgoing
Label
No Label
Prefix
Bytes Label
or Tunnel Id
Switched
72::/64[V]
0
72:0:0:1::/64[V] 0
72:0:0:2::/64[V] 0
72:0:0:3::/64[V] 0
72:0:0:4::/64[V] 0
72:0:0:7::/64[V] 0
72:0:0:8::/64[V] 0
72:0:0:9::/64[V] 0
72:0:0:A::/64[V] 0
72:0:0:B::/64[V] 0
72:0:0:C::/64[V] 0
72:0:0:D::/64[V] 0
72:0:0:E::/64[V] 0
72:0:0:F::/64[V] 0
72:0:0:10::/64[V]
\
0
72:0:0:11::/64[V]
\
0
Prefix
Bytes Label
or Tunnel Id
Switched
72:0:0:12::/64[V]
\
0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
744
Outgoing
interface
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Next Hop
Vl100
100::2
Vl100
Outgoing
interface
100::2
Next Hop
Vl100
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
100::2
1780
No Label
1781
No Label
1782
No Label
1783
No Label
1784
No Label
1785
No Label
72:0:0:13::/64[V]
0
72:0:0:14::/64[V]
0
72:0:0:15::/64[V]
0
72:0:0:16::/64[V]
0
72:0:0:17::/64[V]
0
72:0:0:18::/64[V]
0
\
Vl100
100::2
Vl100
100::2
Vl100
100::2
Vl100
100::2
Vl100
100::2
Vl100
100::2
\
\
\
\
\
To display output information linking the MPLS label with prefixes, use the following show command.
Router# show mpls forwarding-table
Local
tag
16
17
18
19
20
21
22
23
24
Outgoing
tag or VC
Aggregate
Aggregate
Aggregate
Pop tag
Pop tag
Pop tag
Aggregate
Aggregate
Aggregate
Prefix
or Tunnel Id
IPv6
IPv6
IPv6
192.168.99.64/30
192.168.99.70/32
192.168.99.200/32
IPv6
IPv6
IPv6
Bytes tag
switched
0
0
0
0
0
0
5424
3576
2600
Outgoing
interface
GE0/0
GE0/0
GE0/0
Next Hop
point2point
point2point
point2point
To display entries in the IPv6 BGP routing table, use the following show command:
Router# show bgp ipv6 2001:33::/64
BGP routing table entry for 2001:33::/64, version 3
Paths: (1 available, best #1, table Global-IPv6-Table)
Not advertised to any peer
Local
::FFFF:192.168.0.2 (metric 30) from 192.168.0.2 (192.168.0.2)
Origin IGP, localpref 100, valid, internal, best
Configuration Examples
This section provides sample configuration examples for IPv6 over MPLS: 6PE and 6VPE feature on the
Cisco ASR 901 Cisco ASR 901S router.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
745
network 55:5::/64
redistribute connected
redistribute isis ipv6-cloud
allocate-label all
!
neighbor 34.4.3.3
remote-as 55400
address-family ipv4 unicast
!
address-family ipv6 labeled-unicast
Additional References
The following sections provide references related to IPv6 over MPLS: 6PE and 6VPE feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
746
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
747
Technical Assistance
Description
Link
Note
Table 46: Feature Information for IPv6 over MPLS: 6PE and 6VPE, on page 748 lists only the software
release that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Table 46: Feature Information for IPv6 over MPLS: 6PE and 6VPE
Feature Name
Releases
Feature Information
15.2(2)SNI
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
748
CHAPTER
38
Storm Control
This feature module describes the Storm Control feature that helps to monitor the incoming broadcast,
multicast, and unknown unicast packets and prevent them from flooding the LAN ports.
Finding Feature Information, page 749
Prerequisites for Storm Control, page 749
Restrictions for Storm Control, page 750
Information About Storm Control, page 750
Configuring Storm Control, page 750
Configuring Error Disable Recovery, page 752
Configuration Example for Storm Control, page 754
Troubleshooting Tips for Storm Control, page 754
Additional References, page 754
Feature Information for Storm Control, page 755
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
749
Storm Control
Restrictions for Storm Control
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
750
Storm Control
Configuring Storm Control
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
storm-control {action
Configures broadcast, multicast, or unknown unicast storm
{shutdown | trap}| {broadcast | control.
multicast | unicast} {level {level
actionSpecifies the action to take when a storm occurs
| bps bps-level| pps pps-level}}
on a port.
Example:
Router(config-if)#
storm-control broadcast
level 70
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
751
Storm Control
Verifying Storm Control
Step 5
Command or Action
Purpose
end
Example:
Router(config-if)# end
What to Do Next
Note
To verify the dropped counters, use the show command described in the following example.
Router# show interface gigabitethernet 0/1 counters storm-control
Port
UcastSupp UcastSuppDiscards McastSupp McastSuppDiscards BcastSupp BcastSuppDiscards
%/ps
%/ps
%/ps
Gi0/1
100.00%
0
20000p
1065163
100.00%
0
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
752
Storm Control
Monitoring Error Disable Recovery
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
errdisable recovery cause storm-control Configure recovery mechanism and recovery from
a specific cause.
Example:
Router(config)# errdisable recovery
cause storm-control
Step 4
Step 5
end
Example:
Router(config)# end
ErrDisable Reason
----------------udld
bpduguard
security-violatio
channel-misconfig
vmps
pagp-flap
dtp-flap
link-flap
lsgroup
l2ptguard
psecure-violation
gbic-invalid
dhcp-rate-limit
mac-limit
unicast-flood
storm-control
arp-inspection
loopback
link-monitor-fail
oam-remote-failur
oam-remote-failur
Timer Status
-------------Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
753
Storm Control
Configuration Example for Storm Control
oam-remote-failur
Disabled
dot1ad-incomp-ety
Disabled
dot1ad-incomp-tun
Disabled
mlacp-minlink
Disabled
Timer interval: 30 seconds
Interfaces that will be enabled at the next timeout:
Interface
Errdisable reason
Time left(sec)
------------------------------------------Gi0/3
storm-control
4
Additional References
The following sections provide references related to Storm Control feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Series Aggregation Services Router
Command Reference
Cisco ASR 901S Series Aggregation Services Router
Command Reference
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
754
Storm Control
Feature Information for Storm Control
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
755
Storm Control
Feature Information for Storm Control
Note
Table 47: Feature Information for Storm Control, on page 756 lists only the software release that introduced
support for a given feature in a given software release train. Unless noted otherwise, subsequent releases
of that software release train also support that feature.
Table 47: Feature Information for Storm Control
Feature Name
Releases
Feature Information
Storm Control
15.3(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
756
CHAPTER
39
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
757
asr901-platf-frr enable
mpls label protocol ldp
mpls ldp router-id loopback-id force
mpls ldp discovery targeted-hello accept
no l3-over-l2 flush buffers
Your network must support the following Cisco IOS features before you can enable fast reroute link
protection:
IP Cisco Express Forwarding (CEF)
Multiprotocol Label Switching (MPLS)
Your network must also support at least one of the following protocols:
Intermediate System-to-Intermediate System (IS-IS)
Open Shortest Path First (OSPF)
You should use throttle interior gateway protocol (IGP) timers for IS-IS and OSPF protocols.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
758
The Border Gateway Protocol (BGP) Prefix-Independent Convergence (PIC) edge is not supported.
Specifically, the bgp additional-paths install command is not supported.
If the network port is an LAG interface (etherchannel), you must use BFD over SVI to achieve FRR
convergence numbers.
If the LAG interface is used either on access side or towards the core, you should shutdown the interface
before removing it.
Feature Overview
The LFA-FRR is a mechanism that provides local protection for unicast traffic in IP, MPLS, EoMPLS, Inverse
Multiplexing over ATM (IMA) over MPLS, Circuit Emulation Service over Packet Switched Network
(CESoPSN) over MPLS, and Structure-Agnostic Time Division Multiplexing over Packet (SAToP) over
MPLS networks. However, some topologies (such as the ring topology) require protection that is not afforded
by LFA-FRR alone. The Remote LFA-FRR feature is useful in such situations.
The Remote LFA-FRR extends the basic behavior of LFA-FRR to any topology. It forwards the traffic around
a failed node to a remote LFA that is more than one hop away.
In Remote LFA-FRR, a node dynamically computes its LFA node. After determining the alternate node (which
is non-directly connected), the node automatically establishes a directed Label Distribution Protocol (LDP)
session to the alternate node. The directed LDP session exchanges labels for the particular forward error
correction (FEC).
When the link fails, the node uses label stacking to tunnel the traffic to the remote LFA node, to forward the
traffic to the destination. All the label exchanges and tunneling to remote LFA node are dynamic in nature
and pre-provisioning is not required.
The following figure shows the repair path that is automatically created by the Remote LFA-FRR feature to
bypass looping. In this figure, the traffic is flowing between CE nodes (R1 to R7) through the PE nodes
(protected link - R2 and R3). When the PE node fails, the repair path (R2 - R4- R5 - R6 - R3) is used to route
the traffic between CE nodes.
Figure 37: Remote LFA-FRR Link Protection
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
759
R1 and R7
CE nodes
R6 - R5 - R4
R2 and R3
P nodes
Fast Reroute Repair Path
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
760
The following figure shows the pseudowire redundancy over FRR implementation.
Figure 38: Pseudowire Redundancy Over FRR
Effective with Cisco IOS Release 15.3(3)S, the Remote LFA-FRR feature is supported on CESoPSN,
SAToP, and ATM/IMA.
Effective with Cisco IOS Release 15.4(1)S, the Pseudowire Redundancy over FRR feature is supported.
This section describes how to configure Remote LFA-FRR feature:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
761
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 40
Step 4
no negotiation auto
Example:
Router(config-if)# no negotiation
auto
Step 5
Example:
Router(config-if)# service
instance 7 ethernet
Step 6
Example:
Router(config-if)# encapsulation
dot1q 7
Step 7
rewrite ingress tag pop 1 symmetric Specifies the encapsulation adjustment to be performed
on a frame ingressing a service instance.
Example:
Router(config-if)# rewrite
ingress tag pop 1 symmetric
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
762
Step 8
Command or Action
Purpose
bridge-domain bridge-domain-id
Example:
Router(config-if)# bridge-domain
7
Step 9
Example:
Router(config-if)# interface vlan
7
Step 10
ip address ip-address
Example:
Router(config-if)# ip address
7.7.7.1 255.255.255.0
Step 11
ip router isis
Example:
Router(config-if)# ip router isis
Step 12
mpls ip
Example:
Router(config-if)# mpls ip
Step 13
Step 14
exit
Example:
Router(config-if)# exit
Step 15
router isis
Example:
Router(config)# router isis
Step 16
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
763
Command or Action
Purpose
level-1Enables per-prefix FRR of level 1
packets.
Example:
Router(config-router)#
fast-reroute per-prefix level-1
all
Router(config-router)#
fast-reroute remote-lfa level-1
mpls-ldp
Step 18
Example:
Router(config-router)# mpls ldp
sync
Step 19
Example:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
764
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 40
Step 4
no negotiation auto
Example:
Router(config-if)# no negotiation
auto
Step 5
Example:
Router(config-if)# service
instance 7 ethernet
Step 6
Router(config-if)# encapsulation
dot1q 7
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
765
Step 8
Command or Action
Purpose
bridge-domain bridge-domain-id
Example:
Router(config-if)# bridge-domain
7
Step 9
Example:
Router(config-if)# interface vlan
7
Step 10
ip address ip-address
Example:
Router(config-if)# ip address
7.7.7.1 255.255.255.0
Step 11
exit
Example:
Router(config-if)# exit
Step 12
router ospf
Example:
Router(config)# router ospf
Step 13
Example:
Router(config-router)#
fast-reroute per-prefix enable
area 1
Step 14
Example:
Router(config-router)#
fast-reroute per-prefix remote-lfa
area 1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
766
Step 15
Command or Action
Purpose
Example:
Router(config-router)# mpls ldp
sync
The Remote LFA-FRR feature is supported on the TDM pseudowires from Cisco IOS Realease 15.3(3)S
onwards. The configuration and restrictions for EoMPLS are also applicable to the TDM pseudowires.
Note
During packet loss, SAToP requires one second for convergence and two seconds for recovery.
Configuring Remote LFA-FRR on a Global Interface, on page 767
Configuring Remote LFA-FRR on a GigabitEthernet Interface, on page 768
Configuring Remote LFA-FRR on an SVI Interface, on page 770
Configuring Remote LFA-FRR on IS-IS , on page 771
Configuring LFA-FRR for EoMPLS , on page 774
Configuring LFA-FRR for ATM/IMA , on page 776
Configuring LFA-FRR for CESoPSN , on page 778
Configuring LFA-FRR for SAToP , on page 780
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
767
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Step 5
asr901-platf-frr enable
Example:
Router(config)# asr901-platf-frr
enable
Step 6
mpls ldp discovery targeted-hello accept Configures the neighbors from which requests for
targeted hello messages may be honored.
Example:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
768
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 40
Step 4
no negotiation auto
Example:
Router(config-if)# no negotiation
auto
Step 5
Example:
Router(config-if)# service
instance 7 ethernet
Step 6
Router(config-if-srv)#
encapsulation dot1q 7
Step 7
rewrite ingress tag pop 1 symmetric Specifies the encapsulation adjustment to be performed
on a frame ingressing a service instance.
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 8
bridge-domain bridge-domain-id
Example:
Router(config-if-srv)#
bridge-domain 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
769
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 40
Step 4
ip address ip-address
Example:
Router(config-if)# ip address
7.7.7.1 255.255.255.0
Step 5
ip router isis
Example:
Router(config-if)# ip router isis
Step 6
mpls ip
Example:
Router(config-if)# mpls ip
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
770
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
router isis
Example:
Router(config)# router isis
Step 4
net net
Example:
Router(config-router)# net
49.0001.0002.0001.0001.00
Step 5
is-type level-1
Example:
Router(config-router)# is-type
level-1
Step 6
advertise-passive-only
Example:
Router(config-router)#
advertise-passive-only
Step 7
ispf level-1
Example:
Router(config-router)# ispf
level-1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
771
Step 8
Command or Action
Purpose
fast-flood
Example:
Router(config-router)#
fast-flood
Step 9
max-lsp-lifetime seconds
Example:
Router(config-router)#
max-lsp-lifetime 65535
Step 10
lsp-refresh-interval seconds
Example:
Router(config-router)#
lsp-refresh-interval 900
Step 11
Step 12
prc-interval prc-max-wait
[prc-initial-wait prc-second-wait]
Example:
Router(config-router)#
prc-interval 5 50 200
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
772
Command or Action
Purpose
prc-second-wait(Optional) Indicates the hold time
between the first and second PRC calculation (in
milliseconds). The range is 1 to 120,000 milliseconds.
The default is 5000 milliseconds (5 seconds).
Step 13
Step 14
no hello padding
Example:
Router(config-router)# no
hello padding
Step 15
log-adjacency-changes
Example:
Router(config-router)#
log-adjacency-changes
Step 16
Example:
Router(config-router)#
fast-reroute per-prefix
level-1 all
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
773
Command or Action
Step 17
Purpose
fast-reroute remote-lfa {level-1 | Configures an FRR path that redirects traffic to a remote LFA
tunnel.
level-2} mpls-ldp
[maximum-metric metric-value]
level-1Enables LFA-FRR of level 1 packets.
Example:
Router(config-router)#
fast-reroute remote-lfa
level-1 mpls-ldp
Step 18
passive-interface interface-type
interface-number
Example:
Router(config-router)#
passive-interface Loopback0
Step 19
Example:
Router(config-router)# mpls
ldp sync
Note
Effective with Cisco IOS release 15.4(1)S, the EoMPLS Pseudowire Redundancy over FRR feature is
supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
774
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface
gigabitethernet 0/1
Step 4
no ip address
Example:
Router(config-if)# no ip address
Step 5
negotiation auto
Example:
Router(config-if)# negotiation
auto
Step 6
Step 7
Step 8
rewrite ingress tag pop 1 symmetric Specifies the encapsulation adjustment to be performed
on a frame ingressing a service instance.
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
775
Step 9
Command or Action
Purpose
Example:
Router(config-if-srv)# xconnect
10.0.0.4 4 encapsulation mpls
Example:
Router(config-if-ether-vc-xconn)#
backup peer 10.0.0.5 4
Note
Effective with Cisco IOS release 15.4(1)S, the TDM Pseudowire Redundancy over FRR feature is supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
776
Step 3
Command or Action
Purpose
Example:
Router(config)# controller e1 0/0
Step 4
ima-group ima-group-number
Example:
Router(config-controller)#
ima-group 2
Step 5
exit
Example:
Router(config-controller)# exit
Step 6
Example:
Router(config)# interface
ATM0/IMA2
Step 7
no ip address
Example:
Router(config-if)# no ip address
Step 8
no atm ilmi-keepalive
Example:
Router(config-if)# no atm
ilmi-keepalive
Step 9
Step 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
777
Command or Action
Purpose
ip-addressIP address of the remote provider edge
(PE) peer. The remote router ID can be any IP
address, as long as it is reachable.
Example:
Router(config-if-cem)# xconnect
2.2.2.2 111 encapsulation mpls
Step 11
Example:
Router(config-if-xconn)# backup
peer 2.2.2.3 111
Note
Effective with Cisco IOS release 15.4(1)S, the TDM Pseudowire Redundancy over FRR feature is supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# controller e1 0/0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
778
Step 4
Command or Action
Purpose
Example:
Router(config-controller)# clock
source internal
Step 5
Step 6
description descriptive-name
Example:
Router(config-controller)#
description E1 CESoPSN example
Step 7
exit
Example:
Router(config)# exit
Step 8
Example:
Router(config)# interface CEM 0/0
Step 9
no ip address
Example:
Router(config-cem)# no ip address
Step 10
cem group-number
Example:
Router(config-cem)# cem 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
779
Command or Action
Step 11
Purpose
Router(config-cem)# xconnect
2.2.2.2 111 encapsulation mpls
Example:
Router(config-if-xconn)# backup
peer 2.2.2.3 111
Note
Effective with Cisco IOS release 15.4(1)S, the TDM Pseudowire Redundancy over FRR feature is supported.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
780
Step 4
Command or Action
Purpose
framing unframed
Example:
Router(config-controller)# framing
unframed
Step 5
Example:
Router(config-controller)# clock
source internal
Step 6
Step 7
description descriptive-name
Example:
Router(config-controller)#
description E1 SAToP example
Step 8
exit
Example:
Router(config-controller)# exit
Step 9
Example:
Router(config)# interface CEM 0/0
Step 10
no ip address
Example:
Router(config-if)# no ip address
Step 11
cem group-number
Example:
Router(config-if)# cem 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
781
Command or Action
Step 12
Purpose
Step 13
Router(config-if-cem-xconn)# backup
peer 2.2.2.3 111
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
782
To display entries in the Cisco Express Forwarding (CEF) Forwarding Information Base (FIB), use the
following show command.
Router# show ip cef 171.1.1.0 internal
171.1.1.0/24, epoch 0, RIB[I], refcount 5, per-destination sharing
sources: RIB, LTE
feature space:
IPRM: 0x00028000
LFD: 171.1.1.0/24 1 local label
local label info: global/542
contains path extension list
disposition chain 0x12E83850
label switch chain 0x12E83850
ifnums:
Vlan4004(30): 71.14.1.4
MPLS-Remote-Lfa6(37)
path 12C70E98, path list 12D52154, share 1/1, type attached nexthop, for IPv4, flags
has-repair
MPLS short path extensions: MOI flags = 0x20 label 31
nexthop 71.14.1.4 Vlan4004 label [31|537], adjacency IP adj out of Vlan4004, addr 71.14.1.4
12CD6A40
repair: attached-nexthop 6.6.6.6 MPLS-Remote-Lfa6 (12C70FE8)
path 12C70FE8, path list 12D52154, share 1/1, type attached nexthop, for IPv4, flags
repair, repair-only
nexthop 6.6.6.6 MPLS-Remote-Lfa6, repair, adjacency IP midchain out of MPLS-Remote-Lfa6
12CD7880
output chain: label [31|537]
FRR Primary (0x11139020)
<primary: TAG adj out of Vlan4004, addr 71.14.1.4 12D8A780>
<repair: TAG midchain out of MPLS-Remote-Lfa6 12CD6580 label 338 TAG adj out of Vlan4003,
addr 71.17.1.7 12CD7160>
To display local Routing Information Base (RIB) or locally redistributed routes use the following show
command.
Router# show ip ospf rib 171.1.1.0
OSPF Router with ID (1.1.1.1) (Process ID 1)
Base Topology (MTID 0)
OSPF local RIB
Codes: * - Best, > - Installed in global RIB
LSA: type/LSID/originator
*> 171.1.1.0/24, Intra, cost 2, area 0
SPF Instance 130, age 00:03:52
Flags: RIB, iSPF
via 71.14.1.4, Vlan4004
Flags: RIB, iSPF
LSA: 1/2.0.0.2/2.0.0.2
repair path via 6.6.6.6, MPLS-Remote-Lfa6, cost 4
Flags: RIB, Repair, IntfDj, BcastDj, CostWon
LSA: 1/2.0.0.2/2.0.0.2
To display information for an IS-IS per-prefix LFA-FRR configuration, use the following show command.
Router# show isis fast-reroute remote-lfa tunnels
Tag Null - Fast-Reroute Remote-LFA Tunnels:
MPLS-Remote-Lfa1: use Vl4003, nexthop 71.17.1.7, end point 6.6.6.6
MPLS-Remote-Lfa2: use Vl4004, nexthop 71.14.1.4, end point 5.5.5.5
To display entries in the CEF Forwarding Information Base (FIB) use the following show command.
Router# show ip cef 171.1.1.0 internal
171.1.1.0/24, epoch 0, RIB[I], refcount 5, per-destination sharing
sources: RIB, LTE
feature space:
IPRM: 0x00028000
LFD: 171.1.1.0/24 1 local label
local label info: global/18
contains path extension list
disposition chain 0x12B537C8
ifnums:
Vlan4004(30): 71.14.1.4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
783
MPLS-Remote-Lfa1(32)
path 12C55CB4, path list 12C856E8, share 1/1, type attached nexthop, for IPv4, flags
has-repair
MPLS short path extensions: MOI flags = 0x20 label none
nexthop 71.14.1.4 Vlan4004 label [none|23], adjacency IP adj out of Vlan4004, addr 71.14.1.4
1139FAA0
repair: attached-nexthop 6.6.6.6 MPLS-Remote-Lfa1 (12C55D24)
path 12C55D24, path list 12C856E8, share 1/1, type attached nexthop, for IPv4, flags
repair, repair-only
nexthop 6.6.6.6 MPLS-Remote-Lfa1, repair, adjacency IP midchain out of MPLS-Remote-Lfa1
12D512C0
output chain: label [none|23]
FRR Primary (0xA74F800)
<primary: IP adj out of Vlan4004, addr 71.14.1.4 1139FAA0>
<repair: TAG midchain out of MPLS-Remote-Lfa1 11180740 label 366 TAG adj out of Vlan4003,
addr 71.17.1.7 12D51520>
To display information about IS-IS FRR configurations, use the following show command.
Router# show isis fast-reroute summary
Tag null:
IPv4 Fast-Reroute Protection Summary:
Prefix Counts:
Total
Protected
High priority:
0
0
Normal priority:
10
8
Total:
10
8
Coverage
0%
80%
80%
To display paths for a specific route or for all routes under a major network that are stored in the IP local
Routing Information Base (RIB), use the following show command.
Router# show isis rib 171.1.1.0
IPv4 local RIB for IS-IS process
IPV4 unicast topology base (TID 0, TOPOID 0x0) =================
Repair path attributes:
DS - Downstream, LC - Linecard-Disjoint, NP - Node-Protecting
PP - Primary-Path, SR - SRLG-Disjoint
Routes under majornet 171.1.0.0/16:
171.1.1.0/24
[115/L1/10] via 71.14.1.4(Vlan4004), from 71.14.1.4, tag 0, LSP[2/18]
(installed)
repair path: 6.6.6.6(MPLS-Remote-Lfa1) metric:20 (DS,SR) LSP[2]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
784
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
785
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
786
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
787
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
788
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
789
asr901-platf-frr enable
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
790
no atm enable-ilmi-trap
xconnect 2.2.2.2 90 encapsulation mpls
backup peer 180.0.0.201 90
!
Additional References
The following sections provide references related to Remote Loop-Free Alternate - Fast Reroute feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Series Aggregation Services Router
Command Reference
Cisco ASR 901S Series Aggregation Services Router
Command Reference
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
791
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
792
Note
Table 48: Feature Information for Remote Loop-Free Alternate - Fast Reroute, on page 793 lists only the
software release that introduced support for a given feature in a given software release train. Unless noted
otherwise, subsequent releases of that software release train also support that feature.
Table 48: Feature Information for Remote Loop-Free Alternate - Fast Reroute
Feature Name
Releases
Feature Information
This feature was introduced on the
Cisco ASR 901 routers.
The following sections provide
information about this feature:
15.4(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
793
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
794
CHAPTER
40
Feature Overview
The ASR 901 router supports DOM as per the standard SFF-8724 Multi-Source Agreement (MSA). This
feature allows monitoring real-time parameters of the router, such as optical input and output power,
temperature, laser bias current, and transceiver supply voltage. These parameters are monitored against the
threshold values. The real-time DOM parameters can be monitored using command line interface or SNMP
interface. Effective with Cisco IOS Release 15.3(3)S, Cisco ASR 901 supports DOM for both 1G and 10G
SFPs.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
795
DOM allows the user to view the threshold violation messages. To display the threshold violation messages,
you must enable transceiver monitoring. For information on enabling transceiver monitoring, see How to
Enable Transceiver Monitoring, on page 796.
The command line output for the real-time parameters is shown using the show interfaces transceiver
command. To enable threshold notification in the transceiver via SNMP, use the snmp-server enable traps
transceiver command. You can use the show controllers gig 0/x command to check whether SFPs are DOM
capable. This command displays the SFP details.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# transceiver type all
Step 4
monitoring
Example:
Router(config-xcvr-type)# monitoring
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
796
Step 5
Command or Action
Purpose
monitoring interval;
Example:
Router(config-xcvr-type)# monitoring
interval 500
Examples
The real-time parameters of the router, such as optical output power, optical input power, temperature, laser
bias current, and transceiver supply voltage can be monitored using the show interfaces transceiver command.
