Junos Ipv6 Dualstack
Junos Ipv6 Dualstack
Published
2021-03-10
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. All other trademarks, service marks, registered marks, or registered service
marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use
with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such
software, you agree to the terms and conditions of that EULA.
iii
Table of Contents
About This Guide | xxii
Understanding BNG Support for Cascading DSLAM Deployments Over Bonded DSL Channels | 22
Minimize Traffic Loss Due to Stale Route Removal After a Graceful Routing Engine Switchover | 34
Preventing DHCP from Installing Access, Access-Internal, and Destination Routes by Default | 41
iv
Verifying the Configuration of Access and Access-Internal Routes for DHCP and PPP
Subscribers | 42
Configuring DHCP Snooped Packets Forwarding Support for DHCP Local Server | 57
Enabling and Disabling DHCP Snooped Packets Support for DHCP Relay Agent | 59
Configuring DHCP Snooped Packets Forwarding Support for DHCP Relay Agent | 66
Requirements | 71
Overview | 71
Configuration | 71
Requirements | 74
Overview | 75
Configuration | 75
Verification | 78
Configuring the Router to Distinguish Between DHCPv4 Duplicate Clients Based on Option 82
Information | 83
Configuring the Router to Distinguish Between DHCPv4 Duplicate Clients Based on Their
Incoming Interfaces | 85
Configuring the Router to Use Underlying Interfaces to Distinguish Between DHCPv6 Duplicate
Client DUIDs | 88
Understanding How the Router Processes Subscriber-Initiated PPP Fast Keepalive Requests | 93
Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges | 102
Configuring Local Authentication in Dynamic Profiles for Static Terminated IPv4 PPP
Subscribers | 107
Configuring Tag2 Attributes in Dynamic Profiles for Static Terminated IPv4 PPP Subscribers | 109
Ensuring IPCP Negotiation for Primary and Secondary DNS Addresses | 124
Configuring the Number and Size of PPP Service Log Files | 128
Configuring the Severity Level to Filter Which PPP Service Messages Are Logged | 132
Enabling Tunnel and Global Counters for SNMP Statistics Collection | 144
Tunnel Switching Actions for L2TP AVPs at the Switching Boundary | 153
Using the Same L2TP Tunnel for Injection and Duplication of IP Packets | 166
Configuring How the LAC Responds to Address and Port Changes Requested by the LNS | 168
Globally Configuring the LAC to Interoperate with Cisco LNS Devices | 172
Limiting the Number of L2TP Sessions Allowed by the LAC or LNS | 198
Subscriber Access Line Information Handling by the LAC and LNS Overview | 211
Transmission of the Receive Connect Speed AVP When Transmit and Receive Connect Speeds
are Equal | 236
Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS | 237
viii
Configuring the Reporting and Processing of Subscriber Access Line Information | 240
Preventing the LAC from Sending Calling Number AVP 22 to the LNS | 245
Override the Calling-Station-ID Format for the Calling Number AVP | 246
Applying PPP Attributes to L2TP LNS Subscribers per Inline Service Interface | 256
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
Configuring an Address-Assignment Pool for L2TP LNS with Inline Services | 264
Configuring Options for the LNS Inline Services Logical Interface | 270
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
L2TP Session Limits and Load Balancing for Service Interfaces | 278
Requirements | 282
Overview | 283
Configuration | 285
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
Configuring a Pool of Inline Services Interfaces for Dynamic LNS Sessions | 309
Configuring the Severity Level to Filter Which L2TP Messages Are Logged | 328
Configuring the Maximum Number of Pseudowire Logical Interface Devices Supported on the
Router | 340
Changing the Anchor Point for a Pseudowire Subscriber Logical Interface Device | 343
Configuring the Transport Logical Interface for a Pseudowire Subscriber Logical Interface | 346
Configuring Layer 2 Circuit Signaling for Pseudowire Subscriber Logical Interfaces | 347
Configuring Layer 2 VPN Signaling for Pseudowire Subscriber Logical Interfaces | 348
Configuring the Service Logical Interface for a Pseudowire Subscriber Logical Interface | 350
x
Supported Access Models for Dynamic-Bridged GRE Tunnels on the Wi-Fi Access Gateway | 360
Configuring a Pseudowire Subscriber Logical Interface Device for the Wi-Fi Access Gateway | 361
Configuring VLAN Subscriber Interfaces for Dynamic-Bridged GRE Tunnels on Wi-Fi Access
Gateways | 366
Configuring Untagged Subscriber Interfaces for Dynamic-Bridged GRE Tunnels on Wi-Fi Access
Gateways | 371
Configuring the Number and Size of Fixed Wireless Access Log Files | 394
Configuring a Regular Expression for Fixed Wireless Access Messages to Be Logged | 395
8 Configuration Statements
aaa-access-profile (L2TP LNS) | 404
address-change-immediate-update | 443
allow-snooped-clients | 447
always-write-option-82 | 449
bfd | 465
chap | 472
client | 479
detection-time | 489
dhcp-local-server | 493
dhcp-relay | 506
dial-options | 538
drain | 546
dynamic-profiles | 562
failover-resync | 583
failure-action | 586
flexible-vlan-tagging | 588
holddown-interval | 620
input-hierarchical-policer | 637
interface-id | 642
ip-reassembly | 651
ipcp-suggest-dns-option | 656
keepalive | 658
keepalives | 660
l2tp | 664
l2tp-access-profile | 674
lcp-renegotiation | 682
liveness-detection | 684
xv
mac | 693
maximum-sessions-per-tunnel | 700
method | 705
minimum-interval | 710
minimum-receive-interval | 712
mtu | 716
multiplier | 720
no-adaptation | 726
next-hop-service | 732
xvi
no-allow-snooped-clients | 734
no-gratuitous-arp-request | 736
on-demand-ip-address | 740
pap | 760
ppp-options | 777
proxy-mode | 799
reject-unauthorized-ipv6cp | 810
relay-option-82 | 812
session-mode | 858
session-options | 860
soft-gre | 866
stacked-vlan-tagging | 870
transmit-interval | 902
tunnel-group | 908
untagged | 933
vlan-tagging | 942
vlan-tags | 947
9 Operational Commands
clear services l2tp destination | 952
Use this guide to understand how to configure the primary methods for accessing the subscriber
network:
• PPP enables a point-to-point direct connection to the network and service provider. Dynamic profiles
apply configurations and services to authenticated subscribers.
• L2TP separates the termination of access technologies from the termination of PPP and subsequent
access to a network. This separation enables service providers to outsource their access
technologies. L2TP provides ISPs the capability to supply VPN service; private enterprises can reduce
or avoid investment in access technologies for remote workers.
• MPLS pseudowire interfaces extend MPLS domains from the access-aggregation network to the
service edge.
• Wi-Fi access gateways provide public Wi-Fi access from residential or business Wi-Fi networks so
that mobile subscribers can be authenticated and connected regardless of their physical location.
• Fixed wireless access enables service providers to manage subscribers over a wireless network to the
home instead of having to run fiber to the building. The wireless network reduces last-mile
installation and maintenance costs and gives providers the ability to increase services to underserved
end users.
RELATED DOCUMENTATION
Configuring the Broadband Edge as a Service Node Within Seamless MPLS Network Designs
Configuring MX Series Universal Edge Routers for Service Convergence
1 CHAPTER
IN THIS SECTION
Understanding BNG Support for Cascading DSLAM Deployments Over Bonded DSL Channels | 22
Detection of Backhaul Line Identifiers and Autogeneration of Intermediate Node Interface Sets | 26
A subscriber access environment can include various components, including subscriber access
technologies and authentication protocols.
NOTE: This feature requires a license. To understand more about Subscriber Access Licensing,
see, Subscriber Access Licensing Overview. Please refer to the Juniper Licensing Guide for
general information about License Management. Please refer to the product Data Sheets at MX
Series Routers for details, or contact your Juniper Account Team or Juniper Partner.
A multiservice access node is a broader term that refers to a group of commonly used aggregation
devices. These devices include digital subscriber line access multiplexers (DSLAMs) used in xDSL
networks, optical line termination (OLT) for PON/FTTx networks, and Ethernet switches for Active
Ethernet connections. Modern MSANs often support all of these connections, as well as providing
connections for additional circuits such as plain old telephone service (referred to as POTS) or Digital
Signal 1 (DS1 or T1).
The defining function of a multiservice access node is to aggregate traffic from multiple subscribers. At
the physical level, the MSAN also converts traffic from the last mile technology (for example, ADSL) to
Ethernet for delivery to subscribers.
You can broadly categorize MSANs into three types based on how they forward traffic in the network:
4
• Layer–2 MSAN—This type of MSAN is essentially a Layer 2 switch (though typically not a fully
functioning switch) with some relevant enhancements. These MSANs use Ethernet (or ATM)
switching to forward traffic. The MSAN forwards all subscriber traffic upstream to an edge router
that acts as the centralized control point and prevents direct subscriber-to-subscriber
communication. Ethernet Link Aggregation (LAG) provides the resiliency in this type of network.
Layer 2 DSLAMs cannot interpret IGMP, so they cannot selectively replicate IPTV channels.
• Layer–3 aware MSAN—This IP-aware MSAN can interpret and respond to IGMP requests by locally
replicating a multicast stream and forwarding the stream to any subscriber requesting it. Layer 3
awareness is important when supporting IPTV traffic to perform channel changes (sometimes
referred to as channel zaps). Static IP-aware MSANs always receive all multicast television channels.
They do not have the ability to request that specific channels be forwarded to the DSLAM. Dynamic
IP-aware DSLAMs, however, can inform the network to begin (or discontinue) sending individual
channels to the DSLAM. Configuring IGMP proxy or IGMP snooping on the DSLAM accomplishes
this function.
• Layer–3 MSAN—These MSANs use IP routing functionality rather than Layer 2 technologies to
forward traffic. The advantage of this forwarding method is the ability to support multiple upstream
links going to different upstream routers and improving network resiliency. However, to accomplish
this level of resiliency, you must assign a separate IP subnetwork to each MSAN, adding a level of
complexity that can be more difficult to maintain or manage.
IN THIS SECTION
Direct Connection | 6
Each MSAN can connect directly to an edge router (broadband services router or video services router),
or an intermediate device (for example, an Ethernet switch) can aggregate MSAN traffic before being
sent to the services router. Table 1 on page 5 lists the possible MSAN aggregation methods and under
what conditions they are used.
Direct connection Each MSAN connects directly to the broadband services router and
optional video services router.
Ethernet aggregation Each MSAN connects directly to an intermediate Ethernet switch. The
switch connection switch, in turn, connects to the broadband services router or optional
video services router.
Ethernet ring Each MSAN connects to a ring topology of MSANs. The head-end MSAN
aggregation connection (the device closest to the upstream edge router) connects to the
broadband services router.
You can use different aggregation methods in different portions of the network. You can also create
multiple layers of traffic aggregation within the network. For example, an MSAN can connect to a central
office terminal (COT), which, in turn, connects to an Ethernet aggregation switch, or you can create
multiple levels of Ethernet aggregation switches prior to connecting to the edge router.
6
Direct Connection
In the direct connection method, each MSAN has a point-to-point connection to the broadband services
router. If an intermediate central office exists, traffic from multiple MSANs can be combined onto a
single connection using wave-division multiplexing (WDM). You can also connect the MSAN to a video
services router. However, this connection method requires that you use a Layer 3 MSAN that has the
ability to determine which link to use when forwarding traffic.
When using the direct connection method, keep the following in mind:
• Because multiple MSANs are used to connect to the services router, and Layer 3 MSANs generally
require a higher equipment cost, this method is rarely used in a multiedge subscriber management
model.
• Direct connection is typically used when most MSAN links are utilized less than 33 percent and there
is little value in combining traffic from multiple MSANs.
An Ethernet aggregation switch aggregates traffic from multiple downstream MSANs into a single
connection to the services router (broadband services router or optional video services router).
When using the Ethernet aggregation switch connection method, keep the following in mind:
• Ethernet aggregation is typically used when most MSAN links are utilized over 33 percent or to
aggregate traffic from lower speed MSANs (for example, 1 Gbps) to a higher speed connection to the
services router (for example, 10 Gbps).
• You can use an MX Series router as an Ethernet aggregation switch. For information about
configuring the MX Series router in Layer 2 scenarios, see the Ethernet Networking User Guide for
MX Series Routers.
In a ring topology, the remote MSAN that connects to subscribers is called the remote terminal (RT). This
device can be located in the outside plant (OSP) or in a remote central office (CO). Traffic traverses the
ring until it reaches the central office terminal (COT) at the head-end of the ring. The COT then connects
directly to the services router (broadband services router or video services router).
NOTE: The RT and COT must support the same ring resiliency protocol.
7
You can use an MX Series router in an Ethernet ring aggregation topology. For information about
configuring the MX Series router in Layer 2 scenarios, see the Ethernet Networking User Guide for MX
Series Routers.
IN THIS SECTION
Sample Configuration | 10
A pseudowire is a virtual link that is used to transport a Layer 2 service across an MPLS edge or access
network. In a typical broadband edge or business edge network, one end of a pseudowire is terminated
as a Layer 2 circuit on an access node, and the other end is terminated as a Layer 2 circuit on a service
node that serves as either an aggregation node or an MPLS core network. Traditionally, both endpoints
are provisioned manually through configuration. LDP pseudowire autosensing introduces a new
provisioning model that allows pseudowire endpoints to be automatically provisioned and deprovisioned
on service nodes based on LDP signaling messages. This model can facilitate the provisioning of
pseudowires on a large scale. An access node uses LDP to signals both pseudowire identity and
attributes to a service node. The identity is authenticated by a RADIUS server, and then used together
with the attributes signaled by LDP and the attributes passed down by the RADIUS server to create the
pseudowire endpoint configuration, including the Layer 2 circuit.
In a seamless MPLS-enabled broadband access or business edge network, Ethernet pseudowires are
commonly used as virtual interfaces to connect access nodes to service nodes. Each pseudowire carries
the bidirectional traffic of one or multiple broadband subscribers or business edge customers between
an access node and a service node pair. The establishment of the pseudowire is usually initiated by the
access node, based on either static configuration or dynamic detection of a new broadband subscriber
or business edge customer arriving on a client-facing port on the access node.
Ideally, the access node should create one pseudowire per client port, where all subscribers or
customers hosted by the port are mapped to the pseudowire. The alternative is where there is one
pseudowire per client port (S-VLAN), and all subscribers or customers sharing a common S-VLAN on the
port are mapped to the pseudowire. In either case, the pseudowire is signaled in the raw mode.
8
The S-VLAN, if not used to delimit service on the service node or combined with C-VLAN to distinguish
subscribers or customers, will be stripped off before the traffic is encapsulated in pseudowire payload
and transported to the service node. Individual subscribers or customers may be distinguished by C-
VLAN, or a Layer 2 header such as DHCP and PPP, which will be carried in pseudowire payload to the
service node. On the service node, the pseudowire is terminated. Individual subscribers or customers are
then demultiplexed and modeled as broadband subscriber interfaces, business edge interfaces (for
example, PPPoE), Ethernet interfaces, or IP interfaces. Ethernet and IP interfaces may be further
attached to service instances, such as VPLS and Layer 3 VPN instances.
In Junos OS, pseudowire ingress termination on service nodes is supported through the use of
pseudowire service physical and logical interfaces. This approach is considered as superior in scalability
to the old logical tunnel interface based approach, due to its capability of multiplexing and
demultiplexing subscribers or customers over a single pseudowire. For each pseudowire, a pseudowire
service physical interface is created on a selected Packet Forwarding Engine, which is called an anchor
Packet Forwarding Engine. On top of this pseudowire service physical interface, a ps.0 logical interface
(transport logical interface) is created, and a Layer 2 circuit or Layer 2 VPN is created to host the ps.0
logical interface as an attachment interface.
The Layer 2 circuit or Layer 2 VPN enables pseudowire signaling towards the access node, and the ps.0
logical interface serves the role of customer edge facing interface for the pseudowire. Further, one or
multiple ps.n logical interfaces (also known as service logical interfaces, where n>0) may be created on
the pseudowire service physical interface to model individual subscriber/customer flows as logical
interfaces. These interfaces can then be attached to desired broadband and business edge services or
Layer 2 or Layer 3 VPN instances.
NOTE: Note that the purpose of the anchor Packet Forwarding Engine is to designate the Packet
Forwarding Engine to process the bidirectional traffic of the pseudowire, including encapsulation,
decapsulation, VLAN mux or demux, QoS, policing, shaping, and many more.
For Junos OS Release 16.2 and earlier, the creation and deletion of the pseudowire service physical
interfaces, pseudowire service logical interfaces, Layer 2 circuits, and Layer 2 VPNs for pseudowire
ingress termination rely on static configuration. This is not considered as the best option from the
perspective of scalability, efficiency, and flexibility, especially in a network where each service node may
potentially host a large number of pseudowires. The objective is to help service providers come out of
static configuration in provisioning and deprovisioning pseudowire ingress termination on service nodes.
In the pseudowire autosensing approach, a service node uses the LDP label mapping message received
from an access node as a trigger to dynamically generate configuration for a pseudowire service physical
interface, a pseudowire service logical interface, a Layer 2 circuit. Likewise, it uses the LDP label
withdraw message received from the access node and LDP session down event as triggers to remove
9
the generated configuration. In pseudowire autosensing, it is assumed that access nodes are the
initiators of pseudowire signaling, and service nodes are the targets. In a network where a service may
be hosted by multiple service nodes for redundancy or load balancing, this also provides access nodes
with a select-and-connect model for service establishment. The basic control flow of pseudowire
autosensing is shown in Figure 3 on page 9
1. Customer premises equipment (CPE) comes online and sends an Ethernet frame with C-VLAN to the
optical line terminator (OLT). OLT adds S-VLAN to the frame and sends the frame to the access node.
The access node checks with the RADIUS server to authorize the VLANs.
2. The RADIUS server sends an access accept to the access node. The access node creates a Layer 2
circuit and signals a pseudowire to the service node through an LDP label mapping message.
3. The service node accepts the label mapping message, and sends an access request with pseudowire
information to the RADIUS server for authorization and for selection of a pseudowire service
physical interface or a logical interface.
4. The RADIUS server sends an access accept to the service node with a service string specifying the
selected pseudowire service physical interface or logical interface. The service node creates a Layer 2
circuit configuration, the pseudowire information, and the pseudowire service physical interface or
logical interface. The service node signals the pseudowire towards the access node through an LDP
label mapping message. The pseudowire comes up bidirectionally.
10
Sample Configuration
The following configuration explicitly marks the Layer 2 circuit as generated by autosensing. The
pseudowire service physical interface and pseudowire service logical interface configuration are
optional, depending on whether they preexist.
Router 0
[edit]
protocols {
Layer 2 circuit {
neighbor 192.0.2.2 {
interface ps0.0 {
virtual-circuit-id 100;
control-word;
mtu 9100;
auto-sensed;
}
}
}
}
IN THIS SECTION
Sample Configuration | 14
The pseudowire service logical interface supports the transport logical interface (psn.0) on the MPLS
access side and service logical interfaces (psn.1 to psn.n) on the MPLS core side of the subscriber
management network.
11
The pseudowire service on service logical interfaces psn.1 to psn.n are configured as Layer 2 interfaces
in the bridge domain or in a virtual private LAN service (VPLS) instance. There is Layer 2 circuit or the
Layer 2 VPN across MLPS access between an Ethernet aggregation device and a service edge device
with the pseudowire service on transport logical interface psn.0 as the terminating interface of the Layer
2 circuit or the Layer 2 VPN at the service edge device.
Junos OS supports the pseudowire service on service logical interfaces psn.1 to psn.n in the bridge
domain or VPLS instance, which receives traffic egressing from the pseudowire service on the transport
logical interface at the service edge device. It also enables Layer 2 ingress features such as MAC
learning, VLAN manipulations, and destination MAC look up on the pseudowire service on service
logical interfaces.
When the traffic is in reverse direction, the destination MAC enters the Layer 2 domain at the service
edge device, which is learned as the source MAC on the pseudowire service on service logical interfaces.
Starting in Junos OS Release 17.1R1, the pseudowire logical tunnel interfaces support Ethernet VPLS,
Ethernet bridge, VLAN VPLS, and VLAN bridge encapsulation next hops to exit Layer 2 traffic. Starting
in Junos OS Release 18.4R1, the Layer 2 service support with the pseudowire service logical interfaces
is extended to pseudowire service interfaces anchored over redundant logical tunnel interfaces as well.
These Layer 2 services are supported only on pseudowire service on service logical interfaces (psn.1 to
psn.n) and not on transport logical interface (psn.0). The Layer 2 output features such as VLAN
manipulations and others are enabled on the pseudowire service interfaces. The traffic sent out of the
interfaces enter the pseudowire service on transport logical interfaces which is the Layer 2 circuit
interface between Ethernet aggregation and service edge devices across the MPLS access domain.
NOTE: For Junos OS Release 16.2 and earlier, Layer 2 encapsulations or features could not be
configured on pseudowire service on service logical interfaces.
VPLS-x and VPLS-y instances are configured on the MPLS core side of the service edge device (PE A). A
Layer 2 circuit or Layer 2 VPN is configured between the Ethernet aggregation device (EAD 1) and the
service edge device. ps0.0 (transport logical interface) is the local interface in the Layer 2 circuit or the
Layer 2 VPN at PE A. Junos OS supports pseudowire service on service logical interface ps0.x (x>0) in
VPLS instance VPLS-x (VLAN ID in VPLS-x = m) and pseudowire service on service logical interface
ps0.y(y>0) in VPLS instance VPLS-y (VLAN ID in VPLS-y = n).
In Figure 4 on page 12, when the traffic comes from EAD 1 to PE A (on either Layer 2 circuit or Layer 2
VPN) with any VLAN ID, the traffic will exit through ps0.0. Based on the VLAN ID in the traffic the
12
pseudowire service on service logical interface is selected. For example, if VLAN ID is m, then the traffic
will enter ps0.x and if VLAN ID is n, then the traffic will enter ps0.y.
When traffic enters pseudowire service on the service logical interface ps0.n, where n>0, the following
steps are performed.
1. The source MAC learning should occur on the Layer 2 pseudowire service on the service logical
interface. The source Packet Forwarding Engine for this MAC is the Packet Forwarding Engine of the
logical tunnel interface on which the pseudowire service is anchored in a VPLS instance or bridge
domain in the PE A device.
2. The destination MAC lookup is done at the entry side as an input bridge family feature list of
pseudowire services on service logical interfaces.
• If destination MAC lookup is successful, then the traffic is sent as unicast; otherwise, the
destination MAC, broadcast MAC, and multicast MAC are flooded.
• If destination MAC lookup fails for the traffic coming on a pseudowire service on a service logical
interface, the mlp query command is sent to the Routing Engine and the other Packet Forwarding
Engine in bridge domain or VPLS instance.
3. If a new MAC is learned on a pseudowire service on a service logical interface, then the mlp add
command is sent to the Routing Engine and the other Packet Forwarding Engine in bridge domain or
VPLS instance.
13
When traffic enters the VPLS instance or bridge domain at the service edge device and if the destination
MAC in the traffic is learned on a pseudowire service on a service logical interface, then the token
associated with that pseudowire service logical interface is set at the entry side. The traffic is then sent
to the Packet Forwarding Engine on which the logical tunnel interface of the pseudowire service
physical interface is anchored through a fabric. When this token is launched, it supports VLAN VPLS,
VLAN bridge, Ethernet VPLS, and Ethernet bridge encapsulations. The encapsulation next hop points to
the egress logical interface feature list of the pseudowire service on the service logical interface to
execute all the Layer 2 output features and send the packet to the entry side of the pseudowire service
on transport logical interface ps0.0.
If the MAC query reaches the Packet Forwarding Engine on which the pseudowire service is anchored,
then the Packet Forwarding Engine sends the response only when the MAC learned on the pseudowire
service on the service logical interface is present. The Layer 2 token associated with the pseudowire
service on the service logical interface seen after destination MAC lookup for the MAC learned on the
pseudowire service on service logical interface should point to the next hop associated with the access
side of the pseudowire service on service the logical interface.
The pseudowire service on the transport logical interface is the local interface ps0.0 of the Layer 2
circuit or Layer 2 VPN between the service edge and the Ethernet aggregation devices. Traffic is sent to
the Ethernet aggregation device though the Layer 2 circuit or Layer 2 VPN across the MPLS access
domain.
If the destination MAC traffic coming from the entry and exit side of the service edge device is unknown
or multicast or broadcast, the traffic needs to be flooded. This requires an customer edge device flood
next hop to include the pseudowire service on service logical interface, which acts as an access logical
interface for the VPLS instance or bridge domain.
• A pseudowire service interface is hosted over a logical tunnel interface (lt-x/y/z). The traffic from a
transport pseudowire service on a logical interface to a subscriber pseudowire service on a logical
interface is based on the available VLAN ID.
• Pseudowire service on service logical interfaces are supported on the virtual routing and forwarding
(VRF) routing instance.
14
Sample Configuration
This sample configuration shows a pseudowire service on a transport logical interface on a Layer 2
circuit and a pseudowire service on service logical interfaces in a bridge domain and a VPLS instance in a
service edge device:
[edit]
interfaces {
ps0 {
unit 0 {
encapsulation ethernet-ccc;
}
unit 1 {
encapsulation vlan-bridge;
vlan-id 1;
}
unit 2 {
encapsulation vlan-bridge;
vlan-id 2;
}
}
ge-0/0/0 {
unit 1 {
encapsulation vlan-bridge;
vlan-id 1;
}
unit 2 {
encapsulation vlan-bridge;
vlan-id 2;
}
}
ge-2/0/6 {
unit 0 {
family inet {
address 10.11.2.1/24;
}
family mpls;
}
}
}
15
protocols {
mpls {
label-switched-path to_192.0.2.2 {
to 192.0.2.2;
}
}
bgp {
group RR {
type internal;
local-address 192.0.3.3;
}
}
l2-circuit {
neighbor 192.0.2.2 {
interface ps0.0 {
virtual-circuit-id 100;
}
}
}
}
bridge-domains {
bd1 {
domain-type bridge;
vlan-id 1;
interface ps0.1;
interface ge-0/0/0.1;
}
bd2 {
domain-type bridge;
vlan-id 2;
interface ps0.2;
interface ge-0/0/0.2;
}
}
[edit]
interfaces {
ps0 {
unit 0 {
encapsulation ethernet-ccc;
16
}
unit 1 {
encapsulation vlan-vpls;
vlan-id 1;
family vpls;
}
unit 2 {
encapsulation vlan-vpls;
vlan-id 2;
family vpls;
}
}
ge-0/0/0 {
unit 1 {
encapsulation vlan-vpls;
vlan-id 1;
family vpls;
}
unit 2 {
encapsulation vlan-vpls;
vlan-id 2;
family vpls;
}
}
ge-2/0/6 {
unit 0 {
family inet {
address 10.11.2.1/24;
}
family mpls;
}
}
}
protocols {
mpls {
label-switched-path to_192.0.2.2 {
to 192.0.2.2;
}
}
bgp {
group RR {
type internal;
local-address 192.0.3.3;
17
}
}
l2-circuit {
neighbor 192.0.2.2 {
interface ps0.0 {
virtual-circuit-id 100;
}
}
}
}
routing-instances {
vpls-1 {
instance-type vpls;
vlan-id 1;
interface ps0.1;
interface ge-0/0/0.1;
}
vpls-2 {
instance-type vpls;
vlan-id 2;
interface ps0.2;
interface ge-0/0/0.2;
}
}
[edit]
interfaces {
ps0 {
unit 0 {
encapsulation ethernet-ccc;
}
unit 1 {
encapsulation vlan-ccc;
vlan-id 1;
}
unit 2 {
encapsulation vlan-ccc;
vlan-id 2;
}
}
18
ge-0/0/0 {
unit 1 {
encapsulation vlan-vpls;
vlan-id 1;
family vpls;
}
unit 2 {
encapsulation vlan-vpls;
vlan-id 2;
family vpls;
}
}
ge-2/0/6 {
unit 0 {
family inet {
address 10.11.2.1/24;
}
family mpls;
}
}
}
protocols {
mpls {
label-switched-path to_192.0.2.2 {
to 192.0.2.2;
}
}
bgp {
group RR {
type internal;
local-address 192.0.3.3;
}
}
l2-circuit {
neighbor 192.0.2.2 {
interface ps0.0 {
virtual-circuit-id 100;
}
}
neighbor 10.10.10.10 {
interface ps0.1 {
virtual-circuit-id 1;
}
19
}
neighbor 10.11.11.11 {
interface ps0.2 {
virtual-circuit-id 2;
}
}
}
}
IN THIS SECTION
Active Ethernet | 20
Four primary delivery options exist today for delivering broadband network service. These options
include the following:
Digital subscriber line (DSL) is the most widely deployed broadband technology worldwide. This delivery
option uses existing telephone lines to send broadband information on a different frequency than is
used for the existing voice service. Many generations of DSL are used for residential service, including
Very High Speed Digital Subscriber Line 2 (VDSL2) and versions of Asymmetric Digital Subscriber Line
(ADSL, ADSL2, and ADSL2+). These variations of DSL primarily offer asymmetric residential broadband
service where different upstream and downstream speeds are implemented. (VDSL2 also supports
symmetric operation.) Other DSL variations, like High bit rate Digital Subscriber Line (HDSL) and
Symmetric Digital Subscriber Line (SDSL), provide symmetric speeds and are typically used in business
applications.
The head-end to a DSL system is the Digital Subscriber Line Access Multiplexer (DSLAM). The
demarcation device at the customer premise is a DSL modem. DSL service models are defined by the
Broadband Forum (formerly called the DSL Forum).
20
Active Ethernet
Active Ethernet uses traditional Ethernet technology to deliver broadband service across a fiber-optic
network. Active Ethernet does not provide a separate channel for existing voice service, so VoIP (or
TDM-to-VoIP) equipment is required. In addition, sending full-speed (10 or 100 Mbps) Ethernet requires
significant power, necessitating distribution to Ethernet switches and optical repeaters located in
cabinets outside of the central office. Due to these restrictions, early Active Ethernet deployments
typically appear in densely populated areas.
Passive Optical Networking (PON), like Active Ethernet, uses fiber-optic cable to deliver services to the
premises. This delivery option provides higher speeds than DSL but lower speeds than Active Ethernet.
Though PON provides higher speed to each subscriber, it requires a higher investment in cable and
connectivity.
A key advantage of PON is that it does not require any powered equipment outside of the central office.
Each fiber leaving the central office is split using a non-powered optical splitter. The split fiber then
follows a point-to-point connection to each subscriber.
• ATM PON (APON), Broadband PON (BPON), and Gigabit-capable PON (GPON)—PON standards
that use the following different delivery options:
• APON—The first passive optical network standard is primarily used for business applications.
• BPON—Based on APON, BPON adds wave division multiplexing (WDM), dynamic and higher
upstream bandwidth allocation, and a standard management interface to enable mixed-vendor
networks.
• GPON—GPON is based on BPON but supports higher rates, enhanced security, and a choice of
which Layer 2 protocol to use (ATM, Generic Equipment Model [GEM], or Ethernet).
• Ethernet PON (EPON)—Provides capabilities similar to GPON, BPON, and APON, but uses Ethernet
standards. These standards are defined by the IEEE. Gigabit Ethernet PON (GEPON) is the highest
speed version.
• Wave Division Multiplexing PON (WDM-PON)—A nonstandard PON which, as the name implies,
provides a separate wavelength to each subscriber.
The head-end to a PON system is an Optical Line Terminator (OLT). The demarcation device at the
customer premises is an Optical Network Terminator (ONT). The ONT provides subscriber-side ports for
connecting Ethernet (RJ-45), telephone wires (RJ-11) or coaxial cable (F-connector).
21
Multi-System Operators (MSOs; also known as cable TV operators) offer broadband service through
their hybrid fiber-coaxial (HFC) network. The HFC network combines optical fiber and coaxial cable to
deliver service directly to the customer. Services leave the central office (CO) using a fiber-optic cable.
The service is then converted outside of the CO to a coaxial cable tree using a series of optical nodes
and, where necessary, through a trunk radio frequency (RF) amplifier. The coaxial cables then connect to
multiple subscribers. The demarcation device is a cable modem or set-top box, which talks to a Cable
Modem Termination System (CMTS) at the MSO head-end or primary facility that receives television
signals for processing and distribution. Broadband traffic is carried using the Data Over Cable Service
Interface Specification (DOCSIS) standard defined by CableLabs and many contributing companies.
Many implementations use existing copper cabling to deliver signal to the premises, but fiber-optic cable
connectivity is making its way closer to the subscriber. Most networks use a combination of both copper
and fiber-optic cabling. The term fiber to the x (FTTx) describes how far into the network fiber-optic
cabling runs before a switch to copper cabling takes place. Both PON and Active Ethernet can use fiber-
optic portion of the network, while xDSL is typically used on the copper portion. This means that a
single fiber-optic strand may support multiple copper-based subscribers.
Increasing the use of fiber in the network increases cost but it also increases network access speed to
each subscriber.
The following terms are used to describe the termination point of fiber-optic cable in a network:
• Fiber to the Premises (FTTP), Fiber to the Home (FTTH), Fiber to the Business (FTTB)—Fiber extends
all the way to the subscriber. PON is most common for residential access, although Active Ethernet
can be efficiently used in dense areas such as apartment complexes. Active Ethernet is more common
for delivering services to businesses.
• Fiber to the Curb (FTTC)—Fiber extends most of the way (typically, 500 feet/150 meters or less) to
the subscriber. Existing copper is used for the remaining distance to the subscriber.
• Fiber to the Node/Neighborhood (FTTN)—Fiber extends to within a few thousand feet of the
subscriber and converted to xDSL for the remaining distance to the subscriber.
• Fiber to the Exchange (FTTE)—A typical central office-based xDSL implementation in which fiber is
used to deliver traffic to the central office and xDSL is used on the existing local loop.
22
IN THIS SECTION
Supported Features | 25
Junos OS supports configuring and maintaining the access lines between access nodes and their ANCP
subscribers using DSL access multiplexer as the broadband access technology for Copper-to-the-
Building (CuTTB) and Fiber-to-the-Building (FTTB). When multiple subscribers share the same access
line, the access line could be one of the following types:
Starting in Junos OS Release 18.2R1, Passive Optical Network (PON) access technologies are supported
with four levels of quality-of-service (QoS) scheduler hierarchy for residential subscribers in a BBE
deployment. This feature extends the Access Node Control Protocol (ANCP) implementation to handle
network configuration for residential customers that use PON as the broadband access technology for
both CuTTB and FTTB. ANCP uses a statically controlled traffic-control profile on the interface-set for
shaping at the subscriber level at the intermediate node to which the subscribers are connected. New
DSL types are provided to support access line rate adjustment for the new access technologies.
A new RADIUS VSA, Inner-Tag-Protocol-Id 26-211 is introduced to fetch the inner VLAN Tag Protocol
Identifier value for L2BSA subscribers to enable maintaining one dynamic profile instead of two separate
dynamic profiles. A new Junos OS dynamic profile variable $junos-inner-vlan-tag-protocol-id allows a
VLAN map’s inner-tag-protocol-id to be set by RADIUS or a predefined default value provided in the
configuration.