This section provides sample output for monitoring the real-time parameters on the Cisco ASR 901 Cisco
ASR 901S router:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
797
Port
--------Gi0/10
Gi0/11
Port
--------Gi0/10
Gi0/11
Port
--------Gi0/10
Gi0/11
Current
(milliamperes)
----------------533.3
391.1
Optical
Transmit Power
(dBm)
-----------------4.5
-5.5
Optical
Receive Power
(dBm)
-----------------5.2
-7.5
High Alarm
Threshold
(mA)
---------N/A
N/A
High Alarm
Threshold
(dBm)
----------3.5
-3.5
High Alarm
Threshold
(dBm)
---------0.0
0.0
High Warn
Threshold
(mA)
--------N/A
N/A
High Warn
Threshold
(dBm)
---------4.0
-4.0
High Warn
Threshold
(dBm)
--------0.0
0.0
Low Warn
Threshold
(mA)
--------N/A
N/A
Low Warn
Threshold
(dBm)
---------9.5
-9.5
Low Warn
Threshold
(dBm)
---------17.0
-17.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
798
Low Alarm
Threshold
(mA)
--------N/A
N/A
Low Alarm
Threshold
(dBm)
---------10.0
-10.0
Low Alarm
Threshold
(dBm)
---------17.1
-17.1
GIgE BX U SFP
GigE BX D SFP
X2 LRM
NONE
ALL
ALL
Voltage
--------4.50
4.75
5.25
5.50
3.00
3.09
3.59
3.70
4.50
4.75
5.25
5.50
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
799
Min1
Min2
Max2
Max1
XENPAK_ER
Min1
Min2
Max2
Max1
X2_ER
Min1
Min2
Max2
Max1
XFP_ER
Min1
Min2
Max2
Max1
XENPAK_LR
Min1
Min2
Max2
Max1
X2_LR
Min1
Min2
Max2
Max1
XFP_LR
Min1
Min2
Max2
Max1
XENPAK_LW
Min1
Min2
Max2
Max1
X2_LW
Min1
Min2
Max2
Max1
X2 SR
Min1
Min2
Max2
Max1
XFP SR
Min1
Min2
Max2
Max1
CWDM_SFP
Min1
Min2
Max2
Max1
SX_SFP
Min1
Min2
Max2
Max1
LX_SFP
Min1
Min2
Max2
Max1
ZX_SFP
Min1
Min2
Max2
N/A
N/A
N/A
N/A
-24.50
-24.29
-6.69
4.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-5.00
-4.69
4.00
4.50
-16.50
-15.80
-0.50
0.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-5.00
-4.69
4.00
4.50
-16.50
-15.80
-0.50
0.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-5.00
-4.69
4.00
4.50
-16.50
-15.80
-0.50
0.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-8.50
-8.19
0.50
1.00
-15.00
-14.39
0.50
1.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-8.50
-8.19
0.50
1.00
-15.00
-14.39
0.50
1.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-8.50
-8.19
0.50
1.00
-15.00
-14.39
0.50
1.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-8.50
-8.19
0.50
1.00
-15.00
-14.39
0.50
1.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-8.50
-8.19
0.50
1.00
-15.00
-14.39
0.50
1.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-11.30
-7.30
-1.00
3.00
-13.89
-9.89
-1.00
3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-10.30
-7.30
-1.00
2.00
-12.89
-9.89
-1.00
2.00
0
5
60
70
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-4.00
0.00
5.00
8.00
-32.00
-28.00
-7.00
-3.00
-4
0
85
90
84.00
70.00
4.00
2.00
3.00
3.09
3.50
3.59
-10.00
-9.50
-4.00
-3.50
-17.50
-17.00
0.00
0.00
-5
0
75
85
N/A
N/A
N/A
N/A
3.00
3.09
3.59
3.70
-10.00
-9.50
-3.00
-2.50
-19.50
-19.00
-3.00
0.00
-5
0
75
85
N/A
N/A
N/A
N/A
3.00
3.09
3.59
3.70
-5.00
0.00
5.00
-24.00
-23.00
-3.00
-5
0
75
N/A
N/A
N/A
3.00
3.09
3.59
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
800
Max1
EX_SFP
Min1
Min2
Max2
Max1
GigE BX D SFP
Min1
Min2
Max2
Max1
X2 LRM
Min1
Min2
Max2
Max1
5.50
5.00
-5.00
-1.00
3.00
6.00
-25.00
-22.50
1.00
4.00
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-10.50
-6.50
0.50
3.00
-12.39
-8.39
0.50
3.00
85
N/A
3.70
-45
-15
95
97
N/A
N/A
N/A
N/A
3.00
3.09
3.59
3.70
0
0
0
0
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
This example shows the sample output when transceiver monitoring is disabled:
Router# show interfaces transceiver detail
Transceiver monitoring is disabled for all interfaces.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
801
0x02:
0x06:
0x0A:
0x0E:
0x12:
0x16:
0x1A:
0x1E:
02
0A
53
54
00
34
20
00
43
36
30
01
0A
DD
00
62
0x0362
0x006F
0x7800
0x0000
0x0003
0x0000
0x257F
0x0000
00
64
43
4F
5F
2D
20
28
31
20
36
64
9E
C3
00
04
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
802
0x03:
0x07:
0x0B:
0x0F:
0x13:
0x17:
0x1B:
0x1F:
0x5DB1
0x2001
0x0000
0x3000
0xFFFF
0x0F04
0xFFFF
0x0000
connector
sfp_transceiver_code
encoding
br_nominal
(100MHz)
length_9km
(100m)
length_9m
(100m)
length_50m
(100m)
length_62_5m (100m)
length_cu
(10m)
vendor_name
vendor_oui
vendor_pn
vendor_rev
cc_base
options[0]
options[1]
br_max (%)
br_min (%)
vendor_sn
date_code
cc_ext
DOM support
0x07 (LC)
0x02 (1000BaseLX)
0x01 (8B10B)
13
10
100
55
55
0
CISCO-SUMITOMO
0x00 00 5F
SCP6G44-C1-BMH
A
0x28
0x00000000
0x0000001A
0
0
SPC15240CP6
110612C8 (yymmddvv, v=vendor specific)
0x64
yes
Additional References
The following sections provide references to digital optical monitoring feature.
Related Documents
Related Topic
Document Title
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
803
Note
Table 49: Feature Information for Digital Optical Monitoring, on page 804 lists only the software release
that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Table 49: Feature Information for Digital Optical Monitoring
Feature Name
Releases
Feature Information
15.2(2)SNI
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
804
CHAPTER
41
Autonomic Networking
Last Published Date: December 20, 2014
Autonomic networking makes network devices intelligent by introducing self-management concepts that
simplify network management for the network operator.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
805
"Channel Discovery" protocol (CD) on the autonomic devices which probes for working VLAN
encapsulations.
To build the ACP across intervening non-autonomic L3 devices, you need to configure explicitly a
tunnel between the autonomic devices and enable "autonomic adjacency-discovery" on this tunnel.
Autonomic Registrar, commonly known as registrar, is required for the Autonomic Networking
Infrastructure feature to work. At least one device in the network must be configured as a registrar to
enroll new devices into the autonomic domain. In a network where all required devices are already
enrolled into the autonomic domain, a registrar is not required.
Each registrar supports one autonomic domain only. The registrar is needed only when new autonomic
devices join the domain.
All new devices must have a physical connectivity to at least one autonomic device to contact the registrar
for authentication and authorization.
A device can only be enrolled into one autonomic domain. Two devices enrolled into different domains
will not build the autonomic control plane between each other.
For autonomic intent, the registrar must be configured with domain ID.
For Zero Touch Bootstrap to happen, there must be no startup-config file and the config-register must
remain default i.e, 0x2102.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
806
Autonomic Networking is controlled by a separate software entity running on top of traditional operating
systems that include networking components, such as IP, Open Shortest Path First (OSPF), and so forth.
Traditional networking components are unchanged and unaware of the presence of the autonomic process.
The autonomic components use normal interfaces that are exposed by the traditional networking components
and interact with different devices in the network. The autonomic components securely cooperate to add more
intelligence to devices so that the devices in an autonomic network can autonomically configure, manage,
protect, and heal themselves with minimal operator intervention. They can also securely consolidate their
operations to present a simplified and abstracted view of the network to the operator.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
807
5 The autonomic control plane is automatically established across the autonomic domain to make new
devices reachable.
The benefits of Autonomic Networking Infrastructure are as follows:
Autonomic discovery of Layer 2 topology and connectivity by discovering how to reach autonomic
neighbors.
Secure and zero touch identity of new devices by using the device name and domain certificate.
A virtual autonomic control plane that enables communications between autonomic nodes.
Autonomic behavior is enabled by default on new devices. To enable autonomic behavior on existing devices,
use the autonomic connect command. To disable, use the no form of this command.
The components of autonomic networking are as follows:
RegistrarA domain-specific registration authority in a given enterprise that validates new devices in
the domain, provides them with domain-wide credentials, and makes policy decisions. Policy decisions
can include whether a new device can join a given domain based on a preloaded whitelist. The registrar
also has a database of devices that join a given domain and the device details.
Channel DiscoveryUsed to discover reachability between autonomic nodes across nonautonomic
Layer 2 networks.
Adjacency DiscoveryUsed to discover autonomic neighbors. Adjacency discovery is done on Layer
3. It is also possible to discover autonomic neighbors across preestablished Layer 3 Generic Routed
Encapsulation (GRE) tunnels.
1 The new device sends out a hello message to the neighbor. In this case, the neighbor is part of an autonomic
network domain.
2 The hello message includes the unique device identifier (UDI) of the new device.
3 The autonomic device acts as a proxy and allows the new device to join this autonomic network domain.
The autonomic network device advertises itself with the domain information to its Layer 3 neighbors.
4 On receiving the autonomic network hello message from the neighbor and detecting the UDI information,
the new device is validated with the autonomic registrar.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
808
5 The new device advertises its domain certificate in its hello message with all neighbors. The neighbor
information is exchanged every 10 seconds.
Note
If the neighbor information changes, the entry is deleted and neighbor discovery is restarted. In the absence
of a domain certificate and devices working with UDI, UDI is exchanged at a 10-second interval.
Note
The domain name is a group of devices in the network managed by the same set of rules. Any neighbor
communicating with the registrar using the UDI certificate is sent an invitation to join the domain by
registrar.
Currently, the registrar validates the new devices based on an optional list of UDIs that is specified when
configuring the registrar. The list specifies a set of devices that are allowed to join the network.
Figure 41: Provisioning Registrar in an Autonomic Network
The registrar maintains a database of all devices that join or fail to join the domain. The failed devices can
try to join the domain again. The registrar database tracks all devices in the domain and associates each device
with the following states:
AcceptedDevices that successfully join the domain.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
809
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
810
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
autonomic connect
Example:
Device(config)# autonomic connect
Step 4
autonomic registrar
Example:
Device(config)# autonomic
registrar
Step 5
domain-id domain-name
Example:
Device(config-anra)# domain-id
abc.com
Step 6
device-accept udi
Example:
Device(config-anra)#
device-accept "PID:A901-12C-FT-D
SN:CAT1902U88Y"
Step 7
whitelist filename
Example:
Device(config-anra)# whitelist
flash:whitelist.txt
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
811
Command or Action
Purpose
If this command is not configured, all devices
are accepted into the domain.
Enables the autonomic registrar.
Step 8
no shut
Example:
Device(config-anra)# no shut
Step 9
exit
Example:
Device(config-anra)# exit
Step 10
exit
Example:
Device(config)# exit
enable
Example:
Device> enable
Step 3
Displays the current state of an autonomic device including the global details.
show autonomic neighbors [detail]
Example:
Device# show autonomic neighbors detail
UDI: "PID:A901-12C-FT-D SN:CAT1602U0C3"
Device ID
0006.f6ac.3be0-4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
812
Domain ID
manual-cisco
State
Nbr inside the Domain
Credential
Domain Cert
Credential Validation
Passed
Last Validated Time 2014-07-21 12:42:57 IST
Certificate Expiry Date 2015-07-21 12:42:48 IST
Certificate Expire Countdown 31535585 (secs)
Number of Links connected 1
Link:
Local Interface: Vlan4086(GigabitEthernet0/7)
Remote Interface: Vlan4026
IP Address: FE80::4255:39FF:FE8D:C93B
Uptime(Discovered Time): 00:06:36 ( 2014-07-21 12:43:07 IST)
Last Refreshed time: 7 seconds ago
Step 4
Step 5
manual-cisco
Live
FD8F:E354:CCF9:0:6:F6AC:3BE0:1
(sub:) cn=ANRA-CS
Step 6
Step 7
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
813
Document Title
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
814
Feature Name
Autonomic Networking
Infrastructure
Releases
Feature Information
Autonomic networking makes
network devices intelligent by
introducing self-management
concepts that simplify network
management for the network
operator. The Autonomic
Networking Infrastructure feature
simplifies the network bootstrap
functionality by removing the need
for any kind of prestaging, thereby
allowing devices to join a domain
securely, after which devices can
be configured.
The following commands were
introduced or modified: autonomic
connect, autonomic registrar,
autonomic service, clear
autonomic, debug autonomic,
device-accept, domain-id, show
autonomic control plane, show
autonomic device, show
autonomic interfaces, show
autonomic neighbors, show
autonomic registrar, show
autonomic service, whitelist.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
815
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
816
CHAPTER
42
IPv4 Multicast
This feature module describes how to configure IP multicast in an IPv4 network. IP multicast is an efficient
way to use network resources, especially for bandwidth-intensive services such as audio and video.
Finding Feature Information, page 817
Prerequisites for IPv4 Multicast, page 817
Restrictions for IPv4 Multicast, page 818
Information About IPv4 Multicast, page 818
Configuring IPv4 Multicast, page 824
Configuration Examples for IPv4 Multicast, page 843
Troubleshooting Tips, page 846
Additional References, page 847
Feature Information for IPv4 Multicast, page 848
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
817
IPv4 Multicast
Restrictions for IPv4 Multicast
You must enable the asr901-multicast source command on the SVI interface that is connected to the
traffic source for PIM sparse mode.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
818
IPv4 Multicast
Supported Protocols
For more information on IP Multicast Technology, see the IP Multicast Technology Overview document at:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipmulti_pim/configuration/xe-3s/imc_tech_oview.html.
Supported Protocols
Basic multicast routing
IP Multicast Routing for VRF Lite
IGMP
PIMv4 SSM
PIMv4 SSM Mapping
PIM MIB
PIM sparse mode
PIM BFD
Static Rendezvous Point (RP)
Auto RP
Bootstrap router (BSR)
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
819
IPv4 Multicast
IGMP
Path First (OSPF), Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS),
and static routes. PIM uses unicast routing information to perform the multicast forwarding function.
Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the
RPF check function instead of building up a completely independent multicast routing table. Unlike other
routing protocols, PIM does not send and receive routing updates between routers.
For more information on SSM and PIM, see the IP Multicast Technology Overview document at: http://
www.cisco.com/en/US/docs/ios-xml/ios/ipmulti_pim/configuration/xe-3s/imc_tech_oview.html
IGMP
IGMP is used to dynamically register individual hosts in a multicast group on a particular LAN. Enabling
PIM on an interface also enables IGMP. IGMP provides a means to automatically control and limit the flow
of multicast traffic throughout the network with the use of special multicast queriers and hosts.
For more information on IGMP, see the IP Multicast: IGMP Configuration Guide at: http://www.cisco.com/
en/US/docs/ios-xml/ios/ipmulti_igmp/configuration/xe-3s/imc_customizing_igmp.html
IGMPv1
IGMP version 1 is a simple protocol consisting of two messages. It provides the basic query-response
mechanism that allows the multicast device to determine which multicast groups are active and other processes
that enable hosts to join a multicast group. RFC 1112 defines the IGMPv1 host extensions for IP multicasting.
IGMPv2
IGMP version 2 extends the functionality of IGMP, allowing such capabilities as the IGMP leave process,
group-specific queries, and an explicit maximum response time field. IGMPv2 also adds the capability for
devices to elect the IGMP querier without dependence on the multicast protocol to perform this task. RFC
2236 defines IGMPv2.
IGMPv3
IGMP version 3 provides for source filtering, which enables a multicast receiver host to signal to a device
which groups it wants to receive multicast traffic from, and from which sources this traffic is expected. In
addition, IGMPv3 supports the link local address 224.0.0.22, which is the destination IP address for IGMPv3
membership reports; all IGMPv3-capable multicast devices must listen to this address. RFC 3376 defines
IGMPv3.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
820
IPv4 Multicast
IGMP Snooping
IGMP Snooping
IGMP snooping allows a router to examine IGMP packets and make forwarding decisions based on their
content. IGMP, which runs at Layer 3 on a multicast router, generates Layer 3 IGMP queries in subnets where
the multicast traffic has to be routed. Using IGMP snooping, the router intercepts IGMP messages from the
host and updates its multicast table accordingly.
You can configure the router to use IGMP snooping in subnets that receive IGMP queries from either IGMP
or the IGMP snooping querier. IGMP snooping constrains IPv4 multicast traffic at Layer 2 by configuring
Layer 2 LAN ports dynamically to forward IPv4 multicast traffic only to those ports that want to receive it.
You can configure the IGMP snooping lookup method for each VLAN. Layer 3 IGMP snooping lookup uses
destination IP addresses in the Layer 2 multicast table (This is the default behavior). Layer 2 IGMP snooping
lookup uses destination MAC addresses in the Layer 2 multicast table.
For more information on IGMP snooping, see the IPv4 Multicast IGMP Snooping document at: http://
www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/15.0SY/configuration/guide/ipv4_igmp_
snooping.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
821
IPv4 Multicast
PIM SSM Mapping
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
822
IPv4 Multicast
IP Multicast VRF Lite
If the packet arrives on the RPF interface, a router forwards the packet out the interfaces present in the
outgoing interface list of a multicast routing table entry.
If the packet does not arrive on the RPF interface, the packet is silently discarded to prevent loops.
PIM SSM uses source trees to forward datagrams; the RPF check is performed as follows:
If a PIM router has source-tree state (that is, an [S, G] entry is present in the multicast routing table),
the router performs the RPF check against the IPv4 address of the source of the multicast packet.
Sparse-mode PIM uses the RPF lookup function to determine where it needs to send joins and prunes.
(S, G) joins (which are source-tree states) are sent toward the source.
For more information on Reverse Path Forwarding, see the Configuring Unicast Reverse Path Forwarding
document at: http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfrpf.html
PIM BFD
Bidirectional Forwarding Detection (BFD) is a detection protocol designed to provide fast forwarding path
failure detection times for all media types, encapsulations, topologies, and routing protocols and independent
of the higher layer protocols. In addition to fast forwarding path failure detection, BFD provides a consistent
failure detection method for network administrators. Because the network administrator can use BFD to detect
forwarding path failures at a uniform rate, rather than the variable rates for different routing protocol hello
mechanisms, network profiling and planning is easier and reconvergence time is consistent and predictable.
Protocol Independent Multicast (PIM) uses a hello mechanism for discovering new neighbors and for detecting
failures between adjacent nodes. The minimum failure detection time in PIM is 3 times the PIM Query-Interval.
To enable faster failure detection, the rate at which a PIM Hello message is transmitted on an interface is
configurable. However, lower intervals increase the load on the protocol and can increase CPU and memory
utilization and cause a system-wide negative impact on performance. Lower intervals can also cause PIM
neighbors to expire frequently as the neighbor expiry can occur before the hello messages received from those
neighbors are processed.
The BFD Support for Multicast (PIM) feature, also known as PIM BFD, registers PIM as a client of BFD.
PIM can then utilize BFD to initiate a session with an adjacent PIM node to support BFD's fast adjacency
failure detection in the protocol layer. PIM registers just once for both PIM and IPv6 PIM.
At PIMs request (as a BFD client), BFD establishes and maintains a session with an adjacent node for
maintaining liveness and detecting forwarding path failure to the adjacent node. PIM hellos will continue to
be exchanged between the neighbors even after BFD establishes and maintains a BFD session with the neighbor.
The behavior of the PIM hello mechanism is not altered due to the introduction of this feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
823
IPv4 Multicast
Configuring IPv4 Multicast
Although PIM depends on the Interior Gateway Protocol (IGP) and BFD is supported in IGP, PIM BFD is
independent of IGP's BFD.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip multicast-routing
Example:
Router(config)# ip multicast-routing
Step 4
asr901-platf-multicast enable
Example:
Router(config)# asr901-platf-multicast
enable
Step 5
Example:
Router(config)# ip pim rp-address
192.168.0.1
Step 6
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
824
IPv4 Multicast
Configuring PIM SSM
Step 7
Command or Action
Purpose
ip pim sparse-mode
Example:
Router(config-if)# ip pim sparse-mode
Step 8
asr901-multicast source
Example:
Router(config-if)# asr901-multicast
source
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config)# interface vlan 5
Step 5
ip pim sparse-mode
Example:
Router(config-if)# ip pim sparse-mode
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
825
IPv4 Multicast
Configuring PIM SSM Mapping
Step 6
Command or Action
Purpose
ip igmp version 3
Example:
Router(config-if)# ip igmp version 3
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# no ip igmp ssm-map query
dns
Step 4
Example:
Router(config)# ip igmp ssm-map enable
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
826
IPv4 Multicast
Configuring Multicast Receivers in VRF Interface
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
827
IPv4 Multicast
Configuring IGMP Snooping
Untagged
Dot1q (with or without rewrite)
Routed QinQ (with rewrite pop 2)
These sections describe how to configure IGMP snooping:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip igmp snooping
Example:
Router(config)# ip igmp snooping
Step 4
exit
Example:
Router(config)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
828
IPv4 Multicast
Configuring IGMP Snooping
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
ip igmp snooping
Example:
Router(config)# ip igmp snooping
Step 4
Example:
Router(config)# ip igmp snooping vlan
102
Step 5
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
asr901-platf-multicast enable
Example:
Router(config)# asr901-platf-multicast
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
829
IPv4 Multicast
Configuring IGMP Snooping
Step 4
Command or Action
Purpose
Example:
Router(config)# ip igmp snooping vlan
5
Step 5
Example:
Router(config)# ip igmp snooping vlan
5 check
rtr-alert-option
Step 6
Example:
Router(config)# ip igmp snooping vlan
5
check ttl
Step 7
Step 8
Step 9
Step 10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
830
IPv4 Multicast
Configuring IGMP Snooping
Step 11
Command or Action
Purpose
Example:
Step 12
Step 13
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
no ip igmp snooping
Example:
Router(config)# no ip igmp snooping
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
831
IPv4 Multicast
Configuring IGMP Snooping
Step 4
Command or Action
Purpose
Example:
Router(config)# no ip igmp snooping
vlan 10
Step 5
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Note
Step 4
Example:
Router(config-vrf)# vrf definition
vpe_1
Step 5
rd route-distinguisher
Example:
Router(config-vrf)# rd 1.1.1.1:100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
832
IPv4 Multicast
Configuring IGMP Snooping
Step 6
Command or Action
Purpose
address-family ipv4
Example:
Router(config-vrf)# address-family
ipv4
Step 7
exit address-family
Example:
Router(config-router-af)# exit
address-family
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface VLAN 80
Step 4
Step 5
ip address ip-address
Example:
Router(config-if)# ip address
192.108.1.27 255.255.255.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
833
IPv4 Multicast
Configuring IGMP Snooping
Step 6
Command or Action
Purpose
ip pim sparse-mode
Example:
Router(config-if)# ip pim
sparse-mode
Step 7
Example:
Router(config-if)# ip ospf 1 area
0
Step 8
exit
Example:
Router(config-if)# exit
Step 9
Example:
Restriction
This feature is supported only on switch virtual interfaces on which both PIM and BFD are supported.
For ECMP, PIM BFD is used to detect quick neighbor failure.
For non-ECMP, BFD for IGP should be configured for faster convergence.
Timers that are less than 50 ms for 3 sessions are not supported.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
834
IPv4 Multicast
Verifying IPv4 Multicast Routing
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface VLAN 80
Step 4
ip pim bfd
Example:
Router(config-if)# ip pim bfd
Uptime
Expires
Last Reporter
04:10:01 stopped
70.1.1.10
04:17:35 00:02:58 16.1.1.3
05:08:03 00:02:54 23.1.1.1
Group Accounted
To display the contents of the IP multicast routing table, use the show command described in the following
example.
Router#
show ip mroute
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
835
IPv4 Multicast
Verifying PIM SSM Mapping
To display the sources that SSM mapping uses for a particular group, use the show command described in
the following example.
Router# show ip igmp ssm-mapping 232.1.1.1
Group address: 232.1.1.1
Database
: Static
Source list : 5.1.1.1
9.1.1.1
To display the multicast groups with receivers that are directly connected to the router and that were learned
through IGMP, use the show command described in the following examples.
show ip igmp groups group-address
Router# show ip igmp groups 232.1.1.1
IGMP Connected Group Membership
Group Address
Interface
232.1.1.1
Vlan70
Uptime
Expires
Last Reporter
04:14:26 stopped
70.1.1.10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
836
Group Accounted
IPv4 Multicast
Verifying Static Mroute
Uptime
Expires
Last Reporter
04:15:33 stopped
70.1.1.10
Group Accounted
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
837
IPv4 Multicast
Verifying IGMP Snooping
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
2
2
1000
Yes
Yes
Vlan 102:
-------IGMP snooping Admin State
IGMP snooping Oper State
IGMPv2 immediate leave
Report suppression
Robustness variable
Last member query count
Last member query interval
Check TTL=1
Check Router-Alert-Option
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
2
2
1000
Yes
Yes
Vlan 105:
-------IGMP snooping Admin State
IGMP snooping Oper State
IGMPv2 immediate leave
Report suppression
Robustness variable
Last member query count
Last member query interval
Check TTL=1
Check Router-Alert-Option
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
2
2
1000
Yes
Yes
To display the IGMP snooping configuration, use the show ip igmp snooping vlan bridge-domain command,
as shown in the following example:
Router# show ip igmp snooping vlan 105
Global IGMP Snooping configuration:
------------------------------------------IGMP snooping Oper State
: Enabled
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
838
IPv4 Multicast
Verifying IP Multicast Routing for VRF Lite
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
2
2
2
1000
No
No
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
2
2
1000
Yes
Yes
0
10000
To display the IGMP snooping configuration, use the show ip igmp snooping groups command, as shown
in the following examples:
Router# show ip igmp snooping groups
Flags: I -- IGMP snooping, S -- Static, P -- PIM snooping, A -- ASM mode
Vlan Group/source Type Version Port List
----------------------------------------------------------------------104 232.0.0.5 I v3 Gi0/0
104 232.0.0.6 I v3 Gi0/0
104 232.0.0.7 I v3 Gi0/0
104 232.0.0.8 I v3 Gi0/0
104 232.0.0.9 I v3 Gi0/0
Router# show ip igmp snooping groups vlan 104
Flags: I -- IGMP snooping, S -- Static, P -- PIM snooping, A -- ASM mode
Vlan Group/source Type Version Port List
----------------------------------------------------------------------104 232.0.0.5 I v3 Gi0/0
104 232.0.0.6 I v3 Gi0/0
104 232.0.0.7 I v3 Gi0/0
104 232.0.0.8 I v3 Gi0/0
104 232.0.0.9 I v3 Gi0/0
Router# show ip igmp snooping groups count
Total number of groups: 6
Total number of (S,G): 0
-----------------------------------------------------------------------
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
839
IPv4 Multicast
Verifying IP Multicast Routing for VRF Lite
To view information about the interfaces configured for Protocol Independent Multicast (PIM), use the show
ip pim interface detail command:
Router# show ip pim vrf vpe_2 interface detail
Vlan80 is administratively down, line protocol is down
Internet address is 192.108.1.27/24
Multicast switching: fast
Multicast packets in/out: 0/0
Multicast TTL threshold: 0
PIM: enabled
PIM version: 2, mode: sparse
PIM DR: 0.0.0.0
PIM neighbor count: 0
PIM Hello/Query interval: 30 seconds
PIM Hello packets in/out: 0/0
PIM J/P interval: 60 seconds
PIM State-Refresh processing: enabled
PIM State-Refresh origination: disabled
PIM NBMA mode: disabled
PIM ATM multipoint signalling: disabled
PIM domain border: disabled
PIM neighbors rpf proxy capable: FALSE
PIM BFD: disabled
PIM Non-DR-Join: FALSE
Multicast Tagswitching: disabled
To view the information in a PIM topology table, use the show ip mroute vrf command:
Router# show ip mroute vrf vpe_2
IP Multicast Forwarding is not enabled.
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry, E - Extranet,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group,
G - Received BGP C-Mroute, g - Sent BGP C-Mroute,
N - Received BGP Shared-Tree Prune, n - BGP C-Mroute suppressed,
Q - Received BGP S-A Route, q - Sent BGP S-A Route,
V - RD & Vector, v - Vector, p - PIM Joins on route,
x - VxLAN group
Outgoing interface flags: H - Hardware switched, A - Assert winner, p - PIM Join
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
To view the forwarding entries and interfaces in the IP Multicast Forwarding Information Base (MFIB), use
the show ip mfib vrf command:
Router# show ip mfib vrf
Entry Flags:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
840
IPv4 Multicast
Verifying IP Multicast Routing for VRF Lite
VRF VPN_C
(*,224.0.0.0/4) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,224.0.1.40) Flags: C
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
0/0/0/0, Other: NA/NA/NA
Vlan131 Flags: IC
(*,232.0.0.1) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
0/0/0/0, Other: NA/NA/NA
(171.1.1.10,232.0.0.1) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
923200/12/60/5, Other: NA/NA/NA
Vlan134 Flags: A
Vlan131 Flags: F NS
Pkts: 0/0
VRF VPN_B
(*,224.0.0.0/4) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,224.0.1.40) Flags: C
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
5369300/12/60/5, Other: NA/NA/NA
Vlan121 Flags: IC
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
841
IPv4 Multicast
Verifying PIM BFD Support
To display BFD's registered clients such as PIM, OSPF, and so on, use the show bfd neighbors ipv4 details
command:
Router# show bfd neighbors ipv4 details
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int
24.24.24.1 3/3 Up Up Vl24
Session state is UP and not using echo function.
Session Host: Software
OurAddr: 24.24.24.2
Handle: 3
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 50000, Multiplier: 3
Received MinRxInt: 50000, Received Multiplier: 3
Holddown (hits): 126(0), Hello (hits): 50(36644)
Rx Count: 36656, Rx Interval (ms) min/max/avg: 1/56/45 last: 24 ms ago
Tx Count: 36647, Tx Interval (ms) min/max/avg: 1/56/46 last: 8 ms ago
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: PIM CEF OSPF
Template: abc
Authentication(Type/Keychain): md5/chain1
last_tx_auth_seq: 5 last_rx_auth_seq 4
Uptime: 00:27:47
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
C bit: 0
Multiplier: 3 - Length: 48
My Discr.: 3 - Your Discr.: 3
Min tx interval: 50000 - Min rx interval: 50000
Min Echo interval: 0
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int
101.101.101.1 1/3 Up Up Vl101
Session state is UP and not using echo function.
Session Host: Software
OurAddr: 101.101.101.2
Handle: 1
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 50000, Multiplier: 3
Received MinRxInt: 50000, Received Multiplier: 3
Holddown (hits): 126(0), Hello (hits): 50(37036)
Rx Count: 37014, Rx Interval (ms) min/max/avg: 1/56/46 last: 24 ms ago
Tx Count: 37037, Tx Interval (ms) min/max/avg: 1/60/46 last: 0 ms ago
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: PIM CEF OSPF
Template: abc
Authentication(Type/Keychain): md5/chain1
last_tx_auth_seq: 4 last_rx_auth_seq 6
Uptime: 00:28:03
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
842
IPv4 Multicast
Configuration Examples for IPv4 Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
843
IPv4 Multicast
Example: Configuring Rendezvous Point
!
ip multicast-routing
ip igmp ssm-map enable
ip igmp ssm-map static 10 172.16.8.10
ip igmp ssm-map static 11 172.16.8.11
!
.
.
.
!
interface vlan10
description Sample IGMP Interface Configuration for SSM-Mapping Example
ip address 10.20.1.2 255.0.0.0
ip pim sparse-mode
ip igmp static-group 232.1.2.1 source ssm-map
ip igmp version 3
!
.
.
.
!
ip pim ssm default
!
access-list 10 permit 232.1.2.10
access-list 11 permit 232.1.2.0 0.0.0.255
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
844
IPv4 Multicast
Example: Configuring IPv4 Multicast Routing for VRF Lite
.
.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
845
IPv4 Multicast
Troubleshooting Tips
asr901-platf-multicast enable
interface Loopback1
ip address 3.3.3.3 255.255.255.255
ip ospf 1 area 0
!
!
interface GigabitEthernet0/0
no ip address
negotiation auto
service instance 24 ethernet
encapsulation dot1q 24
rewrite ingress tag pop 1 symmetric
bridge-domain 24
!
interface Vlan24
ip address 24.24.24.2 255.255.255.0
ip pim sparse-mode
ip pim bfd
ip igmp version 3
bfd interval 50 min_rx 50 multiplier 3
!
router ospf 1
router-id 3.3.3.3
timers throttle spf 50 50 5000
timers throttle lsa 10 20 5000
timers lsa arrival 10
timers pacing flood 5
network 24.24.24.0 0.0.0.255 area 0
network 25.25.25.0 0.0.0.255 area 0
network 55.55.55.0 0.0.0.255 area 0
network 101.101.101.0 0.0.0.255 area 0
bfd all-interfaces
ip pim ssm default
end
Troubleshooting Tips
To display IGMP packets received and sent, use the following debug command:
Router#
debug ip igmp
To display debugging messages about IGMP snooping, use the following debug command:
Router#
To display debugging messages about IP PIM, use the following debug command:
Router#
To display PIM packets received and sent, and to display PIM-related events for BFD, use the following
debug command:
Router#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
846
IPv4 Multicast
Additional References
To display debugging messages about BFD, use the following debug command:
Router#
Note
We recommend that you do not use these debug commands without TAC supervision.
Additional References
The following sections provide references related to IPv4 Multicast feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Series Aggregation Services Router
Command Reference
Cisco ASR 901S Series Aggregation Services Router
Command Reference
IP Multicast Technology Overview
Customizing IGMP
Title
RFC 1112
RFC 2236
RFC 3376
RFC 3569
Source-Specific Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
847
IPv4 Multicast
Feature Information for IPv4 Multicast
MIBs
MIB
MIBs Link
PIM-MIB
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
848
IPv4 Multicast
Feature Information for IPv4 Multicast
Feature Name
Releases
Feature Information
15.4(1)S
IGMP Version 1
15.4(1)S
IGMP Version 2
15.4(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
849
IPv4 Multicast
Feature Information for IPv4 Multicast
Feature Name
Releases
Feature Information
IGMP Version 3
15.4(1)S
IGMP Snooping
15.4(2)S
15.4(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
850
CHAPTER
43
IPv6 Multicast
This feature module describes how to configure basic IP multicast in an IPv6 network.
Finding Feature Information, page 851
Prerequisites for IPv6 Multicast, page 851
Restrictions for IPv6 Multicast, page 852
Information About IPv6 Multicast, page 852
Configuring IPv6 Multicast, page 858
Configuration Examples for IPv6 Multicast, page 889
Troubleshooting Tips, page 892
Additional References, page 893
Feature Information for IPv6 Multicast, page 894
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
851
IPv6 Multicast
Restrictions for IPv6 Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
852
IPv6 Multicast
IPv6 Multicast Groups
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
853
IPv6 Multicast
MLD Snooping
A set of queriers and hosts that receive multicast data streams from the same source is called a multicast group.
Queriers and hosts use MLD reports to join and leave multicast groups and to begin receiving group traffic.
MLD uses the Internet Control Message Protocol (ICMP) to carry its messages. All MLD messages are
link-local with a hop limit of 1, and they all have the alert option set. The alert option implies an implementation
of the hop-by-hop option header.
MLD has three types of messages:
QueryGeneral, group-specific, and multicast-address-specific. In a query message, the multicast
address field is set to 0 when MLD sends a general query. The general query learns which multicast
addresses have listeners on an attached link. Group-specific and multicast-address-specific queries are
the same. A group address is a multicast address.
ReportIn a report message, the multicast address field is that of the specific IPv6 multicast address to
which the sender is listening.
DoneIn a done message, the multicast address field is that of the specific IPv6 multicast address to
which the source of the MLD message is no longer listening.
An MLD report must be sent with a valid IPv6 link-local source address, or the unspecified address (::). If
the sending interface has not yet acquired a valid link-local address. Sending reports with the unspecified
address is allowed to support the use of IPv6 multicast in the Neighbor Discovery Protocol.
For stateless autoconfiguration, a node is required to join several IPv6 multicast groups in order to perform
duplicate address detection (DAD). Prior to DAD, the only address the reporting node has for the sending
interface is a tentative one, which cannot be used for communication. Therefore, the unspecified address must
be used.
MLD states that result from MLD version 2 or MLD version 1 membership reports can be limited globally
or by interface. The MLD group limits feature provides protection against denial of service (DoS) attacks
caused by MLD packets. Membership reports in excess of the configured limits are not entered in the MLD
cache, and traffic for those excess membership reports are not forwarded.
MLD provides support for source filtering. Source filtering allows a node to report interest in listening to
packets only from specific source addresses (as required to support SSM), or from all addresses except specific
source addresses sent to a particular multicast address.
When a host using MLD version 1 sends a leave message, the device needs to send query messages to reconfirm
that this host was the last MLD version 1 host joined to the group before it can stop forwarding traffic. This
function takes about 2 seconds. This leave latency is also present in IGMP version 2 for IPv4 multicast.
MLD Snooping
MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners (nodes looking
to receive IPv6 multicast packets) on its directly attached links, and to discover which multicast packets are
of interest to neighboring nodes.
Using MLD snooping, IPv6 multicast data is selectively forwarded to a list of ports that looks to receive the
data, instead of data being flooded to all the ports in a VLAN. This list is constructed by snooping IPv6
multicast control packets.
For more information on MLD snooping, see the IPv6 MLD Snooping document at: http://www.cisco.com/
en/US/docs/switches/lan/catalyst6500/ios/15.0SY/configuration/guide/ipv6_mld_snooping.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
854
IPv6 Multicast
Protocol Independent Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
855
IPv6 Multicast
Protocol Independent Multicast
For more information on PIM, see the IP Multicast Technology Overview document at: http://www.cisco.com/
en/US/docs/ios-xml/ios/ipmulti_pim/configuration/xe-3s/imc_tech_oview.html
PIM-Sparse Mode
PIM-SM uses a pull model to deliver multicast traffic. Only network segments with active receivers that have
explicitly requested the data receive the traffic.
PIM-SM distributes information about active sources by forwarding data packets on the shared tree. Because
PIM-SM uses shared trees (at least, initially), it requires the use of a rendezvous point (RP). The RP must be
administratively configured in the network.
For more information on PIM Sparse Mode, see the IP Multicast: PIM Configuration Guide at: http://
www.cisco.com/en/US/docs/ios-xml/ios/ipmulti_pim/configuration/xe-3s/ip6-mcast-pim-sm.html
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
856
IPv6 Multicast
IPv6 Multicast VRF Lite
Rendezvous Point
A rendezvous point (RP) is required only in networks running Protocol Independent Multicast sparse mode
(PIM-SM). The protocol is described in RFC 2362.
For more information on RP, see the Configuring a Rendezvous Point guide at: http://www.cisco.com/en/US/
docs/ios/solutions_docs/ip_multicast/White_papers/rps.html
The recommended methods for configuring an RP in a PIM-SM network are given below:
Static RP
Bootstrap router
Anycast RP
Note
PIM BFD
Bidirectional Forwarding Detection (BFD) is a detection protocol designed to provide fast forwarding path
failure detection times for all media types, encapsulations, topologies, and routing protocols and independent
of the higher layer protocols. In addition to fast forwarding path failure detection, BFD provides a consistent
failure detection method for network administrators. Because the network administrator can use BFD to detect
forwarding path failures at a uniform rate, rather than the variable rates for different routing protocol hello
mechanisms, network profiling and planning is easier and reconvergence time is consistent and predictable.
Protocol Independent Multicast (PIM) uses a hello mechanism for discovering new neighbors and for detecting
failures between adjacent nodes. The minimum failure detection time in PIM is 3 times the PIM Query-Interval.
To enable faster failure detection, the rate at which a PIM Hello message is transmitted on an interface is
configurable. However, lower intervals increase the load on the protocol and can increase CPU and memory
utilization and cause a system-wide negative impact on performance. Lower intervals can also cause PIM
neighbors to expire frequently as the neighbor expiry can occur before the hello messages received from those
neighbors are processed.
The BFD Support for Multicast (PIM) feature, also known as PIM BFD, registers PIM as a client of BFD.
PIM can then utilize BFD to initiate a session with an adjacent PIM node to support BFD's fast adjacency
failure detection in the protocol layer. PIM registers just once for both PIM and IPv6 PIM.
At PIMs request (as a BFD client), BFD establishes and maintains a session with an adjacent node for
maintaining liveness and detecting forwarding path failure to the adjacent node. PIM hellos will continue to
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
857
IPv6 Multicast
Configuring IPv6 Multicast
be exchanged between the neighbors even after BFD establishes and maintains a BFD session with the neighbor.
The behavior of the PIM hello mechanism is not altered due to the introduction of this feature.
Although PIM depends on the Interior Gateway Protocol (IGP) and BFD is supported in IGP, PIM BFD is
independent of IGP's BFD.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
asr901-platf-multicast enable
Example:
Router(config)# asr901-platf-multicast
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
858
IPv6 Multicast
Disabling MLD Device-Side Processing
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
no ipv6 mfib
Example:
Router(config)# no ipv6 mfib
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 105
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
859
IPv6 Multicast
Configuring MLD Protocol on an Interface
Step 4
Command or Action
Purpose
Example:
Router(config)# no ipv6 mld router
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 104
Step 4
Example:
Router(config-if)# ipv6 mld
query-interval 60
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
860
IPv6 Multicast
Configuring MLD Snooping
Step 6
Command or Action
Purpose
Example:
Router(config-if)# ipv6 mld
query-timeout 130
Step 7
ipv6 mld join-group [group-address] Configures MLD reporting for given group with MLDv1
[include | exclude] {source-address | or given source and group with MLDv2. The packets that
are addressed to this group address are passed up to the
source-list [acl]}
client process in the router as well forwarded out the
interface.
Example:
Router(config-if)# ipv6 mld
join-group
ff04::12 exclude 2001:DB8::10:11
Step 8
ipv6 mld static-group [group-address] Configures forwarding of traffic for the multicast group
[include | exclude] {source-address | onto this interface and behave as if an MLD joiner was
present on the interface. The packets to the group get
source-list [acl]}
fastswitched or hardware switched (whatever is available
on the platform).
Example:
Router(config-if)# ipv6 mld
static-group
ff04::10 include 100::1
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
861
IPv6 Multicast
Configuring MLD Snooping
Note
In the context of REP and G8032, topology change may cause the routers in the ring topology to trigger
general queries that may impact the convergence time (because this time is based on the report received
from the host).
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ipv6 mld snooping
Step 4
exit
Example:
Router(config)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
862
IPv6 Multicast
Configuring MLD Snooping
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config)# ipv6 mld snooping
vlan 1001
Step 5
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ipv6 mld snoopingvlan vlan-id static Configures statically a multicast group with a Layer 2
port as a member of a multicast group:
ipv6-multicast-address interface
interface-id
vlan-idMulticast group VLAN ID. The VLAN
ID ranges from 1 to 1001 and 1006 to 4094.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
863
IPv6 Multicast
Configuring MLD Snooping
Command or Action
Purpose
ipv6-multicast-address The 128-bit group IPv6
address. The address must be in the form specified
in RFC 2373.
Example:
Router(config)# ipv6 mld snooping
vlan 104
static FF45::5 interface
gigabitethernet0/4
Step 4
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ipv6 mld snoopingvlan vlan-id mroute Specifies the multicast router VLAN ID, and the
interface of the multicast router.
interface interface-id
Example:
Router(config)# ipv6 mld snooping
vlan 104
mrouter interface gigabitEthernet
0/4
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
864
IPv6 Multicast
Configuring MLD Snooping
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ipv6 mld snooping
vlan 104 immediate-leave
Step 4
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
865
IPv6 Multicast
Configuring MLD Snooping
Step 3
Command or Action
Purpose
Example:
Router(config)# ipv6 mld snooping
check hop-count
Step 4
Step 5
ipv6 mld snooping last-listener-query-count Sets the last listener query count on a VLAN basis.
This value overrides the value configured globally.
count
The range is from 1 to 7. The default is 0. When
set to 0, the global count value is used. Queries
Example:
are sent 1 second apart.
Router(config)# ipv6 mld snooping
last-listener-query-count 3
Step 6
Step 7
Example:
Router(config)# ipv6 mld snooping
listener-message-suppression
Step 8
Step 9
Step 10
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
866
IPv6 Multicast
Configuring a Rendezvous Point
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# no ipv6 mld snooping
listener-message-suppression
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
867
IPv6 Multicast
Disabling PIM SSM Multicast on an Interface
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 104
Step 4
ipv6 pim
Example:
Router(config-if)# ipv6 pim
Step 5
Step 6
Example:
Router(config-if)# ipv6 pim
join-prune-interval 75
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
868
IPv6 Multicast
Configuring IPv6 SSM Mapping
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 104
Step 4
no ipv6 pim
Example:
Router(config-if)# no ipv6 pim
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
869
IPv6 Multicast
Configuring IPv6 Multicast Routing for VRF Lite
Step 3
Command or Action
Purpose
Example:
Note
Step 4
Example:
Router(config-if)# ipv6 mld ssm-map
static SSM_MAP_ACL_2 2001:DB8:1::1
Step 5
Example:
Router(config-if)# no ipv6 mld ssm-map
query dns
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
870
IPv6 Multicast
Enabling VRF Under a VLAN Interface
Step 4
Command or Action
Purpose
vrf definitionvrf-name
Example:
Router(config-vrf)# vrf definition
vpe_1
Step 5
rd route-distinguisher
Example:
Router(config-vrf)# rd 1.1.1.1:100
Step 6
address-family ipv6
Example:
Router(config-vrf)# address-family
ipv6
Step 7
exit-address-family
Example:
Router(config-router-af)#
exit-address-family
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface VLAN 80
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
871
IPv6 Multicast
Configuring PIM BFD on an IPv6 Interface
Step 4
Command or Action
Purpose
Example:
Router(config-if)# vrf forwarding
vpe_1
Step 5
Example:
Router(config-if)# ipv6 address
my-prefix 0:0:0:7272::72/64
This feature is supported only on switch virtual interfaces on which both PIM and BFD are supported.
Restriction
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
872
IPv6 Multicast
Verifying IPv6 Multicast
Step 3
Command or Action
Purpose
Example:
Router(config)# interface VLAN 80
Step 4
Interface
Vlan104
Vlan104
Vlan104
Vlan104
Uptime
00:18:41
00:19:10
00:35:00
00:35:04
Expires
never
never
not used
00:01:44
To display the MLD interface specific parameters, use the show command described in the following example.
Router# show ipv6 mld interface vlan 104
Vlan104 is up, line protocol is up
Internet address is FE80::4255:39FF:FE89:6283/10
MLD is enabled on interface
Current MLD version is 2
MLD query interval is 60 seconds
MLD querier timeout is 130 seconds
MLD max query response time is 20 seconds
Last member query response interval is 1 seconds
MLD activity: 18 joins, 7 leaves
MLD querying router is FE80::4255:39FF:FE89:6283 (this system)
To display the MLD traffic counters, use the show command described in the following example.
Router# show ipv6 mld traffic
MLD Traffic Counters
Elapsed time since counters cleared: 02:29:12
Valid MLD Packets
Queries
Reports
Leaves
Mtrace packets
Received
784
4
776
4
0
Sent
385
167
218
0
0
Errors:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
873
IPv6 Multicast
Verifying IPv6 Multicast
Malformed Packets
Martian source
Non link-local source
Hop limit is not equal to 1
0
10
0
0
To display interface specific information for PIM, use the show command described in the following example.
Router# show ipv6 pim interface
Interface
PIM
Nbr
Hello
Count Intvl
DR
Prior
Vlan102
on
1
30
1
Address: FE80::4255:39FF:FE89:5283
DR
: FE80::4255:39FF:FE89:5284
Null0
off
0
30
1
Address: FE80::1
DR
: not elected
FastEthernet0/0
off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/8 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/9 off
0
30
1
Address: ::
DR
: not elected
Gi0/10
off
0
30
1
Address: ::
DR
: not elected
Gi0/11
off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/0 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/1 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/2 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/3 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/4 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/5 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/6 off
0
30
1
Address: ::
DR
: not elected
GigabitEthernet0/7 off
0
30
1
Address: ::
DR
: not elected
Vlan1
off
0
30
1
Address: ::
DR
: not elected
Port-channel1
off
0
30
1
Address: ::
DR
: not elected
Tunnel0
off
0
30
1
Address: FE80::7EAD:74FF:FE9D:94C8
DR
: not elected
Loopback1
off
0
30
1
Address: ::
DR
: not elected
Vlan104
on
1
45
1
Address: FE80::4255:39FF:FE89:6283
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
874
IPv6 Multicast
Verifying IPv6 Multicast
DR
: FE80::4255:39FF:FE89:6284
Tunnel1
off
0
30
1
Address: FE80::7EAD:74FF:FE9D:94C8
DR
: not elected
To display the number of (*, G) and (S, G) membership reports present in the MLD cache, use the show
command described in the following example.
Router# show ipv6 mld groups summary
MLD Route Summary
No. of (*,G) routes = 9
No. of (S,G) routes = 3
To display the number of PIM neighbors on each interface, as well as, the total number of PIM neighbors,
use the show command described in the following example.
Router# show ipv6 pim neighbor count
Interface
Nbr count
Vlan104
Vlan102
1
1
Total Nbrs
To display the number of PIM neighbors discovered, use the show command described in the following
example.
Router# show ipv6 pim neighbor
PIM Neighbor Table
Mode: B - Bidir Capable, G - GenID Capable
Neighbor Address
Interface
Uptime
Expires
FE80::4255:39FF:FE89:5284
FE80::4255:39FF:FE89:6284
02:30:51
00:09:49
00:01:38 B G
00:01:16 B G
Vlan102
Vlan104
Mode DR pri
DR 1
DR 1
To display the information in the PIM topology table in a format similar to the show ip mroute command,
use the show command described in the following example.
Router# show ipv6 mroute
Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group,
C - Connected, L - Local, I - Received Source Specific Host Report,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, Y - Joined MDT-data group,
y - Sending to MDT-data group
g - BGP signal originated, G - BGP Signal received,
N - BGP Shared-Tree Prune received, n - BGP C-Mroute suppressed,
q - BGP Src-Active originated, Q - BGP Src-Active received
E - Extranet
Timers: Uptime/Expires
Interface state: Interface, State
(2006::1, FF34::4), 00:38:41/never, flags: sPTI
Incoming interface: Vlan102
RPF nbr: FE80::4255:39FF:FE89:5284
Immediate Outgoing interface list:
Vlan104, Null, 00:38:41/never
(100::1, FF04::10), 00:22:21/never, flags: SPI
Incoming interface: Null
RPF nbr: ::
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
875
IPv6 Multicast
Verifying IPv6 Multicast
To display PIM topology table for given group or all groups, use the show command described in the following
example.
Router# show ipv6 pim topology
IP PIM Multicast Topology Table
Entry state: (*/S,G)[RPT/SPT] Protocol Uptime Info Upstream Mode
Entry flags: KAT - Keep Alive Timer, AA - Assume Alive, PA - Probe Alive,
RA - Really Alive, LH - Last Hop, DSS - Don't Signal Sources,
RR - Register Received, SR - Sending Registers, E - MSDP External,
DCC - Don't Check Connected, Y - Joined MDT-data group,
y - Sending to MDT-data group
BGS - BGP Signal Sent, !BGS - BGP signal suppressed
SAS - BGP Src-Act Sent, SAR - BGP Src-Act Received
Interface state: Name, Uptime, Fwd, Info
Interface flags: LI - Local Interest, LD - Local Disinterest,
II - Internal Interest, ID - Internal Disinterest,
LH - Last Hop, AS - Assert, AB - Admin Boundary, BS - BGP Signal,
BP - BGP Shared-Tree Prune, BPT - BGP Prune Time
(2006::1,FF34::4)
SSM SPT UP: 00:39:23 JP: Null(never) Flags:
RPF: Vlan102,FE80::4255:39FF:FE89:5284
Vlan104
00:39:23 off
LI
(100::1,FF04::10)
SM UP: 00:23:04 JP: Null(never) Flags:
RPF: ,::
Vlan104
00:23:04 off
LI
(*,FF04::12)
SM UP: 00:23:33 JP: Null(never) Flags:
RP: 2021::2021
RPF: Vlan104,FE80::4255:39FF:FE89:6284
Vlan104
00:23:33 off
LI II
(2001:DB8::10:11,FF04::12)
SM RPT UP: 00:23:33 JP: Null(never) Flags:
RP: 2021::2021
RPF: Vlan104,FE80::4255:39FF:FE89:6284
Vlan104
00:23:33 off
LD ID
(*,FF45::5)
SM UP: 00:39:27 JP: Null(never) Flags:
RP: 2021::2021
RPF: Vlan104,FE80::4255:39FF:FE89:6284
Vlan104
00:39:27 off
LI IP PIM Multicast Topology Table
Entry state: (*/S,G)[RPT/SPT] Protocol Uptime Info
Entry flags: KAT - Keep Alive Timer, AA - Assume Alive, PA - Probe Alive,
RA - Really Alive, LH - Last Hop, DSS - Don't Signal Sources,
RR - Register Received, SR - Sending Registers,
E - MSDP External, DCC - Don't Check Connected
Interface state: Name, Uptime, Fwd, Info
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
876
IPv6 Multicast
Verifying IPv6 Multicast
To display the count of the ranges, (*, G), (S, G) and (S, G) RPT routes in the pim topology tables, use the
show command described in the following example.