23
This feature is useful to support access network deployments where multiple subscribers share the same
access line aggegrated by an intermediate node between the access node and the home routing
gateways. Another benefit is to conserve Layer 2 CoS nodes. Typically a dummy Layer 2 node is created
for each residential household, which could exhaust Layer 2 CoS resources. Therefore, network models
using bonded DSL, G.Fast, and PON access models can conserve Layer 2 CoS nodes.
Junos OS supports 4-Level QoS scheduler hierarchy minimally supporting residential and L2BSA access
over Copper-to-the-Building (CTTB) or Fiber-to-the-Building access network deployments. The
following QoS scheduler hierarchy levels are supported:
• Level 2 Access Line (Logical interface set, represents a collection of subscribers sharing a given
access line aggregated by an intermediate node)
In Figure 5 on page 23, residential and L2BSA access require only 4-level scheduler hierarchy. Business
subscriber access is currently not supported and hence 4-level scheduler hierarchy is sufficient for
CuTTB and PON services targeted to an apartment building.
24
Bonded DSL for copper to the building (CuTTB) introduces an intermediate node Distribution Point Unit-
Copper (DPU-C) between the DSL access multiplexer (DSLAM) and a cluster of subscribers at the
customer location. Shared access line deployment models may be of type Passive-Optical-Network
(PON) or bonded DSL copper lines. Example intermediate nodes are listed below:
In Figure 6 on page 24, each DPU-C has an ANCP session to report access line parameters of individual
subscribers connected to the node. The MSAN also has an ANCP session to report access line
parameters of the bonded DSL access line to the DPU-C. All subscribers connected to the DPU-C are
thus subject to the DSL access-line downstream rate, the DPU-C subscribers are grouped together in an
interface set. You can adjust the speeds reported in this Port-Up and apply to the CoS node for the
corresponding interface ste maintaining the semantics of the CoS adjustment control profile that is used
for individual subscriber lines. The access model consists of a hybrid of bonded DSL access and
conventional unbonded access. The DPU-C and the Multi Service Access Node (MSAN) ANCP sessions
are completely independent and the PPPoE-IA tags only reflect the attributes reported in the dPU-C
ANCP session
25
In Figure 7 on page 25, the OLT has an ANCP session with the BNG and proxies for all downstream
native PON nodes. G.fast DSL subscribers are connected to an intermediate node, which has a PON
connection to the intermediate ONU in front of the OLT.
A hybrid access network connects DSL based subscriber lines using both PON access and G.fast nodes
with an intermediate node between the OLT and home gateways (HGs). Both businesses and residences
are connected to the intermediate node, which is the PON leaf. Shaping is required both at the
subscriber level and at the PON leaf level. Ths G.fast subscribers are associated with the intermediate
ONU like a native PON subscriber. New DSL type TLVs are supported by the AN and their values are
reported in the ANCP Port-Up for the correstpnding subscriber access line. However, it is still not
possible to distinguish between an intermediate node and a conventional connection for a given PPPoE
session.
Supported Features
• Preservation of PPP0E-IA and ANCP independence by CLI configuration for residential subscribers.
26
• The following additional type values for the DSL type TLV are supported. All subscribers include
these DSL type TLVs in the PPPoE PADR messages’s PPPoE IA tags.
• (8) G.fast
Before you begin, you must confirm that your existing access nodes or IAs are not already inserting
strings that begin with the # character. Because this is a system-level configuration, parsing applies to all
ANCP access nodes and PPPoE IAs globally. The leading # character is not configurable. Parsing is
disabled by default in case some providers use that character for some other purpose.
Starting in Junos OS Release 18.4R1, you can configure the router to detect a logical intermediate node
in an access network. The node identifies subscribers that are connected to the same shared media,
such as a PON tree or a bonded copper line that connects to a DPU-C for CuTTB. When you configure
this detection, the router parses the ANCP Access-Aggregation-Circuit-ID-ASCII attribute (TLV 0x03)
that is received either in the ANCP Port Up message or PPPoE PADR IA tags. If the TLV string begins
with the # character, the string is a backhaul line identifier that is unique across the network to identify
the bonded DSL line or the PON tree. The same string is reported in the TLV or IA for all subscribers
connected to that DPU-C or PON.
The portion of the string after the # character represents the logical intermediate node. It is used as the
name of the dynamic interface set for the CoS Level 2 node that groups the subscribers using that
intermediate node. This interface set is known as the parent interface set. Every PPPoE or VLAN
(L2BSA) logical interface with the same value for TLV 0x03 is a member of that interface set.
27
NOTE: The TLV value must match the requirements for interface set naming; it can include
alphanumeric characters and the following special characters:
#%/=+-:;@._
This portion of the string also sets the value of the $junos-aggregation-interface-set-name predefined
variable in the dynamic profile. This value is used as the name of a CoS Level 2 interface set that groups
the subscribers sharing that string. It overrides the predefined variable default, which uses the value of
$junos-phy-ifd-interface-set-name as the name of the interface set.
For example, if the value of the TLV string is #TEST-DPU-C-100, the value of the predefined variable—
and consequently the name of the interface set—becomes TEST-DPU-C-100.
NOTE: The Access-Loop-Remote-ID (TLV (0x02) is similarly parsed for the # character, but the
resulting string is not used in the current release.
NOTE: Intermediate node detection is supported only for 4-level scheduler hierarchies, so
business access is limited to conventional DSL access MPCs.
To enable parsing of the Access-Aggregation-Circuit-ID-ASCII TLV and setting the interface set name:
1. Specify detection of hierarchical access networks and extraction of the node string.
2. Configure the dynamic profile to use the Access-Aggregation-Circuit-ID-ASCII string for the interface
set name.
The following sample configuration shows a dynamic profile for L2BSA subscribers. Three things to note
here are the following:
• The CoS scheduler configuration specifies an interface named with the value of $junos-aggregation-
interface-set-name.
When hierarchical-access-network-detection is configured for the access lines, then the name of the
Level 2 scheduler interface set is determined as follows:
• When TLV 0x03 begins with #, then $junos-aggregation-interface-set-name is the remainder of the
string, excluding the initial #.
• When TLV 0x03 begins with any other character, then $junos-aggregation-interface-set-name is the
value of $junos-phy-ifd-interface-set-name.
}
output-vlan-map {
pop-swap;
inner-tag-protocol-id 0x8100;
}
family vpls;
}
}
}
class-of-service {
traffic-control-profiles {
L2BSAShaper {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate" burst-size 17k;
overhead-accounting frame-mode cell-mode-bytes 6;
}
L2iflsetShaper {
shaping-rate 1G burst-size 17k;
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
output-traffic-control-profile L2BSAShaper;
classifiers {
ieee-802.1 L2BSA vlan-tag outer;
}
rewrite-rules {
ieee-802.1 L2BSA vlan-tag outer;
}
}
}
interface-set "$junos-aggregation-interface-set-name" {
output-traffic-control-profile L2iflsetShaper;
}
}
}
30
Release Description
18.4R1 Starting in Junos OS Release 18.4R1, the Layer 2 service support with the pseudowire service logical
interfaces is extended to pseudowire service interfaces anchored over redundant logical tunnel
interfaces as well.
18.4R1 Starting in Junos OS Release 18.4R1, you can configure the router to detect a logical intermediate node
in an access network.
17.1R1 Starting in Junos OS Release 17.1R1, the pseudowire logical tunnel interfaces support Ethernet VPLS,
Ethernet bridge, VLAN VPLS, and VLAN bridge encapsulation next hops to exit Layer 2 traffic.
RELATED DOCUMENTATION
IN THIS SECTION
Minimize Traffic Loss Due to Stale Route Removal After a Graceful Routing Engine Switchover | 34
This topic is a high-level overview of high availability for DHCP, L2TP, and PPP access networks.
31
A unified in-service software upgrade (unified ISSU) enables you to upgrade between two different
Junos OS Releases with no disruption on the control plane and with minimal disruption of traffic. The
routers preserves the active subscriber sessions and session services across the upgrade, so that they
continue after the upgrade has completed.
The unified ISSU feature supports the PPPoE, DHCP, and L2TP access models for subscriber
management. Unified ISSU support for the DHCP and L2TP access models was added in Junos OS
Release 14.1.
• For static and dynamic PPPoE access, unified ISSU supports the following:
• Terminated, non-tunneled PPPoE connections configured with static or dynamic PPP logical
interfaces and static or dynamic underlying interfaces
NOTE: Unified ISSU for the subscriber management PPPoE access model does not support
Multilink Point-to-Point Protocol (MLPPP) bundle interfaces. MLPPP bundle interfaces
require the use of an Adaptive Services PIC or Multiservices PIC to provide PPP subscriber
services. These PICs do not support unified ISSU.
• DHCPv4 local server, DHCPv4 relay, DHCPv6 local server, DHCPv6 relay, and DHCP relay proxy
• Preservation of accounting, filter, and class-of-service (CoS) statistics for DHCP subscribers on
MPC/MIC interfaces on MX Series routers
• For L2TP access, unified ISSU supports both the LAC and the LNS. When an upgrade is initiated, the
LAC completes any L2TP negotiations that are in progress but rejects any new negotiations until the
upgrade has completed. No new tunnels or sessions are established during the upgrade. Subscriber
logouts are recorded during the upgrade and are completed after the upgrade has completed.
See Getting Started with Unified In-Service Software Upgrade for a description of the supported
platforms and modules, CLI statements, and procedures you use to configure and initiate unified ISSU.
You can use the issu flag with the traceoptions statement to trace subscriber management unified
ISSU events. You can also use the show system subscriber-management summary command to
display information about the unified ISSU state.
32
IN THIS SECTION
Purpose | 32
Action | 32
Purpose
Action
The first example indicates that control plane quiescing as part of unified ISSU is not in progress (for
example, unified ISSU has not been started, has already completed, or control plane queiscing has not
started). The second example shows that unified ISSU is in progress and that a participating subscriber
management daemon requires 198 seconds to quiesce the control plane.
IN THIS SECTION
DHCP | 33
L2TP | 33
The graceful Routing Engine switchover (GRES) feature in Junos OS enables a router with redundant
Routing Engines to continue forwarding packets, even if one Routing Engine fails. GRES preserves
interface and kernel information. Traffic is not interrupted. However, GRES does not preserve the
control plane.
To enable GRES support on MX Series routers, include the graceful-switchover statement at the [edit
chassis redundancy] hierarchy level.
DHCP
For MX Series routers, the extended DHCP local server and the DHCP relay agent applications both
maintain the state of active DHCP client leases in the session database. The extended DHCP application
can recover this state if the DHCP process fails or is manually restarted, thus preventing the loss of
active DHCP clients in either of these circumstances. However, the state of active DHCP client leases is
lost if a power failure occurs or if the kernel stops operating (for example, when the router is reloaded)
on a single Routing Engine.
You cannot disable graceful Routing Engine switchover support for the extended DHCP application
when the router is configured to support graceful Routing Engine switchover.
For more information about using graceful Routing Engine switchover, see Understanding Graceful
Routing Engine Switchover.
L2TP
GRES is supported on MX Series routers acting as either the L2TP LAC or LNS. In the event that L2TP
(jl2tpd, the L2TP universal edge process) restarts or that the router fails over from the active routing
engine (RE) to the standby RE, L2TP GRES ensures that the following occurs:
• The LAC and the LNS recover destinations, tunnels, and sessions that were already established at the
time of the failure or restart.
34
• The LAC and the LNS respond to tunnel keepalive requests received during the switchover for
established tunnels, but do not generate any keepalives until the switchover is complete.
• The LAC and the LNS delete all the tunnels and sessions that are not in the Established state.
• The LAC and the LNS reject requests to create new tunnels and sessions.
• The LAC and the LNS send another disconnect notification to the peer for sessions and tunnels that
are already in the Disconnecting state at the time of the failure or restart. For sessions and tunnels
that were coming up at that time, the LAC and LNS send a disconnect notification to the peer.
• The LAC and the LNS restart timers for the full timeout period for recovered L2TP destinations,
tunnels, and sessions.
If a graceful Routing Engine switchover (GRES) is triggered by an operational mode command, the state
of aggregated services interfaces (ASIs) are not preserved. For example:
However, if GRES is triggered by a CLI commit or FPC restart or crash, the backup Routing Engine
updates the ASI state. For example:
Or:
During a graceful Routing Engine switchover (GRES), access routes and access-internal routes for DHCP
and PPP subscriber management can become stale. After the GRES, the router removes any such stale
routes from the forwarding table. Some traffic is lost if the stale routes are removed before the routes
are reinstalled.
In subscriber networks with graceful restart and routing protocols such as BGP and OSPF configured,
the router purges any remaining stale access routes and access-internal routes as soon as the graceful
35
restart operation completes, which can occur very soon after completion of the graceful Routing Engine
switchover.
In subscriber networks with nonstop active routing (NSR) and routing protocols such as BGP and OSPF
configured, the routing protocol process (rpd) immediately purges the stale access routes and access-
internal routes that correspond to subscriber routes.
You can reduce the risk of this traffic loss by configuring the router to delay the removal of stale routes
after a GRES. The delay period is a nonconfigurable 180 seconds (3 minutes). The router retains the stale
routes for the duration of the period, which is long enough for the DHCP client process (jdhcpd), PPP
client process (jpppd), or routing protocol process (rpd) to reinstall the access routes and access-internal
routes before the router removes the stale routes from the forwarding table. The risk of traffic loss is
minimized because the router always has available subscriber routes for DHCP subscribers and PPP
subscribers.
To configure the router to delay removal (flushing) of access-routes and access-internal routes after a
graceful Routing Engine switchover:
2. Configure the router to wait 180 seconds before removing access-routes and access-internal routes
after a graceful Routing Engine switchover.
14.1 Unified ISSU support for the DHCP and L2TP access models was added in Junos OS Release 14.1.
RELATED DOCUMENTATION
IN THIS SECTION
Preventing DHCP from Installing Access, Access-Internal, and Destination Routes by Default | 41
Verifying the Configuration of Access and Access-Internal Routes for DHCP and PPP Subscribers | 42
DHCP and PPP on the router use both access routes and access-internal routes to represent either the
subscriber or the networks behind the attached router. An access route represents a network behind an
attached router, and is set to a preference of 13. An access-internal route is a /32 route that represents
a directly attached subscriber, and is set to a preference of 12.
Access routes typically are used to apply the values of the RADIUS Framed-Route attribute [22] for IPv4
routes and the Framed-IPv6-Route attribute [99] for IPv6 routes. A framed route consists of a prefix that
represents a public network behind the CPE, a next-hop gateway, and optional route attributes
consisting of a combination of metric, preference, and tag. The only mandatory component of the
framed route is the prefix. The next-hop gateway can be specified explicitly in the framed route, as
0.0.0.0, ::0, or the subscriber’s fixed address assigned by the Framed-IP-Address (8) or Framed-IPv6-
Prefix (97) attribute (common practice for business subscribers). Alternatively, the absence of the
gateway address implies address 0.0.0.0. The address 0.0.0.0 or ::0, whether implicit or explicitly
configured, resolves to the subscriber’s assigned address (host route). Consequently, the convention is
that the next-hop gateway is the subscriber’s IP address.
You can configure a dynamic profile to use predefined variables to dynamically configure access routes
using the values specified in the RADIUS attribute. To configure access routes include the access stanza
at the [edit dynamic-profiles profile-name routing-options] hierarchy level.
Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support. We recommend that you do not use access-internal routes in the dynamic profile configuration.
37
If the RADIUS Framed-Route attribute (22) or Framed-IPv6-Route attribute [99] does not specify the
next-hop gateway—as is common—the variable representing the next-hop, $junos-framed-route-
nexthop or $junos-framed-route-ipv6-nexthop, automatically resolves to the subscriber’s IP address. If
you configure the access-internal statement in the dynamic profile, it is ignored.
NOTE: Starting in Junos OS Release 15.1R4, the router no longer supports a configuration where
a static route points to a next hop that is tied to a subscriber. Typically, this might occur when
RADIUS assigns the next hop with the Framed-IP-Address attribute. An alternative to this
misconfiguration is to have the RADIUS server provide a Framed-Route attribute that matches
the static route.
You can dynamically configure access routes for DHCP and PPP subscribers based on the values
specified in the following RADIUS attributes:
• For IPv4 access routes, use the variable, $junos-framed-route-ip-address-prefix. The route prefix
variable is dynamically replaced with the value in Framed-Route RADIUS attribute [22].
• For IPv6 access routes, use the variable, $junos-framed-route-ipv6-address-prefix. The variable is
dynamically replaced with the value in Framed-IPv6-Route RADIUS attribute [99].
For IPv6:
For IPv4:
For IPv6:
For IPv6:
For IPv6:
IPv6:
Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support. We recommend that you do not use access-internal routes. If the RADIUS Framed-Route
attribute (22) or Framed-IPv6-Route attribute [99] does not specify the next-hop gateway—as is
common—the variable representing the next-hop, $junos-framed-route-nexthop, is automatically
resolved. If you configure the access-internal statement in the dynamic profile, it is ignored.
You can dynamically configure access-internal routes. In releases earlier than Junos OS 15.1, this
configuration is optional; if you include it, the values from the access-internal variables are used if the
next-hop value is missing in the relevant RADIUS attribute—Framed-Route [22] for IPv4 and Framed-
IPv6-Route [99] for IPv6.
Starting in Junos OS Release 15.1R1, we no longer recommend that you always include the access-
internal stanza in the dynamic-profile when the access stanza is present for framed route support. The
subscriber’s address is stored in the session database entry before the dynamic profile installs the
framed route, enabling the next-hop address to be resolved when it is not explicitly specified in the
Framed-Route RADIUS attribute (22) or Framed-IPv6-Route attribute [99].
DHCP subscriber interfaces require the qualified-next-hop to identify the interface and the MAC
address. For PPP subscriber interfaces, you do not need to specify the MAC address for access-internal
routes.
3. (DHCP subscriber interfaces only) Configure the MAC address for the qualified next-hop as a
variable.
During the DHCP client binding operation, the DHCP process adds route information for the DHCP
sessions by default. The DHCP process adds the following routes:
An access route represents a network behind an attached video services router, and is set to a
preference of 13.
An access internal route is a /32 route that represents a directly attached end user, and is set to a
preference of 12.
These routes are used by the DHCP application on a video services router to represent either the end
users or the networks behind the attached video services router.
41
In some scenarios, you might want to override the default behavior and prevent DHCP from
automatically installing the route information.
For example, DHCP relay installs destination (host) routes by default—this action is required in certain
configurations to enable address renewals from the DHCP server to work properly. However, the default
installation of destination routes might cause a conflict when you configure DHCP relay with static
subscriber interfaces.
To avoid such configuration conflicts you can override the default behavior and prevent DHCP relay
from installing the routes.
You can use the route suppression option to override the default route installation behavior. You can
configure route suppression and prevent DHCP from installing specific types of routes for:
For DHCPv4 you can override the installation of destination routes only or access-internal routes (the
access-internal option prevents installation of both destination and access-internal routes). For DHCPv6
you can specify access routes, access-internal routes, or both.
Example:
• For DHCP local server route suppression (for example, a global configuration):
• You cannot suppress access-internal routes when the subscriber is configured with both IA_NA and
IA_PD addresses over IP demux interfaces—the IA_PD route relies on the IA_NA route for next hop
connectivity.
• The no-arp statement supported in legacy DHCP is replaced by the route-suppression statement.
IN THIS SECTION
Purpose | 42
Action | 43
Purpose
View configuration information for access routes and access-internal routes on DHCP and PPP
subscribers. The access-internal routes are those that are automatically installed when a client profile is
instantiated.
43
Action
15.1R1 Starting in Junos OS Release 15.1R1, we no longer recommend that you always include the access-
internal stanza in the dynamic-profile when the access stanza is present for framed route support.
15.1 Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support.
15.1 Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support.
RELATED DOCUMENTATION
Subscribers in the same routing instance are typically expected to have different framed routes.
However, there is an active/backup use case where you might want to configure the same framed route
for two subscribers. In this scenario, a subscriber expects to receive ingress traffic from an active CPE
device, but wants to switch as soon as possible to a backup CPE device.
You can meet this requirement by having two subscribers connected to the same BNG with the same
access route for an identical Framed-Route address. However, you must configure a distance value in the
Framed-Route that is different between the two subscribers. For example, you might configure RADIUS
as follows:
Subscribers user1 and user2 have the same password, routing instance, and Framed-Route address. The
distance is just an administrative distance or preference for discrimination between the routes. The
distance is 12 for user1 and 240 for user2. The router can add only one route to the forwarding table. It
selects the route with the lowest distance value, which is 12. Consequently, traffic towards the
subscriber travels to the logical interface associated with user1.
The router installs the backup route for user2 in the routing table. If the link to user1 goes down, then
the router installs the backup route for user2 in the forwarding table so downstream traffic can continue
to the subscriber.
What happens if you do not configure different distance values for the two subscribers? Consider the
following RADIUS configuration:
If both of these subscribers try to log in, only the one that logs in first achieves the Active state, so only
that route is installed in the forwarding table. The other subscriber flaps between the Init and
Terminated states and never succeeds at logging in, as long as the first subscriber is Active.
2 CHAPTER
IN THIS SECTION
IN THIS SECTION
You use DHCP in broadband access networks to provide IP address configuration and service
provisioning. DHCP, historically a popular protocol in LANs, works well with Ethernet connectivity and is
becoming increasingly popular in broadband networks as a simple, scalable solution for assigning IP
addresses to subscriber home PCs, set-top boxes (STBs), and other devices.
• DHCP Relay
DHCP uses address assignment pools from which to allocate subscriber addresses. Address-assignment
pools support both dynamic and static address assignment:
48
• Dynamic address assignment—A subscriber is automatically assigned an address from the address-
assignment pool.
• Static address assignment—Addresses are reserved and always used by a particular subscriber.
NOTE: Addresses that are reserved for static assignment are removed from the dynamic
address pool and cannot be assigned to other clients.
You can enable the services router to function as an extended DHCP local server. As an extended DHCP
local server the services router, and not an external DHCP server, provides an IP address and other
configuration information in response to a client request. The extended DHCP local server supports the
use of external AAA authentication services, such as RADIUS, to authenticate DHCP clients.
You can configure extended DHCP relay options on the router and enable the router to function as a
DHCP relay agent. A DHCP relay agent forwards DHCP request and reply packets between a DHCP
client and a DHCP server. You can use DHCP relay in carrier edge applications such as video and IPTV
to obtain configuration parameters, including an IP address, for your subscribers. The extended DHCP
relay agent supports the use of external AAA authentication services, such as RADIUS, to authenticate
DHCP clients.
DHCP relay proxy mode is an enhancement to extended DHCP relay. DHCP relay proxy supports all
DHCP relay features while providing additional features and benefits. Except for the ability to add
DHCP relay agent options and the gateway address (giaddr) to DHCP packets, DHCP relay is
transparent to DHCP clients and DHCP servers, and simply forwards messages between DHCP clients
and servers. When you configure DHCP relay to operate in proxy mode, the relay is no longer
transparent. In proxy mode, DHCP relay conceals DHCP server details from DHCP clients, which
interact with a DHCP relay in proxy mode as though it is the DHCP server. For DHCP servers there is no
change, because proxy mode has no effect on how the DHCP server interacts with the DHCP relay.
49
The subscriber management feature requires that a subscriber (for example, a DHCP client) send a
discover message to the router interface to initialize dynamic configuration of that interface.
Figure 8 on page 49 shows the flow of operations that occurs when the router is using DHCP relay to
enable access for a subscriber.
The following general sequence occurs during access configuration for a DHCP client:
4. The router passes the DHCP discover message through to the DHCP server.
The subscriber now has access to the network and the authorized service.
50
This topic discusses how to create dynamic profiles to define various levels of service for DHCP clients.
2. Configure a dynamic profile that enables DHCP clients access to the network.
NOTE: You can create a basic dynamic profile that contains both access configuration and
some level of basic service.
3. Ensure that the router is configured to enable communication between the client and the RADIUS
server.
See Specifying the Authentication and Accounting Methods for Subscriber Access.
4. Configure all RADIUS values that you want the profiles to use when validating DHCP clients.
2. (Optional) Define any IGMP protocols values as described for creating a basic access profile to
combine a basic service with access in a profile.
See Configuring Dynamic DHCP Client Access to a Multicast Network.
3. (Optional) Specify any filters for the interface.
See Dynamically Attaching Statically Created Filters for Any Interface Type, Dynamically Attaching
Statically Created Filters for a Specific Interface Family Type, or Dynamically Attaching Filters Using
RADIUS Variables.
4. Define any CoS values for the service level you want this profile to configure on the interface.
51
This example shows how to configure a tiered service profile for subscribers.
• Gold—Subscribers that pay for this service are allocated 10M bandwidth for data, voice, and video
services.
• Silver—Subscribers that pay for this service are allocated 5M bandwidth for data, voice, and video
services.
• Bronze—Subscribers that pay for this service are allocated 1M bandwidth for the data service only.
Each subscriber is allocated a VLAN that is created statically. Subscribers log in using DHCP and
authenticate using RADIUS. The subscribers can migrate from one service to another when they change
subscriptions.
1. Configure the VLAN interfaces associated with each subscriber. Enable hierarchical scheduling for
the interface.
interfaces {
ge-2/0/0 {
description subscribers;
hierarchical-scheduler;
stacked-vlan-tagging;
unit 1 {
vlan-tags outer 100 inner 100;
family inet {
unnumbered-address lo0.0 preferred-source-address 127.0.0.2;
}
}
unit 2 {
family inet {
vlan-tags outer 101 inner 101;
unnumbered-address lo0.0 preferred-source-address 127.0.0.2;
}
}
unit 3 {
vlan-tags outer 102 inner 102;
family inet {
unnumbered-address lo0.0 preferred-source-address 127.0.0.2;
52
}
}
}
}
In this example, each offering (video, voice, and data) is assigned a queue, and each service (Gold,
Silver, and Bronze) is assigned a scheduler.
class-of-service {
forwarding-classes {
queue 0 data;
queue 1 voice;
queue 2 video;
}
scheduler-maps {
bronze_service_smap {
forwarding-class data scheduler data_sch;
}
silver_service_smap {
forwarding-class data scheduler data_sch;
forwarding-class voice scheduler silver_voice_sch;
forwarding-class video scheduler silver_video_sch;
}
gold_service_smap {
forwarding-class data scheduler data_sch;
forwarding-class voice scheduler gold_voice_sch;
forwarding-class video scheduler gold_video_sch;
}
}
schedulers {
data_sch {
transmit-rate percent 20;
buffer-size remainder;
priority low;
}
silver_voice_sch {
transmit-rate percent 30;
buffer-size remainder;
priority high;
}
53
silver_video_sch {
transmit-rate percent 30;
buffer-size remainder;
priority medium;
}
gold_voice_sch {
transmit-rate percent 40;
buffer-size remainder;
priority high;
}
gold_video_sch {
transmit-rate percent 40;
buffer-size remainder;
priority medium;
}
}
}
The scheduler maps configured for each service are referenced in the dynamic profile.
dynamic-profiles {
subscriber_profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
class-of-service {
traffic-control-profiles {
subscriber_tcp {
scheduler-map $smap;
shaping-rate $shaping-rate;
guaranteed-rate $guaranteed-rate;
delay-buffer-rate $delay-buffer-rate;
}
}
interfaces {
"$junos-interface-ifd-name" {
54
unit "$junos-underlying-interface-unit" {
output-traffic-control-profile subscriber_tcp;
}
}
}
}
The DHCP relay agent forwards DHCP request and reply packets between a DHCP client and a
DHCP server. You use DHCP relay to obtain configuration parameters, including an IP address, for
subscribers. In this example, one DHCP server, address 198.51.100.1, can be used by subscribers.
The DHCP relay configuration is attached to an active server group named service_provider_group.
The subscribers are grouped together within the subscriber_group, and identifies characteristics such
as authentication, username info, and the associated interfaces for the group members. In this
example, it also identifies the active server group and the dynamic interface that is used by the
subscribers in the group.
forwarding-options {
dhcp-relay {
server-group {
service_provider_group {
198.51.100.1;
}
}
group subscriber_group {
active-server-group service_provider_group;
dynamic-profile subscriber_profile;
interface ge-2/0/0.1;
interface ge-2/0/0.2;
interface ge-2/0/0.3;
}
}
}
RELATED DOCUMENTATION
DHCP Overview
DHCPv6 Local Server
55
IN THIS SECTION
Configuring DHCP Snooped Packets Forwarding Support for DHCP Local Server | 57
Enabling and Disabling DHCP Snooped Packets Support for DHCP Relay Agent | 59
Configuring DHCP Snooped Packets Forwarding Support for DHCP Relay Agent | 66
IN THIS SECTION
DHCP snooping provides additional security by identifying the incoming DHCP packets and rejecting
DHCP traffic determined to be unacceptable from untrusted devices in the network.
DHCP allocates IP addresses dynamically, leasing addresses to devices so that the addresses can be
reused when they are no longer needed by the devices to which they were assigned. Hosts and end
devices that require IP addresses obtained through DHCP must communicate with a DHCP server
across the LAN.
DHCP snooping looks into incoming DHCP packets and examines DHCP messages. It extracts their IP
addresses and lease information allocated to clients and builds up a database. Using this database, it can
determine if the packets arriving are from the valid clients—that is—the IP addresses of the clients was
assigned by the DHCP server. In this way, DHCP snooping acts as a guardian of network security by
keeping track of valid IP addresses assigned to downstream network devices by a trusted DHCP server
(the server is connected to a trusted network port).
• DHCP snooping provides an extra layer of security via dynamic IP source filtering.
• DHCP snooping can prevent rogue DHCP activity in the network by filtering out DHCP packets that
are arriving on the wrong ports, or with incorrect contents.
On Junos OS device, DHCP snooping is enabled in a routing instance when you configure the following
options in that routing instance:
• You can optionally use the forward-snooped-clients statement to evaluate the snooped traffic and to
determine if the traffic is forwarded or dropped, based on whether or not the interface is configured
as part of a group.
The router discards snooped packets by default if there is no subscriber associated with the packet. To
enable normal processing of snooped packets, you must explicitly configure the allow-snooped-clients
statement at the [edit forwarding-options dhcp-relay] hierarchy level.
You can configure DHCP snooping support for a specific routing instance for the following:
57
• DHCPv4 relay agent—Override the router’s (or switch’s) default snooping configuration and specify
that DHCP snooping is enabled or disabled globally, for a named group of interfaces, or for a specific
interface within a named group.
In a separate procedure, you can set a global configuration to specify whether the DHCPv4 relay
agent forwards or drops snooped packets for all interfaces, only configured interfaces, or only
nonconfigured interfaces. The router also uses the global DHCP relay agent snooping configuration
to determine whether to forward or drop snooped BOOTREPLY packets. A renew request may be
unicast directly to the DHCP server. This is a BOOTPREQUEST packet and is snooped.
• DHCPv6 relay agent—As you can with snooping support for the DHCPv4 relay agent, you can
override the default DHCPv6 relay agent snooping configuration on the router to explicitly enable or
disable snooping support globally, for a named group of interfaces, or for a specific interface with a
named group of interfaces.
In multi-relay topologies where more than one DHCPv6 relay agent is between the DHCPv6 client
and the DHCPv6 server, snooping enables intervening DHCPv6 relay agents between the client and
the server to correctly receive and process the unicast traffic from the client and forward it to the
server. The DHCPv6 relay agent snoops incoming unicast DHCPv6 packets by setting up a filter with
UDP port 547 (the DHCPv6 UDP server port) on a per-forwarding table basis. The DHCPv6 relay
agent then processes the packets intercepted by the filter and forwards the packets to the DHCPv6
server.
Unlike the DHCPv4 relay agent, the DHCPv6 relay agent does not support global configuration of
forwarding support for DHCPv6 snooped packets.
• DHCP local server—Configure whether DHCP local server forwards or drops snooped packets for all
interfaces, only configured interfaces, or only nonconfigured interfaces.
• You can also disable snooping filters. In the preceding configurations, all DHCP traffic is forwarded to
the slower routing plane of the routing instance before it is either forwarded or dropped. Disabling
snooping filters causes DHCP traffic that can be forwarded directly from the faster hardware control
plane to bypass the routing control plane.
You can configure how DHCP local server handles DHCP snooped packets. Depending on the
configuration, DHCP local server either forwards or drops the snooped packets it receives.
Table 2 on page 58 indicates the action the router takes for DHCP local server snooped packets.
58
NOTE: Configured interfaces are those interfaces that have been configured with the group
statement in the [edit system services dhcp-local-server] hierarchy. Non-configured interfaces
are those that are in the logical system/routing instance but have not been configured by the
group statement.
[edit]
user@host# edit system services dhcp-local-server
3. Specify the interfaces that are supported for snooped packet forwarding.
For example, to configure DHCP local server to forward DHCP snooped packets on only configured
interfaces:
[edit]
system {
services {
dhcp-local-server {
forward-snooped-clients configured-interfaces;
}
}
}
SEE ALSO
Enabling and Disabling DHCP Snooped Packets Support for DHCP Relay
Agent
DHCP relay agent uses a two-part configuration to determine how to handle DHCP snooped packets.
This topic describes the first procedure, in which you enable or disable snooping support for DHCP relay
agent and, optionally, override the default snooping configuration.
The second procedure, which applies only to DHCPv4 relay agent, is described in Configuring DHCP
Snooped Packets Forwarding Support for DHCP Relay Agent, and configures the forwarding action for
snooped clients, which specifies whether DHCP relay agent forwards or drops snooped traffic.
You can enable or disable DHCP globally for DHCP relay, for a group of interfaces, or for a specific
interface in a group.
By default, DHCP snooping is disabled for DHCP relay. To enable or disable DHCP snooping support
globally:
[edit]
user@host# edit forwarding-options dhcp-relay
[edit]
user@host# edit forwarding-options dhcp-relay dhcpv6
forwarding-options {
dhcp-relay {
overrides {
allow-snooped-clients;
}
}
}
[edit]
user@host# edit forwarding-options dhcp-relay
[edit]
user@host# edit forwarding-options dhcp-relay dhcpv6
For example, to enable DHCP snooping support on all interfaces in group boston:
forwarding-options {
dhcp-relay {
group boston {
overrides {
allow-snooped-clients;
}
}
}
}
[edit]
user@host# edit forwarding-options dhcp-relay
[edit]
user@host# edit forwarding-options dhcp-relay dhcpv6
3. Specify the interface for which you want to configure DHCP snooping.
4. Specify that you want to override the default configuration on the interface.
For example, to disable DHCP snooping support on interface ge-2/1/8.0 in group boston:
forwarding-options {
dhcp-relay {
group boston {
interface ge-2/1/8.0 {
overrides {
no-allow-snooped-clients;
}
}
}
66
}
}
forwarding-options {
dhcp-relay {
dhcpv6 {
group sunnyvale {
interface ge-3/2/1.1 {
overrides {
allow-snooped-clients;
}
}
}
}
}
}
SEE ALSO
You can configure how DHCP relay agent handles DHCP snooped packets. Depending on the
configuration, DHCP relay agent either forwards or drops the snooped packets it receives.
DHCP relay uses a two-part configuration to determine how to handle DHCP snooped packets. This
topic describes how you use the forward-snooped-clients statement to manage whether DHCP relay
agent forwards or drops snooped packets, depending on the type of interface on which the packets are
snooped. In the other part of the DHCP relay agent snooping configuration, you enable or disable the
DHCP relay snooping feature.
67
Table 3 on page 67 shows the action the router or switch takes on snooped packets when DHCP
snooping is enabled by the allow-snooped-clients statement.
The router or switch also uses the configuration of the DHCP relay agent forwarding support to
determine how to handle snooped BOOTREPLY packets.
Table 3: Actions for DHCP Relay Agent Snooped Packets When DHCP Snooping Is Enabled
Table 4 on page 67 shows the action the router (or switch) takes on snooped packets when DHCP
snooping is disabled by the no-allow-snooped-clients statement.
Table 4: Actions for DHCP Relay Agent Snooped Packets When DHCP Snooping Is Disabled
Table 5 on page 68 shows the action the router (or switch) takes for the snooped BOOTREPLY packets.
68
Configured interfaces have been configured with the group statement in the [edit forwarding-options
dhcp-relay] hierarchy. Non-configured interfaces are in the logical system/routing instance but have not
been configured by the group statement.
To configure DHCP snooped packet forwarding and BOOTREPLY snooped packet forwarding for DHCP
relay agent:
[edit]
user@host# edit forwarding-options dhcp-relay
3. Specify the interfaces that are supported for snooped packet forwarding.
For example, to configure DHCP relay agent to forward DHCP snooped packets on only configured
interfaces:
[edit]
forwarding-options {
dhcp-relay {
forward-snooped-clients configured-interfaces;
69
}
}
DHCP snooping provides DHCP security by identifying incoming DHCP packets. In the default DHCP
snooping configuration, all traffic is snooped. You can optionally use the forward-snooped-clients
statement to evaluate the snooped traffic and to determine whether the traffic is forwarded or dropped,
based on whether or not the interface is configured as part of a group.
In both the default configuration and in configurations using the forward-snooped-clients statement, all
DHCP traffic is forwarded from the hardware control plane to the routing plane of the routing instance
to ensure that all DHCP packets are intercepted. In certain topologies, such as a Metropolitan Routing
Ring topology, forwarding all DHCP traffic to the control plane can result in excessive traffic. The no-
snoop configuration statement disables the snooping filter for DHCP traffic that can be directly
forwarded on the hardware control plane, such as Layer 3 unicast packets with a valid route, causing
those DHCP packets to bypass the slower routing plane. You can disable DHCP snooping filters starting
in Junos OS Release 15.1R2.
[edit]
user@host# edit system services dhcp-local-server
[edit]
user@host# edit forwarding-options dhcp-relay
SEE ALSO
IN THIS SECTION
Requirements | 71
Overview | 71
Configuration | 71
This example shows how to configure DHCP snooping support for DHCP relay agent.
Requirements
• Configure DHCP relay agent. See Extended DHCP Relay Agent Overview.
Overview
In this example, you configure DHCP snooping support for DHCP relay agent by completing the
following operations:
• Override the default DHCP snooping configuration and enable DHCP snooping support for the
interfaces in group frankfurt.
• Configure DHCP relay agent to forward snooped packets to only configured interfaces.
Configuration
IN THIS SECTION
Procedure | 72
72
Procedure
Step-by-Step Procedure
[edit]
user@host# edit forwarding-options dhcp-relay
3. Specify the interfaces that you want to include in the group. DHCP relay agent considers these as the
configured interfaces when determining whether to forward or drop traffic.
4. Specify that you want to override the default configuration for the group.
6. Return to the [edit forwarding-options dhcp-relay] hierarchy level to configure the forwarding action
and specify that DHCP relay agent forward snooped packets on only configured interfaces:
8. Specify that snooped packets are forwarded on only configured interfaces (the interfaces in group
frankfurt).
Results
From configuration mode, confirm your configuration by entering the show forwarding-options
command. If the output does not display the intended configuration, repeat the instructions in this
example to correct it. The following output also shows a range of configured interfaces in group
frankfurt.
[edit]
user@host# show forwarding-options
dhcp-relay {
forward-snooped-clients configured-interfaces;
group frankfurt {
overrides {
allow-snooped-clients;
}
interface fe-1/0/1.3 {
upto fe-1/0/1.9;
}
}
}
74
If you are done configuring the device, enter commit from configuration mode.
IN THIS SECTION
Requirements | 74
Overview | 75
Configuration | 75
Verification | 78
Snooping support for DHCPv6 relay agent is disabled on the router by default. This example shows how
to override the default DHCPv6 relay agent snooping configuration to explicitly enable DHCPv6
snooping for a named group of interfaces and for a specific interface within a different named group.
NOTE: You can also enable DHCPv6 snooping support globally by using the allow-snooped-
clients statement at the [edit forwarding-options dhcp-relay dhcpv6 overrides] hierarchy level.
Requirements
This example uses the following hardware and software components:
• Configure named DHCPv6 relay agent interface groups to which you want to apply a common DHCP
configuration.
Overview
In this example, you override the default DHCPv6 relay agent snooping configuration to explicitly enable
DHCP snooping for both of the following:
Configuration
IN THIS SECTION
To override the default DHCPv6 relay agent snooping configuration to explicitly enable DHCPv6
snooping for a named group of interfaces and for a specific interface within a named group, perform
these tasks:
To quickly configure this example, copy the following commands, paste them in a text file, remove any
line breaks, change any details necessary to match your network configuration, and then copy and paste
the commands into the CLI at the [edit] hierarchy level.
Step-by-Step Procedure
[edit]
user@host# edit forwarding-options dhcp-relay dhcpv6
2. Specify the named group of interfaces for which you want to enable DHCPv6 snooping.
3. Specify that you want to override the default DHCPv6 configuration for the interfaces in that group.
Results
From configuration mode, confirm the results of your configuration by issuing the show statement at the
[edit forwarding-options dhcp-relay] hierarchy level. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
If you are done configuring the router, enter commit from configuration mode.
77
Step-by-Step Procedure
To enable DHCPv6 snooping support for a specific interface within a named group of interfaces:
1. Return to the [edit forwarding-options dhcp-relay dhcpv6] hierarchy level to specify that you want
to configure DHCPv6 relay agent.
3. Specify the interface in group sunnyvale for which you want to enable DHCPv6 snooping.
4. Specify that you want to override the default DHCPv6 configuration for interface ge-3/2/1.1 in
group sunnyvale.
Results
From configuration mode, confirm the results of your configuration by issuing the show statement at the
[edit forwarding-options dhcp-relay] hierarchy level. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
If you are done configuring the router, enter commit from configuration mode.
Verification
IN THIS SECTION
Purpose
Verify the DHCPv6 address bindings in the Dynamic Host Configuration Protocol (DHCP) client table.
79
Action
Display detailed information about address bindings for DHCPv6 relay agent clients.
Session Id: 13
Client IPv6 Prefix: 2001:db8:0:8001::5/128
Client DUID: LL0x1-00:00:5e:00:53:02
State: BOUND(DHCPV6_RELAY_STATE_BOUND)
Lease Expires: 2011-11-21 06:14:50 PST
Lease Expires in: 293 seconds
Lease Start: 2011-11-21 06:09:50 PST
Incoming Client Interface: ge-3/2/1.1
Server Address: unknown
Next Hop Server Facing Relay: 2001:db8::2
Server Interface: none
Client Id Length: 10
Client Id: /0x00030001/0x00006503/0x0102
Meaning
The Server Address field in the show dhcpv6 relay binding detail command output typically displays the
IP address of the DHCPv6 server. In this example, the value unknown in the Server Address field
indicates that this is a multi-relay topology in which the DHCPv6 relay agent is not directly adjacent to
the DHCPv6 server, and does not detect the IP address of the server.
In that case, the output instead includes the Next Hop Server Facing Relay field, which displays the
next-hop address in the direction of the DHCPv6 server.
SEE ALSO
A problem that sometimes occurs with DHCP is DHCP spoofing. In DHCP spoofing, an untrusted client
floods a network with DHCP messages. Often these attacks utilize source IP address spoofing to
conceal the true source of the attack.
DHCP snooping helps prevent DHCP spoofing by copying DHCP messages to the control plane and
using the information in the packets to create anti-spoofing filters. The anti-spoofing filters bind a
client’s MAC address to its DHCP-assigned IP address and use this information to filter spoofed DHCP
messages. In a typical topology, a carrier edge router (in this function also referred to as the broadband
network gateway [BNG]) connects the DHCP server and the MX Series router (or broadband services
aggregator [BSA]) performing the snooping. The MX Series router connects to the client and the BNG.
To configure DHCP snooping, you include the appropriate interfaces within a DHCP group. You can
configure DHCP snooping for VPLS environments and bridge domains.
• In a VPLS environment, DHCP requests are forwarded over pseudowires. You configure DHCP
snooping over VPLS at the [edit routing-instances routing-instance-name] hierarchy level.
• In bridge domains, DHCP snooping works on a per learning bridge basis. Each learning domain must
have an upstream interface configured. This interface acts as the flood port for DHCP requests
coming from the client side. DHCP requests are forwarded across learning domains in a bridge
domain. You configure DHCP snooping on bridge domains at the [edit routing-instances routing-
instance-name bridge-domains bridge-domain-name] hierarchy level.
1. Access the appropriate hierarchy for either a VPLS or bridge domain configuration.
4. Specify the names of one or more interfaces. DHCP will trust only the MAC addresses learned on the
specified interfaces.
NOTE: You can explicitly enable and disable interface support for DHCP snooped clients. See
"Enabling and Disabling DHCP Snooped Packets Support for DHCP Relay Agent" on page 59.
SEE ALSO
15.1R2 You can disable DHCP snooping filters starting in Junos OS Release 15.1R2.
IN THIS SECTION
Configuring the Router to Distinguish Between DHCPv4 Duplicate Clients Based on Option 82
Information | 83
Configuring the Router to Distinguish Between DHCPv4 Duplicate Clients Based on Their Incoming
Interfaces | 85
82
In some network environments, client IDs and hardware addresses (MAC addresses) might not be
unique, resulting in duplicate clients. A duplicate DHCP client occurs when a client attempts to get a
lease, and that client has the same client ID or the same hardware address as an existing DHCP client—
the existing client and the new client cannot exist simultaneously, unless you have configured the
optional duplicate client support.
By default, DHCP local server and DHCP relay agent use the subnet information to differentiate
between duplicate clients. However, in some cases, this level of differentiation is not adequate. For
example, when multiple subinterfaces share the same underlying loopback interface with the same
preferred source address, the interfaces appear to be on the same subnet.
You can enable support for duplicate clients in a subnet by configuring DHCP to use additional
information to uniquely identify clients—the additional information is either the client incoming interface
or the option 82 information in the DHCP packets. Using the option 82 information provides the
following important benefits:
• You can configure DHCP relay to preserve and use the remotely created option 82.
• DHCP local server can support an environment in which an aggregation device is present between
the client and the DHCP server.
When configured to support duplicate clients in the subnet, DHCP uses the following information to
distinguish between the duplicate clients:
• The duplicate clients option you configure—either the client incoming interface or the option 82
information in the client’s incoming DHCP packets
NOTE: Starting in Junos OS Release 16.1R5, 16.2R2, 17.1R2, and 17.2R1, only the ACI
(suboption 1) and ARI (suboption 2) values from the option 82 information are used. Other
suboptions, such as Vendor-Specific (suboption 9), are ignored.
When configuring DHCPv4 duplicate client support, consider the following guidelines:
83
• If you want to preserve the remotely-created option 82 information, use the option 82 option with
the "duplicate-clients-in-subnet" on page 556 statement to distinguish between duplicate clients. If
there is no remotely created option 82 in the incoming DHCP packets, the router locally creates the
option 82 information.
• If you want to use the locally-created option-82, use the incoming-interface option with the
"duplicate-clients-in-subnet" on page 556 statement to distinguish between duplicate clients.
• Only the ACI (suboption 1) and ARI (suboption 2) values from the option 82 information are used.
Other suboptions, such as Vendor-Specific (suboption 9) are ignored.
• DHCP relay agent and DHCP local server in the same routing instance must have the same the
duplicate-clients-in-subnet configuration.
• The wholesaler and retailer logical system/routing instances must have the same duplicate-
clients-in-subnet statement configuration.
• For DHCP relay, the wholesaler and the retailer routing contexts must both have the relay-
option-82 statement configured with the Agent Circuit ID suboption (suboption 1) in option 82.
Duplicate clients occur when two clients in a subnet have the same hardware address or the same client
ID.
The following two procedures describe how to configure the router to use the option 82 information in
the incoming packets to differentiate between duplicate clients. The first procedure describes the
configuration for DHCP relay agent The second procedure is for DHCP local server.
NOTE: Only the ACI (suboption 1) and ARI (suboption 2) values from the option 82 information
are used. Other suboptions, such as Vendor-Specific (suboption 9) are ignored.
To configure the DHCP relay agent to differentiate between duplicate clients based on option 82
information:
84
[edit forwarding-options]
user@host# edit dhcp-relay
2. Configure DHCP relay to insert option 82 information if there is no remotely created option 82. Use
the default setting, which inserts the interface ID rather than the optional interface description.
3. Configure the router to always accept DHCP client packets that contain option 82 information.
NOTE: The trust-option-82 statement must always be enabled so the router can process
incoming DHCP client packets that contain option 82 information when the packets have a
gateway IP address (giaddr) of 0 (zero).
4. Configure DHCP relay to use the remotely created option 82 information to distinguish between
duplicate clients. If there is no remotely created option 82 in the traffic, the router locally creates the
option 82 information.
NOTE: Make sure that the always-write-option-82 statement is not enabled, as the
statement will overwrite the remotely created option 82.
To configure the DHCP local server to differentiate between duplicate clients based on the option 82
information:
85
Duplicate clients occur when two clients in a subnet have the same hardware address or the same client
ID.
The following two procedures describe how to configure the router to use the clients’ incoming interface
to differentiate between duplicate clients. The first procedure describes the configuration for DHCP
relay agent: the second procedure is for DHCP local server.
To configure the DHCP relay agent to differentiate between duplicate clients based on the client
incoming interface:
[edit forwarding-options]
user@host# edit dhcp-relay
3. Configure DHCP relay to insert option 82 information if the information is not specified remotely.
Use the default setting, which inserts the interface ID rather than the optional interface description.
86
NOTE: Only the ACI (suboption 1) and ARI (suboption 2) values from the option 82
information are used. Other suboptions, such as Vendor-Specific (suboption 9) are ignored.
4. Configure the router to overwrite any remotely supplied option 82 information in incoming packets.
5. Configure the router to always accept DHCP client packets that contain option 82 information.
NOTE: The trust-option-82 statement must always be enabled so the router can process
incoming DHCP client packets that contain option 82 information when the packets have a
gateway IP address (giaddr) of 0 (zero).
To configure the DHCP local server to differentiate between duplicate clients based on the client
incoming interface:
Release Description
16.1R5 Starting in Junos OS Release 16.1R5, 16.2R2, 17.1R2, and 17.2R1, only the ACI (suboption 1) and ARI
(suboption 2) values from the option 82 information are used.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the Router to Use Underlying Interfaces to Distinguish Between DHCPv6 Duplicate Client
DUIDs | 88
The DHCP unique identifier (DUID) is used to identify a client for the proper application of configuration
parameters. The DUID is supposed to be unique across all clients. A duplicate DHCPv6 client occurs
when a client attempts to obtain a lease, and that client has the same DUID as an existing DHCPv6
client. Because the DUIDs are supposed to be unique, by default the router treats the request from the
duplicate client as a renegotiation by the original client, and replaces the existing client entry with a new
entry.
However, in some cases the duplicate request is legitimate, because some network equipment vendors
do not guarantee the uniqueness of DUIDs. In these circumstances the router can support the
duplication of the DUID by accommodating the new client without affecting the existing client.
Starting in Junos OS Release 16.1, you can enable duplicate DHCPv6 client support. When enabled, the
router uses the clients’ underlying (incoming) interfaces to differentiate between clients with the same
88
DUID. The router can then create a new client entry for the duplicate client and grant it a lease. The
router retains the existing client entry with the original lease.
All underlying interface types are supported. Only 1:1 VLANs are supported, because the client requests
are received over different underlying interfaces. N:1 VLANs are not supported, because the client
requests can be received over the same underlying interface and therefore cannot be differentiated if
the DUIDs are the same.
DHCPv6 duplicate clients occur when two clients in a subnet have the same DHCP Unique Identifier
(DUID).
The following procedure describes how to configure the router to use the client’s underlying (incoming)
interface to differentiate between clients with duplicate DUIDs. The first part of the procedure
describes the configuration for DHCPv6 relay agent and the second part configures the DHCPv6 local
server.
NOTE: Duplicate client DUIDs are supported only when the clients use different underlying
interfaces, as in the case of 1:1 VLANs. They are not supported when the clients share an
underlying interface, as in the case of N:1 VLANs.
Before configuring duplicate client support, you must ensure the following:
• DHCPv6 relay agent is configured to insert the DHCPv6 Interface-ID option (option 18) in packets
forwarded to the DHCPv6 local server.
• Option 18 specifies the interface name, not the text description of the interface.
• DHCPv6 local server must echo option 18 in the RELAY-REPLY messages returned to the DHCPv6
relay agent, as is the case for DHCPv6 local server configured on a Juniper Networks router. The
relay agent uses the echoed option 18 information to find the client’s interface and construct the
client key.
[edit forwarding-options]
user@host# edit dhcp-relay dhcpv6
2. Configure DHCPv6 relay agent to insert DHCPv6 option 18 in the packets forwarded to the DHCPv6
local server.
NOTE: You must not include the use-interface-description statement because it specifies a
text description of the interface.
3. Specify that the DHCPv6 relay agent uses the clients’ incoming interfaces to differentiate between
the duplicate DUIDs.
2. Configure the DHCPv6 local server to support duplicate clients based on the clients’ incoming
interfaces.
Release Description
16.1 Starting in Junos OS Release 16.1, you can enable duplicate DHCPv6 client support.
RELATED DOCUMENTATION
IN THIS SECTION
Understanding How the Router Processes Subscriber-Initiated PPP Fast Keepalive Requests | 93
Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges | 102
Configuring Local Authentication in Dynamic Profiles for Static Terminated IPv4 PPP Subscribers | 107
Configuring Tag2 Attributes in Dynamic Profiles for Static Terminated IPv4 PPP Subscribers | 109
Subscriber management PPP support enables you to create and attach dynamic profiles for PPP
subscriber interfaces. When the PPP subscriber logs in, the router instantiates the specified dynamic
profile and then applies the attributes defined in the profile to the interface.
Dynamic profiles are used for both static and dynamic PPP interfaces. For static PPP interfaces, you use
the CLI to attach dynamic profiles, which specify PPP options. For dynamic PPP interfaces, the dynamic
profile creates the interface, including the PPP options.
Unlike traditional PPP support, subscriber management does not allow bi-directional PPP authentication
—authentication is performed only by the router, never by the remote peer. The router’s AAA process
manages authentication and address assignment for subscriber management. When you configure PPP
options for a dynamic profile, you can configure either Challenge Handshake Authentication Protocol
(CHAP) or Password Authentication Protocol (PAP) authentication, and you can control the order in
which the router negotiates the CHAP and PAP protocols. In addition, for CHAP authentication, you can
modify the default length of the CHAP challenge message. Other PPP options, which are either
commonly used or mandatory for a traditional PPP interface configuration, are not supported in
subscriber management dynamic profiles.
IN THIS SECTION
On MX Series routers with Modular Port Concentrators/Modular Interface Cards (MPCs/MICs), the
Packet Forwarding Engine on an MPC/MIC processes and responds to Link Control Protocol (LCP) Echo-
Request packets that the PPP subscriber (client) initiates and sends to the router. LCP Echo-Request
packets and LCP Echo-Reply packets are part of the PPP keepalive mechanism that helps determine
whether a link is functioning properly.
Previously, LCP Echo-Request packets and LCP Echo-Reply packets were handled on an MX Series
router by the Routing Engine. The mechanism by which LCP Echo-Request packets are processed by the
Packet Forwarding Engine instead of by the Routing Engine is referred to as PPP fast keepalives.
• PPP fast keepalives reduce the time required for keepalive exchanges by enabling the Packet
Forwarding Engine to receive LCP Echo-Request packets from the PPP subscriber and respond with
94
LCP Echo-Reply packets, without having to send the LCP packets to the Routing Engine for
processing.
• PPP fast keepalives provide increased bandwidth on the router to support a larger number of
subscribers with improved performance by relieving the Routing Engine from having to process the
LCP Echo-Request and Echo-Reply packets.
• PPP fast keepalives use negotiated magic numbers to identify potential traffic loopbacks to the
router or network issues. You can also disable validation if needed to prevent undesired PPP session
termination, for example when the PPP remote peers use arbitrary numbers rather than the
negotiated number.
You do not need any special configuration on an MX Series router with MPCs/MICs to enable
processing of PPP fast keepalive requests on the Packet Forwarding Engine. The feature is enabled by
default, and cannot be disabled.
The following sequence describes how an MX Series router processes LCP Echo-Request packets and
LCP Echo-Reply packets on the Packet Forwarding Engine on the MPC/MIC:
1. The Routing Engine notifies the Packet Forwarding Engine when transmission of keepalive requests is
enabled on a PPP logical interface. The notification includes the magic numbers of both the server
and the remote client.
2. The Packet Forwarding Engine receives the LCP Echo-Request packet initiated by the PPP subscriber
(client).
3. The Packet Forwarding Engine validates the peer magic number in the LCP Echo-Request packet, and
transmits the corresponding LCP Echo-Reply packet containing the magic number negotiated by the
router.
4. If the Packet Forwarding Engine detects a loop condition in the link, it sends the LCP Echo-Request
packet to the Routing Engine for further processing.
The Routing Engine continues to process LCP Echo-Request packets until the loop condition is
cleared.
Transmission of keepalive requests from the Packet Forwarding Engine on the router is not currently
enabled.
When an MX Series router with MPCs/MICs is using PPP fast keepalive for a PPP link, the Keepalive
statistics field in the output of the show interfaces pp0.logical statistics operational command does not
95
include statistics for the number of keepalive packets received or sent, or the amount of time since the
router received or sent the last keepalive packet.
To change the default queue assignment (forwarding class) for outbound traffic generated by the
Routing Engine, you can include the forwarding-class class-name statement at the [edit class-of-service
host-outbound-traffic] hierarchy level.
For PPP fast (inline) keepalive LCP Echo-Request and LCP Echo-Reply packets transmitted between an
MX Series router with MPCs/MICs and a PPP client, changing the forwarding class configuration takes
effect immediately for both new PPP-over-Ethernet (PPPoE), PPP-over-ATM (PPPoA), and L2TP
network server (LNS) subscriber sessions created after the configuration change, and for existing PPPoE,
PPPoA, and LNS subscriber sessions established before the configuration change.
When the Packet Forwarding Engine validates the peer magic number in the received LCP Echo-Request
packet, it checks whether the magic number is unexpected. The received number should match the
number for the remote peer that was agreed during LCP negotiation. The remote peer number must be
different than the local peer number; when they are the same, the expectation is that a loopback
condition (traffic is looping back to the local peer) or some other network issue exists.
When the validation check determines that a mismatch is present, meaning that the received remote
peer number is different from the negotiated number, the Packet Forwarding Engine sends the failed
Echo-Reply packets to the Routing Engine. If an Echo-Reply with a valid magic number is not received
within a certain interval, PPP considers this to be a keepalive failure and tears down the PPP session.
Some customer equipment might not negotiate its local magic number and instead insert an arbitrary
value as the magic number it sends to the router in the keepalive packets. This number is identified as a
mismatch and the session is eventually dropped. Starting in Junos OS Release 18.1R1, this result can be
avoided by configuring the router to not perform a magic number validation check. Because the
mismatch is never identified, the router continues to exchange PPP keepalive packets with the remote
peer. To configure this behavior, include the ignore-magic-number-mismatch statement in an L2TP
group profile, in the dynamic profile for dynamic PPP subscriber connections terminated at the router, or
in the dynamic profile for dynamic tunneled PPP subscribers at the LNS.
SEE ALSO
Configuring Keepalives
Disabling the Sending of PPPoE Keepalive Messages
Changing the Default Queuing and Marking of Host Outbound Traffic
96
Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges | 102
IN THIS SECTION
Starting in Junos OS Release 20.2R1, you can use RADIUS-sourced messages to convey information that
the BNG transparently forwards to a CPE device, such as a home gateway. For example, this information
might be upstream bandwidth or some other connection rate parameter that the CPE device needs. This
capability is useful when you want to dynamically enforce traffic management as close to subscribers as
possible.
Ordinarily, you might use the RADIUS standard attribute Reply-Message (18) to convey this information
to the CPE device during PPP authentication. However, if you are already using that attribute for
something else, you can also use the Juniper Networks Connection-Status-Message VSA (26-4874–
218). This VSA is a logical extension to the Reply-Message attribute (18) and has the same format and
semantics.
PPP uses a Juniper Networks vendor-specific extension to LCP to send the contents of the Connection-
Status-Message VSA to the peer home gateway. PPP includes this information in the Connection-
Status-Message option of an LCP Connection-Update-Request message.
RADIUS can send the Connection-Status-Message VSA to authd in the following ways:
• In the RADIUS Access-Accept message during negotiation and authorization of a PPP session
You might use both of these methods for any given session for business or residential subscribers. The
Access-Accept message provides the initial connection parameters. The CoA capability enables you to
update connection rate parameters as needed throughout the life of a session. The information carried
in the Connection-Status-Message VSA is typically traffic rates that are applied by local configuration
such as a dynamic service profile or the corresponding ANCP Port Up message.
97
NOTE: If you do not include the lcp-connection-update PPP option in the dynamic client profile,
PPP processes the notification from authd, but takes no action. If LCP on the router is not in the
Opened state, then PPP takes no action on the VSA.
The following steps describe what happens when RADIUS sends the VSA in an Access-Accept message:
1. The authd process receives the Connection-Status-Message VSA in an Access-Accept message from
the RADIUS server.
3. PPP NCP negotiation takes place between the remote gateway PPP client and PPP on the router.
4. Successful negotiation results in a family activation request. The PPP session enters the Session Up
state when the family is activated.
5. If the dynamic client profile includes the lcp-connection-update PPP option and LCP on the router is
in the Opened state, PPP sends an LCP Connection-Update-Request message to the gateway. This
message includes the VSA information in the Connection-Status-Message option.
• If the gateway does not support the LCP Connection-Update-Request, it returns an LCP Code-
Reject message to the router.
NOTE: If the gateway does not respond, the router retries the update request. It uses the PPP
default values of up to a maximum of 10 retries with an interval of 3 seconds between the
attempts.
NOTE: If you do not include the lcp-connection-update PPP option in the dynamic client
profile, PPP processes the notification from authd, but takes no action. If the option is present
but LCP on the router is not in the Opened state, PPP takes no action regarding the VSA.
The following steps describe what happens when RADIUS sends the VSA in a CoA request. This
assumes that NCP negotiation was already successful and the session is active.
1. The authd process receives the Connection-Status-Message VSA in a CoA request from the RADIUS
server.
98
3. If the dynamic client profile includes the lcp-connection-update PPP option and LCP on the router is
in the Opened state, PPP sends an LCP Connection-Update-Request message to the gateway. This
message includes the VSA information in the Connection-Status-Message option.
• If the gateway does not support the LCP Connection-Update-Request, it returns an LCP Code-
Reject message to the router.
NOTE: If the gateway does not respond, the router retries the update request. It uses the PPP
default values of up to a maximum of 10 retries with an interval of 3 seconds between the
attempts.
If the home gateway fails to receive a Connection-Update-Request message, the router retries sending
the message. The router also retries the request when it does not receive either a Connection-Update-
Ack or an LCP Code-Reject back from the gateway, or when something is wrong with the Ack message.
The default retry interval is 3 seconds. The router will retry the message up to the default 10 times
before it quits. If the router exhausts all the retry attempts without receiving an appropriate Connection-
Update-Ack message, it logs the message as if it had received a PPP Code-Reject message.
NOTE: RADIUS can include multiple instances of the Connection-Status-Message VSA in either
the Access-Accept message or a CoA request. If this occurs, authd uses only the first instance
and ignores any others.
The Access-Accept or CoA requests might contain other attributes besides the Connection-Status-
Message VSA, but there is no interdependency between the VSA and any other attributes. This is true
even when the message includes the Activate-Service (26–65) or Deactivate-Service (26–66) VSAs. The
lack of dependency means that even if authd does not successfully apply the other attributes, it still
sends the connection info to PPP, which in turn sends the VSA contents to the home gateway.
Similarly, authd applies any other attributes and returns a CoA response regardless of whether PPP
successfully communicates the content of the Connection-Status-Message VSA to the remote gateway.
This is true even when the CoA contains only the Connection-Status-Message VSA. This capability is
necessary because not all gateways will accept the LCP extension used in this feature.
99
Magic Number Negotiated value for the Negotiated value for the local PPP magic
local PPP magic number number
100
Kind 1 for Session-Update 2 for Session-Ack. For any other value, the
router logs the error and the discards the
packet. This enables the request message to
be retried, just as if the gateway had not
received it.
You can configure how the PPP magic numbers are used.
• If you configure ignore-magic-number-mismatch PPP option, you are preventing the magic numbers
from being validated. PPP ignores a mismatch between the magic numbers in the request and Ack
messages. If there are no other validation errors, PPP accepts the Connection-Update-Ack message.
• If you do not configure ignore-magic-number-mismatch PPP option, the magic numbers go through
validation. If the magic number in the Ack message does not match the gateway’s magic number
established during LCP negotiation, the router logs the error and discards the Connection-Update-
Ack message as an invalid response. This enables the request message to be retried, just as if the
gateway had not received it.
See "Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges" for more
information about magic numbers.
101
Figure 10 on page 101 shows the format for the Connection-Status-Message options. Table 7 on page
101 lists the field values.
Field Value
Type 1
Length Number of bytes in the option; 2 plus the length of the message. The message
length can be from 1 through 247 bytes.
A dynamic profile acts as a template that enables you to create, update, or remove a configuration that
includes attributes for client access (for example, interface or protocol) or service (for example, IGMP).
Using these profiles you can consolidate all of the common attributes of a client (and eventually a group
of clients) and apply the attributes simultaneously.
After they are created, the profiles reside in a profile library on the router. You can then use the
dynamic-profile statement to attach profiles to interfaces. To assign a dynamic profile to a PPP interface,
102
you can include the dynamic-profile statement at the [edit interfaces interface-name unit logical-unit-
number ppp-options] hierarchy level:
For information about dynamic profiles, see Dynamic Profiles Overview in the Junos Subscriber Access
Configuration Guide.
For information about creating dynamic profiles, see Configuring a Basic Dynamic Profile in the Junos
Subscriber Access Configuration Guide.
For information about assigning a dynamic profile to a PPP interface, see Attaching Dynamic Profiles to
Static PPP Subscriber Interfaces in the Junos Subscriber Access Configuration Guide.
For information about using dynamic profiles to authenticate PPP subscribers, see Configuring Dynamic
Authentication for PPP Subscribers.
NOTE: Dynamic profiles for PPP subscribers are supported only on PPPoE interfaces for this
release.
PPP magic numbers are negotiated between peers during LCP negotiation. The peers must have
different magic numbers. When the numbers are the same, it indicates that there may be a loopback in
traffic sent by the local peer. In this case, the local peer sends a new number to the remote peer. If the
magic number returned by the remote peer is different than the latest number sent by the local peer,
then the numbers are agreed. Otherwise, the exchange of magic numbers continues until a valid
(different) number is received or the process times out, in which case the session is dropped.
After the numbers are agreed upon, the peers include their respective magic numbers when they
exchange PPP keepalive (Echo-Request/Echo-Reply) packets. The Packet Forwarding Engine validates
the received magic number for each exchange. A mismatch occurs when the PPP magic number received
from the remote peer does not match the value agreed upon during LCP negotiation. When the
validation check determines that a mismatch is present, the Packet Forwarding Engine sends the failed
Echo-Request packet to the Routing Engine. If an Echo-Reply with a valid magic number is not received
within a certain interval, PPP considers this to be a keepalive failure and tears down the PPP session.
103
In some circumstances, this behavior is not desirable. Some customer equipment does not negotiate its
local magic number; instead, it inserts an arbitrary value as the magic number it sends to the router in
the keepalive packets. By default, this number is identified as a mismatch and the session is eventually
dropped. This result can be avoided by preventing the Packet Forwarding Engine from performing the
magic number validation check. Because the mismatch is never identified, the router continues to
exchange PPP keepalive packets with the remote peer.
Disable the magic number validation check by including the ignore-magic-number-mismatch statement
as one of the PPP options applied in a dynamic PPP profile, L2TP LNS dynamic profile, or L2TP group
profile. Configuring this statement has no effect on LCP magic number negotiation or on the exchange
of keepalives when the remote peer magic number is the expected negotiated number.
NOTE: Because magic number validation is not performed, the Packet Forwarding Engine does
not detect whether the remote peer sends the local peer’s magic number, which would indicate a
loopback or other network issue. This is considered to be an unlikely situation, because LCP
negotiation completed successfully, meaning no loopback was present at that time.
To configure dynamic profiles to prevent the Packet Forwarding Engine from detecting mismatches in
magic numbers:
You can use the show ppp interface interface-name extensive command to view whether the magic
numbers are ignored.
104
You can use RADIUS-sourced messages to convey information that the BNG transparently forwards to a
CPE device, such as a home gateway. For example, this information might be upstream bandwidth or
some other connection rate parameter that the CPE device needs.
When you enable this feature, PPP can act on a Connection-Status-Message VSA (26–218) received by
authd in either a RADIUS Access-Accept message or a CoA message. PPP then conveys the contents of
the VSA in an LCP Connection-Update-Request message to the remote peer. This action requires the
following to be true:
• At least the first address family has been successfully negotiated and the session is active.
Otherwise PPP takes no action on the VSA. If you do not enable the lcp-connection-update option, PPP
processes the notification from authd, but takes no action.
You configure this capability in the dynamic client profile associated with subscribers using the CPE
device. In practice, you are adding this to numerous other features in the client profile. This example
shows only the specific configuration for this feature. This feature also requires you to configure VSA
26-218 on your RADIUS server; that is outside the scope of this documentation.
To configure the connection status updates in a dynamic profile for PPP subscriber interfaces:
You can use the show ppp interface extensive command for the PPP logical interface to determine
whether LCP connection updates are successful. You can monitor the relevant statistics with the show
system subscriber-management statistics ppp command.
105
You can attach a dynamic profile to a static PPP subscriber interface. When a PPP subscriber logs in, the
specified dynamic profile is instantiated and the services defined in the profile are applied to the
interface.
2. Specify the dynamic profile you want to associate with the interface.
IN THIS SECTION
Benefits | 107
This topic discusses several considerations for migrating certain static, terminated IPv4 PPP subscriber
configurations to dynamic configurations using dynamic profiles. Service providers managing static
subscribers on routers with legacy Junos OS releases (earlier than Junos OS Release 15.1R4) have
requirements for migrating their static subscribers to being managed with dynamic profiles on routers
running enhanced subscriber management (Junos OS Release 15.1R4 and later releases). Starting in
106
Junos OS Release 18.2R1, several enhancements have been added to facilitate the transition of these
static service provider configurations to dynamic profiles.
Local Authentication
Some providers with static configurations might use CPE devices that do not support any authentication
protocols, not even CHAP or PAP. The providers might use PPPoE service name tables as a rudimentary
method to authenticate and authorize the subscribers on static PPPoE logical interfaces. If the
subscriber ACI or ARI do not match a table entry, then the PPP PADI and PADR packets are typically
dropped. Legacy Junos OS releases do not support subscribers configured with no-authentication for
the authentication method.