Router# show ipv6 pim topology route-count
PIM Topology Table Summary
No. of group ranges = 47
No. of (*,G) routes = 11
No. of (S,G) routes = 2
No. of (S,G)RPT routes = 1
To display the IP multicast group mapping table, use the show command described in the following example.
It shows group to mode mapping and RP information in case of sparse-mode groups.
Router# show ipv6 pim group-map FF0E::E0:1:1:1
IP PIM Group Mapping Table
(* indicates group mappings being used)
FF00::/8*
SM, RP: 2021::2021
RPF: Vl104,FE80::4255:39FF:FE89:6284
Info source: Static
Uptime: 02:33:31, Groups: 3
To display the IPv6 multicast range-lists on a per client (config/autorp/BSR) and per mode (SSM/SM/DM/
Bidir) basis, use the show command described in the following example.
Router# show ipv6 pim range-list
Static SSM Exp: never Learnt from : ::
FF33::/32 Up: 02:33:46
FF34::/32 Up: 02:33:46
FF35::/32 Up: 02:33:46
FF36::/32 Up: 02:33:46
FF37::/32 Up: 02:33:46
FF38::/32 Up: 02:33:46
FF39::/32 Up: 02:33:46
FF3A::/32 Up: 02:33:46
FF3B::/32 Up: 02:33:46
FF3C::/32 Up: 02:33:46
FF3D::/32 Up: 02:33:46
FF3E::/32 Up: 02:33:46
FF3F::/32 Up: 02:33:46
Static SM RP: 2021::2021 Exp: never Learnt from : ::
FF00::/8 Up: 02:33:44
To display information about the PIM register encapsulation and decapsulation tunnels, use the show command
described in the following example.
Router# show ipv6 pim tunnel
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
877
IPv6 Multicast
Verifying IPv6 Multicast
Tunnel0*
Type :
RP
:
Source:
Tunnel1*
Type :
RP
:
Source:
PIM Encap
Embedded RP Tunnel
2003::2
PIM Encap
2021::2021
2003::2
To display information about the PIM traffic counters, use the show command described in the following
example.
Router# show ipv6 pim traffic
PIM Traffic Counters
Elapsed time since counters cleared: 02:34:35
Received
613
613
0
0
0
0
0
0
Sent
629
622
7
0
0
0
0
Errors:
Malformed Packets
Bad Checksums
Send Errors
Packet Sent on Loopback Errors
Packets Received on PIM-disabled Interface
Packets Received with Unknown PIM Version
Packets drops due to PIM queue limits
0
0
0
0
0
0
0
To display the average Join/Prune aggregation for the last (1000/10000/50000) packets for each interface,
use the show command described in the following example.
Router# show ipv6 pim join-prune statistic
PIM Average Join/Prune Aggregation for last (1K/10K/50K) packets
Interface
MTU
Transmitted
Received
Vlan102
Null0
FastEthernet0/0
GigabitEthernet0/8
GigabitEthernet0/9
Gi0/10
Gi0/11
GigabitEthernet0/0
GigabitEthernet0/1
GigabitEthernet0/2
GigabitEthernet0/3
GigabitEthernet0/4
GigabitEthernet0/5
GigabitEthernet0/6
GigabitEthernet0/7
Vlan1
Port-channel1
Tunnel0
Loopback1
Vlan104
Tunnel1
1500
1500
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1280
1452
1280
1500
1452
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
878
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
/
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
IPv6 Multicast
Verifying IPv6 Multicast
To display the MRIB table, use the show command described in the following example. All entries are created
by various clients of MRIB, such as, MLD, PIM and MFIB. The flags on each entry or interface, serve as
communication mechanism between various clients of MRIB.
Router# show ipv6 mrib route FF0E::E0:1:1:1
IP Multicast Routing Information Base
Entry flags: L - Domain-Local Source, E - External Source to the Domain,
C - Directly-Connected Check, S - Signal, IA - Inherit Accept, D - Drop
ET - Data Rate Exceeds Threshold,K - Keepalive,DDE - Data Driven Event
ME - MoFRR ECMP Flow based, MNE - MoFRR Non-ECMP Flow based,
MP - Primary MoFRR Non-ECMP Flow based entry
Interface flags: F - Forward, A - Accept, IC - Internal Copy,
NS - Negate Signal, DP - Don't Preserve, SP - Signal Present,
II - Internal Interest, ID - Internal Disinterest, LI - Local Interest,
LD - Local Disinterest, MD - mCAC Denied, MI - mLDP Interest
A2 - MoFRR ECMP Backup Accept
(*,FF45::5) RPF nbr: FE80::4255:39FF:FE89:6284 Flags: C
Vlan104 Flags: A LI
To display the count of the number of routes in the Multicast RIB, use the show command described in the
following example.
Router# show ipv6 mrib route summary
MRIB Route-DB Summary
No. of (*,G) routes = 57
No. of (S,G) routes = 3
No. of Route x Interfaces (RxI) = 22
To display information about the various MRIB clients, use the show command described in the following
example.
Router# show ipv6 mrib client
IP MRIB client-connections
igmp (0x0):309 (connection id 1)
pim (0x0):342
(connection id 2)
IPv6_mfib(0x1031AFB0):0.358
(connection id 3)
2024#show ipv6 mfib ff45::5
Entry Flags:
C - Directly Connected, S - Signal, IA - Inherit A flag,
ET - Data Rate Exceeds Threshold, K - Keepalive
DDE - Data Driven Event, HW - Hardware Installed
ME - MoFRR ECMP entry, MNE - MoFRR Non-ECMP entry, MP - MFIB
MoFRR Primary, RP - MRIB MoFRR Primary, P - MoFRR Primary
MS - MoFRR Entry in Sync, MC - MoFRR entry in MoFRR Client.
I/O Item Flags: IC - Internal Copy, NP - Not platform switched,
NS - Negate Signalling, SP - Signal Present,
A - Accept, F - Forward, RA - MRIB Accept, RF - MRIB Forward,
MA - MFIB Accept, A2 - Accept backup,
RA2 - MRIB Accept backup, MA2 - MFIB Accept backup
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts:
Total/RPF failed/Other drops
I/O Item Counts:
FS Pkt Count/PS Pkt Count
Default
(*,FF45::5) Flags: C
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
0/0/0/0, Other: NA/NA/NA
Vlan104 Flags: A
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
879
IPv6 Multicast
Verifying IPv6 Multicast
To display information about the IPv6 Multicast Forwarding Information Base, in terms of forwarding entries
and interfaces, use the show command described in the following example.
Router# show ipv6 mfib FF0E::E0:1:1:1
IP Multicast Forwarding Information Base
Entry Flags: C - Directly Connected, S - Signal, IA - Inherit A flag,
AR - Activity Required, D - Drop
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts: Total/RPF failed/Other drops
Interface Flags: A - Accept, F - Forward, NS - Negate Signalling
IC - Internal Copy, NP - Not platform switched
SP - Signal Present
Interface Counts: FS Pkt Count/PS Pkt Count
(*,FF0E::E0:1:1:1) Flags: C
Forwarding: 0/0/0/0, Other: 0/0/0
Tunnel1 Flags: A NS
FastEthernet4/10 Flags: F NS
Pkts: 0/0
(47::1:1:3,FF0E::E0:1:1:1) Flags:
Forwarding: 9592618/0/182/0, Other: 0/0/0
Vlan47 Flags: A
Tunnel0 Flags: F NS
Pkts: 0/0
FastEthernet4/10 Flags: F NS
Pkts: 0/9592618
To display the general MFIB configuration status and operational status, use the show command described
in the following example.
Router# show ipv6 mfib status
IPv6 Multicast Forwarding (MFIB) status:
Configuration Status: enabled
Operational Status: running
Initialization State: Running
Total signalling packets queued: 0
Process Status: may enable - 3 - pid 358
Tables 1/1/0 (active/mrib/io)
To display summary information about the number of IPv6 MFIB entries and interfaces, use the show command
described in the following example.
Router# show ipv6 mfib summary
Default
60 prefixes (60/0/0 fwd/non-fwd/deleted)
21 ioitems (21/0/0 fwd/non-fwd/deleted)
Forwarding prefixes: [3 (S,G), 11 (*,G), 46 (*,G/m)]
Table id 0x0, instance 0x1031AFB0
Database: epoch 0
2024#show ipv6 mfib in
2024#show ipv6 mfib int
2024#show ipv6 mfib interface
IPv6 Multicast Forwarding (MFIB) status:
Configuration Status: enabled
Operational Status: running
Initialization State: Running
Total signalling packets queued: 0
Process Status: may enable - 3 - pid 358
Tables 1/1/0 (active/mrib/io)
MFIB interface
status
Vlan102
Vlan104
up
up
CEF-based output
[configured,available]
[yes
,yes
]
[yes
,yes
]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
880
IPv6 Multicast
Verifying MLD Snooping
Tunnel0
Tunnel1
up
up
[yes
[yes
,no
,yes
]
]
To display the IPv6 multicast-enabled interfaces and their forwarding status, use the show command described
in the following example.
Router# show ipv6 mfib interface
IPv6 Multicast Forwarding (MFIB) status:
Configuration Status: enabled
Operational Status: running
MFIB interface status CEF-based output
[configured,available]
Loopback0 up [yes ,? ]
Vlan46 up [yes ,? ]
Vlan47 up [yes ,? ]
Tunnel0 down [yes ,no ]
Tunnel1 down [yes ,no ]
To display how IPv6 multicast routing does Reverse Path Forwarding, use the show command described in
the following example.
Router# show ipv6 rpf FE80::4255:39FF:FE89:7404
RPF information for 3::3
RPF interface: Vlan10
RPF neighbor: FE80::4255:39FF:FE89:7404
RPF route/mask: 3::3/128
RPF type: Unicast
RPF recursion count: 0
Metric preference: 110
Metric: 2
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
Enabled
3
3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
881
IPv6 Multicast
Verifying MLD Snooping
: 1000
: 100000/0
: Yes
Vlan 104:
-------MLD snooping Admin State
MLD snooping Oper State
MLD immediate leave
Explicit host tracking
Listener message suppression
Robustness variable
Last listener query count
Last listener query interval
EHT DB limit/count
Check Hop-count=1
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
3
3
1000
100000/2
Yes
Vlan 1001:
-------MLD snooping Admin State
MLD snooping Oper State
MLD immediate leave
Explicit host tracking
Listener message suppression
Robustness variable
Last listener query count
Last listener query interval
EHT DB limit/count
Check Hop-count=1
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Disabled
Enabled
Enabled
3
3
1000
100000/0
Yes
To display all or a specified IP Version 6 (IPv6) multicast address information maintained by MLD snooping,
use the show command described in the following example:
Router#
To display the number of multicast groups on a router or in a specified VLAN, use the show command
described in the following example:
Router#
To display the MLD snooping membership summary on a router or in a specified VLAN, use the show
command described in the following example:
Router#
Interface Reporter
Uptime
Last-Join/
Last-Leave
----------------------------------------------------------------------------------------------2006::1/FF34::4
Gi0/1
FE80::4255:39FF:FE89:6284
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
882
00:47:22 00:00:11
IPv6 Multicast
Verifying MLD Snooping
/
2006::1/FF34::4
/
Gi0/10
FE80::200:4EFF:FE72:F91F
00:47:26 00:00:09
-
To display the MLD snooping that is dynamically learned and manually configured on the multicast router
ports for a router or for a specific multicast VLAN, use the show command described in the following example:
Router#
Vlan
---102
104
ports
----Po1(dynamic)
Gi0/1(dynamic), Gi0/4(static)
To display the configuration and operation information for the MLD snooping configured on a router, use the
show command described in the following example:
Router#
Vlan
IP Address
MLD Version
Port
------------------------------------------------------------102
FE80::4255:39FF:FE89:5284
v2
Po1
104
FE80::4255:39FF:FE89:6284
v2
Gi0/1
To verify a static member port and an IPv6 address, use the show command described in the following example:
Router#
Vlan
----
Mac Address
-----------
Type
----
Ports
-----
To verify if IPv6 MLD snooping is enabled on a VLAN interface, use the show command described in the
following example:
Router#
Vlan
---104
ports
----Gi0/1(dynamic), Gi0/4(static)
To verify if Immediate Leave is enabled on a VLAN interface, use the show command described in the
following example:
Router#
: Enabled
: Enabled
: Enabled
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
883
IPv6 Multicast
Verifying IPv6 Multicast Routing for VRF Lite
:
:
:
:
:
:
:
:
:
Enabled
Enabled
3
3
1000
100000/2
Yes
125
10000
To verify the MLD snooping querier information for a router or for a VLAN, use the show command described
in the following example:
Router#
IP address
MLD version
Port
Max response time
Query interval
Robustness variable
:
:
:
:
:
:
FE80::4255:39FF:FE89:5284
v2
Gi0/3
10s
125s
2
PIM
Nbr
Hello
Count Intvl
DR
Prior
on
1
30
1
FE80::7EAD:74FF:FEDC:E4AC
this system
on
1
30
1
FE80::7EAD:74FF:FEDC:E4AC
this system
off
0
30
1
FE80::7EAD:74FF:FEDC:E4B0
not elected
To view the information in a PIM topology table, use the show ipv6 mroute command:
Router# show ipv6 mroute vrf VPN_B
Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group,
C - Connected, L - Local, I - Received Source Specific Host Report,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, Y - Joined MDT-data group,
y - Sending to MDT-data group
g - BGP signal originated, G - BGP Signal received,
N - BGP Shared-Tree Prune received, n - BGP C-Mroute suppressed,
q - BGP Src-Active originated, Q - BGP Src-Active received
E - Extranet
Timers: Uptime/Expires
Interface state: Interface, State
(170:1::3, FF36::1), 21:11:23/00:03:23, flags: sT
Incoming interface: Vlan123
RPF nbr: FE80::462B:3FF:FE48:DA54
Immediate Outgoing interface list:
Vlan122, Forward, 21:11:23/00:03:23
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
884
IPv6 Multicast
Verifying IPv6 Multicast Routing for VRF Lite
To view the forwarding entries and interfaces in the IPv6 Multicast Forwarding Information Base (MFIB),
use the show ipv6 mfib command:
Router# show ipv6 mfib vrf VPN_B
Entry Flags:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
885
IPv6 Multicast
Verifying IPv6 Multicast Routing for VRF Lite
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts:
Total/RPF failed/Other drops
I/O Item Counts:
FS Pkt Count/PS Pkt Count
VRF VPN_B
(*,FF00::/8) Flags: C
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF00::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF02::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 4/4/0
(*,FF10::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF12::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF20::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF22::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF30::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF32::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF33::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF34::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF35::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF36::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(170:1::3,FF36::1) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::2) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::3) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::4) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::5) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::6) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::7) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
886
IPv6 Multicast
Verifying IPv6 Multicast Routing for VRF Lite
(170:1::3,FF36::8) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::9) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(170:1::3,FF36::A) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwarding:
955000/12/60/5, Other: NA/NA/NA
Vlan123 Flags: A
Vlan122 Flags: F NS
Pkts: 0/0
(*,FF37::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF38::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF39::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3A::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3B::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3C::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3D::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3E::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF3F::/32) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF40::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF42::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF50::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF52::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF60::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF62::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF70::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF72::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF80::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF82::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF90::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FF92::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFA0::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFA2::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFB0::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFB2::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFC0::/15) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFC2::/16) Flags:
SW Forwarding: 0/0/0/0, Other: 0/0/0
(*,FFD0::/15) Flags:
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
887
IPv6 Multicast
Verifying PIM BFD Support
SW Forwarding: 0/0/0/0,
(*,FFD2::/16) Flags:
SW Forwarding: 0/0/0/0,
(*,FFE0::/15) Flags:
SW Forwarding: 0/0/0/0,
(*,FFE2::/16) Flags:
SW Forwarding: 0/0/0/0,
(*,FFF0::/15) Flags:
SW Forwarding: 0/0/0/0,
(*,FFF2::/16) Flags:
SW Forwarding: 0/0/0/0,
Other: 0/0/0
Other: 0/0/0
Other: 0/0/0
Other: 0/0/0
Other: 0/0/0
Other: 0/0/0
To view all BFD protocol parameters, timers, and clients such as PIM, OSPF, and so on for each neighbor,
use the show bfd neighbors ipv6 details command:
Router# show bfd neighbors ipv6 details
IPv6 Sessions
NeighAddr LD/RD RH/RS State Int
FE80::4255:39FF:FE89:5284 4/4 Up Up Vl24
Session state is UP and not using echo function.
Session Host: Software
OurAddr: FE80::4255:39FF:FE89:6284
Handle: 4
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 50000, Multiplier: 3
Received MinRxInt: 50000, Received Multiplier: 3
Holddown (hits): 110(0), Hello (hits): 50(52910)
Rx Count: 52927, Rx Interval (ms) min/max/avg: 1/56/45 last: 40 ms ago
Tx Count: 52912, Tx Interval (ms) min/max/avg: 1/56/45 last: 12 ms ago
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: PIM CEF OSPFv3
Template: abc
Authentication(Type/Keychain): md5/chain1
last_tx_auth_seq: 5 last_rx_auth_seq 4
Uptime: 00:40:05
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
C bit: 0
Multiplier: 3 - Length: 48
My Discr.: 4 - Your Discr.: 4
Min tx interval: 50000 - Min rx interval: 50000
Min Echo interval: 0
IPv6 Sessions
NeighAddr LD/RD RH/RS State Int
FE80::FE99:47FF:FE37:FBC0 2/4 Up Up Vl101
Session state is UP and not using echo function.
Session Host: Software
OurAddr: FE80::4255:39FF:FE89:6284
Handle: 2
Local Diag: 0, Demand mode: 0, Poll bit: 0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
888
IPv6 Multicast
Configuration Examples for IPv6 Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
889
IPv6 Multicast
Example: Configuring Rendezvous Point
!
!
!
asr901-platf-multicast enable
ip multicast-routing
ipv6 unicast-routing
ipv6 cef
ipv6 mld snooping explicit-tracking limit 1000
ipv6 mld snooping check hop-count
ipv6 mld snooping robustness-variable 3
ipv6 mld snooping last-listener-query-count 6
ipv6 mld snooping last-listener-query-interval 10000
ipv6 mld snooping vlan 104 mrouter interface Gi0/4
ipv6 mld snooping vlan 104 immediate-leave
ipv6 mld snooping vlan 104 static FF45::5 interface Gi0/4
ipv6 mld snooping
ipv6 multicast-routing
!
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
890
IPv6 Multicast
Example: Configuring BFD PIM on an IPv6 Interface
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
891
IPv6 Multicast
Troubleshooting Tips
Troubleshooting Tips
Use the following debug commands to enable the debug feature to help troubleshoot the IPv6 Multicast
feature on the Cisco ASR 901 Router.
Note
We recommend that you do not use these debug commands without TAC supervision.
Command Name
Description
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
892
IPv6 Multicast
Additional References
Additional References
The following sections provide references related to IPv6 Multicast feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Series Aggregation Services Router
Command Reference
Cisco ASR 901S Series Aggregation Services Router
Command Reference
Title
RFC 2710
MIBs
MIB
MIBs Link
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
893
IPv6 Multicast
Feature Information for IPv6 Multicast
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 52: Feature Information for IPv6 Multicast
Feature Name
Releases
Feature Information
IPv6 Multicast
15.4(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
894
IPv6 Multicast
Feature Information for IPv6 Multicast
Feature Name
Releases
Feature Information
15.4(1)S
15.4(2)S
15.4(3)S
15.4(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
895
IPv6 Multicast
Feature Information for IPv6 Multicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
896
CHAPTER
44
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
897
Ethernet loopback and Traffic generator are not supported when SPAN is enabled. For egress SPAN,
the traffic is mirrored before egress xlate translation.
Egress SPAN is only supported for port and not supported for VLAN, EFP, or Port-Channel interfaces.
When you specify source interfaces and do not specify a traffic type [Transmit (Tx), Receive (Rx), or
Both], both type is used by default.
Use the no monitor session session_number command with no other parameters to clear the SPAN
session number.
Understanding SPAN
The following sections describe SPAN:
Overview
Effective with Cisco IOS Release 15.4(1)S, the Cisco ASR 901 supports Local SPAN. Local SPAN supports
a SPAN session entirely within one switch. You can analyze network traffic passing through ports or VLANs
by using SPAN to send a copy of the traffic to another port on the switch that has been connected to a network
analyzer or other monitoring or security devices. SPAN copies (or mirrors) traffic received or sent (or both)
on source ports to a destination port for analysis. SPAN does not affect the switching of network traffic on
the source ports, VLANs, or EFPs. You must dedicate the destination port for SPAN use. Except for traffic
that is required for the SPAN session, destination ports do not receive or forward traffic.
Only traffic that enters or leaves source ports or traffic that enters or leaves source VLANs or EFPs can be
monitored by using SPAN; traffic routed to a source VLAN cannot be monitored. For example, if incoming
traffic is being monitored, traffic that gets routed from another VLAN to the source VLAN cannot be monitored;
however, traffic that is received on the source VLAN and routed to another VLAN can be monitored. You
can use the SPAN destination port to inject traffic from a network security device.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
898
In Figure 42: Example of Local SPAN Configuration, on page 899, all traffic on Ethernet port 5 (the source
port) is mirrored on Ethernet port 10. A network analyzer on Ethernet port 10 receives all the network traffic
from Ethernet port 5 without being physically attached to Ethernet port 5.
Figure 42: Example of Local SPAN Configuration
SPAN does not affect the switching of network traffic that is received on source ports; a copy of the packets
that are received by the source ports is still sent to the destination port.
SPAN Session
A local SPAN session is an association of a destination interface with a set of source interfaces. You configure
SPAN sessions using parameters that specify the type of network traffic to monitor. SPAN sessions allow
you to monitor traffic on one or more interfaces and to send either ingress traffic, egress traffic, or both to
one destination interface. You can configure a SPAN session with separate sets of SPAN source interfaces
or VLANs; overlapping sets are not supported.
SPAN sessions do not interfere with the normal operation of the switch. The show monitor session all command
displays the operational status of a SPAN session.
A SPAN session remains inactive after system power-up until the destination interface is operational.
Source Interface
A source interface (also called a monitored interface) is an interface monitored for network traffic analysis.
A source interface has these characteristics:
A single VLAN, EFP, or port-channel source per session is supported for ingress.
A single physical source port is supported for ingress and egress.
A maximum of five physical ports can be used in a single session for ingress SPAN (Rx).
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
899
Destination Interface
A destination interface (also called a monitoring interface) is a switched interface to which SPAN sends
packets for analysis. You can have only one SPAN destination interface.
A destination interface has these restrictions:
It needs to be a single physical port.
It cannot be used as an ingress interface.
When an interface is configured as a destination interface, it cannot be configured as a source interface.
Traffic Types
Ingress SPAN (Rx) copies network traffic received by the source interfaces for analysis at the destination
interface. Egress SPAN (Tx) copies network traffic transmitted from the source interfaces. Specifying the
configuration option both copies network traffic received and transmitted by the source interfaces to the
destination interface.
SPAN Traffic
Network traffic, including multicast, can be monitored using local SPAN. Multicast packet monitoring is
enabled by default. In some local SPAN configurations, multiple copies of the same source packet are sent
to the local SPAN destination interface. For example, a bidirectional (both ingress and egress) local SPAN
session is configured for sources a1 and a2 to a destination interface d1. If a packet enters the switch through
a1 and gets switched to a2, both incoming and outgoing packets are sent to destination interface d1; both
packets would be the same (unless a Layer-3 rewrite had occurred, in which case the packets would be
different).
Configuring SPAN
The following sections describe how to configure SPAN:
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
900
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# monitor session 1 type local
Step 4
Example:
Router(config-mon-local)# source interface
gigabitethernet 0/8
Step 5
Example:
Router(config-mon-local)# destination
interface gigabitethernet 0/11
Step 6
no shutdown
Example:
Router(config-mon-local)# no shutdown
What to Do Next
Procedure
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
901
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# no monitor session 1
The following is sample output from the show monitor session all detail command.
Session 1
--------Type
Status
Description
Source Ports
RX Only
TX Only
Both
Source VLANs
RX Only
TX Only
:
:
:
:
:
:
:
:
:
:
Local Session
Admin Enabled
None
Gi0/8
None
None
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
902
Both
: None
Source EFPs
:
RX Only
: None
TX Only
: None
Both
: None
Source RSPAN VLAN
: None
Destination Ports
: Gi0/11
Encapsulation : Native
Ingress: Disabled
Filter VLANs
: None
Dest RSPAN VLAN
: None
Source IP Address
: None
Source IP VRF
: None
Source ERSPAN ID
: None
Destination IP Address : None
Destination IP VRF
: None
MTU
: None
Destination ERSPAN ID : None
Origin IP Address
: None
IP QOS PREC
: 0
IP TTL
: 255
Additional References
The following sections provide references to Switched Port Analyzer feature.
Related Documents
Related Topic
Document Title
Standards
Standard
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
903
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Note
Table 53: Feature Information for Switched Port Analyzer, on page 904 lists only the software release that
introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent
releases of that software release train also support that feature.
Table 53: Feature Information for Switched Port Analyzer
Feature Name
Releases
Feature Information
15.4(1)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
904
CHAPTER
45
IP Security
This feature module describes how to configure the Internet Key Exchange (IKE) protocol for basic IP
Security (IPsec) Virtual Private Networks (VPNs). IKE is a key management protocol standard that is used
in conjunction with the IPsec standard. IPsec is an IP security feature that provides robust authentication
and encryption of IP packets.
Finding Feature Information, page 905
Prerequisites for IP Security, page 906
Restrictions for IP Security, page 906
Information About IP Security, page 906
Configuring IP Security, page 909
Configuration Examples for IP Security, page 918
NAT Traversal, page 920
Additional References, page 926
Feature Information for IP Security, page 927
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
905
IP Security
Prerequisites for IP Security
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
906
IP Security
IKE Security Protocol
IKE Modes
IKE has two phases of key negotiation: phase 1 and phase 2. Phase 1 negotiates a security association (a key)
between two IKE peers. The key negotiated in phase 1 enables IKE peers to communicate securely in phase
2. During phase 2 negotiation, IKE establishes keys (security associations) for other applications, such as
IPsec.
Phase 1 negotiation can occur using main mode or aggressive mode. The main mode protects all information
during the negotiation; this means that no information is available to a potential attacker. When main mode
is used, the identities of the two IKE peers are hidden. Although this mode of operation is very secure, it is
relatively costly in terms of the time it takes to complete the negotiation. Aggressive mode takes less time to
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
907
IP Security
Supported Components
negotiate keys between peers; however, it gives up some of the security provided by main mode negotiation.
For example, the identities of the two parties trying to establish a security association are exposed to an
eavesdropper.
The two modes serve different purposes and have different strengths. The main mode is slower than the
aggressive mode, but the main mode is more secure and more flexible because it can offer an IKE peer more
security proposals than the aggressive mode.
For more information on IKE modes, see the Configuring Internet Key Exchange for IPSec VPNs document
at: http://www.cisco.com/en/US/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/sec_key_exch_
ipsec_xe.html
Supported Components
The following components are supported as part of the IPsec feature:
IPsec in tunnel mode
Route-based IP security tunnels
OSPF support over IPSec tunnel.
IKEv2 support - in addition to IKEv1
Periodic dead peer detection (DPD)
IKE main mode (including 3 two-way exchanges)
Pre-Shared Key Exchange mechanismDH group 1, 2, 5, 14, 15, 16, 19, 20, 21, 24
Encapsulation Security Payload (ESP) support
Encryption algorithmsAES (128,192,256), DES, and 3DES
Authentication algorithmsMD5, SHA-1, and SHA-2
IP security tunneling for CPU generated traffic for in-band traffic
IP security tunneling for Layer 3 forwarded traffic
Static routes
Coexistence with Layer 2 traffic
Coexistence with IP multicast
ToS bytes preservation after encryption and decryption.
NAT Traversal
For more information on IPsec see the documents listed in the Additional References section.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
908
IP Security
Configuring IP Security
Configuring IP Security
The following topology is used for the configurations listed in this document.
Figure 43: Route-based VPN
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
909
IP Security
Creating an ISAKMP Policy
Step 4
Command or Action
Purpose
Example:
Router(config-keyring)# pre-shared-key
address 172.17.0.5 key
AnotherSecretKey
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-isakmp)# encryption aes
256
Step 5
authentication pre-share
Example:
Router(config-isakmp)# authentication
pre-share
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
910
IP Security
Creating an ISAKMP Profile
Step 6
Command or Action
Purpose
group 5
Example:
Router(config-isakmp)# group 5
Step 7
hash md5
Example:
Router(config-isakmp)# hash md5
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# crypto isakmp
profile R1_to_R5
Step 4
keyring keyring-name
Example:
Router(config-isa-prof)# keyring
VPN
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
911
IP Security
Defining an IPsec Transform Set
Step 6
Command or Action
Purpose
exit
Example:
Router(config-isa-prof)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Step 4
exit
Example:
Router(config)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
912
IP Security
Creating an IPsec Profile
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(ipsec-profile)# set
transform-set ESP-AES256-SHA1
Step 5
Example:
Router(ipsec-profile)# set
isakmp-profile R1_to_R5
Step 6
exit
Example:
Router(ipsec-profile)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
913
IP Security
Creating a VPN Tunnel Interface
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Tunnel0
Step 4
ip address primary-ip-address
seconary-ip-address
Example:
Router(config-if)# ip address
192.168.0.1 255.255.255.252
Step 5
Step 6
Step 7
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
914
IP Security
Configuring Static Routing
Step 8
Command or Action
Purpose
Example:
Router(config-if)# tunnel protection
ipsec profile Routed_VPN
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ip route ip-address mask interface number Configures a static route on the first router (R1 and
R5. See the figure in Configuring IPsec section.).
Example:
Router(config)# ip route 10.0.5.0
255.255.255.0 tunnel0
Step 4
ip route ip-address mask interface number Configures a static route on the second router.
Example:
Router(config)# ip route 10.0.1.0
255.255.255.0 tunnel0
Step 5
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
915
IP Security
Verifying Static Routing
To display current IKE SAs, use the show crypto isakmp sa command, as shown in the following example:
Router# show crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst
src
172.17.0.5
172.17.0.1
state
QM_IDLE
conn-id status
4004 ACTIVE
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
916
IP Security
Verifying Dynamic Routing
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Tunnel0
Step 4
Step 5
ip ospf mtu-ignore
Example:
Router(config-if)# ip ospf
mtu-ignore
Step 6
exit
Example:
Router(config-if)# exit
Step 7
Example:
Router(config)# interface Loopback0
Step 8
Example:
Router(config-if)# ip ospf 1 area
0
Step 9
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
917
IP Security
Configuration Examples for IP Security
Router5
!
crypto keyring VPN
pre-shared-key address 172.17.0.1 key AnotherSecretKey
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
918
IP Security
Example: Creating an ISAKMP Profile
Router5
!
crypto isakmp profile R5_to_R1
keyring VPN
match identity address 172.17.0.1 255.255.255.255
!
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
919
IP Security
Example: Configuring Static Routing
Router5
!
interface Tunnel0
ip address 192.168.0.2 255.255.255.252
tunnel source 172.17.0.5
tunnel destination 172.17.0.1
tunnel mode ipsec ipv4
tunnel protection ipsec profile Routed_VPN
!
Router5
!
!
ip route 10.0.1.0 255.255.255.0 tunnel0
!
!
NAT Traversal
The NAT Tranversal feature provides support for IP Security (IPsec) traffic to travel through Network Address
Translation (NAT) or Port Address Translation (PAT) points in the network. This feature provides this support
by addressing many known incompatibilities between NAT and IPsec.
Before the introduction of this feature, a standard IPsec virtual private network (VPN) tunnel would not work
if there were one or more NAT or PAT points in the delivery path of the IPsec packet. This feature makes
NAT IPsec-aware; thereby, allowing remote access users to build IPsec tunnels to home gateways.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
920
IP Security
Restrictions for NAT Traversal
Note
Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
921
IP Security
Information About NAT Traversal
path between them. If the hashes do not match (that is, someone translated the address or port), then each peer
needs to perform NAT traversal to get the IPsec packet through the network.
The hashes are sent as a series of NAT discovery (NAT-D) payloads. Each payload contains one hash. If
multiple hashes exist, multiple NAT-D payloads are sent. In most environments, there are only two NAT-D
payloads--one for the source address and port and one for the destination address and port. The destination
NAT-D payload is sent first, followed by the source NAT-D payload, which implies that the receiver should
expect to process the local NAT-D payload first and the remote NAT-D payload second. The NAT-D payloads
are included in the third and fourth messages in Main Mode and in the second and third messages in Aggressive
Mode (AM).
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
922
IP Security
Information About NAT Traversal
To see how UDP encapsulation helps to send IPSec packets, see the figures below.
Figure 44: Standard IPsec Tunnel Through a NAT/PAT Point (No UDP Encapsulation)
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
923
IP Security
Information About NAT Traversal
UDP Encapsulated Process for Software Engines Transport Mode and Tunnel Mode ESP Encapsulation
After the IPsec packet is encrypted by a hardware accelerator or a software crypto engine, a UDP header and
a non-ESP marker (which is 4 bytes in length) are inserted between the original IP header and ESP header.
The total length, protocol, and checksum fields are changed to match this modification.
NAT Keepalives
NAT keepalives are enabled to keep the dynamic NAT mapping alive during a connection between two peers.
NAT keepalives are UDP packets with an unencrypted payload of 1 byte. Although the current dead peer
detection (DPD) implementation is similar to NAT keepalives, there is a slight difference: DPD is used to
detect peer status, while NAT keepalives are sent if the IPsec entity did not send or receive the packet at a
specified period of time in seconds--valid range is from 5 to 3600.
If NAT keepalives are enabled (through the crypto isamkp nat keepalive command), users should ensure
that the idle value is shorter than the NAT mapping expiration time, which is 20 seconds.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
924
IP Security
Information About NAT Traversal
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Note
Router(config)#
crypto isakmp nat keepalive
20
Note
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
925
IP Security
Additional References
Command or Action
Purpose
Example:
Router# show crypto ipsec sa
Additional References
The following sections provide references related to IP Security feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Cisco ASR 901S Router Commands Cisco ASR 901 Commands
Cisco ASR 901S Series Aggregation Services Router
Command Reference
Internet Key Exchange for IPsec VPNs
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
926
IP Security
Standards
Standards
Standard
Title
None
MIB
MIBs Link
MIBs
CISCO-IPSEC-FLOW-MONITOR-MIB
CISCO-IPSEC-MIB
RFCs
RFC
Title
None
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
927
IP Security
Feature Information for IP Security
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 54: Feature Information for IP Security
Feature Name
Releases
Feature Information
IP Security
15.4(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
928
CHAPTER
46
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
929
Note
When table-map for CPU traffic is modified dynamically, it may not get updated. You should remove and
reconfigure the cpu traffic qos precedence table table-map-name command to update table-map.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
930
Quality of Service
The Ethernet Layer 2 traffic is classified on the egress at the Multilink interface based on IP DSCP or VLAN
CoS bits. Based on this classification, egress policing (bandwidth percent or priority percent) is achieved.
You can also re-mark the QoS field. The following table lists the options available for re-marking.
Table 55: Re-Marking Options
IP DSCP
Set IP DSCP
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
931
IP DSCP
Note
Configuring IP address on the SVI of the MLPPP interface does not bring up the IP Control Protocol
(IPCP).
For information on configuring the IP address on the SVI of the MLPPP interface, see the Enabling Routing
on the MLPPP Interface Running BCP section.
Configuring an EFP
To configure an EFP, complete the following steps:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
932
Step 3
Command or Action
Purpose
Example:
Router(config)# interface
GigabitEthernet 0/0
Step 4
Example:
Step 5
Example:
Router(config-if-srv)# encapsulation
dot1q 50
Step 6
Step 7
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
100
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
933
Step 3
Command or Action
Purpose
Example:
Router(config)# interface Multilink
5
Step 4
Step 5
Step 6
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 7
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
100
Step 8
exit
Example:
Note
Router(config-if-srv)# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
934
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Multilink
5
Step 4
Step 5
Step 6
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 7
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
100
Step 8
exit
Example:
Router(config-if-srv)# exit
Step 9
Example:
Router(config)# interface VLAN 100
Step 10
ip adddress ip-address-primary
ip-address-secondary
Example:
Router(config-if)# ip address
10.10.10.8 255.255.255.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
935
ConfiguringMultipleEncapsulatedVLANsBridgedThroughDifferentMultilinks
You should create two encapsulated VLANs and add them to two multilinks for this configuration to work.
To configure multiple encapsulated VLANs bridged through different multilinks, complete the following
tasks:
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Multilink
5
Step 4
Step 5
Step 6
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 7
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
936
Step 8
Command or Action
Purpose
exit
Example:
Note
Router(config-if-srv)# exit
Note
Define a QoS policy, and apply it to the MLPPP interface, and configure a matching policy on the EFP
interface.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map match-any
class-map-name
Example:
Router(config)# class-map
match-any dscpaf11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
937
Step 4
Command or Action
Purpose
Example:
Router(config-cmap)# match ip
dscp af11
Step 5
class-map match-any
class-map-name
Example:
Router(config-cmap)# class-map
match-any qos-group3
Step 6
Step 7
policy-map policy-map-name
Example:
Router(config-cmap)# policy-map
bcpmlpppqos
Step 8
class class-name
Example:
Router(config-pmap)# class
dscpaf11
Step 9
Step 10
Step 11
class class-name
Example:
Router(config-pmap-c)# class
qos-group3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
938
Step 12
Command or Action
Purpose
Example:
Router(config-pmap-c)#
bandwidth percent 20
Step 13
Example:
Router(config-pmap-c)# set
qos-group 4
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Multilink
5
Step 4
service-policy outputpolicy-map-name
Example:
Router(config-if)# service-policy
output bcpmlpppqos
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
939
Step 5
Command or Action
Purpose
Example:
Step 6
Example:
Router(config-if-srv)# encapsulation
dot1q 50
Step 7
Example:
Router(config-if-srv)# rewrite
ingress tag pop 1 symmetric
Step 8
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain
100
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
940
active
active, 0
01:36:49,
01:26:26,
01:25:18,
01:25:17,
01:24:25,
01:24:20,
01:24:18,
01:24:17,
01:23:09,
01:23:08,
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
941
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
942
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
943
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
944
Example: Multilink Between Cisco ASR 901 Series Routers and Cisco C7600
Series Routers
The following is a sample configuration of multilink between a Cisco ASR 901 Series Routers and Cisco
C7600 Series Routers:
Figure 51: Multilink Between Cisco ASR 901 Series Routers and Cisco C7600 Series Routers
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
945
The following sample configurations show how to configure multilink with maximum 10 links.
Policy Map 1
class-map match-any
match qos-group 1
class-map match-any
match qos-group 2
class-map match-any
match qos-group 3
class-map match-any
match qos-group 4
class-map match-any
match qos-group 5
class-map match-any
match qos-group 6
class-map match-any
match qos-group 7
qos-group1
qos-group2
qos-group3
qos-group4
qos-group5
qos-group6
qos-group7
policy-map bcpmlpppqos
class qos-group1
priority percent 20
set qos-group 2
class qos-group2
bandwidth percent 20
set qos-group 3
class qos-group3
bandwidth percent 10
set qos-group 4
class qos-group4
bandwidth percent 5
set qos-group 5
class qos-group5
bandwidth percent 30
set qos-group 6
class qos-group7
bandwidth percent 15
set qos-group 1
Policy Map 2
class-map match-any
match ip dscp af11
class-map match-any
match ip dscp af12
class-map match-any
match ip dscp af21
class-map match-any
match ip dscp af31
dscpaf11
dscpaf12
dscpaf21
dscpaf31
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
946
MLPPP-GIG - 1
interface Multilink1
service-policy output bcpmlpppqos
service instance 1 ethernet
encapsulation untagged
bridge-domain 3000
interface Multilink2
service-policy output bcpmlpppqos
service instance 1 ethernet
encapsulation
dot1q 50
bridge-domain 2000
service instance 2 ethernet
encapsulation dot1q 60
bridge-domain 2001
interface gigabitethernet 0/5
service instance 1 ethernet
encapsulation
dot1q 50
bridge-domain 2000
service instance 2 ethernet
encapsulation dot1q 60
bridge-domain 2001
service instance 3 ethernet
encapsulation untagged
bridge-domain 3000
ADD-MLPPP-GIG - 1
interface Multilink1
service-policy output bcpmlpppqos
service instance 2 ethernet
encapsulation
dot1q 70
bridge-domain 3001
interface gigabitethernet 0/5
service instance 4 ethernet
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
947
encapsulation
dot1q
bridge-domain 3001
70
MLPPP-GIG-2
interface Multilink1
service-policy output bcpmlpppdscp
service instance 1 ethernet
encapsulation untagged
bridge-domain 3000
interface Multilink2
service-policy output bcpmlpppdscp
service instance 2 ethernet
encapsulation dot1q any
bridge-domain 3001
interface gigabitethernet 0/5
service instance 1 ethernet
encapsulation untagged
bridge-domain 3000
service instance 2 ethernet
encapsulation dot1q any
bridge-domain 3001
MLPPP-GIG-3
interface Multilink1
service-policy output bcpmlpppdscp
service instance 1 ethernet
encapsulation default
bridge-domain 3000
interface gigabitethernet 0/5
service instance 1 ethernet
encapsulation default
bridge-domain 3000
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
948
ppp multilink
ppp multilink group 1
interface Serial0/1:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/2:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/3:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/4:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/5:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/6:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/7:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/8:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/9:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
Additional References
The following sections provide references related to BCP Support on MLPPP feature.
Related Documents
Related Topic
Document Title
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
949
Standards
Standard
Title
None
MIB
MIBs Link
None
MIBs
http://tools.cisco.com/ITDIT/MIBS/servlet/index
RFCs
RFC
Title
RFC 3518
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
950
Releases
Feature Information
15.4(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
951
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
952
CHAPTER
47
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
953
G.8032 Overview
The G.8032 provides protection switching mechanisms, and a protocol for Ethernet layer network (ETH)
rings. Ethernet rings provide wide-area multipoint connectivity more economically due to their reduced number
of links. The mechanisms and protocol provide reliable and stable protection; and prevents loop formation,
which could fatally affect network operation and service availability.
You can prevent loops in an Ethernet ring by ensuring that, at any moment, traffic can flow on all but one of
the ring links, the Ring Protection Link (RPL), where the link is blocked in the working state. When the system
detects a link failure, a Ring Automatic Protection Switching (RAPS) Signal Failure message is multicast to
all the nodes, and the failed links end-point ports are blocked. When the RPL owner receives the message, it
unblocks the RPL link. This triggers protection switching and a new traffic pattern is established on the ring.
The blocked ports are then moved to the nodes next to the failed ones.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
954
Effective from Cisco IOS Release 15.4(3)S, the Cisco ASR 901 Cisco ASR 901S Router supports G.8032
on port-channel interface and CFM hardware offloading.
The following functions of G.8032 are supported on the Cisco ASR 901 Cisco ASR 901S Router:
Sub-second switching
EFP bridge domain over physical and port-channel interfaces
Up to six rings per node
Up to two ERP instances per ring
Open-ring and closed-ring support
Open-ring without virtual channel
G.8032-REP TCN interworking (TCN propagation)
G.8032-G.8032 TCN interworkingTCN propagation from subring to major ring
Minimum supported convergence time is 200 ms for a single instance, and 400 ms for multiple instances.
Effective from Cisco IOS Release 15.4 (3) S, the Cisco ASR 901 Cisco ASR 901S Router supports
CFM hardware offloading with CCM interval 100ms, 10ms, and 3.3ms.
Minimum supported convergence time is 100 ms for a single instance, and 200 ms for multiple instances.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
955
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
956
Single-Ring Topology
The following figure shows a 4-node G.8032 single-ring topology. The RPL link is between node A and node
D, and when the network works, the RPL link is blocked by the RPL owner node D and RPL neighbor node
A.
Figure 53: Single-Ring Topology
Multiple-Rings Topology
The following figure shows two interconnected rings in the multiple-rings topology. Ring ERP1 consists of
nodes A, B, C, and D, and the links between these nodes. Ring ERP2 consists of nodes C, D, E, and F, and
the links between C-to-F, F-to-E, and E-to-D. Ring ERP2 on its own does not form a closed loop since the
link of C-to-D is owned and controlled by ring ERP1. The closed loop for ring ERP2 can be accomplished
by introducing an RAPS virtual channel between the interconnected nodes, C and D, of the subring. The
RAPS messages of ring ERP2 are encapsulated and transmitted over this virtual channel. If the RAPS virtual
channel is not used to close the subring, the RAPS messages are terminated at the interconnected nodes. The
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
957
blocked ports on all the nodes in the ring block only the data traffic, not the RAPS messages to prevent
segmentation of the RAPS channel for a nonvirtual channel ring implementation.
Figure 54: Multiple-Rings Topology
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
958
Note
The G.8032 ERP protocol uses CFM Continuity Check Messages (CCMs) at an interval of 1 second. At
this interval (which is supported only on selected platforms), SONET-like switching time performance
and loop-free traffic can be achieved.
Note
The G.8032 ERP protocol uses CFM Continuity Check Messages (CCMs) at an interval of 3.3 ms. At this
interval (which is supported only on selected platforms), SONET-like switching time performance and
loop-free traffic can be achieved.
Note
For G.8032 with Connectivity Fault Management (CFM) hardware offload, the CFM VLANs must be
included in the exclusion VLANs list to avoid the down state of G.8032 rings.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
959
ClearCancels an existing FS or MS command on the ring port. The Clear command is used at the ring
protection link (RPL) owner to clear a nonrevertive mode condition.
A G.8032 ring can support multiple instances. An instance is a logical ring running over a physical ring. Such
instances are used for various reasons, such as load-balancing VLANs over a ring. For example, odd-numbered
VLANs may go in one direction of the ring, and even-numbered VLANs may go in the other direction. Specific
VLANs can be configured under only one instance. They cannot overlap multiple instances. Otherwise, data
traffic or Ring Automatic Protection Switching (R-APS) messages may cross logical rings, which is not
desirable.
Note
The WTB timer interval may be shorter than the WTR timer interval.
Guard timerUsed by all nodes when changing state; the guard timer blocks latent outdated messages
from causing unnecessary state changes. The guard timer can be configured. The default time interval
is 500 ms; the time interval ranges from 10 to 2000 ms.
Hold-off timersUsed by the underlying Ethernet layer to filter out intermittent link faults. The hold-off
timer can be configured. The default time interval is 0 seconds; the time interval ranges from 0 to 10
seconds. Faults are reported to the ring protection mechanism only if this timer expires.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
960
The figure represents an Ethernet ring topology consisting of seven Ethernet ring nodes. The ring protection
link (RPL) is the ring link between Ethernet ring nodes A and G. In this topology, both ends of the RPL are
blocked. Ethernet ring node G is the RPL owner node, and Ethernet ring node A is the RPL neighbor node.
Figure 55: G.8032 Ethernet Ring Protection Switching in a Single-Link Failure
The following sequence describes the steps followed in the single-link failure:
1 A link operates in the normal condition.
2 A failure occurs.
3 Ethernet ring nodes C and D detect a local signal failure (SF) condition and after the hold-off time interval,
block the failed ring port and perform the FDB flush.
4 Ethernet ring nodes C and D start sending Ring Automatic Protection Switching (R-APS) SF messages
periodically along with the (node ID and bidirectional path-protected ring (BPR) identifier pair) on both
ring ports while the SF condition persists.
5 All Ethernet ring nodes receiving an R-APS SF message perform the FDB flush. When the RPL owner
node G and RPL neighbor node A receive an R-APS SF message, the Ethernet ring node unblocks its end
of the RPL and performs the FDB flush.
6 All Ethernet ring nodes receiving a second R-APS SF message perform the FDB flush again; the additional
FDB flush is because of the node ID and BPR-based configuration.
7 R-APS SF messages are detected on the Ethernet Ring indicating a stable SF condition. Further R-APS
SF messages trigger no further action.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
961
The following figure illustrates the steps taken in a revertive operation in a single-link failure.
Figure 56: Single-Link Failure Recovery (Revertive Operation)
The following sequence describes the steps followed in the single-link failure revertive (recovery) operation:
1 A link operates in the stable SF condition.
2 Recovery of link failure occurs.
3 Ethernet ring nodes C and D detect clearing of the SF condition, start the guard timer, and initiate periodic
transmission of the R-APS No Request (NR) messages on both ring ports. (The guard timer prevents the
reception of R-APS messages.)
4 When the Ethernet ring nodes receive an R-APS NR message, the node ID and BPR identifier pair of a
receiving ring port is deleted and the RPL owner node starts the Wait-to-Restore (WTR) timer.
5 When the guard timer expires on Ethernet ring nodes C and D, the nodes may accept the new R-APS
messages, if any. Ethernet ring node D receives an R-APS NR message with a higher node ID from Ethernet
ring node C, and unblocks its nonfailed ring port.
6 When the WTR timer expires, the RPL owner node blocks its end of the RPL, sends R-APS (NR or route
blocked [RB]) message with the (node ID and BPR identifier pair), and performs the FDB flush.