For subscribers where the CPE does not support authentication protocols such as PAP and CHAP, you
can configure usernames and passwords locally. The router uses these values when it contacts the
RADIUS server for authentication.
• To configure the username for local authentication, include the username-include statement in the
PPP options for the dynamic logical interface. You can define the name based on one or more of the
following attributes: MAC address, Agent Circuit ID, Agent Remote ID, and domain name. By default,
a period (.) is the delimiter between elements of the name, but you can define other characters
instead.
• To configure the password for local authentication, include the password statement in the PPP
options for the dynamic logical interface.
You can use the same dynamic profile to support both CPEs that do not support an authentication
protocol and CPEs that do.
For some static configurations, the subscriber address is not assigned by using RADIUS or a local
address pool on the router. Instead, the CPE has a static address configured for the subscriber; during
IPCP negotiation, the CPE requests the router to assign that address to the subscriber.
Starting in Junos OS Release 18.2R1, you can assign a wildcard address of 255.255.255.255 to the
Framed-Route-Address attribute [8] in the configuration for your RADIUS server. When RADIUS returns
the attribute with that value, jpppd automatically accepts the subscriber IP address assignment provided
by the client in an IPCP configure-request message rather than assigning another address.
In some configurations, static PPP subscriber interfaces are configured in different VRFs. Each VRF
configuration has static routes that point to static PPP subscriber interfaces as the next-hop address.
107
These routes might have the tag2 attribute configured; it is required by MP-BGP to apply the
appropriate local preference and community when it advertises the routes.
Starting in Junos OS Release 18.2R1, you can configure your RADIUS server to include the tag2
attribute in the Framed-Route attribute [22] when it authenticates a subscriber.
You must also configure the dynamic profile to derive the tag2 value from the Framed-Route attribute.
To do so, specify the $junos-framed-route-tag2 predefined variable to be used when the access route is
dynamically instantiated. Alternatively, you can configure the dynamic profile to provide a specific tag2
value for a specific access route prefix.
See Junos OS Predefined Variables for more information about predefined variables.
Benefits
• Local authentication enables authentication with locally stored passwords and usernames for
subscribers when the CPE does not support authentication protocols such as PAP and CHAP.
• CPE-sourced address assignment enables the router to accept statically configured subscriber IP
addresses requested by the CPE rather than assigning the address from a local or externally sourced
address pool.
Some providers with static configurations might use CPE devices that do not support any authentication
protocols, not even CHAP or PAP. The providers might use PPPoE service name tables as a rudimentary
method to authenticate and authorize the subscribers on static PPPoE logical interfaces. If the
subscriber ACI or ARI does not match a table entry, then the PPP PADI and PADR packets are typically
dropped.
Starting in Junos OS Release 18.2R1, you can configure usernames and passwords locally for clients that
do not support authentication protocols such as PAP and CHAP. The router uses these values when it
contacts the RADIUS server for authentication. This aids in the migration of the static subscribers to
using dynamic profiles on a router running enhanced subscriber management.
a. (Optional) Specify that the agent circuit identifier (ACI) is included in the username. The ACI is
derived from PPPoE tags.
b. (Optional) Specify that the agent remote ID (ARI) is included in the username. The ARI is derived
from PPPoE tags.
c. (Optional) Specify that the MAC address from the client PDU is included in the username. The
MAC address is derived from the PPPoE packet.
d. (Optional) Specify the client domain name to end the username. The router adds the @ character
as the delimiter for this option.
e. (Optional) Specify a delimiter to separate the components that make up the username. The
default delimiter is a period (.).The router always uses the @ character as the delimiter before the
domain name.
The username takes the following format when you include all the options and use the default delimiter:
mac-address.circuit-id.remote-id@domain-name
For example, consider the following sample configuration, where the ACI is aci1002, the ARI is ari349,
and the MAC address is 00:00:5e:00:53:ff:
This configuration results in a local password of $ABC123$ABC123 for the following unique local
username:
In some configurations, PPP subscribers use static routes with a tag2 attribute. For example, MP-BGP
uses tag2 to enable it to apply the appropriate local-preference and community when it advertises
routes. When you migrate these subscribers to using dynamic profiles on a router running enhanced
subscriber management, you can configure the tag2 attribute by configuring a specific value for a route
or by deriving the value from a RADIUS server. This support is first available in Junos OS Release
18.2R1.
1. Configure your RADIUS server to include the tag2 attribute in the Framed-Route attribute [22]
when it authenticates a subscriber. Consult your RADIUS server documentation for configuration
information. The configuration might look something like the following example:
The $junos-framed-route-ip-address-prefix predefined variable derives the IPv4 address prefix for
the access route from the Framed-Route attribute as well.
You can configure a dynamic profile that includes PPP authentication that enables PPP clients to
dynamically access the network. You can specify either CHAP or PAP authentication. Optionally, you
can also control the order in which the router negotiates the CHAP and PAP protocols.
For dynamic interfaces, the router supports unidirectional authentication only—the router always
functions as the authenticator. When you configure PPP authentication in a dynamic profile, CHAP
authentication supports the challenge-length option, which enables you to configure the minimum
length and maximum length of the CHAP challenge message. Neither CHAP authentication nor PAP
authentication supports any other configuration options, including the passive statement.
111
NOTE: Dynamic profiles for PPP subscribers are supported only on PPPoE interfaces.
[edit]
user@host# edit dynamic-profiles vod-profile-25
2. Configure the interfaces and unit for the dynamic profile. Use pp0 for the interface type and the
predefined variable for the unit.
4. Specify the authentication protocol used in the dynamic profile. You can configure either CHAP or
PAP. There are no additional options for either authentication protocol.
5. (Optional) Configure the minimum length and maximum length of the CHAP challenge message.
See "Modifying the CHAP Challenge Length" on page 112.
6. (Optional) Configure the order in which the router negotiates the CHAP and PAP authentication
protocols.
See "Controlling the Negotiation Order of PPP Authentication Protocols" on page 120.
112
7. (Optional) Configure the router to prompt the CPE to negotiate the DNS addresses for dynamic
PPPoE subscribers during IPCP negotiation.
See "Ensuring IPCP Negotiation for Primary and Secondary DNS Addresses" on page 124 for more
information.
You can modify the default minimum length and maximum length of the Challenge Handshake
Authentication Protocol (CHAP) challenge message that the router sends to a PPP client. The CHAP
challenge message, which contains information that is unique to a particular PPP subscriber session, is
used as part of the authentication mechanism between the router and the client to verify the identity of
the client for access to the router.
By default, the minimum length of the CHAP challenge is 16 bytes, and the maximum length is 32 bytes.
You can override this default to configure the CHAP challenge minimum length and maximum length in
the range 8 bytes through 63 bytes.
BEST PRACTICE: We recommend that you configure both the minimum length and the
maximum length of the CHAP challenge to at least 16 bytes.
• For dynamic PPP subscriber interfaces, see "Configuring Dynamic Authentication for PPP
Subscribers" on page 110.
• For static interfaces with PPP encapsulation, see Configuring the PPP Challenge Handshake
Authentication Protocol.
To configure the minimum and maximum length of the CHAP challenge message:
3. Specify the minimum length and maximum length of the CHAP challenge.
For example, the following challenge-length statement in a dynamic profile named pppoe-client-
profile sets the minimum length of the CHAP challenge to 20 bytes, and the maximum length to
40 bytes.
This example shows the minimum configuration for a dynamic profile that is used for static PPPoE
interfaces. The configuration must include the interfaces pp0 stanza.
dynamic-profiles {
ppp-profile-1 {
interfaces {
pp0 {
unit "$junos-interface-unit";
}
}
}
}
IN THIS SECTION
Purpose | 115
Action | 115
115
Purpose
Action
Release Description
20.2R1 Starting in Junos OS Release 20.2R1, you can use RADIUS-sourced messages to convey information that
the BNG transparently forwards to a CPE device, such as a home gateway.
18.2R1 Starting in Junos OS Release 18.2R1, several enhancements have been added to facilitate the transition
of these static service provider configurations to dynamic profiles.
18.1R1 Starting in Junos OS Release 18.1R1, this result can be avoided by configuring the router to not perform
a magic number validation check.
116
RELATED DOCUMENTATION
Configuring Keepalives
Disabling the Sending of PPPoE Keepalive Messages
Changing the Default Queuing and Marking of Host Outbound Traffic
Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges | 102
Dynamic Profiles Overview
Configuring a Basic Dynamic Profile
Junos OS Predefined Variables
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
IN THIS SECTION
Ensuring IPCP Negotiation for Primary and Secondary DNS Addresses | 124
IN THIS SECTION
PPP NCP Active Negotiation Requirements for IPv4 Dynamic and Static PPP Subscribers | 118
PPP NCP Active Negotiation Requirements for IPv6 Dynamic and Static PPP Subscribers | 119
PPP NCP Negotiation Requirements for IPv4 and IPv6 Dual-Stack Configurations | 119
117
The Network Control Protocol (NCP) is a mechanism used to establish and configure different Network
Layer protocols for Point-to-Point Protocol (PPP) connections. Starting in Junos OS Release 14.1, on
MX Series routers with Modular Port Concentrators (MPCs), you can configure PPP NCP negotiation to
actively or passively control subscriber connections initiated by the router functioning as a PPP server.
Junos OS supports the following NCPs as presented in the associated IETF standards:
• Internet Protocol Control Protocol (IPCP) in RFC 1332, The PPP Internet Protocol Control Protocol
(IPCP)
• Active PPP NCP negotiation mode—The router sends an NCP Configuration Request message
without waiting for the PPP client to do so.
• Passive PPP NCP negotiation mode—The router waits for the PPP client to send an NCP
Configuration Request message before sending its own Configuration Request message. Dynamic
subscriber interface connections and static subscriber interface connections use passive PPP NCP
negotiation by default.
Router behavior for active mode and passive mode PPP NCP negotiation differs for dynamic PPP
subscribers and static PPP subscribers, as summarized in Table 8 on page 117.
Table 8: PPP NCP Negotiation Mode Behavior for Dynamic and Static Subscribers
Dynamic Active The router establishes the local network address and uses it
to send the NCP Configuration Request message without
waiting for the PPP client to send a Configuration Request.
Dynamic Passive The router establishes the local network address after it
receives the NCP Configuration Request message from the
PPP client.
118
Table 8: PPP NCP Negotiation Mode Behavior for Dynamic and Static Subscribers (Continued)
You can configure PPP Network Control Protocol (NCP) negotiation for the following single-stack and
dual-stack subscriber configurations on MX Series routers with MPCs:
• Static tunneled PPP subscribers at the L2TP network server (LNS) on an inline service (si) interface
PPP NCP Active Negotiation Requirements for IPv4 Dynamic and Static PPP
Subscribers
To configure active PPP IPv4 Network Control Protocol (IPNCP) negotiation for dynamic and static PPP
subscribers in a single-stack or dual-stack configuration, make sure you meet the following
requirements:
• Configure the IPv4 (inet) protocol family in a dynamic profile (for dynamic subscribers) or at the
interface level (for static subscribers).
• Assign any of the following IPv4 address attributes for the subscriber during the authentication
process:
When you have met these requirements, use the initiate-ncp ip statement to enable active IPNCP
negotiation for dynamic and static subscribers in a single-stack or dual-stack configuration.
PPP NCP Active Negotiation Requirements for IPv6 Dynamic and Static PPP
Subscribers
To configure active PPP IPv6 Network Control Protocol (IPv6NCP) negotiation for dynamic and static
PPP subscribers in a single-stack or dual-stack configuration, make sure you meet the following
requirements:
• Configure the IPv6 (inet6) protocol family in a dynamic profile (for dynamic subscribers) or at the
interface level (for static subscriber).
• Assign any of the following IPv6 address attributes for the subscriber during the authentication
process:
• Framed-IPv6-Pool (RADIUS Attribute 100)—RADIUS explicit IPv6 adress or prefix pool name
• IPv6 attributes allocated from a locally configured Neighbor Discovery Router Advertisement
(NDRA) pool
When you have met these requirements, use the initiate-ncp ipv6 statement to enable active IPv6NCP
negotiation for dynamic and static subscribers in a single-stack or dual-stack configuration.
PPP NCP Negotiation Requirements for IPv4 and IPv6 Dual-Stack Configurations
You can configure either active or passive PPP NCP negotiation for the IPv4 and IPv6 subscriber
interfaces in a dual-stack configuration.
• Make sure you meet the IPv4 and IPv6 protocol and address family requirements.
• Use the initiate-ncp ip statement to enable active negotiation for the IPv4 subscriber interface.
• Use the initiate-ncp ipv6 statement to enable active negotiation for the IPv6 subscriber interface.
• Make sure you meet the IPv4 and IPv6 protocol and address family requirements.
• Use the initiate-ncp dual-stack-passive statement to enable passive negotiation for the dual-stack
configuration. The initiate-ncp dual-stack-passive statement overrides the initiate-ncp ip and
initiate-ncp ipv6 statements if they are configured.
The following additional guidelines apply when you configure PPP NCP negotiation for dual-stack
subscribers:
• Dual-stack subscribers configured for either active mode or passive mode PPP NCP negotiation
continue to use the same negotiation mode when the NCP mechanism is renegotiated.
• Using the on-demand-ip-address statement to save IPv4 addresses for dual-stack PPP subscribers
when you are not using the IPv4 service has no effect on configuration of the PPP NCP negotiation
mode in a dual-stack configuration.
You can control the order in which the router tries to negotiate PPP authentication protocols when it
verifies that a PPP client can access the network. By default, the router first tries to negotiate Challenge
Handshake Authentication Protocol (CHAP) authentication. If the the attempt to negotiate CHAP
authentication is unsuccessful, the router then tries to negotiate Password Authentication Protocol
(PAP) authentication.
You can modify this default negotiation order in any of the following ways:
• Specify that the router negotiate PAP authentication first, followed by CHAP authentication if PAP
negotiation is unsuccessful.
When you specify both authentication protocols in either order, you must enclose the set of protocol
names in square brackets ([ ]).
• For dynamic PPP subscriber interfaces, see "Configuring Dynamic Authentication for PPP
Subscribers" on page 110.
• For CHAP on static interfaces with PPP encapsulation, see Configuring the PPP Challenge
Handshake Authentication Protocol.
121
• For PAP on static interfaces with PPP encapsulation, see Configuring the PPP Password
Authentication Protocol On a Physical Interface.
• For information about dynamic profiles for PPP subscribers, see "Dynamic Profiles for PPP
Subscriber Interfaces Overview" on page 92.
To control the order in which the router negotiates PPP authentication protocols:
2. Specify the negotiation order for PPP authentication protocols on the router.
The following sample authentication statements in a dynamic profile named pppoe-client-profile show
the different ways you can configure the negotiation order for PPP authentication protocols. (The
authentication statements for configuring static interfaces are identical.)
122
• To specify that the router negotiate PAP authentication first, followed by CHAP authentication:
• To restore the default negotiation order for PPP authentication protocols after you have modified it:
Starting in Junos OS Release 14.1, configuring PPP Network Control Protocol (NCP) negotiation enables
you to actively or passively control subscriber connections initiated by the router functioning as a PPP
server. Both dynamic and static subscriber interface connections use passive PPP NCP negotiation by
default.
You can configure the PPP NCP negotiation mode (active or passive) for the following subscriber
configurations on MX Series routers with MPCs:
• Dynamic PPP subscriber connections terminated at the router, using a dynamic profile
• Static PPP subscriber connections terminated at the router, using a per-interface configuration
123
• Dynamic tunneled PPP subscribers at the L2TP network server (LNS), using a dynamic profile
• Static tunneled PPP subscribers at the LNS, using a per-inline service (si) interface configuration
• Dynamic and static tunneled PPP subscribers at the LNS, using a user-group profile
1. Specify that you want to configure PPP-specific properties for the subscriber.
• In a group profile for dynamic and static tunneled PPP subscribers at the LNS:
• To configure active PPP NCP negotiation for IPv4 subscribers in a single-stack or dual-stack
configuration, use the initiate-ncp ip statement.
124
For example, to configure active negotiation for static IPv4 connections terminated at the router:
• To configure active PPP NCP negotiation for IPv6 subscribers in a single-stack or dual-stack
configuration, use the initiate-ncp ipv6 statement.
For example, to configure active negotiation for dynamic IPv6 connections terminated at the
router:
• To configure passive PPP NCP negotiation for dynamic or static subscribers in an IPv4 and IPv6
dual-stack configuration, use the initiate-ncp dual-stack-passive statement, which overrides both
the initiate-ncp ip and initiate-ncp ipv6 statements if they are configured.
For example, to configure passive negotiation for dynamic tunneled PPP subscribers at the LNS in
an IPv4 and IPv6 dual-stack configuration:
Starting in Junos OS Release 15.1, you can configure a router to prompt any customer premises
equipment (CPE) to send the IPv4 primary or secondary DNS address options in the next configuration
request if the options are not included in an initial IPCP configuration request during IPCP negotiations
or if the router rejects the request. This DNS option enables the router to control IPv4 DNS address
provisioning for dynamic and static, terminated PPPoE and LNS subscribers. The router includes the
address options in the IPCP configuration NAK message that it sends to the CPE. The CPE then
negotiates both primary and secondary IPv4 DNS addresses. Using this option ensures that the CPE can
use the DNS addresses available at the router.
125
To configure the router to prompt the CPE to negotiate the DNS addresses for dynamic PPPoE
subscribers:
To configure the router to prompt the CPE to negotiate the DNS addresses for static PPPoE subscribers:
To configure the router to prompt the CPE to negotiate the DNS addresses for dynamic LNS subscribers:
To configure the router to prompt the CPE to negotiate the DNS addresses for static LNS subscribers:
To configure the router to prompt the CPE to negotiate the DNS addresses for tunneled PPP subscribers
with an LNS user group profile:
Release Description
15.1 Starting in Junos OS Release 15.1, you can configure a router to prompt any customer premises
equipment (CPE) to send the IPv4 primary or secondary DNS address options in the next configuration
request if the options are not included in an initial IPCP configuration request during IPCP negotiations
or if the router rejects the request.
14.1 Starting in Junos OS Release 14.1, on MX Series routers with Modular Port Concentrators (MPCs), you
can configure PPP NCP negotiation to actively or passively control subscriber connections initiated by
the router functioning as a PPP server.
14.1 Starting in Junos OS Release 14.1, configuring PPP Network Control Protocol (NCP) negotiation enables
you to actively or passively control subscriber connections initiated by the router functioning as a PPP
server.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the Number and Size of PPP Service Log Files | 128
Configuring the Severity Level to Filter Which PPP Service Messages Are Logged | 132
127
The Junos OS trace feature tracks PPP service operations and records events in a log file. The error
descriptions captured in the log file provide detailed information to help you solve problems.
By default, nothing is traced. When you enable the tracing operation, the default tracing behavior is as
follows:
1. Important events are logged in a file located in the /var/log directory. By default, the router uses the
filename jpppd. You can specify a different filename, but you cannot change the directory in which
trace files are located.
2. When the trace log file filename reaches 128 kilobytes (KB), it is compressed and renamed
filename.0.gz. Subsequent events are logged in a new file called filename, until it reaches capacity
again. At this point, filename.0.gz is renamed filename.1.gz and filename is compressed and renamed
filename.0.gz. This process repeats until the number of archived files reaches the maximum file
number. Then the oldest trace file—the one with the highest number—is overwritten.
You can optionally specify the number of trace files to be from 2 through 1000. You can also
configure the maximum file size to be from 10 KB through 1 gigabyte (GB). (For more information
about how log files are created, see the System Log Explorer.)
By default, only the user who configures the tracing operation can access log files. You can optionally
configure read-only access for all users.
See "Configuring the PPP Service Trace Log Filename" on page 128.
See "Configuring the Number and Size of PPP Service Log Files" on page 128.
See "Configuring Access to the PPP Service Log File" on page 129.
4. (Optional) Configure a regular expression to filter the information to be included in the trace log.
See "Configuring a Regular Expression for PPP Service Messages to Be Logged" on page 129.
6. (Optional) Configure a severity level for messages to specify which event messages are logged.
See "Configuring the Severity Level to Filter Which PPP Service Messages Are Logged" on page 132.
128
By default, the name of the file that records trace output for PPP service is jpppd. You can specify a
different name with the file option.
• Specify the name of the file used for the trace output.
You can optionally specify the number of compressed, archived trace log files to be from 2 through
1000. You can also configure the maximum file size to be from 10 KB through 1 gigabyte (GB); the
default size is 128 kilobytes (KB).
The archived files are differentiated by a suffix in the format .number.gz. The newest archived file
is .0.gz and the oldest archived file is .(maximum number)-1.gz. When the current trace log file reaches
the maximum size, it is compressed and renamed, and any existing archived files are renamed. This
process repeats until the maximum number of archived files is reached, at which point the oldest file is
overwritten.
For example, you can set the maximum file size to 2 MB, and the maximum number of files to 20. When
the file that receives the output of the tracing operation, filename, reaches 2 MB, filename is
compressed and renamed filename.0.gz, and a new file called filename is created. When the new
filename reaches 2 MB, filename.0.gz is renamed filename.1.gz and filename is compressed and
renamed filename.0.gz. This process repeats until there are 20 trace files. Then the oldest file,
filename.19.gz, is simply overwritten when the next oldest file, filename.18.gz is compressed and
renamed to filename.19.gz.
• Specify the name, number, and size of the file used for the trace output.
By default, only the user who configures the tracing operation can access the log files. You can enable all
users to read the log file and you can explicitly set the default behavior of the log file.
To explicitly set the default behavior, only the user who configured tracing can read the log file:
By default, the trace operation output includes all lines relevant to the logged events.
You can apply filters to the PPP service to limit tracing to particular subscribers or domains. Subscriber
filtering simplifies troubleshooting in a scaled environment by enabling you to focus on a reduced set of
trace results.
For subscriber usernames that have the expected form of user@domain, you can filter on the user, the
domain, or both. You can use an asterisk (*) as a wildcard to substitute for characters at the beginning or
end of either term or both terms to match a greater number of subscribers.
NOTE: You cannot filter results using a wildcard in the middle of the user or domain terms. For
example, the following uses of the wildcard are not supported: tom*[email protected],
tom125@ex*.com.
When you enable filtering by username, traces that have insufficient information to determine the
username are automatically excluded.
• Filter results for the specific subscriber with the username, [email protected].
• Filter results for all subscribers whose username begins with tom.
• Filter results for all subscribers whose username ends with tom.
• Filter results for subscribers with the username tom at all domains beginning with ex.
• Filter results for all subscribers at all domains that end with ample.com.
• Filter results for all subscribers whose username begins with tom at domains that end with
example.com.
By default, only important events are logged. You can specify which events and operations are logged by
specifying one or more tracing flags.
Configuring the Severity Level to Filter Which PPP Service Messages Are
Logged
The messages associated with a logged event are categorized according to severity level. You can use
the severity level to determine which messages are logged for the event type. A low severity level is less
restrictive—filters out fewer messages—than a higher level. When you configure a severity level, all
messages at that level and all higher (more restrictive) levels are logged.
The following list presents severity levels in order from lowest (least restrictive) to highest (most
restrictive). This order also represents the significance of the messages; for example, error messages are
of greater concern than info messages.
• verbose
• info
• notice
• warning
• error
The severity level that you configure depends on the issue that you are trying to resolve. In some cases
you might be interested in seeing all messages relevant to the logged event, so you specify all. You can
also specify verbose with the same result, because verbose is the lowest (least restrictive) severity level;
it has nothing to do with the terseness or verbosity of the messages. Either choice generates a large
amount of output. You can specify a more restrictive severity level, such as notice or info to filter the
messages. By default, the trace operation output includes only messages with a severity level of error.
RELATED DOCUMENTATION
IN THIS SECTION
Enabling Tunnel and Global Counters for SNMP Statistics Collection | 144
The Layer 2 Tunneling Protocol (L2TP) is a client-server protocol that allows the Point-to-Point Protocol
(PPP) to be tunneled across a network. L2TP encapsulates Layer 2 packets, such as PPP, for transmission
across a network. An L2TP access concentrator (LAC), configured on an access device, receives packets
from a remote client and forwards them to an L2TP network server (LNS) on a remote network. The LNS
functions as the logical termination point of the PPP session tunneled by the LAC from the remote
client. Figure 11 on page 134 shows a simple L2TP topology.
L2TP separates the termination of access technologies, such as cable or xDSL, from the termination of
PPP and subsequent access to a network. This separation enables public ISPs to outsource their access
technologies to competitive local exchange carriers (CLECs). L2TP provides ISPs the capability to supply
VPN service; private enterprises can reduce or avoid investment in access technologies for remote
workers.
You can configure your router to act as the LAC in PPP pass-through mode in which the LAC receives
packets from a remote client and then forwards them at Layer 2 directly to the LNS. The PPP session is
terminated on the LNS. This LAC implementation supports only Point-to-Point Protocol over Ethernet
(PPPoE) subscribers over dynamic or static logical interfaces. Figure 12 on page 135 shows the protocol
layer stacking for an L2TP pass-through connection.
NOTE: On MX Series routers, the LAC and LNS functions are supported only on MPCs; they are
not supported on any services PIC or MS-DPC. For details about MPC support for L2TP, see the
MX Series Interface Module Reference
Certain M Series routers support LNS functions on services PICs. For more information about the
L2TP implementation on M Series routers, see L2TP Services Configuration Overview.
The LAC dynamically creates tunnels based on AAA authentication parameters and transmits L2TP
packets to the LNS by means of the IP/User Datagram Protocol (UDP). Traffic travels in an L2TP session;
a tunnel is an aggregation of one or more sessions. You can also provision a domain map that is used by
AAA to determine whether to tunnel or terminate the PPPoE subscriber on the LAC. A one-to-one
mapping exists between each PPP subscriber tunneled to the LNS and an L2TP session.
When the LNS is an MX Series router, a LAC-facing peer interface on an MPC provides an IP address for
the exchange of IP packets between the tunnel endpoints; the Routing Engine maintains the L2TP
tunnels. The Packet Forwarding Engine hosts one or more inline services (si) interfaces. These interfaces
function like a virtual physical interface and anchor the L2TP sessions on the LNS. The si interface
136
enables L2TP services without requiring a special services PIC. Finally, another interface is used to
transmit the subscriber data to and from the Internet.
The characteristics of the tunnel can originate either from a tunnel profile that you configure or from
RADIUS tunnel attributes and vendor-specific attributes (VSAs) from the AAA server accessible at the
LAC. You can include a tunnel profile in a domain map, which applies the tunnel profile before RADIUS
authentication takes place. You can use RADIUS standard attributes and VSAs to override any or all
characteristics configured by the tunnel profile in a domain map. Alternatively, RADIUS can itself apply a
tunnel profile when the RADIUS Tunnel-Group VSA [26-64] is specified in the RADIUS login.
The Virtual-Router VSA [26-1] in the subscriber profile on the service provider AAA server (accessible
from the LNS) determines the routing instance in which the L2TP session is brought up on the LNS.
When this VSA is not present, the subscriber session comes up in the same routing instance as the
tunnel, because the AAA server can be accessed only from the routing instance in which the tunnel
terminates on the LNS.
This behavior is different than for DHCP and non-tunneled PPPoE subscribers, which come up in the
default routing instance in the absence of the Virtual-Router VSA. For L2TP subscribers, you must
include this VSA in the subscriber profile when you want the subscriber session to come up in a different
routing instance than the tunnel routing instance.
Starting in Junos OS Release 17.4R1, The LNS includes the following RADIUS attributes when it sends
an Access-Request message to the RADIUS server:
• Tunnel-Type (64)
• Tunnel-Medium-Type (65)
• Tunnel-Client-Endpoint (66)
• Tunnel-Server-Endpoint (67)
• Acct-Tunnel-Connection (68)
• Tunnel-Assignment-Id (82)
• Tunnel-Client-Auth-Id (90)
• Tunnel-Server-Auth-Id (91)
In earlier releases, the LNS includes those attributes only in the accounting records it sends to the
RADIUS server. In the Access-Request messages, they can be used to correlate on the RADIUS server
the session from the LAC to the LNS.
137
The LAC supports RADIUS-initiated mirroring, which creates secure policies based on certain RADIUS
VSAs, and uses RADIUS attributes to identify a subscriber whose traffic is to be mirrored. (This feature is
not supported for an LNS configured on an MX Series router.)
The LAC and the LNS support unified ISSU. When an upgrade is initiated, the LAC completes any L2TP
negotiations that are in progress but rejects any new negotiations until the upgrade has completed. No
new tunnels or sessions are established during the upgrade. Subscriber logouts are recorded during the
upgrade and are completed after the upgrade has completed.
L2TP Terminology
Term Description
Call A connection (or attempted connection) between a remote system and the LAC.
LAC L2TP access concentrator (LAC)—A node that acts as one side of an L2TP tunnel
endpoint and is a peer to the LNS. The LAC sits between an LNS and a remote
system and forwards packets to and from each.
LNS L2TP network server (LNS)—A node that acts as one side of an L2TP tunnel
endpoint and is a peer to the LAC. The LNS is the logical termination point of a
PPP connection that is being tunneled from the remote system by the LAC.
Peer In the L2TP context, either the LAC or LNS. The LAC’s peer is an LNS, and vice
versa.
Proxy PPP pre-authentication performed by the LAC on behalf of the LNS. The proxy
authentication data is sent by the LAC to the LNS containing attributes such as authentication
type, authentication name, and authentication challenge. The LNS responds
with the authentication results.
138
Term Description
Proxy LCP Link Control Protocol (LCP) negotiation that is performed by the LAC on behalf
of the LNS. The proxy is sent by the LAC to the LNS containing attributes such
as the last configuration attributes sent and received from the client.
Remote system An end system or router attached to a remote access network, which is either
the initiator or recipient of a call.
Session A logical connection created between the LAC and the LNS when an end-to-
end PPP connection is established between a remote system and the LNS.
Tunnel A connection between the LAC-LNS pair consisting of a control connection and
0 or more L2TP sessions.
L2TP Implementation
IN THIS SECTION
When the router has established destinations, tunnels, and sessions, you can control the L2TP traffic.
Making a change to a destination affects all tunnels and sessions to that destination; making a change to
a tunnel affects all sessions in that tunnel. For example, closing a destination closes all tunnels and
sessions to that destination.
The router acting as the LAC creates destinations, tunnels, and sessions dynamically, as follows:
2. The router and the client exchange Link Control Protocol (LCP) packets. The LAC negotiates on
behalf of the LNS; this is known as proxy LCP.
3. The LAC authenticates the client on behalf of the LNS; this is known as proxy authentication. By
using either a local database related to the domain name or RADIUS authentication, the router
determines either to terminate or to tunnel the PPP connection.
4. If the router discovers that it should tunnel the session, it does the following:
When a shared secret is configured in either the tunnel profile or the RADIUS attribute Tunnel-
Password [69]—depending on which method is used to configure the tunnel—the secret is used to
authenticate the tunnel during the establishment phase. The LAC includes the Challenge AVP in
the SCCRQ message sent to the LNS. The LNS returns the Challenge Response AVP in the SCCRP
message. If the response from the LNS does not match the value expected by the LAC, then
tunnel authentication fails and the tunnel is not established.
5. The router forwards the results of the LCP negotiations and authentication to the LNS.
A PPP connection now exists between the client and the LNS.
NOTE: The router discards received packets if the size of the variable-length, optional offset pad
field in the L2TP header is too large. The router always supports packets that have an offset pad
field of up to 16 bytes, and may support larger offset pad fields, depending on other information
in the header. This restriction is a possible, although unlikely, cause of excessive discarding of
L2TP packets.
140
NOTE: When the LAC terminates a PPP session, it generates a PPP disconnect cause and
includes this information in the PPP Disconnect Cause Code (AVP 46) when it sends a Call-
Disconnect-Notify (CDN) message to the LNS. The code value is 0, which indicates a global error
with no information available.
1. The LAC initiates a tunnel with the router acting as the LNS.
2. The LNS verifies that a tunnel with this LAC is valid: the destination is configured, the hostname and
the tunnel password are correct.
4. The LAC sets up a session and initiates a session request to the LNS.
5. The LNS uses a static interface or creates a dynamic interface to anchor the PPP session.
6. If they are enabled and present, the LNS accepts the proxy LCP and the proxy authentication data
and passes them to PPP.
7. PPP processes the proxy LCP, if it is present, and, if the proxy LCP is acceptable, places LCP on the
LNS in opened state without renegotiation of LCP.
8. PPP processes the proxy authentication data, if it is present, and passes the data to AAA for
verification. (If the data is not present, PPP requests the data from the peer.)
NOTE: When the proxy LCP is not present or not acceptable, the LNS negotiates LCP with
the peer. When LCP renegotiation is enabled on the LNS, the LNS ignores any pre-negotiated
LCP parameters and renegotiates both the LCP parameters and PPP authentication with the
PPP client.
L2TP peers maintain a queue of control messages that must be sent to the peer device. After the local
peer (LAC or LNS) sends a message, it waits for a response from the remote peer. If a response is not
received, the local peer retransmits the message. This behavior allows the remote peer more time to
respond to the message.
You can control the retransmission behavior in the following two ways:
• Retransmission interval—You can configure how long the local peer waits for the first response to a
control message. If a response is not received within the first timeout interval, then the
retransmission timer doubles the interval between each successive retransmission up to a maximum
of 16 seconds. Increasing the interval gives the remote peer more time to respond, but also spends
more resources on a potentially unavailable peer. Include the minimum-retransmission-interval
statement at the [edit services l2tp tunnel] hierarchy level.
The local peer continues retransmitting the control message until one of the following occurs:
If the maximum count is reached and no response has been received, the tunnel and all its sessions are
cleared.
NOTE: Reaching the maximum interval of 16 seconds does not halt retransmissions. The local
peer continues to wait 16 seconds after each subsequent retransmission.
• Example 1—The retransmission count is three and the minimum retransmission interval is 1 second.
3. The local peer retransmits the control message. This is the first retransmission.
142
4. The local peer waits 2 seconds, but receives a response before the interval expires.
• Example 2—The retransmission count is two and the minimum retransmission interval is 8 seconds.
3. The local peer retransmits the control message. This is the first retransmission.
5. The local peer retransmits the control message. This is the second retransmission.
6. The local peer again waits 16 seconds, because the interval cannot increase beyond 16, but
receives no response.
7. Retransmission stops because the maximum retransmission count of two was reached.
You can control the retransmission of unacknowledged L2TP control messages by configuring how many
times the local peer retransmits the message and how long it waits for a response before retransmission.
L2TP peers maintain a queue of control messages that must be sent to the peer device. After the local
peer (LAC or LNS) sends a message, it waits for a response from the remote peer. If a response is not
received within the minimum retransmission interval, the local peer retransmits the message and waits
for double the retransmission interval. Each time it retransmits the message, the peer doubles how long
it waits, up to a maximum of 16 seconds.
If no response is received, the local peer continues to send the message until the number of
retransmissions matches the retransmission count. In this case, retransmissions stop and the tunnel and
all its sessions are cleared.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support these
statements, we recommend that you explicitly unconfigure the feature by including the no
retransmission-count-established statement and the no retransmission-count-non-established
statement at the [edit services l2tp tunnel] hierarchy level.
143
BEST PRACTICE: During a unified in-service software upgrade (unified ISSU) on an MX Series
router configured as the LAC, the LAC does not respond to control messages from the LNS. This
can result in dropping LAC L2TP sessions. You can avoid this situation by ensuring that the
maximum retransmission count on the LNS is set to 16 or higher.