7 When Ethernet ring node C receives an R-APS (NR or RB) message, the node removes the block on its
blocked ring ports, and stops sending R-APS NR messages. On the other hand, when the RPL neighbor
node A receives an R-APS NR or RB message, the node blocks its end of the RPL. In addition, Ethernet
ring nodes A to F perform the FDB flush when receiving an RAPS NR or RB message because of the
node ID and BPR-based configuration.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
962
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ethernet ring g8032
profile
profile1
Step 4
timer{guard seconds| hold-off seconds | wtr Specifies the time interval for the guard,
hold-off, and Wait-to-Restore (WTR) timers.
minutes}
Example:
Router(config-erp-profile)# timer
hold-off 5
Step 5
non-revertive
Example:
Router(config-erp-profile)#
non-revertive
Step 6
end
Example:
Router(config-erp-profile)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
963
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# ethernet ring
g8032 ring1
Step 4
Example:
Router(config-erp-ring)# port0
interface gigabitethernet 0/1
Step 5
Example:
Router(config-erp-ring-port)#
monitor service instance 1
exit
Example:
Router(config-erp-ring-port)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
964
Step 7
Command or Action
Purpose
Example:
Router(config-erp-ring)# port1
interface gigabitethernet 0/1
Step 8
Example:
Router(config-erp-ring-port)#
monitor service instance 2
exit
Example:
Router(config-erp-ring-port)# exit
Step 10
Example:
Router(config-erp-ring)#
exclusion-list vlan-ids 2
open-ring
Step 12
instance instance-id
Example:
Router(config-erp-ring)# instance
1
Step 13
description descriptive-name
Example:
Router(config-erp-inst)#
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
965
Command or Action
Purpose
description
cisco_customer_instance
Step 14
profile profile-name
Example:
Router(config-erp-inst)# profile
profile1
Step 15
rpl {port0 | port1 } { owner | neighbor Specifies the Ethernet ring port on the local node as
the RPL owner, neighbor, or next neighbor.
| next-neighbor}
Example:
Router(config-erp-inst)# rpl port0
neighbor
Step 16
Example:
Router(config-erp-inst)#
inclusion-list vlan-ids 11
Step 17
aps-channel
Example:
Router(config-erp-inst)#
aps-channel
Step 18
level level-value
Example:
Router(config-erp-inst-aps)# level
5
Step 19
Example:
Router(config-erp-inst-aps)# port0
service instance 100
Step 20
Example:
Router(config-erp-inst-aps)# port1
service instance 100
Step 21
end
Example:
Router(config-erp-inst-aps)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
966
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Note
Step 4
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
967
RPL:
port0 RPL Owner
Inclusion-list VLAN IDs: 1000-1299
APS chanel
Level: 6
Port0: Service Instance 1000
Port1: Service Instance 1000
State: configuration resolved
Instance 2
Description: ERP_FOR_VLANS_1500-1799
Profile:
erp
RPL:
Inclusion-list VLAN IDs: 1500-1799
APS channel
Level: 5
Port0: Service Instance 1500
Port1: Service Instance 1500
State: configuration resolved
<cr>
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
968
States
----------------------------Init
0
Idle
2
Protection
0
Manual Switch
0
Forced Switch
0
Pending
0
---------------------------Total
2
Port0(Tx/Rx)
Port1(Tx/Rx)
Last Tx time
Last Tx time
Last Rx time
Last Rx time
-------------------------------------------------------------------------------NR
: 6/14
6/13
Wed May 14 15:46:44.391
Wed May 14 15:46:44.391
Wed May 14 15:47:42.699
Wed May 14 15:47:42.699
NR,RB : 157/0
157/0
Wed May 14 16:00:34.391
Wed May 14 16:00:34.391
Never
Never
SF
: 5/4
5/2
Wed May 14 15:46:40.043
Wed May 14 15:46:40.043
Wed May 14 15:46:44.639
Wed May 14 15:46:45.503
MS
: 0/0
0/0
Never
Never
Never
Never
FS
: 0/0
0/0
Never
Never
Never
Never
EVENT : 0/0
0/0
Never
Never
Never
Never
State
Last entry into state time
-------------------------------------------------------------------------------Init
: Wed May 14 15:46:29.903
Idle
: Wed May 14 15:47:44.391
Protection
: Wed May 14 15:46:30.039
Manual Switch : Never
Forced Switch : Never
Pending
: Wed May 14 15:46:44.391
Router# show ethernet ring g8032 statistics erp instance 2
Statistics for Ethernet ring erp instance 2
Local SF detected:
Port0: 1
Port1: 0
FOP PM detected:
Port0: 0
Port1: 0
R-APS
Port0(Tx/Rx)
Last Tx time
Last Rx time
Port1(Tx/Rx)
Last Tx time
Last Rx time
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
969
-------------------------------------------------------------------------------NR
: 6/14
6/13
Wed May 14 15:46:44.395
Wed May 14 15:46:44.395
Wed May 14 15:47:42.699
Wed May 14 15:47:42.699
NR,RB : 0/155
0/3
Never
Never
Wed May 14 16:00:42.255
Wed May 14 15:47:47.255
SF
: 5/3
5/1
Wed May 14 15:46:43.191
Wed May 14 15:46:43.191
Wed May 14 15:46:44.643
Wed May 14 15:46:43.407
MS
: 0/0
0/0
Never
Never
Never
Never
FS
: 0/0
0/0
Never
Never
Never
Never
EVENT : 0/0
0/0
Never
Never
Never
Never
State
Last entry into state time
-------------------------------------------------------------------------------Init
: Wed May 14 15:46:32.827
Idle
: Wed May 14 15:47:47.255
Protection
: Wed May 14 15:46:33.123
Manual Switch : Never
Forced Switch : Never
Pending
: Wed May 14 15:46:44.395
Troubleshooting Tips
The following table lists the troubleshooting tips for Configuring the ITU-T G.8032 Ethernet Ring Protection
feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
970
Note
We recommend that you do not use these debug commands without TAC supervision.
Command Name
Description
[no] debug ethernet ring g8032 pseudo-preemption Enables debugging G.8032 pseudo-preemption
messages.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
971
4
vlan 1 direction down
4
vlan 5 direction down
!
!
Neighbor:
Router# show run | sec ring
ethernet ring g8032 profile closed_ring
timer wtr 1
timer guard 2000
ethernet ring g8032 closed_ring
port0 interface GigabitEthernet0/9
monitor service instance 5
port1 interface GigabitEthernet0/6
monitor service instance 4
instance 1
profile closed_ring
rpl port0 neighbor
inclusion-list vlan-ids 1-10
aps-channel
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
972
level 5
port0 service instance 10
port1 service instance 10
!
Additional References
The following sections provide references related to the Configuring ITU-T G.8032 Ethernet Ring Protection
feature.
Related Documents
Related Topic
Document Title
Standard
Title
None
RFC
Title
None
Standards
RFCs
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
973
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
974
Table 57: Feature Information for Configuring ITU-T G.8032 Ethernet Ring Protection Switching
Feature Name
Releases
Feature Information
This feature was introduced on the
Cisco ASR 901 Cisco ASR 901S
Routers.
The following sections provide
information about this feature:
G.8032 Overview, on page
954
How to Configure ITU-T
G.8032 Ethernet Ring
Protection Switching, on
page 963
Configuration Examples for
ITU-T G.8032 Ethernet Ring
Protection Switching, on
page 972
15.4(3)S
15.4(3)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
975
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
976
CHAPTER
48
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
977
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Note
Overview
You can translate IP addresses into globally unique IP addresses when communicating outside your network.
You can configure static or dynamic inside-source address translation as follows:
Static translation establishes a one-to-one mapping between an inside local address and an inside global
address. Static translation is useful when a host on the inside has to be accessed by a fixed address from
the outside.
Dynamic translation establishes mapping between an inside local address and a pool of global addresses.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
978
The following figure shows the translation of a source address inside a network to a source address outside
the network.
You can conserve addresses in the inside global address pool by allowing a device to use one global address
for many local addresses. This type of Network Address Translation (NAT) configuration is called overloading.
When overloading is configured, the device maintains enough information from higher-level protocols (for
example, TCP or UDP port numbers) to translate the global address back to the correct local address. When
multiple local addresses map to one global address, the TCP or UDP port numbers of each inside host distinguish
between local addresses.
Types of NAT
NAT operates on a routergenerally connecting only two networksand translates the private (inside local)
addresses within the internal network into public (inside global) addresses before packets are forwarded to
another network. This functionality gives you the option to configure NAT such that it will advertise only a
single address for your entire network to the outside world. Doing this effectively hides the internal network
from the world, giving you additional security.
The types of NAT include:
Static address translation (static NAT)Allows one-to-one mapping between local and global addresses.
Dynamic address translation (dynamic NAT)Maps unregistered IP addresses to registered IP addresses
from a pool of registered IP addresses.
OverloadingMaps multiple unregistered IP addresses to a single registered IP address (many to one)
using different ports. This method is also known as PAT. By using overloading, thousands of users can
be connected to the Internet by using only one real global IP address.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
979
Supported Components
The following components are supported as part of the NAT feature:
Static NAT and PAT
Dynamic NAT and PAT with overload
NAT and PAT support for Layer 3-forwarded traffic.
Maximum number of inside and outside addresses is 10.
Coexistence with Layer 2 and Layer 3 traffic
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
980
Note
You must configure different IP addresses for an interface on which NAT is configured and for inside
addresses that are configured, by using the ip nat inside source static command.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 10
Step 4
Example:
Router(config-if)# ip address
10.10.10.1 255.255.255.0
Step 5
ip nat inside
Example:
Router(config-if)# ip nat inside
Step 6
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
981
Step 7
Command or Action
Purpose
Example:
Router(config)# interface vlan 40
Step 8
Example:
Router(config-if)# ip address
40.40.40.1 255.255.255.0
Step 9
ip nat outside
Example:
Router(config-if)# ip nat outside
Step 10
ip nat inside source static ilocal-ip global-ip Establishes static translation between an inside
local address and an inside global address.
Example:
Router(config)# ip nat inside
source static 10.10.10.2 40.40.40.1
Step 11
end
Example:
Router(config)# end
Note
Cisco ASR 901 Router does not differentiate between the dynamic translation with overload and dynamic
translation without overload. By default, overloading is considered if translation exceeds the given pool.
Note
When inside global or outside local addresses belong to a directly connected subnet on a NAT device, the
device adds IP aliases for them so that it can answer Address Resolution Protocol (ARP) requests. However,
a situation where the device answers packets that are not destined for it, possibly causing a security issue,
may arise. This may happen when an incoming Internet Control Message Protocol (ICMP) packet or a
UDP packet that is destined for one of the alias addresses does not have a corresponding NAT translation
in the NAT table, and the device itself runs a corresponding service, for example, Network Time Protocol
(NTP). Such a situation might cause minor security risks.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
982
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 10
Step 4
Example:
Router(config-if)# ip address
10.10.10.1 255.255.255.0
Step 5
ip nat inside
Example:
Router(config-if)# ip nat inside
Step 6
exit
Example:
Router(config-if)# exit
Step 7
Example:
Router(config)# interface vlan 40
Step 8
Example:
Router(config-if)# ip address
40.40.40.1 255.255.255.0
Step 9
ip nat outside
Example:
Router(config-if)# ip nat outside
Step 10
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
983
Step 11
Command or Action
Purpose
Example:
Router(config)# ip nat pool
net-208 50.50.50.1 50.50.50.10
netmask 255.255.255.0
Step 12
access-list access-list-number permit source Defines a standard access list permitting those
addresses that are to be translated.
[source-wildcard]
Example:
Router(config)# access-list 1
permit 10.10.10.2 0.0.0.0
Step 13
Example:
Router(config)# ip nat inside
source list 1 pool net-208
Step 14
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
984
Step 3
Command or Action
Purpose
Example:
Router(config)# interface vlan 10
Step 4
Example:
Router(config-if)# ip address
10.10.10.1 255.255.255.0
Step 5
ip nat inside
Example:
Router(config-if)# ip nat inside
Step 6
exit
Example:
Router(config-if)# exit
Step 7
Example:
Router(config)# interface vlan 40
Step 8
Example:
Router(config-if)# ip address
40.40.40.1 255.255.255.0
Step 9
ip nat outside
Example:
Router(config-if)# ip nat outside
Step 10
exit
Example:
Router(config-if)# exit
Step 11
Example:
Router(config)# ip nat pool
net-208 50.50.50.1 50.50.50.10
netmask 255.255.255.0
Step 12
access-list access-list-number permit source Defines a standard access list permitting those
addresses that are to be translated.
[source-wildcard]
Example:
Router(config)# access-list 1
permit 10.10.10.2 0.0.0.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
985
Step 13
Command or Action
Purpose
Example:
Router(config)# ip nat inside
source list 1 pool net-208 overload
Step 14
end
Example:
Router(config)# end
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 10
Step 4
Example:
Router(config-if)# ip address
10.10.10.1 255.255.255.0
Step 5
ip nat inside
Example:
Router(config-if)# ip nat inside
Step 6
exit
Example:
Router(config-if)# exit
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
986
Step 7
Command or Action
Purpose
Example:
Router(config)# interface vlan 40
Step 8
Example:
Router(config-if)# ip address
40.40.40.1 255.255.255.0
Step 9
ip nat outside
Example:
Router(config-if)# ip nat outside
Step 10
exit
Example:
Router(config-if)# exit
Step 11
Example:
Router(config)# ip nat outside source
static tcp 10.10.10.2 23 40.40.40.10
2023
Step 12
end
Example:
Router(config)# end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
987
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
988
Additional References
The following sections provide references related to Configuring NAT for IP Address Conservation feature.
Related Documents
Related Topic
Document Title
Standard
Title
None
RFC
Title
None
Standards
RFCs
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
989
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 58: Feature Information for NAT
Feature Name
Releases
Feature Information
15.4(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
990
CHAPTER
49
Auto-IP
Auto-IP, page 991
Auto-IP
In ring topology, when a device is inserted into the ring, the neighboring node interfaces require manual
reconfiguration. The auto-IP feature addresses the problem of manually reconfiguring nodes during insertion,
deletion, and movement of nodes within the ring. The auto-IP feature automatically provides IP addresses to
the nodes inserted into the ring. For information on how to configure Auto-IP, see the IPv4 Addressing
Configuration Guide, Cisco IOS XE Release 15.3(3)S.
The Auto-IP feature is supported on the Cisco ASR 901 series routers with the following restrictions:
Auto-IP configuration is not supported on the switch virtual interface (SVI) associated with a port
channel.
Manual intervention is mandatory for inserting and deleting nodes because auto-IP is configured on the
SVI.
Auto-IP configuration is not supported for routers that are connected by a switch. It is supported only
for directly connected routers.
Auto-IP-Ring configuration needs to be removed manually on the SVI before defaulting or removing
the SVI.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
991
Auto-IP
Auto-IP
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
992
CHAPTER
50
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
993
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
994
OSPFv3 will not send or accept packets while in the DOWN state.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
995
Step 4
Command or Action
Purpose
Example:
Device(config-if)# ospfv3 authentication
md5 0 27576134094768132473302031209727
Example:
Or
Device(config-if)# ipv6 ospf authentication
ipsec spi 500 md5
1234567890abcdef1234567890abcdef
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
996
Command or Action
Step 4
Purpose
The following example shows how to define authentication on a VLAN interface of the Cisco ASR 901 Series
Router:
interface Vlan60
ipv6 ospf encryption ipsec spi 300 esp 3des 4D92199549E0F2EF009B4160F3580E5528A11A45017F3887
md5 79054025245FB1A26E4BC422AEF54501
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
997
Document Title
IPv6 commands
Title
IPv6 RFCs
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
998
Feature Name
Releases
Feature Information
OSPFv3 uses the IPsec secure
socket API to add authentication
to OSPFv3 packets.
The following commands were
introduced or modified: area
authentication (IPv6), ipv6 ospf
authentication, ipv6 router ospf,
ospfv3 authentication.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
999
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1000
CHAPTER
51
Policy-Based Routing
Policy-based routing is a process whereby the device puts packets through a route map before routing them.
The route map determines which packets are routed to which device next. You might enable policy-based
routing if you want certain packets to be routed some way other than the obvious shortest path. Possible
applications for policy-based routing are to provide equal access, protocol-sensitive routing, source-sensitive
routing, routing based on interactive versus batch traffic, and routing based on dedicated links. Policy-based
routing is a more flexible mechanism for routing packets than destination routing.
To enable policy-based routing, you must identify which route map to use for policy-based routing and create
the route map. The route map itself specifies the match criteria and the resulting action if all of the match
clauses are met.
To enable policy-based routing on an interface, indicate which route map the device should use by using the
ip policy route-map map-tag command in interface configuration mode
To define the route map to be used for policy-based routing, use the route-map map-tag [permit | deny]
[sequence-number] global configuration command.
Only set ip next-hop command can be used under route-map configuration mode when you configure
policy-based routing.
To define the criteria by which packets are examined to learn if they will be policy-based routed, use the
match ip address {access-list-number | access-list-name} [access-list-number | access-list-name] command
in route map configuration mode. No match clause in the route map indicates all packets.
Note
Mediatrace will show statistics of incorrect interfaces with policy-based routing (PBR) if the PBR does
not interact with CEF.
Note
Management implications: Since the policy based routing alters the conventional path (learnt through
routing protocols) the traffic would have taken, the policies should be defined in a deterministic manner
to keep the network manageable without impacting running services or applications. For example, the
policy based routing can alter the path for the control traffic and affect protocols like OSPF, multicast,
etc. Hence the policies need to be defined considering these aspects.
Restrictions on the Policy-Based Routing, page 1002
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1001
Policy-Based Routing
Restrictions on the Policy-Based Routing
Step 1
Command or Action
Purpose
enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1002
Policy-Based Routing
Configuring Route-Map
Command or Action
Purpose
Enter your password if prompted.
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Router(config)# ip access-list
extended ACL1
Step 4
Example:
Router(config-ext-nacl)# permit ip
192.168.3.0 0.0.0.255 any
Step 5
end
Example:
Router(config-ext-nacl)# end
What to Do Next
Configure a Route-Map
Configuring Route-Map
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1003
Policy-Based Routing
Configuring the IP Policy association (on SVI)
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-route-map)# match ip
address ACL1
Step 5
Example:
Router(config-route-map)# set ip
next-hop 30.30.30.3
Step 6
end
Example:
Router(config-route-map)# end
What to Do Next
Configure the IP Policy association (on SVI)
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1004
Policy-Based Routing
Verifying the PBR Configuration
Step 2
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface vlan 100
Step 4
ip address ip-address
Example:
Router(config-if)# ip address 100.0.0.2
255.255.255.0
Step 5
Example:
Router(config-if)# ip policy route-map
PBR1
Step 6
end
Example:
Router(config-if)# end
To display the route-map sequence configuration, use the show route-map command as shown in the following
example:
Router# show route-map MAP1
route-map MAP1, permit, sequence 10
Match clauses:
ip address (access-lists): 100
Set clauses:
ip next-hop 192.168.40.1
Policy routing matches: 0 packets, 0 bytes
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1005
Policy-Based Routing
Configuration Example for the Policy-Based Routing
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1006
Policy-Based Routing
Additional References
environment monitor
!
line con 0
exec-timeout 0 0
line vty 0 4
login
!
exception crashinfo buffersize 128
!
!
end
Additional References
Related Documents
Related Topic
Document Title
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1007
Policy-Based Routing
Feature Information for Policy-Based Routing
Feature Name
Releases
Feature Information
Policy-Based Routing
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1008
CHAPTER
52
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1009
Note
In Cisco ASR 901 Series Routers, for the IPv6 traffic over GRE, IPv4 is used as transport protocol.
Restrictions
The following are NOT claimed to be supported, though the configuration is accepted silently.
Termination of GRE with outer IPv6 header.
Multiple GRE encapsulations and GRE terminations.
GRE encapsulation followed by MPLS encapsulation.
GRE encapsulation followed by MPLS label lookup.
MPLS encapsulation followed by GRE encapsulation.
GRE termination followed by MPLS label lookup.
MPLS label lookup followed by GRE termination.
Support of VRF (MPLS) over tunnels.
Multicast GRE (MGRE).
MTU configuration over L3 interfaces is defined with the additional tunnel header length. This is because
of GRE tunnel using the L3 interface for reachability.
Shaping and Policing support over GRE Tunnel Interface (logical interface).
Load-sharing is supported only for a maximum of two GRE tunnels.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1010
GRE tunnels with same source and destination are not supported.
Both IPSec and GRE on the single node are not supported. That is, the following are not supported on
the single ASR901 node
GRE encapsulation followed by IPsec encryption.
IPsec decryption followed by GRE encapsulation.
Note
You should remove and reapply the policy-map associated to an interface after any dynamic change or
modification to the table-map.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Tunnel l00
Step 4
Step 5
Example:
Router(config-if)# ip address
1.1.1.2 255.255.255.252
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1011
Step 6
Command or Action
Purpose
Example:
Router(config-if)# tunnel source
11.1.1.2
Step 7
Example:
Router(config-if)# tunnel
destination 10.1.1.1
Step 8
What to Do Next
Repeat the steps on a different router to complete the tunnel configuration.
Ensure that tunnel destination should be reachable from source. And tunnel src, tunnel destination on
encapsulation and decapsulation should match as illustrated below.
Encapsulation
Tunnel src 11.1.1.2
Tunnel dest 10.1.1.1
Decapsulation
Tunnel src 10.1.1.1
Tunnel dest 11.1.1.2
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1012
Step 3
Command or Action
Purpose
ip cef
Example:
Router(config)# ip cef
Step 4
ipv6 unicast-routing
Example:
Router(config)# ipv6 unicast-routing
Step 5
ipv6 cef
Example:
Router(config)# ipv6 cef
Step 6
Example:
Router(config)# interface Tunnel l00
Step 7
Step 8
Example:
Router(config-if)# ip address
1.1.1.2 255.255.255.252
Step 9
Example:
Router(config-if)# tunnel source
11.1.1.2
Step 10
Example:
Router(config-if)# tunnel
destination 10.1.1.1
Step 11
Step 12
Example:
Router(config-if)# ipv6 address
35:35:35::1/64
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1013
Step 13
Command or Action
Purpose
ipv6 enable
Example:
Router(config-if)# ipv6 enable
What to Do Next
Repeat the steps on a different router to complete the tunnel configuration.
Ensure that tunnel destination should be reachable from source. And tunnel src, tunnel destination on
encapsulation and decapsulation should match as illustrated below. For IPv6 also, the tunnel source and
destination (outer transport) should only be IPv4.
Encapsulation
Tunnel src 11.1.1.2
Tunnel dest 10.1.1.1
Decapsulation
Tunnel src 10.1.1.1
Tunnel dest 11.1.1.2
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1014
Step 4
Command or Action
Purpose
Example:
Router(config-vrf)# address-family
ipv4 unicast
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
ipv6 unicast-routing
Example:
Router(config)# ipv6 unicast-routing
Step 4
ipv6 cef
Example:
Router(config)# ipv6 cef
Step 5
Step 6
Example:
Router(config-vrf)# address-family
ipv6 unicast
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1015
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-if)# vrf forwarding
vpn_1
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1016
Step 3
Command or Action
Purpose
Example:
Router(config)# interface Tunnel 0
Step 4
Example:
Router(config-if)# vrf forwarding
vpn_1
Step 5
Example:
Router(config-if)# tunnel vrf vpn_1
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1017
Table Map.
Egress policy-map: It is used to associated to a GRE as an outbound policy.
Configuring Service-Policy
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
class-map match-anyclass-map-name
Example:
Step 4
Example:
Router(config-cmap)# match dscp 38
Step 5
exit
Example:
Router(config-cmap)# exit
Step 6
policy-map policy-map-name
Example:
Router(config)# policy-map
policy_dscp
Step 7
class class-name
Example:
Router(config-pmap)# class dscp_class
Step 8
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1018
Step 9
Command or Action
Purpose
exit
Example:
Router(config-pmap)# exit
Step 10
Example:
Router(config)# interface
GigabitEthernet 0/1
Step 11
Example:
Router(config-if)# service-policy
input policy_dscp
What to Do Next
Configure a Table-Map
Configuring a Table-Map
Perform this task to configure a table-map.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
table-map table-map-name
Example:
Note
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1019
Step 4
Command or Action
Purpose
Example:
Router(config-tablemap)# map from
5 to 7
What to Do Next
Create a policy-map to associate to the GRE tunnel.
Configuring a Policy-Map
Perform this task to configure a policy-map.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
policy-map policy-map-name
Example:
Router(config)# policy-map POLICY3
Step 4
class class-default
Example:
Router(config-pmap)# class
class-default
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1020
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Example:
Router(config)# interface Tunnel
0
Step 4
Example:
Note
Router(config-if)# service-policy
output POLICY3
To display the usability status of interfaces configured for IP, use the show ip interface command.
Router# show ip interface brief | include Tunnel
Tunnel2
35.35.35.1
YES NVRAM
up
up
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1021
Tunnel10
45.45.45.1
YES NVRAM
up
up
To display the configuration of a tunnel interface, use the show interface tunnel command.
Router# show interfaces tunnel 0
Tunnel0 is up, line protocol is up
Hardware is Tunnel
Internet address is 10.0.0.1/30
MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive set (10 sec), retries 3
Tunnel linestate evaluation up
Tunnel source 1.1.1.1, destination 2.2.2.2
Tunnel protocol/transport GRE/IP
Key disabled, sequencing disabled
Checksumming of packets disabled
Tunnel TTL 255
Tunnel transport MTU 1476 bytes
Tunnel transmit bandwidth 8000 (kbps)
Tunnel receive bandwidth 8000 (kbps)
Last input 01:13:28, output 00:00:08, output hang never
Last clearing of "show interface" counters 01:13:48
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/0 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
15 packets input, 1416 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
442 packets output, 21216 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out
To display the contents of the gigabitethernet interface, use the show running-config command.
Router# show running-config interface gigabitEthernet 0/11
Building configuration...
Current configuration : 384 bytes
!
interface GigabitEthernet0/11
no ip address
negotiation auto
no qos-config scheduling-mode min-bw-guarantee
service-policy input policy1
service instance 100 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 100
!
service instance 101 ethernet
encapsulation dot1q 101
rewrite ingress tag pop 1 symmetric
bridge-domain 101
!
end
To display the statistics and the configurations of the input and output policies that are attached to an interface,
use the show policy-map interface command.
Router# show policy-map interface g0/11
GigabitEthernet0/11
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1022
To display the configuration of a specified table map or all table maps, use the show table-map command.
Router# show table-map
Table Map table_1
from 5 to 7
default copy
Table Map new_table
default copy
Table Map table3
from 0 to 7
from 5 to 1
default copy
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1023
!
class-map match-all class_2
match dscp af33
class-map match-all class1
match dscp af43
!
policy-map invalid
class class-default
set dscp qos-group table table_1
policy-map policy1
class class1
set qos-group 5
class class_2
set qos-group 3
policy-map policy2
class class-default
set dscp qos-group table new_table
!
!
!
interface Tunnel0
ip address 10.0.0.1 255.255.255.252
keepalive 10 3
tunnel source 1.1.1.1
tunnel destination 2.2.2.2
service-policy output policy2
!
interface GigabitEthernet0/0
no ip address
negotiation auto
!
interface GigabitEthernet0/1
no ip address
negotiation auto
!
interface GigabitEthernet0/2
no ip address
negotiation auto
service instance 34 ethernet
encapsulation dot1q 34
rewrite ingress tag pop 1 symmetric
bridge-domain 34
!
!
!
interface GigabitEthernet0/11
no ip address
negotiation auto
no qos-config scheduling-mode min-bw-guarantee
service-policy input policy1
service instance 100 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 100
!
service instance 101 ethernet
encapsulation dot1q 101
rewrite ingress tag pop 1 symmetric
bridge-domain 101
!
!
interface FastEthernet0/0
ip address 7.44.23.31 255.255.0.0
!
interface Vlan1
no ip address
shutdown
!
interface Vlan34
ip address 1.1.1.1 255.255.255.252
!
interface Vlan100
ip address 192.168.1.1 255.255.255.0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1024
!
interface Vlan101
ip address 172.16.1.1 255.255.255.0
!
ip default-gateway 7.44.0.1
ip forward-protocol nd
!
!
no ip http server
no ip http secure-server
ip route 2.2.2.0 255.255.255.252 1.1.1.2
ip route 172.16.2.0 255.255.255.0 Tunnel0
ip route 192.168.2.0 255.255.255.0 Tunnel0
!
!
!
!
control-plane
!
environment monitor
!
line con 0
exec-timeout 0 0
line vty 0 4
login
!
exception crashinfo buffersize 128
!
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1025
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1026
negotiation auto
!
interface GigabitEthernet0/8
no ip address
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface GigabitEthernet0/9
no ip address
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface GigabitEthernet0/10
no ip address
negotiation auto
no qos-config scheduling-mode min-bw-guarantee
service instance 100 ethernet
encapsulation dot1q 100
rewrite ingress tag pop 1 symmetric
bridge-domain 100
!
!
interface GigabitEthernet0/11
no ip address
negotiation auto
no qos-config scheduling-mode min-bw-guarantee
!
interface FastEthernet0/0
ip address 7.44.23.30 255.255.0.0
!
interface Vlan1
no ip address
!
interface Vlan34
ip address 34.34.34.2 255.255.255.252
ip ospf 1 area 0
!
interface Vlan100
no ip address
ipv6 address 2002::1/64
!
router ospf 1
router-id 35.1.1.1
!
ip default-gateway 7.44.0.1
ip forward-protocol nd
!
!
no ip http server
no ip http secure-server
!
ipv6 route 2001::/64 Tunnel100
!
!
!
control-plane
!
environment monitor
!
line con 0
exec-timeout 0 0
line vty 0 4
login
!
exception crashinfo buffersize 128
!
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1027
Additional References
Related Documents
Related Topic
Document Title
Title
RFC2784
MIBs
MIB
MIBs Link
TUNNEL-MIB
Technical Assistance
Description
Link
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1028
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 61: Feature Information for Generic Routing Encapsulation
Feature Name
Releases
Feature Information
Generic Routing
Encapsulation
15.5(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1029
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1030
CHAPTER
53
Call Home
The Call Home feature can deliver messages containing information on configuration, inventory, syslog,
snapshot, environmental, and crash events. It provides these messages as either email-based or web-based
messages. Multiple message formats are available, allowing for compatibility with pager services, standard
email, or XML-based automated parsing applications. This feature can deliver messages to multiple recipients,
referred to as Call Home destination profiles, each with configurable message formats and content categories.
A predefined destination profile is provided for sending alerts to the Cisco Smart Call Home server. The
predefined profile defines both the email address and the HTTP(S) URL; the transport method configured
in the profile determines whether the email address or the HTTP(S) URL is used.
Benefits of Using Call Home, page 1032
Obtaining Smart Call Home Services, page 1032
Anonymous Reporting, page 1033
How to Configure Call Home, page 1033
Prerequisites for Call Home, page 1033
Configuring Smart Call Home (Single Command), page 1034
Enabling and Disabling Call Home, page 1034
Configuring Contact Information, page 1035
Configuring Destination Profiles, page 1036
Subscribing to Alert Groups, page 1039
Configuring General email Options, page 1043
Sending Call Home Communications Manually, page 1048
Sending a Call Home Test Message Manually , page 1048
Sending Call Home Alert Group Messages Manually, page 1048
Submitting Call Home Analysis and Report Requests, page 1049
Manually Sending Command Output Message for One Command or a Command List, page 1050
Configuring Diagnostic Signatures, page 1051
Displaying Call Home Configuration Information, page 1057
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1031
Call Home
Benefits of Using Call Home
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1032
Call Home
Anonymous Reporting
You need the following items to register for Smart Call Home:
SMARTnet contract number for your router
Your email address
Your Cisco.com username
Anonymous Reporting
Smart Call Home is a service capability included with many Cisco service contracts and is designed to assist
customers resolve problems more quickly. In addition, the information gained from crash messages helps
Cisco understand equipment and issues occurring in the field. If you decide not to use Smart Call Home, you
can still enable Anonymous Reporting to allow Cisco to securely receive minimal error and health information
from the device. If you enable Anonymous Reporting, your customer identity will remain anonymous, and
no identifying information is sent.
When you enable Anonymous Reporting, you acknowledge your consent to transfer the specified data to
Cisco or to vendors operating on behalf of Cisco (including countries outside the United States). Cisco
maintains the privacy of all customers. For information about how Cisco treats personal information, see the
Cisco Privacy Statement at http://www.cisco.com/web/siteassets/legal/privacy.html.
When Call Home is configured in an anonymous way, only crash, inventory, and test messages are sent to
Cisco. No identifying information is sent.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1033
Call Home
Configuring Smart Call Home (Single Command)
Router must have IP connectivity to an email server or the destination HTTP(S) server.
If Cisco Smart Call Home is used, an active service contract covering the device is required to provide
full SCH service.
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home reporting {anonymous | Enables all Call Home basic configurations using a single
contact-email-addr email-address} command.
[http-proxy name port port-number Note
HTTP proxy option allows you to make use of your
own proxy server to buffer and secure internet
Example:
connections from your devices.
Router(config)# call-home
Note
After successfully enabling Call Home either in
reporting contact-email-addr
anonymous or full registration mode using the
[email protected]
call-home reporting command, an inventory message
is sent out. If Call Home is enabled in anonymous
mode, an anonymous inventory message is sent out.
If Call Home is enabled in full registration mode, a
Full Inventory message for full registration mode is
sent.
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
service call-home
Example:
Router(config)# service call-home
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1034
Call Home
Configuring Contact Information
Step 3
Command or Action
Purpose
no service call-home
Example:
Router(config)# no service call-home
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
Step 4
phone-number + phone-number
Example:
Router(cfg-call-home)# phone-number
+1-800-555-4567
Step 5
street-address street-address
Example:
Router(cfg-call-home)#
street-address 1234 Picaboo Street,
Any city, Any state, 12345
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1035
Call Home
Configuring Destination Profiles
Step 6
Command or Action
Purpose
customer-id text
Example:
Router(cfg-call-home)# customer-id
Customer1234
Step 7
site-id text
Example:
Router(cfg-call-home)# site-id
Site1ManhattanNY
Step 8
contract-id text
Example:
Router(cfg-call-home)# contract-id
Company1234
Note
If you use the Cisco Smart Call Home service, the destination profile must use the XML message format.
You can configure the following attributes for a destination profile:
Profile nameString that uniquely identifies each user-defined destination profile. The profile name is
limited to 31 characters and is not case-sensitive. You cannot use all as a profile name.
Transport methodTransport mechanism, either email or HTTP (including HTTPS), for delivery of
alerts.
For both the CiscoTAC-1 profile and user-defined destination profiles, email is the default, and
you can enable either or both transport mechanisms. If you disable both methods, email is enabled.
For the predefined CiscoTAC-1 profile, you can enable either transport mechanism, but not both.
Destination addressThe actual address related to the transport method by which the alert should be
sent.
Message formattingThe message format used for sending the alert. The format options for a user-defined
destination profile are long-text, short-text, or XML. The default is XML. For the predefined CiscoTAC-1
profile, only XML is allowed.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1036
Call Home
Creating a New Destination Profile
Message sizeThe maximum destination message size. The valid range is 50 to 3,145,728 bytes. The
default is 3,145,728 bytes.
Reporting dataYou can choose which data to report for a profile. You can enable reporting of Smart
Call Home data or Smart Licensing data, or both. Only one active profile is allowed to report Smart
Licensing data at a time.
Anonymous reportingYou can choose for your customer identity to remain anonymous, and no
identifying information is sent.
Subscribing to interesting alert-groupsYou can choose to subscribe to alert-groups highlighting your
interests.
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
profile name
Example:
Router(config-call-home)# profile
profile1
Step 4
Step 5
Example:
Router(cfg-call-home-profile)#
destination address email
[email protected]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1037
Call Home
Copying a Destination Profile
Command or Action
Step 6
Purpose
Step 7
Example:
Router(cfg-call-home-profile)#
destination message-size-limit 3145728
Step 8
active
Example:
Router(cfg-call-home-profile)# active
Step 9
Router(cfg-call-home-profile)# reporting
smart-call-home-data
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1038
Call Home
Setting Profiles to Anonymous Mode
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
profile name
Example:
Router(cfg-call-home) profile
CiscoTAC-1
Step 4
anonymous-reporting-only
Example:
Router(cfg-call-home-profile)#
anonymous-reporting-only
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1039
Call Home
Subscribing to Alert Groups
Note
A Call Home alert is sent only to destination profiles that have subscribed to the alert group containing
that Call Home alert. In addition, the alert group must be enabled.
Note
As an alternative to subscribing to individual alert groups, you can subscribe to all alert groups by entering
the subscribe-to-alert-group all command. However, entering this command causes a large number of
syslog messages to generate. We recommend subscribing to alert groups individually, using appropriate
severity levels and patterns when possible.
To subscribe a destination profile to one or more alert groups, perform the following steps:
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
Step 4
profile name
Example:
Router(cfg-call-home)# profile
profile1
Step 5
subscribe-to-alert-group configuration
[periodic {daily hh:mm | monthly daily
hh:mm | weekly daily hh:mm }]
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group
configuration
periodic daily 12:00
Step 6
subscribe-to-alert-group inventory
[periodic {daily hh:mm | monthly daily
hh:mm | weekly daily hh:mm }]
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1040
Call Home
Periodic Notification
Command or Action
Purpose
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group
inventory periodic monthly 1 12:00
Step 7
Step 8
subscribe-to-alert-group crash
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group crash
Step 9
subscribe-to-alert-group snapshot
[periodic {daily hh:mm | hourly mm |
interval mm | monthly daily hh:mm |
weekly day hh:mm }]
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group
snapshot periodic daily 12:00
Periodic Notification
When you subscribe a destination profile to the Configuration, Inventory, or Snapshot alert group, you can
choose to receive the alert group messages asynchronously or periodically at a specified time. The sending
period can be one of the following:
DailySpecifies the time of day to send, using an hour:minute format hh:mm, with a 24-hour clock
(for example, 14:30).
WeeklySpecifies the day of the week and time of day in the format day hh:mm, where the day of the
week is spelled out (for example, Monday).
MonthlySpecifies the numeric date, from 1 to 31, and the time of day, in the format date hh:mm.
IntervalSpecifies the interval at which the periodic message is sent, from 1 to 60 minutes.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1041
Call Home
Message Severity Threshold
HourlySpecifies the minute of the hour at which the periodic message is sent, from 0 to 59 minutes.
Note
Hourly and by interval periodic notifications are available for the Snapshot alert group only.
Note
Call Home severity levels are not the same as system message logging severity levels.
Level
Keyword
Syslog Level
Description
catastrophic
Network-wide
catastrophic failure.
disaster
Significant network
impact.
fatal
Emergency (0)
System is unusable.
critical
Alert (1)
Critical conditions,
immediate attention
needed.
major
Critical (2)
Major conditions.
minor
Error (3)
Minor conditions.
warning
Warning (4)
Warning conditions.
notification
Notice (5)
normal
Information (6)
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1042
Call Home
Configuring Snapshot Command List
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
alert-group-config snapshot
Example:
Router(cfg-call-home)# alert-group-config
snapshot
Step 4
Router(cfg-call-home-snapshot)#
add-command show version
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1043
Call Home
Configuring General email Options
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
Example:
Router(cfg-call-home)# mail-server
stmp.example.com priority 1
Step 4
Step 5
Example:
Router(cfg-call-home)# sender
reply-to [email protected]
Step 6
source-interface interface-name
Router(cfg-call-home)#
source-interface loopback1
source-ip-address ipv4/ipv6-address
Example:
Step 7
Example:
Router(cfg-call-home)#
source-ip-address 209.165.200.226
Step 8
vrf vrf-name
Example:
Router(cfg-call-home)# vrf vpn1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1044
Call Home
Specifying Rate Limit for Sending Call Home Messages
Command or Action
Purpose
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
rate-limit number
Example:
Router(cfg-call-home)# rate-limit 40
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1045
Call Home
Enabling AAA Authorization to Run IOS Commands for Call Home Messages
Step 3
Command or Action
Purpose
Example:
Router(cfg-call-home)# http-proxy 1.1.1.1
port 1
Enabling AAA Authorization to Run IOS Commands for Call Home Messages
To enable AAA authorization to run IOS commands that enable the collection of output for a Call Home
message, perform the following steps:
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
aaa-authorization
Example:
Router(cfg-call-home)# aaa-authorization
Step 4
Example:
Router(cfg-call-home)# aaa-authorization
username user
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1046
Call Home
Configuring Call Home Data Privacy
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
syslog-throttling
Example:
Router(cfg-call-home)#
syslog-throttling
Procedure
Step 1
Command or Action
Purpose
configure terminal
Example:
Router# configure terminal
Step 2
call-home
Example:
Router(config)# call-home
Step 3
Example:
Note
Router(cfg-call-home)# data-privacy
level high
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1047
Call Home
Sending Call Home Communications Manually
Command or Action
Purpose
Procedure
Command or Action
Step 1
Purpose
call-home test [test-message] profile Sends a test message to the specified destination profile.
The user-defined test message text is optional but must be
name
enclosed in quotes () if it contains spaces. If no
user-defined message is configured, a default message is
Example:
Router# call-home test profile
sent.
profile1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1048
Call Home
Submitting Call Home Analysis and Report Requests
Procedure
Command or Action
Step 1
Purpose
call-home send alert-group snapshot [profile Sends a snapshot alert group message to one
destination profile if specified or to all
name]
subscribed destination profiles.
Example:
Router# call-home send alert-group
snapshot profile profile1
Step 2
Example:
Router# call-home send alert-group crash
profile profile1
Step 3
Example:
Router# call-home send alert-group
configuration profile profile1
Step 4
call-home send alert-group inventory [profile Sends an inventory alert group message to one
destination profile if specified or to all
name]
subscribed destination profiles.
Example:
Router# call-home send alert-group
inventory profile profile1
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1049
Call Home
Manually Sending Command Output Message for One Command or a Command List
information. In other case, if the user-id is specified, the response is sent to the email address of the
registered user. If no user-id is specified, the response is sent to the contact email address of the device.
Based on the keyword specifying the type of report requested, the following information is returned:
config-sanityInformation on best practices as related to the current running configuration.
bugs-listKnown bugs in the running version and in the currently applied features.
command-referenceReference links to all commands in the running configuration.
product-advisoryProduct Security Incident Response Team (PSIRT) notices, End of Life (EOL)
or End of Sales (EOS) notices, or field notices (FN) that may affect devices in your network.
registration-infoDevice status information from Smart Call Home server. It may include device
registration status, contract information, contact information and last message update time, etc.
To submit a request for analysis and report information from the Cisco Output Interpreter tool, perform the
following steps:
Procedure
Step 1
Command or Action
Purpose
Example:
Router# call-home request
output-analysis show diag profile TG
Step 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1050
Call Home
Configuring Diagnostic Signatures
If the email option is selected using the email keyword and an email address is specified, the command
output is sent to that address.
If neither the email nor the HTTP option is specified, the output is sent in long-text format with the
specified service request number to the Cisco TAC ([email protected]).
If neither the email nor the http keyword is specified, the service request number is required for both
long-text and XML message formats and is provided in the subject line of the email.
If the HTTP option is specified and neither URL nor profile is specified, the CiscoTAC-1 profile
destination HTTP or HTTPS URL is used as the destination. The destination email address can be
specified so that Smart Call Home can forward the message to the email address. The user must specify
either the destination email address or an SR number but they can also specify both.
To execute a command and send the command output, perform the following step:
Procedure
Command or Action
Purpose
Step 1 call-home send {cli command | cli list} [[email [email -address |
profileprofile-name] | [http [url | profileprofile-name]
destination-email-address forward-email-address]]msg-format {long-text
| xml} [tac-service-request SR#]
Example:
Router# call-home send show version;show running-config;show
inventory email [email protected] msg-format xml
!The following example shows how to send the output of a command
to a user-specified email address:
Router# call-home send show diag email [email protected]
!The following example shows the command output sent in long-text
format to [email protected], with the SR number specified:
Router# call-home send show version; show run tac-service-request
123456
!The following example shows the command output sent in XML
message format to [email protected]:
Router# call-home send show version; show run email
[email protected] msg-format xml
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1051
Call Home
Configuring Diagnostic Signatures
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1052
Call Home
Configuring Diagnostic Signatures
There are two types of DS update requests to download DS files: regular and forced-download. Regular
download requests DS files that were recently updated. You can trigger a regular download request either by
using a periodic configuration or by initiating an on-demand CLI. The regular download update happens only
when the version of the requested DS is different from the version of the DS on the device. Periodic download
is only started after there is any DS assigned to the device from DS web portal. After the assignment happens,
the response to the periodic inventory message from the same device will include a field to notify device to
start its periodic DS download/update. In a DS update request message, the status and revision number of the
DS is included such that only a DS with the latest revision number is downloaded.
Forced-download downloads a specific DS or a set of DSes. You can trigger the forced-download update
request only by initiating an on-demand CLI. In a force-download update request, the latest version of the DS
file is downloaded irrespective of the current DS file version on the device.
The DS file is digitally signed, and signature verification is performed on every downloaded DS file to make
sure it is from a trusted source.
Diagnostic Signature Workflow
The diagnostic signature feature is enabled by default in Cisco software. The following is the workflow for
using diagnostic signatures:
1 Find the DS(es) you want to download and assign them to the device. This step is mandatory for regular
periodic download, but not required for forced download.
2 The device downloads all assigned DS(es) or a specific DS by regular periodic download or by on-demand
forced download.
3 The device verifies the digital signature of every single DS. If verification passes, the device stores the
DS file into a non-removable disk, such as bootflash or hard disk, so that DS files can be read after the
device is reloaded. On the Cisco ASR 901 Series Routers, the DS file is stored in the flash:/directory.
4 The device continues sending periodic regular DS download requests to get the latest revision of DS and
replace the older one in device.
5 The device monitors the event and executes the actions defined in the DS when the event happens.
Diagnostic Signature Events and Actions
The events and actions sections are the key areas used in diagnostic signatures. The event section defines all
event attributes that are used for event detection. The action section lists all actions which should be performed
after the event happens, such as collecting s how command outputs and sending them to Smart Call Home to
parse.
Diagnostic Signature Event Detection
Event detection in a DS is defined in two ways: single event detection and multiple event detection.
Single Event Detection
In single event detection, only one event detector is defined within a DS. The event specification format is
one of the following two types:
DS event specification type: syslog, periodic, configuration, and call home are the supported event types,
where immediate indicates that this type of DS does not detect any events, its actions are performed
once it is downloaded, and the call-home type modifies the current CLI commands defined for existing
alert-group.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1053
Call Home
Configuring Diagnostic Signatures
The Embedded Event Manager (EEM) specification type: supports any new EEM event detector without
having to modify the Cisco software.
Other than using EEM to detect events, a DS is triggered when a Tool Command Language (Tcl) script is
used to specify event detection types.
Multiple Event Detection
Multiple event detection involves defining two or more event detectors, two ore more corresponding tracked
object states, and a time period for the events to occur. The specification format for multiple event detection
can include complex event correlation for tracked event detectors. For example, three event detectors (syslog
and IPSLA) are defined during the creation of a DS file. The correlation that is specified for these event
detectors is that the DS will execute its action if syslog or IPSLA are triggered.
Diagnostic Signature Actions
The diagnostic signature (DS) file consists of various actions that must be initiated when an event occurs. The
action type indicates the kind of action that will be initiated in response to a certain event. Variables are
elements within a DS that are used to customize the files.
DS actions are categorized into the following four types:
call-home
command
emailto
script
DS action types call-home and emailto collect event data and send a message to call-home servers or to the
defined email addresses. The message uses diagnostic-signature as its message type and DS ID as the message
sub-type.
The commands defined for the DS action type initiate CLI commands that can change configuration of the
device, collect show command outputs, or run any EXEC command on the device. The DS action type script
executes Tcl scripts.
Diagnostic Signature Variables
Variables are referenced within a DS and are used to customize the DS file. All DS variable names have the
prefix ds_ to separate them from other variables. The following are the supported DS variable types:
System variable: variables assigned automatically by the device without any configuration changes. The
Diagnostic Signatures feature supports two system variables: ds_hostname and ds_signature_id.
Environment variable: values assigned manually by using the environment variable-name variable-value
command in call-home diagnostic-signature configuration mode. Use the show call-home
diagnostic-signature command to display the name and value of all DS environment variables. If the DS
file contains unresolved environment variables, this DS will stay in pending status until the variable gets
resolved.
Prompt variable: values assigned manually by using the call-home diagnostic-signature install ds-id
command in privileged EXEC mode. If you do not set this value, the status of the DS indicates pending.
Regular expression variable: values assigned from a regular expression pattern match with predefined
CLI command outputs. The value is assigned during the DS run.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1054
Call Home
How to Configure Diagnostic Signatures
Syslog event variable: values assigned during a syslog event detection in the DS file. This variable is
valid only for syslog event detection.
Note
The predefined CiscoTAC-1 profile is enabled as a DS profile by default and we recommend using it. If
used, you only need to change the destination transport-method to the http setting.
Procedure
Command or Action
Purpose
Enters global
configuration mode.
Example:
Router# configure terminal
Example:
Router(config)# service call-home
Step 3 call-home
Example:
Router(config)# call-home
(Optional) Assigns an
email address to be used
for Call Home customer
contact.
(Optional) Configures a
Simple Mail Transfer
Protocol (SMTP) email
server address for Call
Home. This command is
only used when sending
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1055
Call Home
Configuring Diagnostic Signatures
Command or Action
Purpose
email is part of the actions
defined in any DS.
Configures a destination
profile for Call Home and
enters call-home profile
configuration mode.
Example:
Specifies a transport
method for a destination
profile in the Call Home.
Note
To configure
diagnostic
signatures, you
must use the http
option.
To configure
diagnostic
signatures, you
must use the http
option.
Step 9 subscribe-to-alert-group inventory [periodic {daily hh:mm | month day Configures a destination
profile to send messages
hh:mm | weekly day hh:mm}]
for the Inventory alert
group for Call Home.
Example:
Router(cfg-call-home-profile)# subscribe-to-alert-group
inventory periodic daily 14:30
Note
This command is
used only for the
periodic
downloading of
DS files.
What to Do Next
Set the profile configured in the previous procedure as the DS profile and configure other DS parameters.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1056
Call Home
Displaying Call Home Configuration Information
Procedure
Step 1
Command or Action
Purpose
call-home
Example:
Router(config)# call-home
Step 2
diagnostic-signature
Example:
Router(cfg-call-home)# diagnostic-signature
Step 3
profile ds-profile-name
Example:
Router(cfg-call-home-diag-sign)# profile
user1
Step 4
Step 5
end
Example:
Router(cfg-call-home-diag-sign)# end
Step 6
Example:
Router# call-home diagnostic-signature
download 6030
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1057
Call Home
Displaying Call Home Configuration Information
State
------Enable
Enable
Enable
Enable
Enable
Enable
Description
------------------------------configuration info
crash and traceback info
environmental info
inventory info
snapshot info
syslog info
Profiles:
Profile Name: CiscoTAC-1
Profile Name: profile1
Profile Name: profile2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1058
Call Home
Displaying Call Home Configuration Information
State
------Enable
Enable
Enable
Enable
Enable
Enable
Description
------------------------------configuration info
crash and traceback info
environmental info
inventory info
snapshot info
syslog info
Profiles:
Profile Name: CiscoTAC-1
Profile status: INACTIVE
Profile mode: Full Reporting
Reporting Data: Smart Call Home, Smart Licensing
Preferred Message Format: xml
Message Size Limit: 3145728 Bytes
Transport Method: email
Email address(es): [email protected]
HTTP address(es): https://tools.cisco.com/its/service/oddce/services/DDCESe
rvice
Periodic configuration info message is scheduled every 27 day of the month a
t 11:53
Periodic inventory info message is scheduled every 27 day of the month at 11
38
Alert-group
-----------------------crash
Severity
-----------debug
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1059
Call Home
Displaying Call Home Configuration Information
environment
inventory
minor
normal
Syslog-Pattern
-----------------------.*
Severity
-----------major
Severity
-----------debug
normal
Syslog-Pattern
-----------------------.*
Severity
-----------major
Severity
State
------Enable
Enable
Enable
Enable
Enable
Enable
Description
------------------------------configuration info
crash and traceback info
environmental info
inventory info
snapshot info
syslog info
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1060
Call Home
Displaying Call Home Configuration Information
Severity
-----------debug
minor
normal
Syslog-Pattern
-----------------------.*
Severity
-----------major
Severity
-----------debug
Syslog-Pattern
-----------------------.*
Severity
-----------major
Severity
-----------N/A
Syslog-Pattern
-----------------------N/A
Severity
-----------N/A
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1061
Call Home
Displaying Call Home Configuration Information
Severity
-----------debug
normal
Syslog-Pattern
-----------------------.*
Severity
-----------major
Total
-------------------0
0
0
0
0
0
0
0
0
0
0
Email
-------------------0
0
0
0
0
0
0
0
0
0
0
HTTP
-----------------0
0
0
0
0
0
0
0
0
0
0
Total In-Queue
Config
Crash
Environment
Inventory
Snapshot
SysLog
Test
Request
Send-CLI
SCH
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Total Failed
Config
Crash
Environment
Inventory
Snapshot
SysLog
Test
Request
Send-CLI
SCH
2
0
0
0
0
0
0
0
1
1
0
2
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
Total Ratelimit
-dropped 0
Config
0
0
0
0
0
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1062
Call Home
Displaying Call Home Configuration Information
Crash
Environment
Inventory
Snapshot
SysLog
Test
Request
Send-CLI
SCH
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
DS Name
------------------------------ActCH
Triggered/
Max/Deinstall
------------0/0/N
Average Run
Time(sec)
----------0.000
Max Run
Time(sec)
--------0.000
Msg Subtype
Success Failed Inqueue Dropped Last-sent (GMT+08:00)
---------------------------------------------------------------------REGISTRATION
33
0
0
0
2014-03-12 10:08:08
ACKNOWLEDGEMENT 1
0
0
0
2014-03-12 10:08:13
ENTITLEMENT
1
0
0
0
2014-03-12 10:08:21
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1063
Call Home
Default Settings
Default Settings
The following table lists the default Call Home settings.