For example, the following configuration specifies that established tunnels have a maximum
retransmission count of three and a minimum retransmission interval of two seconds:
With this sample configuration, the following sequence applies to each control message sent by the LAC
or LNS:
1. The local peer sends the control message and waits for a response from the remote peer.
144
2. If the response is not received within the minimum interval of 2 seconds, the local peer retransmits
the message. This is the first retransmission.
3. If the response is not received within 4 seconds, the local peer retransmits the message. This is the
second retransmission.
4. If the response is not received within 8 seconds, the local peer retransmits the message. This is the
third and final retransmission, because the maximum count has been reached.
5. If the response is not received within 16 seconds, the tunnel and all its sessions are cleared.
By default, SNMP polling is disabled for L2TP statistics. As a consequence, the L2TP tunnel and global
counters listed in Table 10 on page 144 have a default value of zero.
jnxL2tpTunnelStatsDataTxPkts Tunnel
jnxL2tpTunnelStatsDataRxPkts Tunnel
jnxL2tpTunnelStatsDataTxBytes tunnel
jnxL2tpTunnelStatsDataRxBytes Tunnel
jnxL2tpStatsPayloadRxOctets Global
jnxL2tpStatsPayloadRxPkts Global
jnxL2tpStatsPayloadTxOctets Global
jnxL2tpStatsPayloadTxPkts Global
You can enable collection of these statistics by including the enable-snmp-tunnel-statistics statement at
the [edit services l2tp] hierarchy level. When enabled, the L2TP process polls for these statistics every
145
30 seconds for 1000 sessions. The potential age of the statistics increases with the number of
subscriber sessions; the data is refreshed more quickly as the number of sessions decreases. For
example, with 60,000 sessions, none of these statistics can be more than 30 minutes old.
BEST PRACTICE: The system load can increase when you enable these counters and also use
RADIUS interim accounting updates. We recommend you enable these counters when you are
using only SNMP statistics.
IN THIS SECTION
Purpose | 145
Action | 146
Purpose
BEST PRACTICE: The all option is not intended to be used as a means to perform a bulk logout
of L2TP subscribers. We recommend that you do not use the all option with the clear services
l2tp destination, clear services l2tp session, or clear services l2tp tunnel statements in a
146
production environment. Instead of clearing all subscribers at once, consider clearing subscribers
in smaller group, based on interface, tunnel, or destination end point.
Action
• To display a summary of L2TP tunnels, sessions, errors, and control and data packets:
• To clear statistics for all L2TP tunnels belonging to a destination, tunnels belonging to a specified
local-gateway address, and tunnels belonging to a specified peer-gateway address:
• To clear all L2TP sessions, the session with a specified local session ID, or sessions associated with
the local gateway specified by an IP address or name:
• To clear statistics for all L2TP sessions, the session with a specified local session ID, or sessions
associated with the local gateway specified by an IP address or name:
• To clear all L2TP tunnels, the tunnel with a specified local tunnel ID, or tunnels associated with the
local gateway specified by an IP address or name:
• To clear statistics for all L2TP tunnels, the tunnel with a specified local tunnel ID, or tunnels
associated with the local gateway specified by an IP address or name:
RELATED DOCUMENTATION
IN THIS SECTION
Tunnel Switching Actions for L2TP AVPs at the Switching Boundary | 153
Using the Same L2TP Tunnel for Injection and Duplication of IP Packets | 166
IN THIS SECTION
L2TP tunnel switching, also known as L2TP multihop, simplifies the deployment of an L2TP network
across multiple domains. A router that lies between a LAC and an LNS is configured as an L2TP tunnel
switch (LTS)—sometimes referred to simply as a tunnel switch or a tunnel switching aggregator (TSA)—as
149
shown in Figure 13 on page 149. The LTS is configured as both an LNS and a LAC. When a remote LAC
sends encapsulated PPP packets to the LNS configured on the LTS, the LTS can forward or redirect the
packets through a different tunnel to a different LNS beyond the LTS. The logical termination point of
the original L2TP session is switched to a different endpoint.
For example, in the network shown in Figure 13 on page 149, packets from the subscriber provisioned
by service provider A are initially targeted at the LNS configured on the LTS. The LTS might redirect
those packets to LNS1.
L2TP tunnel switching simplifies network configuration when the administrative domain of a LAC is
different from that of the desired LNS. For example:
• The LTS acts as the LNS for multiple LACs. The individual LACs do not have to have the
administrative control or capability required to identify the most appropriate LNS on which to
terminate their sessions. The LTS performs that function is centralized in the LTS.
• The LTS acts as the LAC for multiple LNSs. When a new remote LAC is added to an ISP’s network,
the ISP does not have to reconfigure its LNS routers to accommodate the new LAC, because they
connect to the LAC on the LTS.
150
In a Layer 2 wholesale network, the wholesaler can use L2TP tunnel switching to create a flatter
network configuration that is easier to manage. The wholesaler bundles Layer 2 sessions from a LAC
that are destined for different ISPs—and therefore different LNSs—onto a single L2TP tunnel. This
configuration enables a common L2TP control connection to be used for the LAC.
Figure 14 on page 150 shows an example of L2TP tunnel switching for incoming calls with the following
sequence of events:
2. The LAC creates the first L2TP tunnel to the LNS configured on the LTS and the first L2TP session to
carry the encapsulated PPP packets.
3. During authentication of this first session, the LTS determines whether to retunnel the session to an
LNS beyond the LTS, based on the presence or absence of a tunnel switch profile configured on the
LTS.
The tunnel switch profile can be a default profile or it can be applied by the RADIUS server, a domain
map configuration, or a tunnel group configuration.
4. If a tunnel switch profile is configured, the LTS creates a second tunnel (if it does not already exist) to
the LNS beyond the LTS as specified in the profile and creates the second session in this tunnel.
• In your RADIUS server configuration, returned in the Tunnel Switch-Profile VSA (26-91)
You can configure more than one of these methods of application. When multiple tunnel switch profiles
are present, the following order of precedence establishes which profile the LTS uses; the order is from
highest (RADIUS) to lowest (default profile):
1. RADIUS VSA 26-91 > domain map > tunnel group > global tunnel switch profile
The tunnel switch profile must also reference a tunnel profile. This tunnel profile specifies the
characteristics of the second tunnel, to which the subscriber packets are switched.
Tunnel switched sessions are terminated on the LTS when any of the following happens:
• Either the LAC or LNS interface on the LTS receives a Call-Disconnect-Notify (CDN) message (Table
11 on page 151).
Both the first and second sessions are terminated because the LTS relays the CDN to the interface
that did not receive the CDN. The disconnect cause is the same for both sessions.
The LTS does not relay the StopCCN message, because a given tunnel can contain both switched and
nonswitched sessions. Another reason in a wholesale scenario is that the tunnel ending on the LNS
on the LTS can contain sessions from LACs from different providers. Instead, the LTS sends a CDN
message to the interface that did not receive the StopCCN to terminate the tunnel-switched session.
This CDN relays the error code carried in the StopCCN.
Table 13 on page 152 lists the actions taken when an administrative clear command is issued on the LTS.
Table 13: LAC, LNS, and LTS Actions Taken for Switched Tunnels in Response to Administrative clear
Commands
clear services l2tp Clear the destination and For each switched session in a tunnel to the
destination all associated tunnels and destination, clear the corresponding mapped
sessions. switched session by sending it a CDN
message with the cause set to
Administrative.
Table 13: LAC, LNS, and LTS Actions Taken for Switched Tunnels in Response to Administrative clear
Commands (Continued)
clear services l2tp Clear the session. Clear the corresponding mapped switched
session session for this session by sending it a CDN
message with the cause set to
Administrative.
clear services l2tp Clear the tunnel and all its For each switched session in the tunnel, clear
tunnel sessions. the corresponding mapped switched session
by sending it a CDN message with the cause
set to Administrative.
When L2TP tunnel switching redirects packets to a different LNS, it performs one of the following
default actions at the switching boundary for each AVP carried in the L2TP messages:
• relay—L2TP transparently forwards the AVP in the switched packet with no alteration.
• regenerate—L2TP ignores the received AVP that was negotiated by the first tunnel and session. It
generates a new AVP for the second session based on the local policy at the LTS and sends this AVP
in the switched packet. The local policy may or may not use the value for the AVP received during
negotiation for the first session.
Table 14 on page 154 lists the default action for each AVP. Mandatory AVPs are always included in the
L2TP messages from the LAC; optional AVPs might be included in the messages.
You can optionally override the default action taken at the switching boundary for the Bearer Type AVP
(18), Calling Number AVP (22), or Cisco NAS Port Info AVP (100). You can configure any of these three
154
AVPs to be dropped from the switched packets or regenerated, or you can restore the default relay
action.
NOTE: L2TP AVPs that have their attribute values hidden are always regenerated at the
switching boundary. The value is decoded and sent in clear text when the packet is forwarded to
the remote LNS.
Table 14: Default Action for Handling L2TP AVPs at the Switching Boundary
AVP Name (Number) AVP Type L2TP Message Type Default Action
Table 14: Default Action for Handling L2TP AVPs at the Switching Boundary (Continued)
AVP Name (Number) AVP Type L2TP Message Type Default Action
Table 14: Default Action for Handling L2TP AVPs at the Switching Boundary (Continued)
AVP Name (Number) AVP Type L2TP Message Type Default Action
Table 14: Default Action for Handling L2TP AVPs at the Switching Boundary (Continued)
AVP Name (Number) AVP Type L2TP Message Type Default Action
When LCP
renegotiation is
enabled with the lcp-
negotiation statement
in the client profile on
the LNS, authentication
is also renegotiated and
the AVP is regenerated
rather than relayed.
Table 14: Default Action for Handling L2TP AVPs at the Switching Boundary (Continued)
AVP Name (Number) AVP Type L2TP Message Type Default Action
L2TP tunnel switching enables a router configured as an LTS to forward PPP packets carried on one
L2TP session to a second L2TP session terminated on a different LNS. To configure L2TP tunnel
switching, you must define a tunnel switch profile and then assign that profile.
You can configure tunnel switch profiles for all sessions globally, all sessions in a tunnel group, all
sessions in a domain or in your RADIUS server configuration to be returned in the RADIUS Tunnel
Switch-Profile VSA (26-91). The order of precedence for tunnel switch profiles from various sources is as
follows:
• RADIUS VSA 26-91 > domain map > tunnel group > global tunnel switch profile
[edit access]
user@host# edit tunnel-switch-profile profile-name
2. (Optional) Override the default actions taken for certain L2TP AVPs at the switching boundary.
3. Specify the tunnel profile that defines the tunnel to which the subscriber traffic is switched.
NOTE: This step is not required for a tunnel switch profile specified in the Tunnel Switch-
Profile VSA (26-91).
4. (Optional) Apply the profile as a global default profile to switch packets from all incoming sessions
from the LAC.
5. (Optional) Apply the profile as part of a tunnel group to switch packets from all sessions in the tunnel
group.
NOTE: The tunnel group is part of the LTS configuration that enables it to act as the LNS for
the original sessions from the LAC.
A tunnel group with a tunnel switch profile must also contain a dynamic profile, because
tunnel switching supports only dynamic subscribers.
6. (Optional) Apply the profile as part of a domain map to switch packets from all sessions that are
associated with the domain.
NOTE: A domain map cannot have both a tunnel switch profile and a tunnel profile. You must
remove one if you add the other.
7. (Optional) Apply the profile by means of the Tunnel-Switch-Profile VSA [26–91] in the RADIUS
Access-Accept message returned when the session from the LAC is authenticated. Refer to the
documentation for your RADIUS server to determine how to configure this method.
NOTE: A tunnel switch profile specified by a RADIUS server in the Tunnel Switch-Profile VSA
(26-91) takes precedence over the tunnel switch profile specified in the CLI configuration. If
the Tunnel-Group VSA (26–64) is received in addition to the Tunnel Switch-Profile VSA
(26-91), the Tunnel Switch-Profile VSA (26-91) takes precedence over the Tunnel-Group VSA
(26-64), ensuring that the subscribers are tunnel switched rather than LAC tunneled.
161
For example, consider the following configuration. which creates three tunnel switch profiles, l2tp-
tunnel-switch-profile, lts-profile-groupA, and lts-profile-example-com:
The profile l2tp-tunnel-switch-profile is applied as the global default. When packets are switched
according to this profile, the values for the Bearer Type AVP (18) and Calling Number AVP (22) in the
L2TP packets are regenerated based on local policy at the L2TP tunnel switch and then sent with the
packets. The Cisco NAS Port Info AVP (100) is simply dropped. Finally, l2tp-tunnel-profile1 provides the
configuration characteristics of the tunnel to which the traffic is switched.
Tunnel switch profile lts-profile-groupA is applied by means of a tunnel group, groupA; it specifies a
different tunnel profile, l2tp-tunnel-profile2 and it does not override any AVP actions. Tunnel switch
profile lts-profile-example.com is applied by means of a domain map for the example.com domain; it
specifies a different tunnel profile, l2tp-tunnel-profile3 and it does not override any AVP actions.
You can configure the L2TP receive window size for an L2TP tunnel. The receive window size specifies
the number of packets a peer can send before waiting for an acknowledgment from the router.
162
By default, the receive window size is set to four packets. If the receive window size is set to its default
value, the router does not send the Receive Window Size AVP, AVP 10, in its first packet sent during
tunnel negotiation to its peer.
You can configure the LAC or the LNS to specify how long a tunnel without any sessions remains active.
The idle timer starts when the last session on the tunnel is terminated. When the timer expires the
tunnel is disconnected. This idle timeout frees up resources otherwise consumed by inactive tunnels.
If you set the idle timeout value to zero, the tunnel is forced to remain active indefinitely after the last
session is terminated until one of the following occurs:
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, we recommend that you explicitly unconfigure the feature by including the no idle-
timeout statement at the [edit services l2tp tunnel] hierarchy level.
You can configure the LAC or the LNS to specify how long the router attempts to maintain dynamic
destinations, tunnels, and sessions after they have been destroyed. This destruct timeout aids debugging
and other analysis by saving underlying memory structures after the destination, tunnel, or session is
terminated. Any specific dynamic destination, tunnel, or session may not be maintained for this entire
time period if the resources must be reclaimed early to allow new tunnels to be established.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, we recommend that you explicitly unconfigure the feature by including the no
destruct-timeout statement at the [edit services l2tp] hierarchy level.
When multiple sets of tunneling parameters are available, L2TP uses a selection process to choose the
best tunnel for subscriber traffic. As part of this selection process, L2TP locks out destinations it cannot
connect to when a subscriber tries to reach a domain. L2TP places the destination on the destination
lockout list and excludes the destination from consideration for a configurable period called the
destination lockout timeout.
By default, the destination lockout timeout is 300 seconds (5 minutes). You can configure a value from
60 through 3600 seconds (1 minute through 1 hour). When the lockout timeout expires, L2TP assumes
that the destination is now available and includes the destination when performing the tunnel selection
process. The destination lockout period is a global value and is not individually configurable for
particular destinations, tunnels, or tunnel groups.
NOTE: In general, a locked destination cannot be used until the lockout timer expires. However,
when L2TP performs the tunnel selection process, in some circumstances it clears the lockout
timer for a locked destination. See Selection When Failover Between Preference Levels Is
164
Configured and Selection When Failover Within a Preference Level Is Configured in "LAC Tunnel
Selection Overview" for detailed information about the selection process.
BEST PRACTICE: Configure the lockout timeout to be equal to or shorter than the destruct
timeout. Otherwise, the destruct timeout expires before the lockout timeout. In this event, the
locked-out destination is destroyed and can be subsequently returned to service before the
lockout timeout expires, thus negating the effectiveness of the lockout timeout.
The show services l2tp destination lockout command displays the destination lockout list and for each
destination indicates how much time remains before its timeout expires. The show services l2tp
destination detail command indicates for each destination whether it is locked and waiting for the
timeout to expire or not locked.
When a PPP subscriber tries to log in to a domain, L2TP selects a tunnel associated with a destination in
that domain and attempts to access the destination. If the connection attempt fails, L2TP places the
destination on the destination lockout list. Destinations on this list are excluded from being considered
for subsequent connections for a configurable period called the destination lockout timeout.
You can issue the request services l2tp destination unlock command for a particular destination to
remove it from the destination lockout list. The result is that this destination is immediately available for
consideration when a subscriber logs in to the associated domain.
For administrative purposes, you can set the state of an L2TP destination or tunnel to drain. This
prevents the creation of new sessions, tunnels, and destinations at L2TP LAC and LNS.
You can configure L2TP drain at the global level or for a specific destination or tunnel. If the feature is
configured at global L2TP level, then no new destination, tunnel, or session can be created. If the feature
is configured for a specific destination, no new tunnel or session can be created at that destination.
Similarly, if the feature is configured for a specific tunnel, no new sessions can be assigned to that
tunnel, but new destinations and tunnels can be created.
[edit services]
user@host# set l2tp drain
[edit services]
user@host# set l2tp destination address ip-address drain
user@host# set l2tp destination address ip-address routing-instance routing-instance-name drain
user@host# set l2tp destination name name drain
[edit services]
user@host# set l2tp tunnel name name drain
user@host# set l2tp tunnel name name address ip-address drain
user@host# set l2tp tunnel name name address ip-address routing-instance routing-instance-name
drain
NOTE: The tunnel name is the locally assigned name of the tunnel in the following format:
destination-name/tunnel-name or tunnel-name
When only the tunnel-name is provided, then you must include the address ip-address
statement to identify the destination for the tunnel by.
166
When this feature is configured, the command output of show services l2tp summary, show services
l2tp destination, and show services l2tp tunnel displays the state of the L2TP session, destination, and
tunnel as Drain.
Using the Same L2TP Tunnel for Injection and Duplication of IP Packets
You can configure the same L2TP tunnel that is used for subscriber secure policy mirroring to be used
for duplication of packets. Packets duplicated are used to inject traffic towards the customer or towards
the network. Injection or transmission of packets is supported for all subscriber access modes. A single
L2TP tunnel is used for both transmission of packets and duplication of packets. A port or interface that
is configured for duplication of packets on one side of an L2TP tunnel is connected to the other tunnel
endpoint. The other endpoint of the tunnel can send IP packets using the L2TP tunnel to the port or
interface configured for packet duplication, and the IP packets received at that interface can be either
forwarded to the customer or sent as though it has been received form the customer.
The remote tunnel endpoint sends an IP tunnel packet that contains an Ethernet MAC address in the
payload. If the destination MAC address of the payload packet contains the MAC address of the router,
the Ethernet packet is sent in the outgoing direction towards the network, and it is processed and
forwarded as though it is received on the customer port. If the source MAC address of the payload
packet contains the MAC address of the router, the Ethernet packet is transmitted in the outgoing
direction towards the customer port. If the tunnel does not contain the receive-cookie configured,
packet injection does not happen. In such a case, any received tunnel packet is counted and dropped in
the same manner in which packets that arrive with a wrong cookie are counted and dropped.
To configure the packet to be duplicated and sent towards the customer or the network (based on the
MAC address in the Ethernet payload), include the decapsulate l2tp output-interface interface-name
cookie l2tpv3-cookie statement at the [edit firewall family family-name filter filter-name term term-
name then] hierarchy level. You can also configure a counter for the duplicated or decapsulated L2TP
packets by including the count counter-name statement at the [edit firewall family family-name filter
filter-name term term-name then] hierarchy level
RELATED DOCUMENTATION
IN THIS SECTION
Configuring How the LAC Responds to Address and Port Changes Requested by the LNS | 168
Globally Configuring the LAC to Interoperate with Cisco LNS Devices | 172
• See "Configuring the L2TP LAC Tunnel Selection Parameters" on page 205.
• See "Configuring Weighted Load Balancing for LAC Tunnel Sessions" on page 206.
• See "Configuring Destination-Equal Load Balancing for LAC Tunnel Sessions" on page 207.
• See "Configuring LAC Tunnel Selection Failover Within a Preference Level" on page 205.
3. (Optional) Configure the LAC to not send Calling Number AVP 22 to the LNS.
See "Preventing the LAC from Sending Calling Number AVP 22 to the LNS" on page 245.
4. (Optional) Specify the method for setting the transmit and receive connect speeds.
See "Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS" on page 237.
5. (Optional) Configure whether the L2TP failover protocol is negotiated or the silent failover method
is used for resynchronization.
See "Configuring the L2TP Peer Resynchronization Method" on page 320.
6. (Optional) Specify the format for the tunnel name.
See "Setting the Format for the Tunnel Name" on page 201.
7. (Optional) Specify when and how many times L2TP retransmits unacknowledged control messages.
See "Configuring Retransmission Attributes for L2TP Control Messages" on page 142.
168
8. (Optional) Specify how long a tunnel can remain idle before being torn down.
See "Setting the L2TP Tunnel Idle Timeout" on page 162.
9. (Optional) Specify the L2TP receive window size for the L2TP tunnel. The receive window size
specifies the number of packets a peer can send before waiting for an acknowledgment from the
router.
See "Setting the L2TP Receive Window Size" on page 161.
10. (Optional) Specify how long the router retains information about terminated dynamic tunnels,
sessions, and destinations.
See "Setting the L2TP Destruct Timeout" on page 163.
11. (Optional) Specify how the LAC handles IP address or UDP port change requests.
See "Configuring How the LAC Responds to Address and Port Changes Requested by the LNS" on
page 168.
12. (Optional) Configure all tunnels on the LAC for interoperation with Cisco LNS devices.
See "Globally Configuring the LAC to Interoperate with Cisco LNS Devices" on page 172.
13. (Optional) Specify that the LAC sends information to the LNS about subscriber access lines.
See "Configuring the Reporting and Processing of Subscriber Access Line Information" on page 240.
14. (Optional) Configure the LAC to create the IPv6 address family (inet6) when establishing a tunnel
for subscribers, enabling the application of IPv6 firewall filters.
See "Enabling the LAC for IPv6 Services" on page 207.
15. (Optional) Prevent the creation of new sessions, destinations, or tunnels for L2TP.
See "Configuring L2TP Drain" on page 165.
16. (Optional) Enable SNMP statistics counters.
See "Enabling Tunnel and Global Counters for SNMP Statistics Collection" on page 144.
17. (Optional) Configure trace options for troubleshooting the configuration.
See "Tracing L2TP Events for Troubleshooting" on page 323.
An LNS can use the SCCRP message that it sends the LAC when a tunnel is being established to request
a change in the destination IP address or UDP port that the LAC uses to communicate with the LNS. By
default, the LAC accepts the request and makes the change. You can use the tx-address-change
statement to configure one of the following methods for the LAC to handle these change requests for all
tunnels:
• accept—The LAC accepts the change from the LNS. It sends all subsequent packets to and receives
packets from the new IP address or UDP port.
169
• ignore—The LAC continues to send packets to the original address or port, but accepts packets from
the new address or port.
• reject—The LAC sends a StopCCN message to the original address or port and then terminates the
connection to that LNS.
The LAC accepts a change in address or port only once, when the tunnel is being established. Tunnels
that are already established are not affected. The LAC drops any L2TP control packets containing
change requests received at any other time, or in any packet other than an SCCRP message.
To configure how the LAC handles change requests for the IP address, the UDP port, or both:
• (Optional) Configure the LAC to accept all change requests. This is the default behavior.
• (Optional) Configure the LAC to ignore change requests only for the IP address.
• (Optional) Configure the LAC to ignore change requests only for the UDP port.
• (Optional) Configure the LAC to reject change requests only for the IP address.
• (Optional) Configure the LAC to reject change requests only for the UDP port.
For example, the following configuration causes the LAC to ignore requests to change the UDP port, but
to reject requests to change the IP address:
NOTE: Conflicting configurations are not allowed and fail the configuration commit check. You
cannot For example, the following configuration fails, because it specifies that UDP port changes
are ignored, but that all changes are rejected:
Use the show services l2tp summary command to display the current behavior of the LAC:
Depending on the configuration, this command displays one of the following outputs:
In some network environments, the LAC may need to interoperate with an LNS configured on a device
from another vendor that does not run Junos OS. Interoperation with Cisco Systems devices requires
the LAC to communicate a NAS port type, but the LAC does not provide this information by default.
You can enable interoperation with Cisco Systems devices by configuring the NAS port method as cisco-
avp, which causes the LAC to include the Cisco Systems NAS Port Info AVP (100) when it sends an
incoming call request (ICRQ) to the LNS. The AVP includes information that identifies the NAS port and
indicates whether the port type is ATM or Ethernet.
You can configure the NAS port method globally for all tunnels on the LAC or in a tunnel profile for only
the tunnels instantiated by the profile.
172
You can also include the Tunnel-Nas-Port-Method VSA [26–30] in your RADIUS server configuration
with the value set to 1 to indicate Cisco Systems CLID. In this case, RADIUS can override the global
value by modifying or creating a tunnel profile. The RADIUS configuration has precedence over the
tunnel profile configuration, which in turn has precedence over the global LAC configuration.
If the LNS receiving the AVP is an MX Series router instead of a Cisco Systems device, the LNS simply
ignores the AVP, unless the LNS is configured for L2TP tunnel switching. In that case, the LNS preserves
the value of the AVP and passes it along when it switches tunnels for the LAC.
Cisco LNS devices require from the LAC both the physical NAS port number identifier and the type of
the physical port, such as Ethernet or ATM. By default, the LAC does not include this information. You
can globally configure the LAC to provide this information by including the NAS Port Info AVP (100) in
the ICRQ that it sends to the LNS. This configuration enables the LAC to interoperate with a Cisco LNS.
To globally configure the LAC to include the NAS Port Info AVP:
NOTE: This global configuration for the LAC can be overridden by the configuration in a tunnel
profile or RADIUS.
Use the show services l2tp tunnel extensive command to display the current behavior of the LAC:
RELATED DOCUMENTATION
IN THIS SECTION
Limiting the Number of L2TP Sessions Allowed by the LAC or LNS | 198
IN THIS SECTION
Selection When Distributing the Session Load Across Multiple LNSs | 185
When a user logs in to a domain, the PPP client contacts the LAC establish a connection. The LAC has to
find a destination in the domain and a tunnel that can reach it. The association between destinations,
tunnels, and domains is provided by a tunnel profile either in a domain map in the subscriber’s access
profile or in the Tunnel-Group attribute (VSA 26-64) received from a RADIUS server. The RADIUS
attribute takes precedence over a profile specified in a domain map. The tunnel profile includes a list of
tunnels; each tunnel is associated with a destination IP address and with a tunnel preference level.
• Up to eight levels of tunnel preference. The preference level determines the order in which the LAC
attempts to use an existing tunnel (or establish a new one) to a destination in the user’s requested
domain.
NOTE: Zero (0) is the highest level of preference; this is the most-preferred level.
If two tunnels both reach valid destinations within a domain, the LAC first selects the tunnel with the
highest preference level. For example, when Tunnel A has a preference level of 1 and Tunnel B has a
preference level of 4, the LAC attempts to use Tunnel A first.
When the LAC determines that a PPP session should be tunneled, it selects a tunnel from the set of
tunnels associated with either the PPP user or the PPP user’s domain by a tunnel profile.
175
• Failover between preference levels—By default, when a tunnel to a valid destination is not selected
within a preference level, the selection process fails over to the next level; that is, the LAC drops
down to the next lower level to continue the search for a suitable tunnel. See "Selection When
Failover Between Preference Levels Is Configured" on page 177 for more information.
• Failover within a preference level—In this case, the LAC does not limit its attempts to establish a
session to only a single tunnel at a preference level. If the attempt fails through the selected tunnel,
the selection process fails over within that same level by selecting another suitable tunnel to a valid
destination. The LAC continues its connection attempts within the level until no more tunnels to a
valid destination are available at that level. Then the LAC drops down to the next lower level to
continue the search. See "Selection When Failover Within a Preference Level Is Configured" on page
183 for more information.
• Maximum sessions per tunnel—When the maximum number of sessions allowed per tunnel is
configured, the LAC takes that setting into account during the tunnel selection process. The
maximum number of sessions per tunnel can be configured by means of the RADIUS Tunnel-Max-
Sessions VSA [26-33] or by including the max-sessions statement in a tunnel profile.
When a randomly selected tunnel has a current session count equal to its maximum session count,
the LAC does not attempt to connect to a destination with that tunnel. Instead, it selects an alternate
tunnel from the set of tunnels at that preference level that have valid destinations in the domain. If
no such tunnels exist at the current preference level, the LAC drops to the next preference level to
make the selection. This process is consistent, regardless of which failover scheme is currently
running on the LAC.
When the maximum number of sessions is not configured for a tunnel, then that tunnel has no upper
limit on the number of sessions it can support. By default, the maximum sessions value is 0 (zero),
which allows unlimited sessions in the tunnel.
Take the following information into consideration to understand the tunnel and destination selection
process and failover:
176
• More than one tunnel may be able to reach a destination, and those tunnels can have the same
preference level or different preference levels.
• The tunnel selected to establish the subscriber session may itself already be established. meaning
that it has currently active sessions. Alternatively, the LAC might have to establish a new tunnel to
the destination if no tunnel capable of reaching the destination is already established.
• It is reachable by a tunnel that has not met its maximum session limit.
• It has not yet been contacted for the current subscriber login request.
• A locked destination is one for which the destination lockout timer is running. Locked destinations
are placed on a lockout list until the timer expires or is cleared (reset to zero). Destinations on the list
cannot be contacted to establish a session.
• An unlocked destination is one for which the destination lockout timer is zero.
• When the LAC discovers valid destinations that are locked, it places them on the
DestinationsLockedNotContacted list, which is different than the lockout list that includes all locked-
out destinations. The DestinationsLockedNotContacted list includes only locked destinations that
the LAC has not yet attempted to contact for the current, in-progress subscriber login. The
DestinationsLockedNotContacted list does not include destinations that the LAC locks out after it
has attempted and failed to establish a connection.
• You can use the clear services l2tp destination lockout command to manually clear all locked
destinations or only locked destinations that match the specified local or remote gateway address.
You might use the command if, for example, you want to clear a specific destination so that it gets
priority within a preference level.
• The failover behavior that is part of the tunnel selection process applies only when the destination is
unreachable for one of the following reasons:
• The LNS fails to return an SCCRP message in response to the SCCRQ message from the LAC after
the maximum number of retransmission attempts.
• The tunnel is established, but the LNS does not return an ICRP message in response to the ICRQ
from the LAC after the maximum number of retransmission attempts.
• The tunnel is established, but the LNS sends a CDN message while the LAC is attempting to
establish the session with the LNS, resulting in the failure of the subscriber login attempt.
177
When a user tries to log in to a domain in a default configuration—that is, when failover within a
preference level and load balancing are not configured—the LAC searches for valid destinations to the
requested domain, starting at the highest tunnel preference level. If no valid destination is found, or the
attempt to connect to a destination fails, the LAC drops down to the next lower level to continue
searching. The search process is the same for all levels except for the lowest:
1. The search begins by identifying tunnels with valid destinations at the preference level from among
all the tunnels specified in the domain’s tunnel profile.
2. All locked, valid destinations are placed on the DestinationsLockedNotContacted list. No attempt is
made to contact any of these destinations.
3. From among the unlocked, valid destinations, the LAC selects one at random and attempts to
connect through the associated tunnel; if the tunnel has no current sessions, then the LAC must
establish the tunnel.
NOTE: Random selection is the default behavior. The behavior is different when weighted
load balancing or destination-equal load balancing is configured. See "Selection When
Distributing the Session Load Across Multiple LNSs" on page 185 for information about load
balancing.
• If the attempt is successful, the LAC reports the successful login to the PPP client. The LAC also
clears all destinations on the DestinationsLockedNotContacted list.
• If the LAC receives no response, it retries the attempt up to the maximum retry number. If the
LAC exhausts the retries without receiving a reply, the attempt is considered unsuccessful and the
LAC marks the destination as unreachable by locking out the destination. It places the destination
on the lockout list and starts the destination lockout timer.
4. What the LAC does next depends on the current preference level.
• If it is not the lowest preference level, then the LAC drops to the next lower preference level and
continues the search process.
• If it is the lowest preference level and the DestinationsLockedNotContacted list is not empty, then
the LAC unlocks all destinations in the DestinationsLockedNotContacted list and jumps back up
to the highest preference level and restarts the search process.
5. When the valid destinations at one level are all locked, what the LAC does next depends on the
current preference level.
• If it is not the lowest preference level, then the LAC drops to the next lower preference level and
continues the search process.
• If it is the lowest preference level, the LAC selects the locked, valid destination with the shortest
remaining lockout time. It clears the lockout timer and attempts to connect to the destination and
establish a session.
• If the attempt is successful, the LAC reports the successful login to the PPP client.
• If the attempt fails and the DestinationsLockedNotContacted list is empty—meaning that all
valid destinations have been attempted—then the LAC reports a failed login to the PPP client.
• If the attempt fails and the DestinationsLockedNotContacted list is not empty, then the LAC
unlocks all destinations in the DestinationsLockedNotContacted list, jumps back up to the
highest preference level, and restarts the search process.
6. When no valid destinations are present, what the LAC does next depends on the current preference
level.
• If it is not the lowest preference level, then the LAC drops to the next lower preference level and
continues the search process.
• If it is the lowest preference level and the DestinationsLockedNotContacted list is not empty, then
the LAC unlocks all destinations in the DestinationsLockedNotContacted list, jumps back up to
the highest preference level, and restarts the process.
7. The search and failover process cycles through the levels until either a session is established or all
valid destinations have been attempted—no destinations remain on the
DestinationsLockedNotContacted list—and the login fails.
179
Figure 15 on page 180 illustrates the possible conditions and decision points that determine the
selection of a destination and corresponding tunnel for the default case, where failover occurs between
tunnel preference levels.
180
Figure 15: Destination and Tunnel Selection Process with Failover Between Preference Levels
181
For example, suppose that the tunnel profile includes the following tunnels, each with a valid
destination:
When a PPP user tries to connect to the domain, the LAC acts as follows:
1. At the highest preference level, 0, the LAC selects Tunnel 1 because it is the only tunnel in the level
with a valid destination. The LAC attempts to reach 192.168.10.10.
2. This connection attempt fails, so the LAC locks out 192.168.10.10. It is not considered again during
this login attempt, and cannot be considered for any login attempt until the destination lockout
timer expires.
3. The LAC drops (fails over) to the next level, preference level 1, to reach a destination for the
domain. The LAC randomly selects between 192.168.22.22 through Tunnel 2 and 192.168.33.33
through Tunnel 3. It selects 192.168.22.22 and attempts to connect through Tunnel 2.
4. The connection attempt to 192.168.22.22 fails, so the LAC locks out 192.168.22.22. It is not
considered again during this login attempt, and cannot be considered for any login attempt until the
destination lockout timer expires.
NOTE: Even though Tunnel 3 has an unlocked, valid destination, the LAC cannot now select
that tunnel to reach 192.168.33.33, because the LAC can make only one attempt to reach a
valid destination each time it searches in a level when the failover method is between
preference levels.
5. The LAC drops to the final (lowest) level in this example, preference level 2. The LAC selects Tunnel
4 because it is the only tunnel in the level with a valid destination. The LAC attempts to reach
192.168.44.44.
6. The connection attempt to 192.168.44.44 also fails, so the LAC locks out 192.168.44.44. It is not
considered again during this login attempt, and cannot be considered for any login attempt until the
destination lockout timer expires.