Parameters
Default
Disabled
Active
Inactive
Transport method
XML
Enabled
Debug
20
AAA authorization
Disabled
Enabled
Normal
Syslog
Event
Crash
SYSTEM_CRASH
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1064
Call Home
Alert Group Trigger Events and Commands
Alert Group
Syslog
Event
TRACEBACK
Configuration
Inventory
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1065
Call Home
Message Contents
Alert Group
Syslog
Event
Syslog
Syslog
Environment
Message Contents
The following tables display the content formats of alert group messages:
Table 63: Format for a Short Text Message
Data Item
Description
Device identification
Date/time stamp
Table 64: Common Fields for All Long Text and XML Messages
Time stamp
Message name
Name of message.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1066
Call Home
Message Contents
Message type
CallHome/Event/Type
Message subtype
Message group
Severity level
Body/Block/Severity
Source ID
Device ID
CallHome/CustomerData/ContractData/DeviceId
Contract ID
Site ID
Server ID
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1067
Call Home
Message Contents
Message
description
CallHome/MessageDescription
Device name
Contact name
CallHome/CustomerData/SystemInfo/Contact
Contact email
CallHome/CustomerData/SystemInfo/ContactEmail
Contact phone
number
CallHome/CustomerData/SystemInfo/
Street address
Model name
CallHome/Device/Cisco_Chassis/Model
Serial number
CallHome/Device/Cisco_Chassis/SerialNumber
System object ID
ContactPhoneNumber
CallHome/Device/Cisco_Chassis/
AdditionalInformation/AD@name=sysDescr
Data Item (Plain Text and Description (Plain Text and XML)
XML)
Command output name
Attachment type
MIME type
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1068
/aml/Attachments/Attachment/Data@encoding
Call Home
Sample Syslog Alert Notification in XML Format
Data Item (Plain Text and Description (Plain Text and XML)
XML)
Command output text
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1069
Call Home
Configuration Example for Call Home
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1070
Call Home
Additional References
Additional References
Related Documents
Related Topic
Document Title
Title
None
MIBs
MIB
MIBs Link
None
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1071
Call Home
Feature Information for Call Home
Technical Assistance
Description
Link
Note
The following table lists only the software release that introduced support for a given feature in a given
software release train. Unless noted otherwise, subsequent releases of that software release train also
support that feature.
Table 66: Feature Information for Call Home
Feature Name
Releases
Feature Information
Call Home
15.5(2)S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1072
CHAPTER
54
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1073
Note
This feature should be used only for debugging purposes and in a maintenance window.
Prerequisites
Identify a remote site node, which is reachable through an IP path.
Ensure that the GRE tunnel configured on the PTP slave device is not carrying any data traffic at the
time of PTP debugging.
Ensure that the tunnel configuration is not changed during PTP debugging.
Ensure that the PTP debugging dumps are enabled.
Restrictions
The PTP debugging over GRE tunnel feature is supported only for debugging.
Only Unidirectional GRE tunnel is supported.
This feature does not support the capture of PTP packets received from the peer on this device. It only
supports the capture of PTP packets generated by this device.
This feature does not support the changes in tunnel configuration during execution.
Guidelines
Unidirectional GRE tunnel should be set up manually by the user from the PTP client node to the remote
site node or IXIA where the packets are captured.
Manual configuration of GRE tunnel is required by the user.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1074
The PTP packets are captured only for a 30 minutes duration in packet capture (PCAP) file. The debugging
is disabled after 30 minutes.
After the successful capture of PTP packets, tunnel configuration must be manually removed from the
slave device.
Note
This feature configures a unidirectional GRE tunnel. The other end of the tunnel is not configured with
any GRE tunnel configuration; however, that other end must be reachable through a pure IP path (no
MPLS).
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router# enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Step 4
Example:
Router(config-if)# ip address 45.45.45.1
255.255.255.0
Step 5
Example:
Router(config-if)# tunnel source 7.7.7.5
Step 6
Example:
Router(config-if)# tunnel destination
7.7.7.10
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1075
Step 7
Command or Action
Purpose
end
Example:
Router(config-if)# end
Procedure
Step 1
Step 2
Step 3
Enable PTP debugging dumps on the ASR901 PTP slave device using BCM shell commands. (Contact Cisco
TAC to enable these commands.)
Enable PTP debugging over GRE tunnel feature using the debug platform ptp interface tunnel command.
Allow the packet capture to run for 30 minutes. After 30 minutes, disable the feature. (You can disable the
PTP debugging over GRE tunnel feature using the no debug platform ptp interface tunnel command.)
Note
Generic debug commands like debug all and undebug all do not have any effect on this feature.
You can only use the debug platform ptp interface tunnel command to enable the PTP debugging
over GRE tunnel feature.
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1076
CHAPTER
55
Overview
Smart Licensing is the next generation enterprise license model for all Cisco software products. It simplifies
the Cisco software experience and helps you to understand how Cisco software is used across your network.
Information About Smart Licensing, page 1077
How to Configure Cisco Smart Licensing, page 1079
Enabling Smart Licensing, page 1079
Registering the Device, page 1080
Authorizing the Device, page 1081
Verifying Smart Licensing Configuration, page 1081
Configuration Examples for Smart Licensing, page 1085
Additional References, page 1088
Feature Information for Cisco Smart Licensing, page 1089
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1077
Overview
Benefits
Benefits
Seamless software experience encompassing purchasing, licensing management, reporting, and
reconciliation/ renewal/ billing.
Reduce cycle time with activation and registration that are automatic, instead of manual.
Obtain visibility of software consumption (what's purchased and what's deployed) across your network.
New streamlined way of viewing and managing software licenses. Make changes within minutes, instead
of days or weeks.
New cloud-based solution architecture and tools, in line with where the industry is headed.
Eliminates the need for return materials authorization (RMA) or re-hosting action.
License Feature
License PID
A901-12C-FT-D
IPBase
SL-A901-B
A901-12C-F-D
AdvancedMetroIPAccess
SL-A901-A
1588BC
SL-A901-T
A901-4C-FT-D
IPBase
SL-A901-B
A901-4C-F-D
AdvancedMetroIPAccess
SL-A901-A
1588BC
SL-A901-T
Gige4CuUpgrade
FLS-A901-4T
Gige4SfpUpgrade
FLS-A901-4S
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1078
Overview
How to Configure Cisco Smart Licensing
Chassis PID
License Feature
License PID
A901-6CZ-FT-D
IPBase
SL-A901-B
A901-6CZ-F-D
AdvancedMetroIPAccess
SL-A901-A
A901-6CZ-FT-A
1588BC
SL-A901-T
A901-6CZ-F-A
10gigUpgrade
FLS-A901-2Z
Gige4portflexi
FLS-A901-4
A901S-4SG-F-D
IPBase
SL-A901-B
A901S-3SG-F-D
AdvancedMetroIPAccess
SL-A901-A
A901-6CZ-FS-D
IPBase
SL-A901-B
A901-6CZ-FS-A
AdvancedMetroIPAccess
SL-A901-A
1588BC
SL-A901-T
Ipsecnatpat
FLS-A901-I
A901S-2SG-F-D
A901S-2SG-F-AH
A901S-3SG-F-AH
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1079
Overview
Registering the Device
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
configure terminal
Example:
Router# configure terminal
Step 3
Note
Example:
Router# license smart enable
Note
Step 4
exit
Example:
Router# exit
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Router> enable
Step 2
Example:
Router# license smart register
idtoken 123
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1080
Overview
Authorizing the Device
Command or Action
Purpose
Note
Example:
Router# license smart
deregister
Step 4
Example:
Router# license smart renew ID
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1081
Overview
Verifying Smart Licensing Configuration
Count: 1
Version: 1.0
Status: AUTHORIZED
(asr901_Gige4SfpUpgra):
Description:
Count: 1
Version: 1.0
Status: AUTHORIZED
(asr901_Gige4CuUpgrad):
Description:
Count: 1
Version: 1.0
Status: AUTHORIZED
Product Information
===================
UDI: PID:A901-4C-F-D,SN:CAT1747U2BF
Agent Version
=============
Smart Agent for Licensing: 1.2.1_throttle/5
Component Versions: SA:(1_2_1_throttle)1.1.0, SI:(rel20)1.0.0, CH:(rel4)1.0.15,
PK:(rel16)1.0.6
To display the license status information, use the show license status command as shown in the example
below:
Router# show license status
Smart Licensing is ENABLED
Registration:
Status: REGISTERED
Virtual Account: Default Virtual Account
Initial Registration: SUCCEEDED on Feb 16 23:32:44 2015 UTC
Last Renewal Attempt: None
Next Renewal Attempt: Aug 15 23:32:42 2015 UTC
Registration Expires: Never
License Authorization:
Status: AUTHORIZED on Feb 18 11:07:03 2015 UTC
Last Communication Attempt: SUCCEEDED on Feb 18 11:07:03 2015 UTC
Next Communication Attempt: Mar 20 11:07:02 2015 UTC
Communication Deadline: May 19 05:32:21 2015 UTC
To display the license summary information, use the show license summary command as shown in the
example below:
Router# show license summary
Smart Licensing is ENABLED
Registration:
Status: REGISTERED
Virtual Account: Default Virtual Account
Last Renewal Attempt: None
Next Renewal Attempt: Aug 15 23:32:43 2015 UTC
License Authorization:
Status: AUTHORIZED
Last Communication Attempt: SUCCEEDED
Next Communication Attempt: Mar 20 11:07:03 2015 UTC
License Usage:
License
Entitlement tag
Count Status
--------------------------------------------------------------(asr901_AdvancedMetro) 1
AUTHORIZED
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1082
Overview
Verifying Smart Licensing Configuration
(asr901_Gige4SfpUpgra) 1
(asr901_Gige4CuUpgrad) 1
AUTHORIZED
AUTHORIZED
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1083
Overview
Verifying Smart Licensing Configuration
=============
Smart Agent for Licensing: 1.2.1_throttle/5
Component Versions: SA:(1_2_1_throttle)1.1.0, SI:(rel20)1.0.0, CH:(rel4)1.0.15,
PK:(rel16)1.0.6
Upcoming Scheduled Jobs
=======================
Current time: Feb 18 11:08:31 2015 UTC
IdCert Expiration Warning: Dec 18 17:57:45 2015 UTC (303 days, 6 hours, 49 minutes, 14
seconds remaining)
Daily: Feb 19 11:05:49 2015 UTC (23 hours, 57 minutes, 18 seconds remaining)
Certificate Renewal: Aug 15 23:32:43 2015 UTC (178 days, 12 hours, 24 minutes, 12 seconds
remaining)
Certificate Expiration Check: Feb 16 17:57:45 2016 UTC (363 days, 6 hours, 49 minutes, 14
seconds remaining)
Authorization Renewal: Mar 20 11:07:03 2015 UTC (29 days, 23 hours, 58 minutes, 32 seconds
remaining)
Authorization Expiration Check: May 19 05:32:22 2015 UTC (89 days, 18 hours, 23 minutes,
51 seconds remaining)
Init Flag Check: Not Available
License Certificates
====================
Production Cert: False
PIID: d0dba898-674b-4420-96e6-6186abc54afb
Licensing Certificated:
Id certificate Info:
Start Date: Feb 16 17:57:46 2015 UTC
Expiry Date: Feb 16 17:57:46 2016 UTC
Version Number: 3
Serial Number: 130921
Common Name: 1E4712A4FFD650C29359701C8DB6ECF02CB9048A::1,2
Signing certificate Info:
Start Date: Jun 14 20:18:52 2013 UTC
Expiry Date: Apr 24 21:55:42 2033 UTC
Version Number: 3
Serial Number: 3
Common Name: MMI Signer
Sub CA Info:
Start Date: Apr 24 22:19:15 2013 UTC
Expiry Date: Apr 24 21:55:42 2033 UTC
Version Number: 3
Serial Number: 2
Common Name: Smart Licensing CA - DEV
HA Info
==========
RP Role: Active
Chassis Role: Active
Behavior Role: Active
RMF: True
CF: True
CF State: Stateless
Other Info
==========
Software ID: regid.2014-08.com.cisco.ASR901,1.0_63ef356d-26bc-431b-8ef2-792054f1a118
Agent State: authorized
TS enable: True
Transport: Callhome
Locale: en_US.UTF-8
Debug flags: 0x0
Privacy Send Hostname: True
Privacy Send IP: True
Build type:: Production
sizeof(char) : 1
sizeof(int)
: 4
sizeof(long) : 4
sizeof(char *): 4
sizeof(time_t): 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1084
Overview
Configuration Examples for Smart Licensing
sizeof(size_t): 4
Endian: Big
routingReadyByEvent: True
systemInitByEvent: True
WaitForHaRole: False
standbyIsHot: False
chkPtType: 2
delayCommInit: False
roleByEvent: True
maxTraceLength: 150
traceAlwaysOn: False
debugFlags: 0
To display the license udi information, use the show license udi command as shown in the example below:
Router# show license udi
UDI: PID:A901-4C-F-D,SN:CAT1747U2BF
To display the license usage information, use the show license usage command as shown in the example
below:
Router# show license usage
License Authorization:
Status: AUTHORIZED on Feb 18 11:07:03 2015 UTC
(asr901_AdvancedMetro):
Description:
Count: 1
Version: 1.0
Status: AUTHORIZED
(asr901_Gige4SfpUpgra):
Description:
Count: 1
Version: 1.0
Status: AUTHORIZED
(asr901_Gige4CuUpgrad):
Description:
Count: 1
Version: 1.0
Status: AUTHORIZED
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1085
Overview
Configuration Examples for Smart Licensing
!
!card type command needed for slot/vwic-slot 0/0
no logging console
!
no aaa new-model
clock timezone IST 5 30
call-home
contact-email-addr [email protected]
mail-server 72.163.4.161 priority 1
sender from [email protected]
profile "CiscoTAC-1"
active
no reporting smart-licensing-data
destination transport-method http
no destination transport-method email
destination address http http://10.22.183.117:8080/ddce/services/DDCEService
no destination address http https://tools.cisco.com/its/service/oddce/services
/DDCEService
profile "User_Profile"
reporting smart-licensing-data
destination transport-method http
destination address http http://10.22.183.117:8080/ddce/services/DDCEService
ip cef
!
!
!
!
no ipv6 cef
!
!
!
!
!
!
!
multilink bundle-name authenticated
l3-over-l2 flush buffers
asr901-storm-control-bpdu 1000
!
!
spanning-tree mode pvst
spanning-tree extend system-id
license udi pid A901-6CZ-FT-A sn CAT1625U0EL
!
!
!
!
!
interface GigabitEthernet0/0
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/1
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/2
no ip address
shutdown
!
interface GigabitEthernet0/8
no ip address
shutdown
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface GigabitEthernet0/9
no ip address
shutdown
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1086
Overview
Example: Smart Call Home
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface GigabitEthernet0/10
no ip address
shutdown
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface GigabitEthernet0/11
no ip address
shutdown
negotiation auto
qos-config scheduling-mode min-bw-guarantee
!
interface TenGigabitEthernet0/0
no ip address
shutdown
!
interface TenGigabitEthernet0/1
no ip address
shutdown
no negotiation auto
!
interface FastEthernet0/0
ip address 10.64.99.202 255.255.255.128
!
interface Vlan1
no ip address
shutdown
!
ip forward-protocol nd
!
!
no ip http server
no ip http secure-server
ip http client source-interface FastEthernet0/0
ip route 0.0.0.0 0.0.0.0 202.153.144.25
ip route 0.0.0.0 0.0.0.0 10.64.99.1
ip route 0.0.0.0 0.0.0.0 10.64.99.129
ip route 10.105.33.0 255.255.255.0 10.64.99.129
!
!
!
!
control-plane
!
environment monitor
!
line con 0
exec-timeout 0 0
line vty 0 4
login
!
exception crashinfo buffersize 128
!
!
end
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1087
Overview
Additional References
! Configuring call-home profile. HTTP transport method is used for smart license reporting.
Router(cfg-call-home)#contact-email-addr [email protected]
Router(cfg-call-home)#profile CiscoTAC-1
Router(cfg-call-home-profile)#active
Router(cfg-call-home-profile)#destination transport-method http
!CiscoTAC-1 profile cannot enable more than one transport method. HTTP transport has been
enabled and email transport disabled.
Router(cfg-call-home-profile)#destination address http
http://10.22.183.117:8080/ddce/services/DDCEService
Router(cfg-call-home-profile)#reporting smart-licensing-data
Router(cfg-call-home-profile)#end
Additional References
Related Documents
Related Topic
Document Title
Title
MIBs
MIB
MIBs Link
CISCO-LICENSE-MGMT-MIB
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1088
Overview
Feature Information for Cisco Smart Licensing
Technical Assistance
Description
Link
Feature Name
Releases
Feature Information
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1089
Overview
Feature Information for Cisco Smart Licensing
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1090
CHAPTER
56
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1091
MAC ACL occupies the layer 2 ACL slice based on the availability of the Ingress Field Processor (IFP)
slice.
MAC ACL is supported on 1G and 10G interfaces.
MAC ACL is supported on Gigabit Ethernet interface and its bundle derivatives.
MAC ACL is not supported on Multilink Point-to-Point (MLPPP) interface.
MAC ACL and IP ACLs are not supported together on an interface.
Named MAC ACLs are only supported.
MAC ACLs share many fundamental concepts including the configurations and limitations with IP
ACLs.
A maximum of 128 entries can be configured per MAC ACL slice.
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1092
Command or Action
Step 4
Purpose
permit {{src-mac mask | any} {dest-mac mask Allows forwarding of layer 2 traffic if the
conditions are matched. Creates an ACE for
| any}}
the ACL.
Example:
Device(config-ext-macl)# permit host
00aa.00bb.00cc host 00aa.00bb.00dd
Procedure
Step 1
Command or Action
Purpose
enable
Example:
Device> enable
Step 2
configure terminal
Example:
Device# configure terminal
Step 3
Example:
Device(config)# mac-access list extended
test-12-acl
Step 4
permit {host src-mac | src-mac mask any} {host Allows forwarding of Layer 2 traffic if the
conditions are matched. This creates an ACE
dest-mac | dest-mac mask any}
for the ACL.
Example:
Device(config-ext-macl)# permit host
00aa.bbcc.ddeb host 00bb.bbcc.ddeb
Step 5
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1093
Step 6
Command or Action
Purpose
exit
Example:
Device(config-ext-macl)# exit
Step 7
Example:
Device(config)# interface gigabitethernet
1/0/0
Step 8
Example:
Device(config-if-srv)# mac access-group
test-12-acl in
Verification of configuration
Use the following command to verify the configuration of MAC layer 2 ACL:
#sh access-lists macacl
Extended MAC access list macacl
permit host 0001.0001.0001 host 0002.0002.0002 sequence 10
deny
any any sequence 20
permit any any sequence 30
Use the following command to verify the configuration of MAC layer 2 ACL on an interface:
#sh run int g0/0
Building configuration...
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1094
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1095
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
1096
INDEX
abbreviating commands 60
ACLs 480
any keyword 480
host keyword 480
administrative VLAN 247
REP, configuring 247
administrative VLAN, REP 247
ARP 4
defined 4
assured forwarding, DSCP 435
autonegotiation 3
duplex mode 3
autosensing, port speed 3
B
bandwidth command 445, 448, 449
for CBWFQ 445
QoS, described 448
with police command 449
bandwidth remaining percent command 449
base station controller 2
See 2
before starting router 25
best-effort packet delivery 428
BGP 5
support for 5
bridge domain 88, 89, 90
configuring 89
creating 88
rewrite command 90
split horizon 90
symmetric rewrite 90
bridge-domain command 137, 166, 268
BSC 2
in RAN 2
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-1
Index
D
Default Font& 2
Default Font> 2
default commands 60
default configuration 93, 143, 172, 182, 196, 245
CFM 143
E-LMI and OAM 196
Ethernet OAM 182
EVCs 93
REP 245
Y.1731 172
default service, DSCP 435
Differentiated Services Code Point 432
See DSCP 432
DSCP 432, 435
assured forwarding 435
class selectors 435
classification 435
default service 435
expedited forwarding 435
values 432
duplex mode, setting 76
E
E-LMI 195, 196, 197
configuring a PE device 196
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-2
Index
E-LMI (continued)
default configuration 196
defined 195
enabling 196
information 195
monitoring 197
E1 controllers 312
editing features 62, 63, 65
enabling and disabling 62
keystrokes used 63
wrapped lines 65
encapsulation frame-relay ietf command 137
encapsulation on service instances 88
encapsulation types supported 88
equal-cost routing 5
error messages during command entry 60
EtherChannel 3, 130, 131, 134
configuration guidelines 130
configuring 131
Layer 2EtherChannel 131
Layer 2, configuring 131
load balancing 130, 134
configuring 134
understanding 130
port-channel interfaces 130
STPSTP 130
EtherChannel 130
support for 3
Ethernet flow point 85
See EFP 85
Ethernet infrastructure 141
Ethernet Link Management Interface 141
See E-LMI 141
Ethernet OAM 179, 182, 183, 184, 185, 188, 189, 192
protocol 179, 192
monitoring 192
configuration guidelines 182
default configuration 182
enabling 183
link monitoring 185
protocol 179, 192
defined 179
remote failure indications 188
remote loopback 184
templates 189
Ethernet OAM protocol 141
Ethernet operation, administration, and maintenance 141
See Ethernet OAM 141
Ethernet Virtual Connection 1, 85
See EVC 1, 85
EVC 85, 86, 87, 93, 94
broadcast domain 85
configuration guidelines 94
creating 87
EVC (continued)
default configuration 93
supported features 86
expedited forwarding, DSCP 435
F
figure 348
TDM over MPLS configuration 348
filtering 65
show and more command output 65
filtering show and more command output 65
first-time configuration 25
frame distribution 130
See EtherChannel load balancing 130
G
GE interface 75, 76
IP address 75
mode 76
speed 76
global parameters 26
configuring 26
H
help, for the command line 59
history 61, 62
changing the buffer size 61
described 61
disabling 62
recalling commands 62
hostname 30, 31
configuring 30
verifying 31
HP OpenView 3
I
ICMP 5
support for 5
IEEE 802.1ag 142
IEEE 802.3ad 128
See LACP802.3ad 128
See LACP 128
IEEE 802.3ah Ethernet OAM discovery 141
IFS 4
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-3
Index
L
LACP 128
system ID 128
Layer 2 packets, classification 432
Layer 3 features 5
link integrity, verifying with REP 241
link monitoring, Ethernet OAM 185
LSP ping 295, 296, 297
over pseudowire 296, 297
configuring 297
configuring 297
described 295
over pseudowire 296, 297
described 296
LSP traceroute 296, 297
configuring 297
described 296
M
MAC addresses 109
static 109
allowing 109
manageability features 4
management access 4
in-band 4
CLI session 4
SNMP 4
out-of-band console port connection 4
management options 3, 57
CLI 57
overview 3
manual preemption, REP, configuring 256
marking 441
described 441
match command, QoS 429, 434, 482
for classification 429, 434
guidelines 482
matching classifications, QoS 434
mobile switching center 2
See & 2
modular QoS command-line interface 427
See MQC 427
monitoring 6, 177, 192, 197
E-LMI 197
Ethernet CFM 177
Ethernet OAM 192
Ethernet OAM protocol 192
features 6
MPLS 295, 296
LSP traceroute 296
LSP ping 295
MPLS OAM 295
described 295
MQC 429
process 429
steps to configure 429
MSC 2
in a RAN 2
MSTP 244
and REP 244
multi-VRF CE 6
support for 6
multiprotocol label switching 295
See MPLS 295
N
neighbor offset numbers, REP 242
no commands 60
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-4
Index
NTP 4
support for 4
O
OAM 179, 180
client 179
features 180
sublayer 179
OAM manager 195
purpose of 195
OAM PDUs 182
OAM protocol data units 179
options, management 3
OSPF 5
support for 5
OSPF for IPv6 994
authentication support with IPSec 994
output policies 431
output policy maps 431
classification criteria 431
P
packet classification 432
defined 432
packet marking 444
defined 444
parent policies, QoS 439, 447
password 26, 30, 31
configuring 30
verifying 31
passwords 4
for security 4
per-port per VLAN policing 439
performance features 3
ping mpls ipv4 command 297
ping mpls pseudowire command 297
ping, LSP 295
policing 441, 442
individual in input policy maps 442
QoS 441
policy maps 429, 430, 442
attaching 429
described 442
input 430
described 430
output 430
described 430
policy-map command 429
Q
QoS 5, 427, 428, 431, 432, 433, 434, 435, 436, 438, 439, 440, 441, 442, 443,
445, 446, 447, 448, 449, 461, 482
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-5
Index
QoS (continued)
configuration guidelines (continued)
general 461
configuring 482
class maps 482
class maps 482
congestion management 445
CPU-generated traffic 432
output remarking 432
input policy maps 431
described 431
IP packet classification 432
Layer 2 packet classification 432
Layer 3 packet classification 432
match command 434
output policy maps 431
described 431
overview 428
parent-child hierarchy 439, 447
per-port, per-VLAN hierarchical policy maps 439
described 439
policers 441
described 441
policing 441, 442, 443
described 441
individual 442
priority 443
port shaping, described 447
priority policing, described 443
scheduling 445
CBWFQ 445
priority queuing 445
traffic shaping 445
strict priority queuing 449
support for 5
supported table maps 440
table maps 440
traffic shaping, described 446
QoS groups 431, 438, 439
classification 438, 439
described 431, 438
quality of service 427
See QoS 427
R
RADIUS 4
support for 4
RAN, using the Cisco ASR 901 router 2
remote failure indications, Ethernet OAM 188
remote loopback, Ethernet OAM 184
REP 239, 241, 242, 244, 245, 247, 248, 256, 257
administrative VLAN 247
administrative VLAN, configuring 247
and MSTP 244
configuration guidelines 245
configuring interfaces 248
convergence 242
default configuration 245
manual preemption, configuring 256
neighbor offset numbers 242
open segment 239
ports 244
preempt delay time 242
primary edge port 242
ring segment 239
secondary edge port 242
segments 239
characteristics 239
SNMP traps, configuring 257
supported interfaces 239
triggering VLAN load balancing 242
verifying link integrity 241
VLAN load balancing 242
RFC 435
2475, DSCP 435
2597, AF per-hop behavior 435
2598, EF 435
RNC 2
in a RAN 2
S
saving configuration changes 66
scheduling, QoS 445
secondary edge port, REP 242
Secure Shell 4
See SSH 4
security features 4
security policy 995
defining for OSPF for IPv6 995
service instance 87, 88, 95
configuration mode 87
configuring 95
creating 87
defined 87
encapsulation 88
service-policy command 429
attaching policy maps 429
set command 444
for QoS marking 444
setup command facility 25
shape average command, QoS 445, 447
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-6
Index
Telnet (continued)
number of connections 4
templates, Ethernet OAM 189
traceroute mpls ipv4 command 297, 298
traceroute, LSP 296
traffic class, defined 429
traffic classification, typical values 436
traffic marking 444
traffic policies, elements in 429
traffic shaping 445, 446
for QoS scheduling 445
QoS traffic control 446
V
verifying 29, 31
hostname 31
password 31
software version 29
version of Cisco IOS software 29
VLAN load balancing 242
REP 242
triggering 242
T
table maps 440, 444
described 440
for QoS marking 444
types of 440
TACACS+ 4
support for 4
Telnet 4, 66
accessing management interfaces 66
Y
Y.1731 172
default configuration 172
described 172
terminology 172
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-7
Index
Cisco ASR 901 Series Aggregation Services Router Software Configuration Guide
IN-8