7. Because this is the lowest level, and the DestinationsLockedNotContacted list is empty, the LAC
rejects the login request from the PPP client.
182
Destinations 192.168.10.10, 192.168.22.22, and 192.168.44.44 were locked out, but not added to
the DestinationsLockedNotContacted list because the LAC locked them out after attempting to
connect. Destination 192.168.33.33 was not contacted, but not added to the
DestinationsLockedNotContacted list because it is not locked out.
8. The client tries to log in again and the LAC repeats the tunnel selection process, starting over at
preference level 0 to check for an unlocked, valid destination, and cycling through the levels as
needed.
9. At preference level 0, 192.168.10.10 is the only valid destination and is still locked out, so the LAC
cannot attempt to connect to the destination. The LAC adds 192.168.10.10 to the
DestinationsLockedNotContacted list and then drops to preference level 1.
NOTE: Remember that the destination lockout timer applies globally, so it persists across
multiple subscriber logins. The DestinationsLockedNotContacted list applies only to a given
subscriber login and does not persist. Even though the LAC contacted 192.168.10.10 for
this subscriber, it was during a previous login attempt. In this login attempt, it cannot contact
the destination because of the lockout, and consequently places the destination on the
DestinationsLockedNotContacted list.
10. At preference level 1, 192.168.22.22 is still locked out, so the LAC adds 192.168.22.22 to the
DestinationsLockedNotContacted list. 192.168.33.33 is still available. The LAC attempts to connect
to 192.168.33.33 through Tunnel 3.
11. This connection attempt fails, so the LAC locks out 192.168.33.33. It is not considered again during
this login attempt, and cannot be considered for any login attempt until the destination lockout
timer expires. The LAC drops to preference level 2.
12. 192.168.44.44 is still locked out, so the LAC adds 192.168.44.44 to the
DestinationsLockedNotContacted list.
13. This is the lowest preference level, but this time the DestinationsLockedNotContacted list is not
empty; it contains 192.168.10.10, 192.168.22.22, and 192.168.44.44. The LAC unlocks all
destinations on the DestinationsLockedNotContacted list and then jumps back to the highest
preference level.
14. At preference level 0, the LAC attempts to connect to 192.168.10.10 because it was unlocked. The
LAC establishes the session and reports the successful login to the PPP client.
Although the LAC does not attempt to contact a destination that is locked out, there is a special case
when the LAC has reached the lowest preference level. The level must have more than one valid
destination and all of them must be locked out. For example, suppose that the tunnel profile includes the
following tunnels, each with a valid destination:
183
• Preference 1, Tunnel 2, 192.168.22.22. The destination is locked out with the lockout timer currently
at 245 seconds.
• Preference 1, Tunnel 3, 192.168.33.33. The destination is locked out with the lockout timer currently
at 180 seconds.
When a PPP user tries to connect to the domain, the LAC acts as follows:
1. At the highest preference level, 0, the LAC selects Tunnel 1 because it is the only tunnel in the level
with a valid destination. The LAC attempts to reach 192.168.10.10.
2. This connection attempt fails, so the LAC locks out 192.168.10.10. It is not considered again during
this login attempt, and cannot be considered for any login attempt until the destination lockout timer
expires.
3. The LAC drops to the next level, preference level 1, to reach a destination for the domain. Both valid
destinations at this level, 192.168.22.22 and 192.168.33.33, are locked out.
5. Because this is the lowest preference level, the LAC determines which destination has a shorter
remaining lockout time. It selects 192.168.33.33 because it has a shorter remaining lockout time
(180 seconds) than 192.168.22.22 (245 seconds). The LAC unlocks 192.168.33.33 and attempts to
connect through Tunnel 3. As a consequence, the LAC also removes 192.168.33.33 from the
DestinationsLockedNotContacted list.
6. The connection attempt is successful and a session is established to 192.168.33.33. The LAC reports
a successful login to the PPP client.
When you configure failover within a preference level, the destination and tunnel selection process is
the same as for the default configuration, with one exception: the LAC is not limited to only one
connection attempt at a preference level.
When the LAC tries to connect to an unlocked, valid destination and is unsuccessful, it locks out that
destination but does not immediately drop down to the next lower level. Instead, if another unlocked,
valid destination is available at the same preference level, the LAC attempts to connect to that
destination.
If the LAC does not connect, then it continues to try to reach a destination within that preference level
until no more unlocked, valid destinations remain to be attempted. At that point the LAC drops down to
184
search at the next lower preference level. At each level, the LAC searches for and attempts to connect to
a valid destination until no unlocked, valid destinations are available.
If the LAC drops down to the lowest preference level and finds no unlocked, valid destinations, the
behavior depends on the DestinationsLockedNotContacted list:
• If the DestinationsLockedNotContacted list is not empty, then the LAC unlocks all destinations in the
DestinationsLockedNotContacted list and jumps back up to the highest preference level and restarts
the search process.
For example, suppose that the tunnel profile specifies the following tunnels and destinations. Load
balancing is not configured. All destinations are valid; all are unlocked except 192.168.3.3. The
preference levels for the tunnels are assigned as follows:
In this example, when a PPP user tries to connect to the domain, the LAC acts as follows:
1. The LAC randomly selects between the two unlocked, valid destinations at preference level 0,
192.168.1.1 through Tunnel 1 and 192.168.2.2 through Tunnel 2. It chooses 192.168.2.2 and
attempts to connect through Tunnel 2.
2. The connection attempt to 192.168.2.2 fails, so the LAC locks out 192.168.2.2. It is not considered
again during this login attempt, and cannot be considered for any login attempt until the destination
lockout timer expires.
3. The LAC then attempts to connect to 192.168.1.1 through Tunnel 1 at preference level 0.
4. The connection attempt to 192.168.1.1 fails, so the LAC locks out 192.168.1.1. It is not considered
again during this login attempt, and cannot be considered for any login attempt until the destination
lockout timer expires.
5. 192.168.3.3 through Tunnel 3 is the only remaining valid destination at preference level 0, but it is
locked. The LAC adds 192.168.3.3 to the DestinationsLockedNotContacted list. The LAC did not
add 192.168.1.1 and 192.168.2.2 to the DestinationsLockedNotContacted list, because it locked
them out after attempting to contact them.
185
6. Because level 0 has no more unlocked, valid destinations, the LAC drops to the next level,
preference level 1, to reach a destination for the domain.
7. At preference level 1, the LAC randomly selects 192.168.4.4 and attempts to connect through
Tunnel 4.
8. The connection attempt to 192.168.4.4 fails, so the LAC locks out 192.168.4.4. It is not considered
again during this login attempt, and cannot be considered for any login attempt until the destination
lockout timer expires.
9. The LAC then attempts to connect to 192.168.5.5 through Tunnel 5 at preference level 1.
10. The connection attempt to 192.168.5.5 fails, so the LAC locks out 192.168.5.5. It is not considered
again during this login attempt, and cannot be considered for any login attempt until the destination
lockout timer expires. Level 1 has no more unlocked, valid destinations. Because the
DestinationsLockedNotContacted list is not empty, the LAC unlocks all the destinations on the list
—in this case, 192.168.3.3—and jumps back up to the highest preference level, 0.
11. 192.168.3.3 is now the only unlocked destination at preference level 0, so the LAC attempts to
connect to it through Tunnel 3.
12. The connection attempt to 192.168.3.3 fails, so the LAC locks out 192.168.3.3. It is not considered
again during this login attempt, and cannot be considered for any login attempt until the destination
lockout timer expires.
13. Because level 0 has no more unlocked, valid destinations, the LAC drops to the next level,
preference level 1.
Multiple tunnel profiles can be configured on the LAC; some tunnels may share destinations. When the
LAC tunnels the session for a PPP subscriber to the LNS, a tunnel has to be selected for the subscriber
session. The tunnel selection process chooses a tunnel with the highest preference that has a reachable
destination. By default, the LAC selects a tunnel at random from among multiple tunnels that meet the
same criteria. Alternatively, you can configure load balancing to enable different selection choices. Both
load-balancing methods affect which tunnels and destinations the LAC selects, but the selection and
failover process otherwise remains the same.
186
NOTE: Weighted load balancing and destination-equal load balancing are mutually exclusive. You
can enable only one or the other.
Weighted load balancing evaluates tunnels according to their weight. The weight of a tunnel is
determined by the tunnel’s maximum session limit and the maximum session limits of the other tunnels
at the same preference level. The tunnel with the highest maximum session limit has the highest weight
in that preference level. The tunnel with the next-highest maximum session limit has the next-highest
weight, and so on. The tunnel with the lowest maximum session limit has the lowest weight.
NOTE: Tunnel selection and session distribution are probability based; the load is not strictly
distributed according to weight.
When you configure weighted load balancing, the LAC still selects tunnels randomly within a preference
level, but on average the sessions are distributed across tunnels in relationship to the weight of the
tunnels.
With weighted load balancing, the LAC generates a random number within a range equal to the
aggregate total of all session limits for all tunnels in the preference level. It associates part of the range—
a pool of numbers—with each tunnel proportional to the tunnel weight. A tunnel with a higher weight is
associated with a greater portion of the range—a larger pool—than a tunnel with a lower weight. A
tunnel is selected when the random number is in its associated pool of numbers. The random number is
more likely, on average, to be in a larger pool, so a tunnel with a higher weight (larger pool) is more likely
to be selected than a tunnel with a lower weight (smaller pool).
For example, consider a preference level that has only two tunnels, 1 and 2. Tunnel 1 has a maximum
limit of 1000 sessions and Tunnel 2 has a limit of 2000 sessions, resulting in an aggregate total of 3000
sessions. The LAC generates a random number from a pool of 3000 in the range from 0 through 2999. A
pool of 1000 numbers, the portion of the range from 0 through 999, is associated with Tunnel 1. A pool
of 2000 numbers, the portion of the range from 1000 through 2999, is associated with Tunnel 2.
• When the generated number is less than 1000, then Tunnel 1 is selected, even though it has a lower
weight (1000) than Tunnel 2 (2000).
Because the pool of possible generated numbers for Tunnel 2 (2000) is twice that for Tunnel 1 (1000),
Tunnel 2, on average, is selected twice as often as Tunnel 1.
187
Destination-equal load balancing evaluates tunnels according to the number of sessions to the
destination and the number of sessions carried by the tunnel in order to spread the session load equally
among all tunnels. The tunnel with a destination that has the lowest session count is considered to have
the lightest load. This process operates on tunnels at the highest available preference level and uses the
following guidelines:
• When each tunnel goes to a separate destination and only one destination has the lowest session
count among all destinations, the LAC selects the tunnel to that destination.
• When each tunnel goes to a separate destination and more than one destination has the same
lowest session count, the LAC selects a tunnel at random from among the tunnels to these
destinations.
• When more than one tunnel goes to the same destination and that destination has the lowest
destination session count, the LAC selects from among these tunnels the one that has the lowest
total number of tunnel sessions. If the tunnel session count is the same for all these tunnels, then the
LAC selects one of them at random.
Consider the following scenarios to better understand tunnel selection behavior when destination-equal
load balancing is enabled.
In Scenario 1, every tunnel has a different valid destination and only the destination session count is
evaluated:
When the first PPP user tries to connect to the domain, the LAC selects Tunnel 2, because it is at the
highest preference level, 1, and has the valid destination, B, with the lowest session count, 50.
When additional PPP users try to connect to the domain, the LAC acts as follows:
1. Tunnel 2 continues to be selected until the session count for 192.168.2.2 equals 100, matching the
next lowest session count, 192.168.4.4’s in Tunnel 4.
2. When the next subscriber logs in, the LAC randomly selects between Tunnel 2 and Tunnel 4, because
their destinations have the same session count, and it is lower than that for the other destinations.
3. Whichever tunnel is selected from this pair, the session count for its destination is now 101. The
other tunnel is selected when the next subscriber logs in, because it has the lower destination
session count of 100. This raises its destination session count to 101, matching the other tunnel.
188
4. As subscribers continue to log in, the LAC repeats this process, randomly selecting between Tunnel 2
and Tunnel 4 when their session counts match and then selecting the other tunnel with the next
subscriber, until their destination session counts both reach 200, matching Tunnel 1.
5. When the next subscriber logs in, the LAC now randomly selects among Tunnel 1, Tunnel 2, and
Tunnel 4, because 192.168.1.1, 192.168.2.2, 192.168.3.3 all have the same session count of 200.
The destination session count is raised for the selected tunnel to 201, so for the next subscriber, the
LAC randomly selects between the other two tunnels. Now two tunnels have a destination session
count of 201, so the LAC selects the remaining tunnel for the next subscriber.
6. As subscribers continue to log in, the LAC repeats this process, randomly selecting among Tunnel 1,
Tunnel 2, and Tunnel 4 when their session counts match, randomly selecting between the remaining
pair for the next subscriber, and then selecting the remaining tunnel, so the destination session
counts for these three tunnels match again. This pattern continues until the destination session
count for all three tunnels reaches 300, matching Tunnel 3.
7. Now the destinations for all four tunnels have the same session count. Because there are only four
tunnels, the final pattern is established. The LAC first randomly selects among all four tunnels, then
the remaining three, then the remaining pair, and finally selects the last tunnel. When the destination
session counts are all the same, the LAC starts this pattern again.
In Scenario 2, two tunnels share the same valid destination. The tunnel session count and the
destination session count are both evaluated:
• Tunnel 1, preference level 1, tunnel session count = 120, 192.168.1.1, destination session count =
200
• Tunnel 2, preference level 1, tunnel session count = 80, 192.168.1.1, destination session count = 200
When the first PPP user tries to connect to the domain, the LAC first selects between destinations. The
tunnels for both 192.168.1.1 and 192.168.2.2 are at preference level 1. The LAC selects 192.168.1.1,
because it has a lower session count (200) than 192.168.2.2 (300). The LAC then has to choose between
Tunnel 1 and Tunnel 2 because both go to 192.168.1.1. The LAC evaluates the tunnel session count.
Tunnel 2 has a lower count (80) than Tunnel 1 (120), so the LAC selects Tunnel 2 for the first subscriber.
When additional PPP users try to connect to the domain, the LAC acts as follows:
1. Tunnel 2 continues to be selected until its tunnel session count increases to 120, matching Tunnel 1.
2. When the next subscriber logs in, the LAC randomly selects between Tunnel 1 and Tunnel 2, because
they have the same tunnel session count. The tunnel session count of the selected tunnel is raised to
121.
189
3. When the next subscriber logs in, the LAC selects the other tunnel to 192.168.1.1, because it has a
lower tunnel session count. From this point, the LAC continues to alternate, first making a random
selection between Tunnels 1 and 2 and then selecting the other tunnel, until the destination session
count rises to 300, matching the session count for 192.168.2.2 in Tunnel 3. (At this point, the tunnel
session count is 150 for both Tunnel 1 and Tunnel 2.)
4. For the next subscriber, the LAC randomly selects among Tunnels 1, 2, and 3.
• If the LAC selects either Tunnel 1 or Tunnel 2, the 192.168.1.1 session count rises to 301.
Consequently the LAC selects Tunnel 3 for the next subscriber because the 192.168.2.2 session
count is still 300. At this point, both destinations have the same session count again.
• If the LAC selects Tunnel 3, the 192.168.2.2 session count rises to 301. For the next subscriber,
the LAC randomly selects between Tunnel 1 and Tunnel 2 because they both go to 192.168.1.1.
Whichever one the LAC selects, the 192.168.1.1 session count rises to 301. At this point, both
destinations have the same session count again.
NOTE: The tunnel session count for Tunnels 1 and 2 is no longer evaluated; the LAC only
considers the destination session count for 192.168.1.1 and 192.168.2.2.
In Scenario 3, each tunnel has a different valid destination and only the destination session count is
evaluated:
When the first PPP user tries to connect to the domain, the LAC determines that the destination session
count is the same for all destinations for all four tunnels at the preference level. Consequently, the LAC
selects randomly among the four tunnels.
When additional PPP users try to connect to the domain, the LAC acts as follows:
1. The LAC selects randomly among Tunnels 2, 3, and 4, because Destinations 192.168.2.2,
192.168.3.3, and 192.168.4.4 all have the same session count, 100, which is lower than the current
session count for 192.168.1.1, 101.
190
2. Suppose the LAC selects Tunnel 2. For the next subscriber, the LAC randomly selects between
Tunnels 3 and 4, because 192.168.3.3 and 192.168.4.4 all have the same session count, 100, which
is lower than the current session count of 101 for 192.168.1.1 and 192.168.2.2.
3. Suppose the LAC selects Tunnel 3. For the next subscriber, the LAC selects Tunnel 4, because
192.168.4.4 has a session count of 100, and all the other destinations have a count of 101.
4. Now the destinations for all four tunnels have the same session count. Because there are only four
tunnels, the final pattern is established. As subscribers continue to log in, the LAC first randomly
selects among all four tunnels, then the remaining three, then the remaining pair, and finally selects
the last tunnel. When the destination session counts are all the same, the LAC starts this pattern
again.
In Scenario 4, the LAC evaluates both destination session limits and tunnel maximum session limits:
• Tunnel 1, preference level 1, 192.168.1.1, destination session count = 30, tunnel maximum session
limit = 200
• Tunnel 2, preference level 1, 192.168.2.2, destination session count = 40, tunnel maximum session
limit = 200
• Tunnel 3, preference level 1, 192.168.3.3, destination session count = 300, tunnel maximum session
limit = 1000
When the first PPP user tries to connect to the domain, the LAC selects Tunnel 1, because 192.168.1.1
has the lowest session count in the preference level.
When additional PPP users try to connect to the domain, the LAC acts as follows:
1. The LAC continues to select Tunnel 1 until the destination session count for 192.168.1.1 equals 40,
matching the count for 192.168.2.2 in Tunnel 2.
2. When the next subscriber logs in, the LAC randomly selects between Tunnel 1 and Tunnel 2, because
their destinations have the same session count, and it is lower than that for Tunnel 3 (300).
3. Whichever tunnel is selected from this pair, the session count for its destination is now 41. The other
tunnel is selected when the next subscriber logs in, because it has the lower destination session
count of 40. This raises its destination session count to 41, matching the other tunnel.
4. As subscribers continue to log in, the LAC repeats this process, randomly selecting between Tunnel 1
and Tunnel 2 when their session counts match and then selecting the other tunnel with the next
subscriber, until their destination session counts both reach 200, matching their tunnel maximum
session limit of 200. Because both tunnels have reached their maximum session limit, they are not
available for selection.
191
5. As subscribers continue to log in, the LAC selects the remaining tunnel in the preference level, Tunnel
3, until the session count for its destination reaches the maximum session limit for the tunnel, 1000.
6. When the next subscriber logs in, the LAC drops to the next preference level and selects Tunnel 4,
because it is the only tunnel at this level.
7. As subscribers continue to log in, the LAC continues to select Tunnel 4, because no maximum session
limit is configured for this tunnel. The LAC can subsequently select a tunnel in the higher preference
level only when a session is terminated for one of the tunnels at that level, dropping it’s session
count below the maximum limit.
• Tunnel 1, preference level 1, 192.168.1.1, destination session count = 100, destination locked out
When the first PPP user tries to connect to the domain, the LAC cannot select Tunnel 1, even though its
destination has the lowest session count, because the tunnel is in the destination lockout state. Tunnel 1
cannot be considered until it is out of the locked state. The LAC selects Tunnel 2 because the session
count for 192.168.2.2 is lower than for 192.168.3.3.
When additional PPP users try to connect to the domain, what happens next depends on when
192.168.1.1 emerges from the lockout state. For as long as 192.168.1.1 is locked out, the LAC makes
the selections as follows:
1. The LAC continues to select Tunnel 2 until the session count for 192.168.2.2 equals 250, matching
the count for 192.168.3.3 in Tunnel 3.
2. When the next subscriber logs in, the LAC randomly selects between Tunnel 2 and Tunnel 3, because
their destinations have the same session count, 250.
3. Whichever tunnel is selected from this pair, the session count for its destination is now 251. The
other tunnel is selected when the next subscriber logs in, because it has the lower destination
session count of 250. This raises its destination session count to 251, matching the other tunnel.
4. As subscribers continue to log in, the LAC repeats this process, randomly selecting between Tunnel 2
and Tunnel 3 when their session counts match and then selecting the other tunnel with the next
subscriber.
Whenever 192.168.1.1 emerges from the lockout state, the LAC selects Tunnel 1 for the next subscriber
because 192.168.1.1 has the lowest session count. The LAC continues to do so until the session count
for 192.168.1.1 matches the current session count for either of the other destinations. From that point
forward, the LAC alternates making a random selection between tunnels with matching destination
session counts and then subsequently selecting the tunnel with the lowest count.
192
1. The LAC selects Tunnel 1 for the next subscriber because 192.168.1.1 has the lowest session count.
2. The LAC continues to select Tunnel 1 until the session count for 192.168.1.1 matches the current
session count for either of the other destinations.
3. From that point forward, the LAC alternates making a random selection between tunnels with
matching destination session counts and then subsequently selecting the tunnel with the lowest
count.
IN THIS SECTION
When an L2TP session request is initiated, the LNS or LAC checks the number of current active sessions
against the maximum number of sessions allowed for the chassis, tunnels, a tunnel group, a client
(requesting host device), or a group of clients. New session requests are rejected when the configured
session limit is reached.
When a session is requested, the LNS checks for session limits in the following order:
chassis > tunnel > tunnel group > session-limit group > client
At each level, the LNS determines whether the current session count is less than the configured limit.
When that is true or when no limit is configured, the check passes and the LNS proceeds to check the
next level. If at any level the current session count is equal to the configured limit, then the LNS rejects
the session request and does not check any other level. Otherwise, the session can be established.
When a session request is rejected for an existing tunnel, a Call-Disconnect-Notify (CDN) message with
a result code and error code both set to 4 is returned in response to the incoming-call request (ICRQ).
When the rejected request is for a new tunnel, the tunnel is established but the session fails to come up,
causing the tunnel to come down because it has no sessions.
193
The LAC performs the same check, but only for the chassis and tunnel levels. The LAC rejects requests
by returning a PPP terminate message to the client.
You can configure session limits for the chassis, all tunnels, a tunnel group, a group of clients, or an
individual client. The scenarios that follow describe what happens for different configurations of session
limits.
In Table 15 on page 193, the current L2TP session count is 10,000 and the session limit is configured as
10,000 at every level. When a new session is requested, the first check at the chassis level fails, because
the current session count matches the configured limit. No further checks are performed at the other
levels and the session request is rejected. No new sessions are allowed at any level until the current
session count drops below 10,000.
In Table 16 on page 194, the current L2TP session count is 2000. When a new session is requested, the
first check at the chassis level passes because the configured limit allows up to 10,000 sessions on the
chassis, but only 2000 sessions are currently active. The next check, at the tunnel level, fails, because
the current session count matches the configured limit tunnel limit of 2000 for tunnel A.
No further checks are performed at the other levels and the session request is rejected.
194
No new sessions are allowed on tunnel A until its current session count drops below 2000 and the
session check can pass. If that happens, then the other level checks pass in this scenario because their
configured limits are greater than their current counts.
The session limit of 2000 applies to all tunnels; that is, each active tunnel has an independent limit of
2000 sessions. The failure of one tunnel has no effect on other tunnels. A session request on any other
tunnel passes, as long as the current session count for that tunnel is less than 2000.
In Table 17 on page 195, the current L2TP session count is 2000. When a new session is requested, the
first check at the chassis level passes because the configured limit allows up to 10,000 sessions on the
chassis, but only 2000 sessions are currently active. The second check, at the tunnel level, also passes
for the same reason. The next check, at the tunnel group level for tunnel group B, fails, because the
current session count for tunnel group B matches the configured limit tunnel group limit of 2000.
No further checks are performed at the other levels and the session request is rejected.
195
No new sessions are allowed on tunnel group B until its current session count drops below 2000 and the
session check can pass. If that happens, then the other level checks can pass because their configured
limits are greater than their current counts.
For tunnel groups, the session limit is configured on a per-group basis; that is, you cannot specify a
single limit that applies to all tunnel groups. The failure of any tunnel group has no effect on other tunnel
groups. In this scenario, a session request on any other tunnel group passes, if the current session count
for that group is less than its configured session limit.
In Table 18 on page 196, the current L2TP session count is 6000. When a new session is requested, the
check passes for the chassis, tunnel, and tunnel group because the configured limit for each allows up to
10,000 sessions, but only 6000 sessions are currently active. The check at the session-limit group fails,
because the current session count for session-limit group slg1 matches the configured limit of 6000.
No further checks are performed at the remaining level and the session request is rejected.
196
No new sessions are allowed for any clients in session-limit group slg1 until the group’s current session
count drops below 6000 and the session check can pass. If that happens, then the remaining level check
can pass because its configured limit is greater than its current count.
You can reconfigure a session-limit group by removing or adding clients without affecting any current
sessions. The reconfiguration does affect the number of sessions available to be established for the
client group.
• If you remove a client, then the number of new sessions that can be established increases by the
number of that client’s current sessions.
• If you add a client, then the number of new sessions that can be established is reduced by the
number of that client’s current sessions. The new total of current sessions for existing clients plus the
new client can exceed the configured limit for the session-limit group. In this case, no sessions are
dropped, but no new sessions can be established until the session count drops below the configured
group limit.
1. The session-limit group slg1 has two clients, ent1-serviceA with a current session count of 3500 and
ent1-serviceB with a current session count of 0. Because group slg1 has a limit of 6000, no more
than 2500 sessions can be added for these clients:
2. Then 1000 sessions are logged in for client ent1-service B. Now no more than 1500 sessions can be
added for these clients:
3. Next, suppose you remove client ent1-serviceA from the session-limit group. The group session
capacity increases to 5000 sessions:
4. Finally, you add a new client, ent1-serviceC, to the session-limit group. This new client currently has
8000 active sessions. In this case, the session-limit group now has 9000 sessions:
No sessions are dropped even though the maximum session limit for the group, 6000, is exceeded.
No new sessions can be added until the session count drops from 9000 to below 6000.
In Table 19 on page 197, the session check passes for the chassis, tunnel, and tunnel group because
their configured limits are greater than their current session counts. The client, ent1-serviceA, does not
belong to a session-limit-group. The limit check fails for the client because its current session count
matches the configured limit of 6000.
No new sessions are allowed for this client until its current session count drops below 6000 and the
session check can pass. The failure of any independent client has no effect on other clients. In this
198
scenario, a session request for any other independent client passes, if the current session count for that
client is less than its configured session limit.
The session limit that you set for an individual client—one that is not part of a session-limit group—
applies on a per-tunnel-group basis. Multiple LACs with the same source hostname but different source
IP addresses are treated as the same client.
Suppose you have three LACs, A, B, and C. All three have the same source hostname, ce-lac. LAC A and
LAC B establish sessions with an LNS through the gateway address associated with tunnel group 1. LAC
C establishes sessions through a different gateway associated with tunnel group 2. Because the LACs
have the same hostname, the client configuration is the same for all three. However, the client session
limit applies differently to the LACs because of the tunnel groups.
Suppose the client session limit is 100. Because LAC A and LAC B both create sessions in tunnel group
1, they must share the client limit. That means that the total number of sessions allowed for LAC A and
LAC B combined is 100.
LAC C creates sessions in a different tunnel group, 2. Because the client session limit applies per tunnel
group, then LAC C is allowed 100 sessions, regardless of how many sessions LAC A and LAC B have
already established.
You can place a limit on the maximum number of L2TP sessions allowed for the chassis, all tunnels, a
tunnel group, a group of clients, an individual client, or an individual service interface or aggregated
service interface. New session requests are rejected by the LNS or LAC when the configured session
limit is reached. Session requests are also rejected when the maximum chassis limit has been reached,
even when a configured limit is not exceeded. Configurable session limits provide fine-grained control of
the number of sessions that a customer can have while connected over LACs in multiple locations.
NOTE: You cannot set the limit to be more than the default maximum limit for the chassis.
To limit the number of sessions per tunnel for all tunnels (LAC or LNS):
199
To limit the number of sessions for all tunnels in a specific tunnel group (LNS):
To limit the number of sessions that are allowed on an individual service interface:
To limit the number of sessions that are allowed on an individual aggregated service interface:
NOTE: The configuration applies to all member interfaces; the limit cannot be configured for
individual member interfaces of the aggregated service interface.
To limit the number of sessions for a client that is not a member of a session-limit group (LNS):
NOTE: Configuring the session limit at any level to be less than the number of sessions that
currently exist at that level has no effect on existing sessions. The new limit applies only if the
number of sessions drops below the new limit.
You can use the show services l2tp summary extensive command to display the configured sessions
limit for a tunnel:
The displayed limit for configured sessions is set to the lowest of the following configured session
values:
• Tunnel profile (individual tunnel)—(LAC and LNS) set access tunnel-profile profile-name tunnel
tunnel-idmax-sessionsnumber]
• Host profile—(LNS only) set access profile profile-name client client-name l2tp maximum-sessions-
per-tunnel
The configured values determine the field value starting in the following Junos OS releases: 19.2R3,
19.3R3, 19.4R3, 20.1R2, 20.2R2, and 20.3R1. In earlier releases, the field displays the host profile value
for the LNS, but it displays a fixed value of 512,000 for the LAC.
201
NOTE: After a GRES, a unified ISSU, or a restart of the jl2tpd process, the value of this field is
accurate only after a new session comes up on the tunnel. Until that happens, the field shows a
value of 65,535 instead of the configured value.
Suppose you have two tunnels, tunnel A and tunnel B. A GRES takes place, and the field for each
tunnel shows 65,535. When a new session comes up on tunnel B, the value for that tunnel
updates to the configured value. For tunnel A, the field continues to show 65,535 until that
tunnel gets a new session.
By default, the name of a tunnel corresponds to the Tunnel-Assignment-Id [82] returned by the AAA
server. You can optionally configure the LAC to use more elements in the construction of a tunnel name
by including the assignment-id-format client-server-id statement at the [edit services l2tp tunnel]
hierarchy level. This format uses three attributes: Tunnel-Client-Auth-Id [90], Tunnel-Server-Endpoint
[67], and Tunnel-Assignment-Id [82]. These attributes correspond, respectively, to the values configured
in the tunnel profile for the LAC (source gateway) name, the tunnel endpoint (remote gateway) address
on the LNS, and the tunnel ID.
A consequence of the client-server-id format is that the LAC automatically creates a new tunnel when
the AAA server returns a different Tunnel-Client-Auth-Id than previously returned.
NOTE: Before you downgrade to a Junos OS Release that does not support this statement, we
recommend that you explicitly unconfigure the feature by including the no assignment-id-format
assignment-id statement at the [edit services l2tp tunnel] hierarchy level.
The tunnel profile specifies a set of attributes to characterize the tunnel. The profile can be applied by a
domain map or automatically when the tunnel is created.
NOTE: RADIUS attributes and VSAs can override the values you configured by a tunnel profile in
a domain map. In the absence of a domain map, RADIUS can supply all the characteristics of a
tunnel. The steps in the following procedure list the corresponding standard RADIUS attribute or
VSA that you can configure on your RADIUS server to modify or configure the tunnel profile.
RADIUS-supplied attributes are associated with a tunnel by a tag carried in the attribute, which
matches the tunnel identifier. A tag of 0 indicates the tag is not used. If L2TP receives a RADIUS
attribute with a tag of 0, the attribute cannot be merged with the tunnel profile configuration
corresponding to the subscriber domain because a tunnel profile cannot provide a tunnel tag
(tunnel identifier) of 0. Only tags in the range of 1 through 31 are supported.
1. Specify the tunnel profile for which you are defining a tunnel. (Tunnel-Group [26-64])
[edit access]
user@host# set tunnel-profile profile-name
2. Specify an identifier (name) for the L2TP control connection for the tunnel.
3. Configure the IP address of the local L2TP tunnel endpoint, the LAC. (Tunnel-Client-Endpoint [66])
4. Configure the IP address of the remote L2TP tunnel endpoint, the LNS. (Tunnel-Server-Endpoint
[67])
5. (Optional) Configure the preference level for the tunnel. (Tunnel-Preference [83])
6. (Optional) Configure the hostname of the local client (LAC). (Tunnel-Client-Auth-Id [90])
7. (Optional) Configure the hostname of the remote server (LNS). (Tunnel-Server-Auth-Id [91])
8. (Optional) Specify the medium (network) type for the tunnel. (Tunnel-Medium-Type [65])
9. (Optional) Specify the protocol type for the tunnel. (Tunnel-Type [64])
10. (Optional) Configure the assignment ID for the tunnel. (Tunnel-Assignment-Id [82])
11. (Optional) Configure the maximum number of sessions allowed in the tunnel. (Tunnel-Max-Sessions
[26-33])
12. (Optional) Configure the password for remote server authentication. (Standard RADIUS attribute
Tunnel-Password [69] or VSA Tunnel-Password [26-9])
13. (Optional) Configure the logical system to use for the tunnel.
If you configure a logical system, you must also configure a routing instance.
14. (Optional) Configure the routing instance to use for the tunnel. (Tunnel-Virtual-Router [26-8])
If you configure a routing instance, configuring a logical system is optional.
15. (Optional) Enable the LAC to interoperate with Cisco LNS devices. (Tunnel-Nas-Port-Method
[26-30])
tunnel-profile marketing {
tunnel 1 {
preference 5;
remote-gateway {
address 198.51.100.4;
gateway-name work;
}
source-gateway {
address 192.0.2.10;
gateway-name local;
}
secret $ABC123;
logical-system bos-metro-5;
205
routing-instance rox-12-32;
medium ipv4;
type l2tp;
identification tunnel_to_work;
max-sessions 32;
nas-port-method cisco avp;
}
}
When the LAC determines that a PPP session should be tunneled, it selects a tunnel from the set of
tunnels associated with either the PPP user or the PPP user’s domain. You can configure how a tunnel is
selected and whether certain information is sent by the LAC to the LNS.
You can configure how LAC tunnel selection continues in the event of a failure to connect. By default,
when the router is unable to connect to a destination at a given preference level, it attempts to connect
at the next lower level. You can specify that the router instead attempt to connect to another
destination at the same level as the failed attempt.
If all destinations at a preference level are marked as unreachable, the router does not attempt to
connect to a destination at that level. It drops to the next lower preference level to select a destination.
If all destinations at all preference levels are marked as unreachable, the router chooses the destination
that failed first and tries to make a connection. If the connection fails, the router rejects the PPP user
session without attempting to contact the remote router.
206
For example, suppose there are four tunnels for a domain: A, B, C, and D. All tunnels are considered
reachable, and the preference levels are assigned as follows:
• A and B at preference 0
• C and D at preference 1
When the router attempts to connect to the domain, suppose it randomly selects tunnel B from
preference 0. If it fails to connect to tunnel B, the router excludes tunnel B for five minutes and attempts
to connect to tunnel A. If this attempt also fails, the router drops to preference 1. Then suppose the
router selects tunnel C. If it also fails to connect to tunnel C, the router excludes tunnel C for five
minutes and attempts to connect to tunnel D.
You configure the preference level used for this tunnel selection method in the tunnel profile or the
RADIUS Tunnel-Preference [83] attribute.
By default, the L2TP LAC selects tunnels for new sessions at random from within the highest available
preference level. You can configure the LAC to distribute sessions across tunnels at the highest available
preference level by evaluating the weight of each tunnel. This method is known as weighted load
balancing. The weight of a tunnel is proportional to its maximum session limit and the maximum session
limits of the other tunnels at the same preference level. When you configure weighted load balancing,
the LAC still selects tunnels randomly within a preference level, but on average the sessions are
distributed across tunnels in relationship to the tunnel weights.
By default, the L2TP LAC selects tunnels for new sessions at random from within the highest available
preference level. Starting in Junos OS Release 15.1, you can configure the LAC to distribute sessions
equally across all tunnels at the highest available preference level by evaluating the number of sessions
to the destinations and the number of sessions carried by the tunnels. This distribution method is
known as destination-equal load balancing. The LAC selects the tunnel with the lightest load, according
to the following guidelines:
• When each tunnel goes to a separate destination and only one destination has the lowest session
count among all destinations, the LAC selects the tunnel to that destination.
• When each tunnel goes to a separate destination and more than one destination has the same
lowest session count, the LAC selects a tunnel at random from among the tunnels to these
destinations.
• When more than one tunnel goes to the same destination and that destination has the lowest
destination session count, the LAC selects from among these tunnels the one that has the lowest
total number of tunnel sessions. If the tunnel session count is the same for all these tunnels, then the
LAC selects one of them at random.
You can configure the LAC to create the IPv6 address family (inet6) when tunneling the subscribers to
the LNS. IPv6 firewall filters can then be applied by services on the LAC to subscriber traffic. By default,
the LAC requires only family inet to enable forwarding into an IP tunnel. The LAC can apply IPv4 firewall
filters to the session. Even when family inet6 is included in the dynamic profile, by default it is not
created in order to conserve resources, because it is not needed. Consequently IPv6 firewall filters
cannot be applied.
To enable IPv6 address family creation and the application of IPv6 firewall filters:
208
• Configure enabling.
You can use the show services l2tp summary command to display whether the statement is enabled
or disabled.
You can test L2TP tunnel configurations on the LAC and successful subscriber authentication and
tunneling without bringing up a PPP user and an associated tunnel.
Issue the test services l2tp tunnel command from CLI operational mode to map a subscriber to an L2TP
tunnel, verify the L2TP tunnel configuration (both locally on the LAC and on a back-end server such as a
RADIUS server), and verify that L2TP tunnels from the LAC can be established with the remote LNS.
The Junos OS LAC implementation enables you to configure multiple tunnels from which one tunnel is
chosen for tunneling a PPP subscriber. You can use the test services l2tp tunnel command to test all
possible tunnel configurations to verify that each can be established. Alternatively, you can test only a
specific tunnel for the subscriber.
You must specify a configured subscriber username when you issue the command. The test generates a
dummy password—testpass—for the subscriber, or you can optionally specify the password. The test
verifies whether the subscriber identified by that username can be tunneled according to the tunnel
configuration. If the subscriber can be tunneled, then the test verifies whether the L2TP tunnel can be
established with the LNS according to the L2TP configuration.
You can optionally specify a tunnel ID, in which case only that tunnel is tested; the tunnel must be
already configured for that username. If you omit this option, the test is applied to the full set of tunnel
configurations that are returned for the username. The tunnel ID you specify is the same as that used by
Tunnel-Assignment-Id (RADIUS attribute 82) and specified by the identification statement in the tunnel
profile.
Example 1:
The user failed authentication with the generated password and consequently was not tunneled.
Example 2:
This user was authenticated with the generated password and successfully tunneled. A set of tunnels
was found to be associated with that username and the entire set was tested.
The subscriber was authenticated. However, the user was terminated locally rather than tunneled;
this means that no tunnel was found to be associated with the user.
The subscriber was authenticated and tunneled. The specified tunnel was found for the subscriber
and the tunnel was established, confirming the tunnel configuration.
210
user@host> test services l2tp tunnel user [email protected] password dieda499 tunnel-
name tunnel5
Subscriber: [email protected], authentication success, l2tp tunneled
The subscriber was authenticated and tunneled. The absence of tunnel information in the output
indicates that the specified tunnel configuration does not exist.
Release Description
20.3R1 The configured values determine the field value starting in the following Junos OS releases: 19.2R3,
19.3R3, 19.4R3, 20.1R2, 20.2R2, and 20.3R1.
15.1 Starting in Junos OS Release 15.1, you can configure the LAC to distribute sessions equally across all
tunnels at the highest available preference level by evaluating the number of sessions to the
destinations and the number of sessions carried by the tunnels.
RELATED DOCUMENTATION
IN THIS SECTION
Subscriber Access Line Information Handling by the LAC and LNS Overview | 211
Transmission of the Receive Connect Speed AVP When Transmit and Receive Connect Speeds are Equal
| 236
Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS | 237
Configuring the Reporting and Processing of Subscriber Access Line Information | 240
Preventing the LAC from Sending Calling Number AVP 22 to the LNS | 245
Override the Calling-Station-ID Format for the Calling Number AVP | 246
IN THIS SECTION
Starting in Junos OS Release 14.1, L2TP supports a set of AVPs that convey information about
subscriber access lines from the LAC to the LNS. The information originates from an ANCP access node
(DSLAM) and is distributed to the LAC by means of either DSL Forum VSAs in ANCP messages or PPPoE
212
intermediate agent tags included in the PPPoE PADI and PADR messages. The access node is typically a
DSLAM for DSL access networks or, starting in Junos OS Release 19.3R1, an ONT/ONU for PON access
networks. See the following references for more information about DSL Forum VSAs and L2TP AVPs:
• RFC 5515, Layer 2 Tunneling Protocol (L2TP) Access Line Information Attribute Value Pair (AVP)
Extensions
• RFC 6320, Protocol for Access Node Control Mechanism in Broadband Networks
• RFC 6320 Draft Extension, Access Extensions for the Access Node Control Protocol
In the network topology shown in Figure 16 on page 213, when a subscriber initiates a connection
through the CPE, the DSLAM relays the subscriber’s PPPoE session to the router configured as a LAC.
When the router has established the PPPoE session, the LAC initiates an L2TP tunnel to forward the
subscriber’s encapsulated PPP packets into the provider network.
In parallel to the PPPoE session, an ANCP connection between the DSLAM and the ANCP agent on the
router conveys information about the subscriber’s local loop as well as the link speeds of the PPPoE
sessions on the local loop. The DSLAM sends the router Agent Circuit Id (ACI) and Agent Remote Id
(ARI) strings that uniquely identify the DSLAM’s receiving interface; this information is encoded in the
ANCP Port Up and Port Down messages as Access Line Identifying TLVs. The ANCP messages can also
include line attributes such as minimum, maximum, and actual net upstream and downstream data rates
in the DSL Line Attributes TLV. The DSLAM can also send the access line attributes in vendor-specific
tags that it inserts in the PADI and PADR messages.
213
NOTE: Starting in Junos OS Release 19.3R1, the access nodes for PON subscriber access lines
(such as ONTs and ONUs) are supported in this same scenario, in addition to the previously
supported DSL access nodes.
L2TP supports the AVPs listed in Table 20 on page 214 to carry this information. The access line
information is not required for the L2TP session to be initiated, and the establishment of that session is
not delayed waiting for the values to be sent from the access node. The content of the ICRQ message
generally varies between DSL access lines and PON access lines. AVPs, 1, 2, 3, and 6 are used for access
line identification for both DSL and PON. If PON information is reported using DSL AVPs, then the
content is the same as it would be for DSL access.
The access line information provided by the AVPs in ICRQ messages is passed on to RADIUS in DSL
Forum VSAs. It is not used for shaping the traffic rate on the subscriber access lines.
214
Table 20: L2TP AVPs That Provide Subscriber Access Line Information
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
64-bit unsigned
integer; data rate in
bits per sec
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Three one-octet
encodings for data link,
encapsulation 1, and
encapsulation 2.
220
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Starting in Junos OS
Release 18.1R1, this
AVP is included even
when the line type is 0
for OTHER access line
types.
221
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
• 1—GPON
• 2—XG-PON1
• 3—TWDM-PON
• 4—XGS-PON
• 5—WDM-PON
• 7—UNKNOWN
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
Table 20: L2TP AVPs That Provide Subscriber Access Line Information (Continued)
You can configure the LAC to notify the LNS when the speed of the subscriber connection changes from
the values initially communicated to the LNS by AVP 24 (transmit speed) and AVP 38 (receive speed) in
Incoming-Call-Connected (ICCN) messages. When configured to do so, the LAC informs the LNS that it
225
can send these updates by including the Connect Speed Update Enable AVP (98) in the ICRQ message
when the L2TP session starts up. The absence of the Connect Speed Update Enable AVP (98) in the
ICRQ message indicates that the LAC does not send updates for the life of the session.
When the connection speed changes, the DSLAM notifies the ANCP agent. The ANCP agent then
notifies the LAC, and the LAC in turn relays this information to the LNS by sending a Connect-Speed-
Update-Notification (CSUN) message that includes the updated speeds in a Connect Speed Update AVP
(97) for each session. The LAC collects connection speed updates and sends them in a batch to minimize
both the performance overhead on the LAC and the amount of traffic generated as a result of these
notifications.
The initial speeds in the ICCN messages and updated speeds in CSUN messages are used by CoS to
shape the traffic rate for subscriber access lines.
The presence of the Connect Speed Update Enable AVP (98) in the ICRQ message also informs the LNS
that the LAC does respond if it receives a Connect-Speed-Update-Request (CSURQ) message from an
LNS.
NOTE: The Junos OS does not currently support the sending of CSURQ messages by MX Series
routers configured as an LNS. All discussion about CSURQ messages is strictly about how an MX
Series LAC responds to a CSURQ that it receives from a third-party LNS.
A third-party LNS can send a CSURQ message at any time during the life of a tunnel to request the
current transmit and receive connection speed for one or more L2TP sessions. The LNS includes the
remote (relative to the LNS) session IDs in the CSURQ message. If the LAC has previously sent the
Connect Speed Update Enable AVP (98) for the requested sessions, then it responds to the CSURQ with
a CSUN message that includes the Connect Speed Update AVP (97) for each session. If no changes to
connection speeds have occurred by this time, the LAC simply includes the initial connection speed
values that were reported in AVP 24 and AVP 38.
When you enable connect speed updates either globally or for a specific LNS, the LAC does not send
CSUN messages unless you have also configured the tx-connect-speed statement to be either ancp or
service-profile.
Starting in Junos OS Release 17.4R1, an MX Series router configured as an LNS can process subscriber
access line information and connection speed updates that it receives from the LAC. The MX Series
router cannot send CSURQ messages to solicit updates from the LAC.
The initial speeds in the ICCN messages and updated speeds in CSUN messages are used by CoS to
shape the traffic rate for subscriber access lines.
226
You can configure the LAC to forward the access line information in the ICRQ message that it sends to
the LNS and you can configure the LNS to receive and process that information. You can configure this
globally for all destinations (endpoints) or for a specific destination. The per-destination configuration
enables you to limit transmission to an individual LNS or to a set of LNSs or reception from an individual
LAC or a set of LACs. This is useful when you know that some remote gateways do not support this
feature or have an incorrect implementation.
Include the access-line-information statement at one or both of the following hierarchy levels on the
LAC or LNS, respectively, to configure the LAC to forward the access line information in the ICRQ
message that it sends to the LNS, or to configure the LNS to receive and process that information:
To configure the LAC to send connection speed updates or the LNS to receive and process the updates,
include the connection-speed-update option with the access-line-information statement at the
appropriate hierarchy level on the LAC or LNS, respectively.
• Access line information—When forwarding by the LAC or processing by the LNS is enabled globally,
you cannot disable the global setting for a specific destination.
• Connection speed updates—When forwarding by the LAC or processing by the LNS is enabled
globally, you can disable the global setting for a specific destination (LNS or LAC) by specifying
access-line-information for the destination and omitting connection-speed-update.
IN THIS SECTION
Methods for Determining the Speed Values Reported to the LNS | 227
An L2TP access concentrator (LAC) uses Incoming-Call-Connected (ICCN) messages during the
establishment of an L2TP tunnel session to send attribute-value pairs (AVP) that convey to the L2TP
network server (LNS) the subscriber session’s connection speed. AVP 24 includes the transmit (Tx)
connect speed and AVP 38 includes the receive (Rx) connect speed.
• The L2TP transmit connect speed is the transmit connect speed in bits per second (bps) of the
subscriber's access interface; that is, it represents the speed of the connection downstream from the
LAC to the subscriber from the perspective of the LAC.
• The L2TP receive connect speed is the speed in bps of the connection upstream from the subscriber
to the LAC, again from the perspective of the LAC. When the receive connect speed is different from
the transmit connect speed, AVP 38 is included in the ICCN to convey the receive connect speed.
When the connection speed is the same in both directions, the LNS uses the value in AVP 24 for
both transmit and receive connect speeds. In this case, the LAC does not send AVP 38. You can
override this default behavior by including the rx-connect-speed-when-equal statement, which
causes the LAC to send AVP 38 even when the transmit and connect speeds are the same. See
"Transmission of the Receive Connect Speed AVP When Transmit and Receive Connect Speeds are
Equal " on page 236.
• The Tx and Rx connect speeds sent in the ICCN message are derived from the method determined by
the LAC fallback procedure. Because service activation does not occur until after the ICCN is sent,
the LAC always falls back to the next method when service-profile is configured as the method.
When the service profile is later activated, corresponding speed changes are sent in update messages
to the LNS.
• After the L2TP session is established, the Tx and Rx connect speeds can change at any time. When
configured to do so, the LAC sends the updated values for each session to the LNS in Connect-
Speed-Update-Notification (CSUN) messages. The updated speeds are conveyed in the Connect
Speed Update AVP (97).
The values reported to the LNS can be derived in the following ways:
• You can configure a method globally for the LAC with the tx-connect-speed-method statement at
the [edit services l2tp] hierarchy level. You can specify any of the following methods to determine
the source for connect speeds:
NOTE: Starting in Junos OS Release 13.3R1, availability and support for methods vary by
Junos OS Release, as described in Table 21 on page 230. The following list includes all
228
historical methods; some of the methods may not be supported in the software release you
are using.
• actual—The speed is the actual rate of the downstream traffic enforced at the session scheduler
node based on local traffic control policy. Only the transmit connect speed is available with this
method, so the receive transmit speed is determined by the fallback scheme. Use the actual
method when you need the reported value to be the downstream speed enforced by the local
CoS policy. Other methods may vary from this enforced value.
The actual method is supported only when the effective shaping-rate statement is included at the
[edit chassis] hierarchy level. The CLI commit check fails if actual is configured but the effective
shaping rate is not configured.
• ancp—The speed is the adjusted ANCP-sourced upstream and downstream value that results from
a configured percentage correction to the actual ANCP values. The adjustment is applied on a
per-DSL basis to account for ATM encapsulation differences between the BNG and the access-
loop and for Layer 1 transport overhead. The initial rate sent to the LNS is the ANCP value
reported at the time the ICCN is sent. Any subsequent changes are sent as updates to the LNS in
the CSUN message.
• none—This option prevents the LAC from sending either AVP 24 or AVP 38 in the ICCN message;
consequently no CSUN messages are sent, either. The LNS has to establish its own upstream and
downstream policy in the absence of these values. This option overrides the Juniper Networks
RADIUS VSAs, Tx-Connect-Speed (26-162) and Rx-Connect-Speed (26-163), as well as any other
method configured for the connect speed.
• pppoe-ia-tags—The speed is derived from the value sent from the DSLAM to the LAC in the
Point-to-Point Protocol over Ethernet (PPPoE) intermediate agent (IA) tags. For Ethernet
interfaces, the speed is an unadjusted value; for ATM interfaces, the value might be an adjusted
value if the tag includes the Encapsulation Overhead attribute (0x90).
This speed value is transmitted when the L2TP session is established. Although the PPPoe IA tag
value does not change during a session, the speed reported to the LAC can change. For example,
suppose the configured method is service-profile. The profile is not activated before the ICCN is
sent, and falls back to the PPPoE IA tag, which is sent in the ICCN message. When the service
profile is activated later, the service profile rates are sent in an update message (if updates are
configured).
• service-profile—Depending on your Junos OS release, there are two ways to use service profiles
to provide connection speeds. One method uses the speeds from the service profile only in CSUN
messages, the other method in ICCN messages.
229
• In CSUN messages—The downstream (Tx) speed is derived from the actual CoS that is
enforced on the L3 node based on local policy. The upstream (Rx) speed is taken from the
configured value in the service profile; no adjustment is made to this value.
By default, service profiles are not activated before the subscriber session is established, so
this method falls back to another method for the values sent in the ICCN. When the profile is
later activated, then those rates are sent to the LNS in a CSUN message, if updates are
enabled.
• In ICCN messages—Starting in Junos OS Release 18.1R1, you can use a dynamic service profile
to provide the connection speeds included in AVP 38 and AVP 24 in the ICCN message when
the L2TP session is negotiated. At subscriber login, authd determines whether the service
profile name conveyed in the Juniper Networks Activate-Service VSA (26-65) in the RADIUS
Access-Accept message matches the service profile name configured with the service-rate-
limiter statement at the [edit access] hierarchy level. If the names match, the speeds are
derived either from default values in the service profile or from parameters passed by the VSA.
See "Specifying a Rate-Limiting Service Profile for L2TP Connection Speeds" on page 248 for
more information about this method.
The service-profile method is supported only when the effective shaping-rate statement is
included at the [edit chassis] hierarchy level. The CLI commit check fails when service-profile is
configured but the effective shaping rate is not configured.
BEST PRACTICE: We recommend that you use only one service profile per subscriber
session to affect the downstream shaping rate or report an upstream rate. If more than
one dynamic service profile is applied to the subscriber session such that each affects the
downstream shaping rate or reports the upstream rate, the values from the most recently
applied profile are reported by L2TP. Deactivation of the most recently applied service
does not result in L2TP reporting the upstream speed for an existing (active) service
profile.
• static—This method causes the LAC to derive the speed from the configured static Layer 2 speed.
For Ethernet VLANs, this is the recommended (advisory) shaping rate configured on the PPPoE
logical interface underlying the subscriber interface. If the advisory shaping rate is not configured
on the underlying interface, then the actual speed of the underlying physical port is used.
• Starting in Junos OS Release 15.1R1, you can configure speed values directly in the Juniper
Networks VSAs, Tx-Connect-Speed (26-162) and Rx-Connect-Speed (26-163). These VSAs may be
returned in the RADIUS Access-Accept message. If only one of the VSAs is present, the LAC uses a
230
connect speed method to determine the value for the other speed. To use these VSAs, you must
configure RADIUS according to your RADIUS server documentation.
• Starting in Junos OS Release 15.1R1, you can configure a method that is conveyed in the Juniper
Networks VSA, Tunnel-Tx-Speed-Method (26-94). If configured, this VSA is returned in the RADIUS
Access-Accept message for individual subscribers. The VSA value applies globally rather than to a
specific tunnel. The method configured in this VSA specifies the resource that the LAC uses to set
the speed. To use this VSA, you must configure RADIUS according to your RADIUS server
documentation.
• When the speeds cannot be determined in any other manner, the port speed of the subscriber
interface is used.
NOTE: Some methods available in VSA 26-94 are not available in the CLI. When one of these
methods is received in the VSA, it is translated to a supported method instead of being rejected,
or it falls back to another method.
• none
• pppoe-ia-tags
• service-profile
• static
231
Table 21: Methods for Determining Connect Speeds by Junos OS Release. (Continued)
• ancp • ancp
• none
• pppoe-ia-tags
• none
• pppoe-ia-tags
• static (default)
NOTE: Changing the connect speed method in VSA 26-94 or in the CLI configuration has no
effect on existing L2TP sessions in which the ICCN has already been sent. All L2TP session
negotiations subsequent to the method change use the new setting.
In Junos OS Releases 15.1, 16.1, 16.2, and 17.1 (which support the actual method), the speed values in
AVP 24 and AVP 38 are typically not greater than the value that is enforced by CoS on the LAC side of
the network. Any difference between the speed reported in these AVPs and that enforced by CoS is
attributable to differences between the CoS configuration (of the source that is used to enforce a
downstream speed) and the Tx connect speed method used to establish these AVPs.
232
Before the LAC can send initial transmit and receive connect speeds in the ICCN message to the LNS, it
has to do the following:
1. If the Tunnel-Tx-Speed-Method VSA (26-94) is present, use the method specified by the VSA value.
2. Otherwise, use the method configured in the CLI with the tx-connect-speed-method statement.
1. If the selected method is none, the LAC does not include the transmit and receive speeds in the
ICCN.
2. For any other selected method, if the values in the Tx-Connect-Speed (26-162) and Rx-Connect-
Speed (26-163) VSAs are nonzero, the LAC sends those values in the ICCN.
3. If the VSA values are zero, use the selected method determined to derive the values to send.
• VSA 26-94 is received with ancp configured as the method. The CLI method is configured as none.
The LAC selects the VSA 26-94 value, the ancp method.
VSA 26-162 and VSA 26-163 are received with nonzero values. The LAC sends these VSA values in
the ICCN.
• VSA 26-94 is received with ancp configured as the method. The CLI method is configured as none.
The LAC selects the VSA 26-94 value, the ancp method.
VSA 26-162 and VSA 26-163 are received with zero values. The LAC uses the ancp method to derive
the values to send in the ICCN.
• VSA 26-94 is received with none configured as the method. The CLI method is configured as ancp.
The LAC selects the VSA 26-94 value, none, and does not send connect speeds in the ICCN.
• VSA 26-94 is not received. The CLI method is configured as none. The LAC does not send connect
speeds in the ICCN.
233
When the LAC has selected a method to derive the connect speeds, it falls back to a different method in
any of the following circumstances:
• One or both connect speed values has not been set by the selected method (VSA 26-94 or the CLI).
When one value is available and nonzero but the other is not, only the unset value falls back to a
different method. There is no fallback when the selected method is none, because this method prevents
the LAC from reporting the connect speeds. The fallback procedure can vary by Junos OS release.
• The selected method is ANCP. The ANCP value for the receive speed is found to be zero. The LAC
sends the ANCP value for the transmit speed, but the receive value falls back to the PPPoE IA tag
method. The LAC sends the IA tag value for the receive speed.
• The selected method is ANCP. The ANCP value for the receive speed is found to be zero. The LAC
sends the ANCP value for the transmit speed, but the receive value falls back to the PPPoE IA tag
method. The IA tag value for the receive speed is also found to be zero, so it falls back to the static
Layer 2 method. This is available, so the LAC sends the static Layer 2 value for the receive speed.
• The selected method is service profile. The service profile is not activated before the ICCN is sent, so
the LAC falls back to the ANCP method. Both transmit and receive ANCP values are available and
nonzero, so the LAC sends these values in the ICCN.
The service profile is activated by a Change of Authorization (CoA) at some later time for the session.
If updates are enabled, the LAC sends the service profile values to the LNS in a CSUN message. If
updates are not enabled, the service profile values are not reported to the LNS.
Note that updates require the method to be configured in the CLI. Consequently, VSA 26-94 must
not be configured or received so that the service profile method is selected from the CLI
configuration.
Starting in Junos OS Release 17.2R1, the LAC fallback procedure is as described in Table 22 on page
234.
234
Table 22: LAC Fallback Procedure When a Connect Speed Value is Not Set (Junos OS Release 17.2 and
Higher)
Method Transmit and Receive Transmit Speed Not Set Receive Speed Not Set
Speed Not Set
Service profile Both fall back to ANCP Transmit speed falls back Receive speed falls back to
method. to ANCP method. ANCP method.
ANCP Both fall back to PPPoE Transmit speed falls back Receive speed falls back to
IA tags method. to PPPoE IA tags method. PPPoE IA tags method.
PPPoE IA tags Both fall back to static Transmit speed falls back Receive speed falls back to
Layer 2 method. to static Layer 2 method. static Layer 2 method.
Static Layer 2 Both fall back to port Transmit speed falls back Receive speed falls back to
speed. to port speed. transmit speed.
Starting in Junos OS Release 15.1R1, the LAC fallback procedure is as described in Table 23 on page
234.
Table 23: LAC Fallback Procedure When a Connect Speed Value is Not Set (Junos OS Releases 15.1,
16.1, 16.2, 17.1)
Method Transmit and Transmit Speed Not Set Receive Speed Not Set
Receive Speed Not
Set
Actual Both fall back to Transmit speed falls back to Receive speed falls back to
ANCP method. ANCP method. ANCP method.
235
Table 23: LAC Fallback Procedure When a Connect Speed Value is Not Set (Junos OS Releases 15.1,
16.1, 16.2, 17.1) (Continued)
Method Transmit and Transmit Speed Not Set Receive Speed Not Set
Receive Speed Not
Set
ANCP Both fall back to If PPPoE IA tags are available If PPPoE IA tags are available
PPPoE IA tags for both, then both fall back to for both, then both fall back to
method. PPPoE IA tags method. PPPoE IA tags method.
PPPoE IA Both fall back to Transmit speed falls back to Receive speed falls back to
tags port speed. port speed. port speed.
Starting in Junos OS Release 13.3R1, the LAC fallback procedure is as described in Table 24 on page
235.
Table 24: LAC Fallback Procedure When a Connect Speed Value is Not Set (Junos OS Releases 13.3,
14.1, 14.2)
Method Transmit and Transmit Speed Not Set Receive Speed Not Set
Receive Speed Not
Set
ANCP Both fall back to If PPPoE IA tags are available If PPPoE IA tags are available
PPPoE IA tags for both, then both fall back for both, then both fall back
method. to PPPoE IA tags method. to PPPoE IA tags method.
Table 24: LAC Fallback Procedure When a Connect Speed Value is Not Set (Junos OS Releases 13.3,
14.1, 14.2) (Continued)
Method Transmit and Transmit Speed Not Set Receive Speed Not Set
Receive Speed Not
Set
PPPoE IA Both fall back to Transmit speed falls back to Receive speed falls back to
tags static Layer 2 static Layer 2 method. static Layer 2 method.
method.
Static Layer Both fall back to Transmit speed falls back to Receive speed falls back to
2 port speed. port speed. transmit speed.
NOTE: For both Gigabit Ethernet (ge) and 10-Gigabit Ethernet (xe) interfaces, the port speed
value is set to 1,000,000,000. For aggregated Ethernet (ae) interfaces, the port speed value is set
to 0. The port speed value for all these interface types is reported in both AVP 24 and AVP 38.
The L2TP Rx Connect Speed (in bits per second) AVP, which is represented by AVP 38, is included in the
ICCN message when the receive connect speed is different from the transmit connect speed. By default,
when the connection speed is the same in both directions, AVP 38 is not sent; the LNS uses the value in
AVP 24 for both transmit and receive connect speeds.
AVP 38 is generated when the receive connect speed of the access interface is set equal to the
calculated transmit connect speed by issuing the rx-connect-speed-when-equal statement at the [edit
services l2tp] hierarchy level. In this scenario, the LAC transmits the same value for transmit and receive
connect speeds that are sent to the LNS through the AVP 24 and AVP 38 in the ICCN message.
To configure the sending of AVP 38 when the connection speeds are the same in both the downstream
and upstream directions:
237
• Configure the transmission of the receive connect speed, AVP 38, when the receive connect speed is
set equal to the calculated transmit connect speed.
You can include the tx-connect-speed-method statement at the [edit services l2tp] hierarchy level to
configure a method that specifies the resource that the LAC uses for setting these speeds when the
Juniper Networks VSAs are not returned for the subscriber.
Starting in Junos OS Release 17.2R1, when you enable connect speed updates for the LAC you must
include the tx-connect-speed-method statement. You also must specify either ancp or service-profile as
the method; otherwise, the LAC does not send CSUN messages.
Changing the connect speed method in the CLI configuration or in VSA 26-94 has no effect on existing
L2TP sessions in which the ICCN has already been sent. All L2TP session negotiations subsequent to the
method change use the new setting.
NOTE: Starting in Junos OS Release 13.3R1, availability and support for methods vary by Junos
OS Release. The following procedure lists all historical methods; some of the methods may not
be supported in the software release you are using. See "Transmission of Tx and Rx Connection
Speeds from LAC to LNS" on page 226 for a table of support by release.
• (Optional) Configure the LAC to use the class-of-service effective shaping rates.
NOTE: This method requires that the effective shaping rate statement is configured at the
[edit chassis] hierarchy level. If it is not, then committing this method fails. However, if the
method is received from RADIUS in VSA 26-94, a system log message is generated instead,
because no commit check is performed in this case.
• (Optional) Configure the LAC to use the values derived from the ANCP value configured on the
PPPoE interface underlying the subscriber interface.
• (Optional) Configure the LAC to use the values provided in the PPPoE IA tags received from the
DSLAM.
In this case, the value of Actual-Data-Rate-Downstream (VSA 26-129) is used for AVP 24. The value
of Actual-Data-Rate-Upstream (VSA 26-130) is used for AVP 38 and is sent only when the VSA
values differ.
NOTE: This speed derived from the IA tags does not apply to subscribers that are already
logged in; it is effective only for subscribers that log in after this setting has been saved.
• Downstream (Tx) speed: The actual CoS rate that is enforced on the level 3 node based on local
policy
• Upstream (Rx) speed: The value configured in the dynamic service profile.
239
2. In the dynamic service profile, configure the ingress shaping rate from CoS to be used by the LAC
to report to the LNS as the Rx connect speed.
NOTE: The service-profile method requires that the effective shaping rate statement is
configured at the [edit chassis] hierarchy level. If it is not, the commit check fails. However, if
the service-profile method is received from RADIUS in VSA 26-94, a system log message is
generated instead, because no commit check is performed in this case.
NOTE: For another method to use service profiles to provide the connection speeds, see
"Specifying a Rate-Limiting Service Profile for L2TP Connection Speeds" on page 248.
• (Optional) Configure the LAC to use the underlying interface’s recommended (advisory) downstream
shaping rate for AVP 24 and recommended upstream shaping rate for AVP 38. This is also referred to
as the static Layer 2 shaping rate.
You configure the advisory rates under the PPPoE logical interface underlying the subscriber
interface with the advisory-options statement at the [edit interfaces interface-name unit logical-
unit-number] hierarchy level. If the advisory speed is not configured, then the actual port speed is
used. For ge and xe interfaces, the speed value is set to 10,000,000 and for ae interfaces, the speed
value is set to 0 and sent in both AVP 24 and AVP 38
• (Optional) Configure the LAC to disable sending AVP 24 and AVP 38.
240
NOTE: This option prevents the LAC from sending either AVP 24 or AVP 38 in the ICCN
messages. This option also overrides the Juniper Networks RADIUS VSAs, Tx-Connect-Speed
(26-162) and Rx-Connect-Speed (26-163).
The L2TP AVP extensions defined in RFC 5515, Layer 2 Tunneling Protocol (L2TP) Access Line
Information Attribute Value Pair (AVP) Extension, enable the LAC to report to the LNS characteristics of
the subscriber’s access line, such as identification attributes, line type, connection speed, various data
rates, and so on. The LAC receives the access line information when the subscriber’s CPE initiates a
connection request, and forwards the available information in various AVPs included in ICRQ messages
to the LNS. The LAC can also signal to the LNS that it is capable of sending updates to the subscriber
connection speeds; these are conveyed by the Connect Speed Update AVP (97) in the CSUN message.
Starting in Junos OS Release 17.4R1, RFC 5515 AVP extensions are also supported on the LNS.
Consequently, you can configure the LNS to process subscriber access line information and connection
speed updates that it receives from the LAC.
Starting in Junos OS Release 19.3R1, AVPs for PON and G.fast access lines are supported,
corresponding to the Broadband Forum PON and G.fast TLVs.
NOTE: Subscriber access line information conveyed by AVPs in ICRQ messages is passed to
RADIUS in DSL Forum VSA AVPs. Initial and updated connection speeds conveyed in ICCN and
CSUN messages can be used by CoS to adjust traffic rates for the subscriber lines.
By default, neither the access line information forwarding or connection speed update capability are
enabled on the LAC. You must configure the capabilities for all LNS endpoints or for a specific LNS
endpoint. The per-destination configuration applies to all tunnels with that destination IP address. You
might want to use a per-destination configuration when you know that only certain endpoints support
or correctly implement this feature.
241
Similarly, processing of this information by the LNS is not enabled by default. You can enable processing
for information received from all LAC endpoints or for specific LAC endpoints. The per-destination
configuration applies to all tunnels with that destination IP address.
NOTE: The CLI statements are the same for both the LAC and LNS; the difference is that you
include the statements in the LAC configuration or the LNS configuration.
To configure the LAC to send information about subscriber access lines to the LNS, or to configure the
LNS to process this information received from the LAC:
BEST PRACTICE: Do not configure the connection-speed-update option on the LAC when the
LNS does not support connection speed changes. This might be an LNS that is not configured to
process the updates or a noncompliant, third-party LNS. Configuring the LAC option for such an
LNS generates additional control messages that are ignored.
To configure the LAC to also send updates to the LNS about changes in connection speed, or to
configure the LNS to process speed updates received from the LAC:
or
• When you configure the LAC to send updates, you must also configure the method by which the
connect speed values are derived. The method specifies the source of the update values. On the LNS,
the derivation method is not relevant and cannot be configured.
• The following configuration specifies that for all tunnels with an endpoint address of 192.0.2.2, the
LAC reports access line characteristics sourced from the ANCP agent or the PPPoE intermediate
agent (in that order) to the LNS in the ICRQ message. The Connect Speed Update Enable AVP (98) is
not included in the ICRQ; consequently no CSUN messages are sent to the LNS to report speed
changes in the subscriber access lines reported by the ANCP agent. The LAC ignores any CSURQ
messages that it receives from the LNS; this can be only a third-party LNS, because the sending of
CSURQ messages is not supported on MX Series routers configured as an LNS.
• The following configuration specifies that for all tunnels with an endpoint address of 203.0.113.23,
the LAC reports access line characteristics sourced from the ANCP agent or the PPPoE intermediate
agent (in that order) to the LNS in the ICRQ message. The Connect Speed Update Enable AVP (98) is
included in the ICRQ; CSUN messages are sent to the LNS to report speed changes in the subscriber
access lines reported by the ANCP agent. The LAC accepts any CSURQ messages that it receives
from the LNS and responds with a CSUN message; this can be only a third-party LNS, because the
sending of CSURQ messages is not supported on MX Series routers configured as an LNS.
When access line information forwarding is enabled globally, you cannot disable it for a specific
destination. However, when connection speed updates are enabled globally, you can disable updates for
a specific destination.
• The following configuration specifies that both forwarding of access line characteristics and
connection speed updates are enabled for all destinations. For destination 198.51.100.2, the global
updates configuration is overridden by repeating the access line configuration for, and omitting the
connection speed updates for, that destination.
The show services l2tp summary command displays the configuration that applies to all destinations.
The following sample output confirms the global configuration in this example:
The show services l2tp destination detail command displays the configuration for each destination
individually. The following sample output verifies that connection speed updates are disabled for
198.51.100.2:
• In this example, the forwarding of access line characteristics is enabled for all destinations, but
connection speed updates are enabled for only one destination, 198.51.100.21.
The following sample output confirms that connection speed updates are disabled globally:
The following sample output confirms that connection speed updates are enabled for destination
198.51.100.21:
Preventing the LAC from Sending Calling Number AVP 22 to the LNS
Calling Number AVP 22 typically identifies the interface that is connected to the customer in the access
network. When RADIUS includes the Calling-Station-Id in the Access-Accept message, that value is used
for the Calling Number AVP. Otherwise, the underlying interface (for example, the S-VLAN IFL) on which
the PPPoE session is established is used for the Calling Number AVP value.
By default, the LAC includes this AVP in the incoming-call request (ICRQ) packets that it sends to the
LNS. However, you may wish to hide your network access interface information. To do so, you can
configure the tunnel so that the LAC does not send the Calling Number AVP to the LNS.
• Configure disabling.
The LAC sends information about the access line or the subscriber to the LNS in L2TP Calling Number
AVP 22. This AVP is conveyed in the incoming-call request (ICRQ) packet when the L2TP session is
being established. AVP 22 by default identifies the access node interface that is connected to the
customer in the access network; this is the agent circuit identifier or ACI. The LAC receives the ACI in
the PPPoE Active Discovery Request (PADR) packet from the L2TP client as DSL Forum Agent-Circuit-
ID VSA [26-1].
Alternatively, you can use the calling-station-id-format statement to change the values sent in the AVP.
For example, you might specify that the agent remote identifier (ARI) received in the PADR as DSL
Forum Agent-Remote-ID VSA [26-2] is used instead of the agent circuit identifier, that both are used, or
that additional attributes are included. The set of values used in the AVP is known as the Calling-
Station-ID format. When this is configured, then the value of the AVP is subsequently sent to the
RADIUS server as Calling-Station-ID attribute (31).See Configuring a Calling-Station-ID with Additional
Options for more information.
In some cases you may want the value of Calling Number AVP 22 to be independent from the RADIUS
attribute value. You can do this by overriding the configured Calling-Station-ID format for the value. Use
the remote-circuit-id-format statement to specify a different format for the AVP: the ACI, the ARI, or
both the ACI and ARI from the PADR packet.
You can also configure fallback values that are sent in the Calling Number AVP when the values you
configure with the remote-circuit-id-format statement are not present in the PADR. You can configure
the fallback option to send the configured Calling-Station-ID or the default underlying interface as the
calling number AVP.
• Configure L2TP.
• Configure RADIUS.
1. Configure the LAC to send the calling number AVP using the configured remote circuit ID format
instead of the Calling-Station-ID format.
247
NOTE: The override statement fails commit check if you have not configured the remote-
circuit-id-format statement.
2. Configure the format of the values that override the Calling-Station-ID in AVP 22. You can configure
the format to include the ACI, the ARI, or both the ACI and ARI.
Table 25 on page 247 describes the attributes sent in calling number AVP 22 based on the attributes
received in the PADR and the format configured in the remote-circuit-id-format configuration
statement.
Table 25: Attributes Sent as Calling Number AVP Based on Remote Circuit ID Format and Attributes
Received in PADR
3. (Optional) Configure the fallback value to be used. Fallback is triggered if the ACI and ARI are not
present in the PADR but are configured in the remote circuit ID format. You can configure the LAC to
send the configured Calling-Station-ID or the default underlying interface in the Calling number AVP
22 when fallback is triggered.
The remote circuit ID format determines what triggers the fallback. Table 26 on page 248 shows the
fallback trigger based on the remote circuit ID format.
4. (Optional) Configure an alternative delimiter character that the router uses to separate the
concatenated values in the resulting remote circuit ID string when more than one value is specified in
the remote circuit ID format. The default delimiter is a hash character (#).
When an L2TP session is negotiated, the LAC sends to the LNS an ICCN message that includes values
for the Rx connection speed (in AVP 38) and Tx connection speed (in AVP 24) at the LAC. The LAC uses
values from the best source available at the time of negotiation. If multiple sources are available, the
selection is made based on preference hierarchy of the sources. The source is either RADIUS, ANCP, or
PPPoE-IA tags.
By default, the LAC cannot use a service profile received in a RADIUS Access-Accept message as the
source, because the profile is not applied until the network family is activated, which occurs after the
249
session negotiation completes. However, if the LNS supports RFC 5515, Layer 2 Tunneling Protocol
(L2TP) Access Line Information Attribute Value Pair (AVP) Extensions, the LAC can send a connection
speed update to the LNS with values from the service profile.
Starting in Junos OS Release 18.1R1, you can use a dynamic service profile to provide the connection
speeds included in AVP 38 and AVP 24 when the L2TP session is negotiated. At subscriber login, authd
determines whether the configured service profile name matches the profile name conveyed in the
Juniper Networks Activate-Service VSA (26-65) in the RADIUS Access-Accept message. If the names
match, the speeds are derived either from default values in the service profile or from parameters
passed by the VSA.
This processing by authd to establish the connection speeds takes place only at subscriber login. It does
not occur in response to reauthentication or CoA requests.
NOTE: For this feature to work, you must also use the tx-connect-speed-method statement at
the [edit services l2tp] hierarchy level to set the method to service-profile. You must also
configure the effective-shaping-rate statement at the [edit chassis] hierarchy level.
You can define the rates directly in the service profile as default values for user-defined variables.
Alternatively, you can configure the rates to be passed by RADIUS in VSA 26-65. In either case, the first
value is taken as the receive speed (the upstream rate from the subscriber to the LAC) and the second
value is taken as the transmit speed (the downstream rate from the LAC to the subscriber). The VSA
might be configured to pass more than two parameters, but only the first two parameters matter for the
service rate-limiting function.
The rate values are specified in the profile or VSA 26-65 in Kbps, but the L2TP AVP format requires rate
values in bps. When you enable this feature, default multipliers automatically convert the rates from
Kbps to bps. You can also configure the multiplier options to adjust the rates up or down. The adjusted
values are equivalent to the Juniper Networks RADIUS VSAs, Rx-Connect-Speed (26-163) and Tx-
Connect-Speed (26-162). These values are stored as such in the session database. Because the values
are available in the SDB before the L2TP connection is negotiated, the LAC includes them in the ICCN
message as AVP 38 and AVP 24. They are treated as RADIUS-sourced values and consequently have
the highest precedence.
NOTE: A parameter value of zero signifies that the rate is not set. For example, if VSA 26-65
returns service-profile-name(0, 0), then no value is set in the SDB for Rx or Tx.
Another circumstance that causes no values to be set in the SDB is if VSA 26-65 does not pass
any parameters and you failed to set default values in the service profile. In this case, there are
no values for authd to derive and so nothing to place in the SDB for Rx or Tx.
250
If the service used to establish the rate limiters is deactivated or deleted, authd then clears those rate
limiter values from the subscriber session. If the service is reactivated, authd does not reinstate the rate
limiters.
To configure LAC connection speeds to be derived at login from a dynamic service profile and to
optionally adjust the rates:
1. Specify the dynamic service profile that supplies the connection speeds.
[edit access]
user@host# set service-rate-limiter service-name service-profile-name
2. (Optional) Configure a value that is multiplied with the Rx connect speed specified in the service
profile.
[edit access]
user@host# set service-rate-limiter rx-multiplier rx-multiplier
3. (Optional) Configure a value that is multiplied with the Tx connect speed specified in the service
profile.
[edit access]
user@host# set service-rate-limiter tx-multiplier tx-multiplier
5. Enable the reporting of the actual downstream rate in RADIUS accounting messages.
[edit chassis]
user@host# set effective-shaping-rate
For example, suppose you configure a dynamic service policy, l2tp-service. The policy includes user-
defined variables, upstream and downstream, with default values, respectively, of 20,000 Kbps and
251
30,000 Kbps. The upstream variable is used for the input (ingress) filter and downstream variable is used
for the output (egress) filter.
Then you configure the following service rate limiter, which specifies that when a service policy named
l2tp-service is returned, the Rx value in the policy, or passed by the VSA, is multiplied by 1005. The Tx
value is multiplied by 1003.
[edit access]
user@host# set service-rate-limiter service-name l2tp-service
user@host# set service-rate-limiter rx-multiplier 1005
user@host# set service-rate-limiter tx-multiplier 1003
Suppose a subscriber logs in and the Access-Accept message from the RADIUS server includes the
Activate-Service VSA, 26-55, specifying l2tp-service. What happens next depends on the parameters
passed by the VSA.
• The VSA includes “l2tp-service” with no parameters. The following values are stored in the SDB:
• The VSA includes “l2tp-service(10000, 15000)”. The following values are stored in the SDB:
• Rx is the first parameter passed by the VSA multiplied by the configured multiplier:
• Tx is the second parameter passed by the VSA multiplied by the configured multiplier:
• The VSA includes “l2tp-service(10000)”. The following values are stored in the SDB:
• Rx is the first (and only) parameter passed by the VSA multiplied by the configured multiplier:
• Because the VSA does not pass a second parameter, Tx is the default value in the policy multiplied
by the configured multiplier:
• The VSA includes “l2tp-service(10000, 0)”. The following values are stored in the SDB:
• Rx is the first parameter passed by the VSA multiplied by the configured multiplier:
• Because the second parameter passed is zero, and zero means that the rate is not set, no value is
stored in the SDB for Tx.
• The VSA includes “l2tp-service(0, 0)”. The following values are stored in the SDB:
• Because a passed value of zero means that the rate is not set, no value is stored in the SDB for
either Rx or Tx.
• The VSA includes “l2tp-service(10000, 15000, 4000000)”. The following values are stored in the
SDB:
• Rx is the first parameter passed by the VSA multiplied by the configured multiplier:
• Tx is the second parameter passed by the VSA multiplied by the configured multiplier:
Release Description
19.3R1 Starting in Junos OS Release 19.3R1, AVPs for PON and G.fast access lines are supported,
corresponding to the Broadband Forum PON and G.fast TLVs.
18.1R1 Starting in Junos OS Release 18.1R1, you can use a dynamic service profile to provide the connection
speeds included in AVP 38 and AVP 24 in the ICCN message when the L2TP session is negotiated.
253
17.4R1 Starting in Junos OS Release 17.4R1, an MX Series router configured as an LNS can process subscriber
access line information and connection speed updates that it receives from the LAC.
17.4R1 Starting in Junos OS Release 17.4R1, RFC 5515 AVP extensions are also supported on the LNS.
17.2R1 Starting in Junos OS Release 17.2R1, the LAC fallback procedure is as described in Table 3.
17.2R1 Starting in Junos OS Release 15.1R1, the LAC fallback procedure is as described in Table 4.
17.2R1 Starting in Junos OS Release 13.3R1, the LAC fallback procedure is as described in Table 5.
17.2R1 Starting in Junos OS Release 17.2R1, when you enable connect speed updates for the LAC you must
include the tx-connect-speed-method statement.
15.1R1 Starting in Junos OS Release 15.1R1, you can configure speed values directly in the Juniper Networks
VSAs, Tx-Connect-Speed (26-162) and Rx-Connect-Speed (26-163).
15.1R1 Starting in Junos OS Release 15.1R1, you can configure a method that is conveyed in the Juniper
Networks VSA, Tunnel-Tx-Speed-Method (26-94).
14.1 Starting in Junos OS Release 14.1, L2TP supports a set of AVPs that convey information about
subscriber access lines from the LAC to the LNS.
13.3R1 Starting in Junos OS Release 13.3R1, availability and support for methods vary by Junos OS Release, as
described in Table 2.
13.3R1 Starting in Junos OS Release 13.3R1, availability and support for methods vary by Junos OS Release.
RELATED DOCUMENTATION
IN THIS SECTION
Applying PPP Attributes to L2TP LNS Subscribers per Inline Service Interface | 256
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
Configuring an Address-Assignment Pool for L2TP LNS with Inline Services | 264
Configuring Options for the LNS Inline Services Logical Interface | 270
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
L2TP Session Limits and Load Balancing for Service Interfaces | 278
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
Configuring a Pool of Inline Services Interfaces for Dynamic LNS Sessions | 309
The L2TP LNS feature license must be installed before you begin the configuration. Otherwise, a
warning message is displayed when the configuration is committed.
1. (Optional) Configure a user group profile that defines the PPP configuration for tunnel subscribers.
See "Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile" on page 259.
255
18. (Optional) Specify how long the L2TP retains information about terminated dynamic tunnels,
sessions, and destinations.
See "Setting the L2TP Destruct Timeout" on page 163.
19. (Optional) Configure the L2TP destination lockout timeout.
See "Configuring the L2TP Destination Lockout Timeout" on page 163.
20. (Optional) Configure L2TP tunnel switching.
See "Configuring L2TP Tunnel Switching" on page 159.
21. (Optional) Prevent the creation of new sessions, destinations, or tunnels for L2TP.
See "Configuring L2TP Drain" on page 165.
22. (Optional) Configure whether the L2TP failover protocol is negotiated or the silent failover method
is used for resynchronization.
See "Configuring the L2TP Peer Resynchronization Method" on page 320.
23. (Optional) Enable SNMP statistics counters.
See "Enabling Tunnel and Global Counters for SNMP Statistics Collection" on page 144.
24. (Optional) Configure trace options for troubleshooting the configuration.
See "Tracing L2TP Events for Troubleshooting" on page 323.
You also need to configure CoS for LNS sessions. For more information, see Configuring Dynamic CoS
for an L2TP LNS Inline Service.
You can configure PPP attributes that are applied by the LNS on the inline service (si) interface to the
PPP subscribers tunneled from the LAC. Because you are configuring the attributes per interface rather
than with a user group profile, the attributes for subscribers can be varied with a finer granularity. This
configuration matches that used for terminated PPPoE subscribers.
1. Specify the predefined dynamic interface and logical interface variables in the dynamic profile.
2. Configure the interval between PPP keepalive messages for the L2TP tunnel terminating on the LNS.
3. Configure PPP authentication methods that apply to tunneled PPP subscribers at the LNS.
4. Specify a set of AAA options that is used for authentication and authorization of tunneled PPP
subscribers at the LNS that are logging in by means of the subscriber and AAA contexts that are
specified in the AAA options set.
The option set is configured with the aaa-options aaa-options-name statement at the [edit access]
hierarchy level.
5. Configure the router to prompt Customer Premises Equipment (CPE) to negotiate both primary and
secondary DNS addresses during IPCP negotiation for tunneled PPP subscribers at the LNS.
6. (Optional) Disable validation of the PPP magic number during LCP negotiation and in LCP keepalive
(echo-request/echo-reply) exchanges. Prevents comparison of received magic number with internally
generated magic number, so that a mismatch does not cause session termination.
2. Configure the interval between PPP keepalive messages for the L2TP tunnel terminating on the LNS.
3. Configure the number of keepalive packets a destination must fail to receive before the network
takes down a link.
NOTE: The keepalives up-count option is typically not used for subscriber management.
4. Configure PPP authentication methods that apply to tunneled PPP subscribers at the LNS.
5. Configure the router to prompt the Customer Premises Equipment (CPE) to negotiate both primary
and secondary DNS addresses during IPCP negotiation for tunneled PPP subscribers at the LNS.
NOTE: You can also configure PPP attributes with a user group profile that applies the attributes
to all subscribers with that profile on a LAC client. See "Applying PPP Attributes to L2TP LNS
Subscribers with a User Group Profile" on page 259 for more information. When you configure
the PPP attributes for L2TP LNS subscribers both on the si interface and in user group profiles,
the inline service interface configuration takes precedence over the user group profile
configuration.
NOTE: When PPP options are configured in both a group profile and a dynamic profile, the
dynamic profile configuration takes complete precedence over the group profile when the
dynamic profile includes one or more of the PPP options that can be configured in the group
profile. Complete precedence means that there is no merging of options between the profiles.
The group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
You can configure a user group profile that enables the LNS to apply PPP attributes to the PPP
subscribers tunneled from the LAC. The user group profile is associated with clients (LACs) in the L2TP
access profile. Consequently all subscribers handled by a given client share the same PPP attributes.
[edit access]
user@host# edit group-profile profile-name
2. Configure the interval between PPP keepalive messages for the L2TP tunnel terminating on the LNS.
NOTE: Changes to the keepalive interval in a user group profile affect only new L2TP sessions
that come up after the change. Existing sessions are not affected.
3. Configure PPP authentication methods that apply to tunneled PPP subscribers at the LNS.
4. Specify a set of AAA options that is used for authentication and authorization of tunneled PPP
subscribers at the LNS that are logging in by means of the subscriber and AAA contexts that are
specified in the AAA options set.
The option set is configured with the aaa-options aaa-options-name statement at the [edit access]
hierarchy level.
5. Configure the router to prompt the Customer Premises Equipment (CPE) to negotiate both primary
and secondary DNS addresses during IPCP negotiation for tunneled PPP subscribers at the LNS.
6. (Optional) Disable the Packet Forwarding Engine from performing a validation check for PPP magic
numbers received from a remote peer in LCP keepalive (Echo-Request/Echo-Reply) exchanges. This
prevents PPP from terminating the session when the number does not match the value agreed upon
during LCP negotiation. This capability is useful when the remote PPP peers include arbitrary magic
numbers in the keepalive packets. Configuring this statement has no effect on LCP magic number
negotiation or on the exchange of keepalives when the remote peer magic number is the expected
negotiated number.
7. Configure how long the PPP subscriber session can be idle before it is considered to have timed out.
NOTE: You can also configure PPP attributes on a per-interface basis. See "Applying PPP
Attributes to L2TP LNS Subscribers per Inline Service Interface" on page 256 for more
information. When you configure the PPP attributes for L2TP LNS subscribers both on the si
interface and in user group profiles, the inline service interface configuration takes precedence
over the user group profile configuration.
NOTE: When PPP options are configured in both a group profile and a dynamic profile, the
dynamic profile configuration takes complete precedence over the group profile when the
dynamic profile includes one or more of the PPP options that can be configured in the group
profile. Complete precedence means that there is no merging of options between the profiles.
The group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
Access profiles define how to validate Layer 2 Tunneling Protocol (L2TP) connections and session
requests. Within each L2TP access profile, you configure one or more clients (LACs). The client
characteristics are used to authenticate LACs with matching passwords, and to establish attributes of
the client tunnel and session. You can configure multiple access profiles and multiple clients within each
profile.
[edit access]
user@host# edit profile access-profile-name
262
NOTE: Except for the special case of the default client, the LAC client name that you
configure in the access profile must match the hostname of the LAC. In the case of a Juniper
Networks router acting as the LAC, the hostname is configured in the LAC tunnel profile with
the gateway gateway-name statement at the [edit access tunnel-profile profile-name tunnel
tunnel-id source-gateway] hierarchy level. Alternatively, the client name can be returned from
RADIUS in the attribute, Tunnel-Client-Auth-Id [90].
NOTE: Use default as the client name when you want to define a default tunnel client. The
default client enables the authentication of multiple LACs with the same secret and L2TP
attributes. This behavior is useful when, for example, many new LACs are added to the
network, because it enables the LACs to be used without additional LNS profile configuration.
Use default only on MX Series routers. The equivalent client name on M Series routers is *.
3. (Optional) Specify a local access profile that overrides the global access profile and the tunnel group
AAA access profile to configure RADIUS server settings for the client.
4. Configure the LNS to renegotiate the link control protocol (LCP) with the PPP client. tunneled from
the client.
5. Configure one or more dynamic service profiles to apply services to all subscribers on the LAC. You
can optionally pass parameter to the services in the same statement.
6. Configure the maximum number of sessions allowed in a tunnel from the client (LAC).
7. Configure the LNS to override result codes 4 and 5 with result code 2 in CDN messages it sends to
the LAC when the number of L2TP sessions reaches the configured maximum value. Some third-
party LACs cannot fail over to another LNS unless the result code has a value of 2.
9. (Optional) Associate a group profile containing PPP attributes to apply for the PPP sessions being
tunneled from this LAC client.
NOTE: If user-group-profile is modified or deleted, the existing LNS subscribers, which were
using this Layer 2 Tunneling Protocol client configuration, go down.
For some LNS tunnels, you might wish to override the access profile configured at the routing instance
that hosts the tunnel with a particular RADIUS server configuration. You can configure a local access
profile to do so. You can subsequently use the aaa-access-profile statement to apply the local access
profile to a tunnel group or LAC client.
A local access profile applied to a client overrides a local access profile applied to a tunnel group, which
in turn overrides the access profile for the routing instance.
264
[edit access]
user@host# edit profile local-aaa-profile-name
You can configure pools of addresses that can be dynamically assigned to the tunneled PPP subscribers.
The pools must be local to the routing instance where the subscriber comes up. The configured pools
are supplied in the RADIUS Framed-Pool and Framed-IPv6-Pool attributes. Pools are optional when
Framed-IP-Address is sent by RADIUS.
To configure an address-assignment pool, you must specify the name of the pool and configure the
addresses for the pool.
You can optionally configure multiple named ranges, or subsets, of addresses within an address-
assignment pool. During dynamic address assignment, a client can be assigned an address from a specific
named range. To create a named range, you specify a name for the range and define the address range.
NOTE: Be sure to use the address-assignment pools (address-assignment) statement rather than
the address pools (address-pool) statement.
For more information about address assignment pools, see Address-Assignment Pools Overview and
Address-Assignment Pool Configuration Overview.
265
1. Configure the name of the pool and specify the IPv4 family.
[edit access]
user@host# edit address-assignment pool pool-name family inet
2. Configure the network address and the prefix length of the addresses in the pool.
3. Configure the name of the range and the lower and upper boundaries of the addresses in the range.
[edit access]
user@host# edit address-assignment pool lns-v4-pool family inet
[edit access address-assignment pool lns-v4-pool family inet]
user@host# set network 192.168.1.1/16
[edit access address-assignment pool lns-v4-pool family inet]
user@host# set range lns-v4-pool-range low 192.168.1.1 high 192.168.255.255
1. Configure the name of the pool and specify the IPv6 family.
[edit access]
user@host# edit address-assignment pool pool-name family inet6
2. Configure the IPv6 network prefix for the address pool. The prefix specification is required when you
configure an IPv6 address-assignment pool.
3. Configure the name of the range and define the range. You can define the range based on the lower
and upper boundaries of the prefixes in the range, or based on the length of the prefixes in the range.
[edit access]
user@host# edit address-assignment pool lns-v6-pool family inet6
[edit access address-assignment pool lns-v6-pool family inet6]
user@host# set prefix 2001:DB8::/32
[edit access address-assignment pool lns-v6-pool family inet6]
user@host# set range lns-v6-pool-range low 2001:DB8:1::/48 high 2001:DB8::ffff::/48
The peer interface connects the LNS to the cloud towards the LACs so that IP packets can be exchanged
between the tunnel endpoints. MPLS and aggregated Ethernet can also be used to reach the LACs.
NOTE: On MX Series routers, you must configure the peer interface on an MPC.
[edit interfaces]
user@host# edit interface-name
2. Enable VLANs.
3. Specify the logical interface, bind a VLAN tag ID to the interface, and configure the address family
and the IP address for the logical interface.
The inline service interface is a virtual physical interface that resides on the Packet Forwarding Engine.
This si interface, referred to as an anchor interface, makes it possible to provide L2TP services without a
special services PIC. The inline service interface is supported only by MPCs on MX Series routers. Four
inline service interfaces are configurable per MPC-occupied chassis slot.
NOTE: On MX80 and MX104 routers, you can configure only four inline services physical
interfaces as anchor interfaces for L2TP LNS sessions: si-1/0/0, si-1/1/0, si-1/2/0, and si-1/3/0.
You cannot configure si-0/0/0 for this purpose on MX80 and MX104 routers.
Although the range of bandwidth values is 1 Gbps through 400 Gbps, you cannot configure the
bandwidth in absolute numbers such as 12,345,878,000 bps. You must use the options available in the
CLI statement:
• 1g
• 10g through 100g in 10 Gbps increments: 10g, 20g, 30g, 40g, 50g, 60g, 70g, 80g, 90g, 100g
• 100g through 400g in 100 Gbps increments: 100g, 200g, 300g, 400g
The maximum bandwidth available varies among MPCs, as shown in Table 27 on page 268. A system log
message is generated when you configure a bandwidth higher than is supported on the MPC.
268
MPC4E 40 Gbps
MPC5E 40 Gbps
MPC6E 40 Gbps
1. Access an MPC-occupied slot and the PIC where the interface is to be enabled.
[edit chassis]
user@host# edit fpc slot-number pic number
2. Enable the interface and optionally specify the amount of bandwidth reserved on each Packet
Forwarding Engine for tunnel traffic using inline services. Starting in Junos OS Release 16.2, you are
not required to explicitly specify a bandwidth for L2TP LNS tunnel traffic using inline services. When
you do not specify a bandwidth, the maximum bandwidth supported on the PIC is automatically
269
available for the inline services; inline services can use up to this maximum value. In earlier releases,
you must specify a bandwidth when you enable inline services with the inline-services statement.
The inline service interface is a virtual physical service interface that resides on the Packet Forwarding
Engine. This si interface, referred to as an anchor interface, makes it possible to provide L2TP services
without a special services PIC. The inline service interface is supported only by MPCs on MX Series
routers. Four inline service interfaces are configurable per MPC-occupied chassis slot.
You can maximize the number of sessions that can be shaped in one service interface by setting the
maximum number of hierarchy levels to two. In this case, each LNS session consumes one L3 node in
the scheduler hierarchy for shaping.
If you do not specify the number of levels (two is the only option), then the number of LNS sessions that
can be shaped on the service interface is limited to the number of L2 nodes, or 4096 sessions.
Additional sessions still come up, but they are not shaped.
[edit interfaces]
user@host# edit si-slot/pic/port
2. (Optional; for per-session shaping only) Enable the inline service interface for hierarchical schedulers
and limit the number of scheduler levels to two.
3. (Optional; for per-session shaping only) Configure services encapsulation for inline service interface.
You must specify characteristics—dial-options—for each of the inline services logical interfaces that you
configure for the LNS. LNS on MX Series routers supports only one session per logical interface, so you
must configure it as a dedicated interface; the shared option is not supported. (LNS on M Series routers
supports dedicated and shared options.) You also configure an identifying name for the logical interface
that matches the name you specify in the access profile.
You must specify the inet address family for each static logical interface or in the dynamic profile for
dynamic LNS interfaces. Although the CLI accepts either inet or inet6 for static logical interfaces, the
subscriber cannot log in successfully unless the address family inet is configured.
NOTE: For dynamic interface configuration, see "Configuring a Dynamic Profile for Dynamic LNS
Sessions" on page 310.
[edit]
user@host# edit interfaces si-fpc/pic/port unit logical-unit-number
3. Configure the logical interface to be used for only one session at a time.
4. Configure the address family for each logical interface and enable the local address on the LNS that
provides local termination for the L2TP tunnel to be derived from the specified interface name.
By default, when an inline service (si) anchor interface goes down—for example, when the card hosting
the interface fails or restarts—L2TP subscriber traffic is lost. When the PPP keepalive timer for the
tunnel subsequently expires, the control plane goes down and the PPP client is disconnected.
Consequently, the client must then reconnect.
You can avoid traffic loss in these circumstances by configuring an aggregated inline service interface
(asi) bundle to provide 1:1 stateful redundancy, also called hot standby or active-backup redundancy.
The bundle consists of a pair of si physical interfaces, the primary (active) member link and the
secondary (standby or backup) member link. These interfaces must be configured on different MPCs;
redundancy is not achievable if you configure the primary and secondary interface on the same MPC
because both member interfaces go down if the card goes down.
When subscribers log in and 1:1 redundancy is configured, the L2TP session is established over an
underlying virtual logical interface (asix.0) over the asi0 physical interface. Individual subscriber logical
interfaces are created on the underlying interface in the format, asiX.logical-unit-number. The session
remains up in the event of a failure or a restart on the MPC hosting the primary member link interface.
All the data traffic destined for this L2TP session automatically moves over to the secondary member
link interface on the other MPC.
You can create an aggregated inline service interface (asi) bundle to provide 1:1 LNS stateful redundancy
for inline service (si) anchor interfaces. The bundle pairs two interfaces that reside on different MPCs as
primary and secondary links. LNS sessions are subsequently established over a virtual logical interface,
asiX.logical-unit-number. LNS session failover occurs when either the primary anchor interface goes
down or the card is restarted with the request chassis fpc restart command. When this happens, the
secondary link—on a different MPC—becomes active and all the LNS data traffic destined for the session
automatically moves over to the secondary interface. The subscriber session remains up on the
272
asiX.logical-unit-number virtual interface. No traffic statistics are lost. When this redundancy is not
configured, subscriber traffic is lost, the keepalives expire, and the PPP client is disconnected and must
reconnect.
See "Enabling Inline Service Interfaces" on page 267 and "Configuring an Inline Service Interface for
L2TP LNS" on page 269.
• If you are using pools of service interfaces, define the service pools.
• You must configure unit 0 family inet for each bundle; otherwise, the session fails to come up.
• The primary (active) and secondary (backup) interfaces must be on different MPCs.
• The bandwidth configured at the [edit chassis fpc slot pic number inline-services bandwidth]
hierarchy level must be the same for both member links.
• When you configure an si interface as a member of an aggregated inline services bundle, you
can no longer configure that si interface independently. You can configure only the parent
bundle; the bundle’s configuration is applied immediately to all member interfaces.
1. On one MPC, specify the primary (active) inline services member link in the bundle.
2. Configure the amount of bandwidth reserved on this MPC for tunnel traffic using the primary inline
service interface.
3. On a different MPC, specify the secondary(backup) inline services member link in the bundle.
NOTE: If you configure the active and backup member links on the same MPC, the
subsequent commit of the configuration fails.
4. Configure the amount of bandwidth reserved on this MPC for tunnel traffic using the secondary
inline service interface.
5. Assign the aggregated inline service interface bundle to an L2TP tunnel group by either of the
following methods:
• Assign a single bundle by specifying the name of the aggregated inline service physical interface.
NOTE: A pool can be mixed; that is, it can include both aggregated inline service interface
bundles and individual inline service interfaces. The individual interfaces must not be
members of existing bundles.
274
The following sample configuration creates bundle asi0 with member links on MPCs in slot 1 and slot 2,
then assigns the bundle to provide redundancy for L2TP sessions on tunnel group tg1:
IN THIS SECTION
Purpose | 274
Action | 275
Purpose
View information about aggregated inline service interface bundles, individual member links, and
redundancy status.
275
Action
errors: 0
Logical interface asi0.0 (Index 356) (SNMP ifIndex 52241) (Generation 165)
Flags: Point-To-Point SNMP-Traps 0x4000 Encapsulation: Adaptive-Services
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 9192, Generation: 198, Route table: 0
Flags: Sendbcast-pkt-to-re
• To view information about an individual member interface in an aggregated inline service interface
bundle:
That sample output shows that both aggregated Ethernet and aggregated inline service interfaces are
configured for redundancy. To display only one of the aggregated inline service interface bundles:
Interface : ae0
State : On primary
Last change : 00:01:30
Primary : ge-1/0/0
Secondary : ge-3/0/1
Current status : backup down
278
IN THIS SECTION
The LNS load balances subscriber sessions across the available service interfaces in a device pool based
on the number of sessions currently active on the interfaces. You can configure a maximum limit per
service interface (si) and per aggregated service interface (asi). In the case of asi interfaces, you cannot
configure a limit for the individual si member interfaces in the bundle.
When an L2TP session request is initiated for a service interface, the LNS checks the number of current
active sessions on that interface against the maximum number of sessions allowed for the individual
service interface or aggregated service interface. The LNS determines whether the current session count
(displayed by the show services l2tp summary command) is less than the configured limit. When that is
true or when no limit is configured, the check passes and the session can be established. If the current
session count is equal to the configured limit, then the LNS rejects the session request. No subsequent
requests can be accepted on that interface until the number of active requests drops below the
configured maximum. When a session request is rejected for an si or asi interface, the LNS returns a
CDN message with the result code set to 2 and the error code set to 4.
For example, suppose a single service interface is configured in the tunnel group. The current L2TP
session count is 1500, with a configured limit of 2000 sessions. When a new session is requested, the
limit check passes and the session request is accepted.
Interface Configured Session Limit Current Session Count Session Limit Check Result
The limit check continues to pass and session requests are accepted until 500 requests have been
accepted, making the current session count 2000, which matches the configured maximum. The session
limit check fails for all subsequent requests and all requests are rejected until the current session count
on the interface drops below 2000, so that the limit check can pass.
279
Interface Configured Session Limit Current Session Count Session Limit Check Result
When the session limit is set to zero for an interface , no session requests can be accepted. If that is the
only interface in the tunnel group, then all session requests in the group are rejected until the session
limit is increased from zero or another service interface is added to the tunnel group.
When a service interface In a service device pool has reached the maximum configured limit or it has a
configured limit of zero, the LNS skips that interface when a session request is made and selects another
interface in the pool to check the session limit. This continues until an interface passes and the session is
accepted or no other interface remains in the pool to be selected.
The behavior for session load distribution in a service device pool changed in Junos OS Release 16.2.
When a service interface has a lower session count than another interface in the pool and both
interfaces are below their maximum session limit, subsequent sessions are distributed to the interface
with fewer sessions.
In earlier releases, sessions are distributed in a strictly round-robin manner, regardless of session count.
The old behavior can result in uneven session distribution when the Packet Forwarding Engine is
rebooted or a service interface goes down and comes back up.
For example, consider the following scenario using the old round-robin distribution behavior for a pool
with two service interfaces:
1. Two hundred sessions are evenly distributed across the two service interfaces.
2. The si-1/0/0 interface reboots. When it comes back, initially sessions are up only on si-0/0/0.
3. As the sessions formerly on si-1/0/0 reconnect, they are distributed equally across both service
interfaces. When all 100 sessions are back up, the distribution is significantly unbalanced.
4. After 100 new sessions connect, si-0/0/0 reaches its maximum limit. Subsequent sessions are
accepted only on si-1/0/0.
5. After 100 more sessions connect, si-1/0/0 reaches its maximum limit. No more sessions can be
accepted until the session count drops below 200 for one of the interfaces.
Now consider the same scenario using the current load distribution behavior based on the number of
attached sessions. The device pool again has two service interfaces each with a configured maximum
limit of 200 sessions:
1. Two hundred sessions are evenly distributed across the two service interfaces.
2. The si-1/0/0 interface reboots. When it comes back up, sessions are up initially only on si-0/0/0.
3. As the sessions formerly on si-1/0/0 reconnect, they are distributed according to the session load on
each interface. Because both interfaces are below their maximum limit, and si-1/0/0 has fewer
sessions than si-0/0/0, sessions are initially distributed only to si-1/0/0.
4. Because both interfaces now have the same session count, the next session (#101) is distributed
randomly between the two interfaces. The next session after that (#102) goes to the interface with
the lower session count. That makes the interfaces equal again, so the next session (#103) is
randomly distributed. This pattern repeats until the maximum limit of 200 sessions for both
interfaces.
No more sessions can be accepted on either interface until the number of sessions drops below 200
on one of the interfaces.
The load balancing behavior is the same for aggregated service interfaces. An asi interface is selected
from a pool based on the current session count for the asi interface. When that count is less than the
maximum, the LNS checks current session count for the active si interface in the asi bundle. When that
count is less than the maximum, the session can be established on the asi interface.
In a mixed device pool that has both service interfaces and aggregated service interfaces, sessions are
distributed to the interface, either asi or si, that has the lowest session count. When the session count of
an interface of either type reaches its limit, it can no longer accept sessions until the count drops below
the maximum.
You can use the session limit configuration to achieve a session limit on particular Packet Forwarding
Engines. Suppose you want a limit of 100 sessions on a PFE0, which has two service interfaces. You can
set the max limit on each interface to 50, or any other combination that adds up to 100 to establish the
PFE0 limit.
IN THIS SECTION
Requirements | 282
Overview | 283
Configuration | 285
This example shows how you can configure an L2TP LNS on an MX Series router to provide tunnel
endpoints for an L2TP LAC in your network. This configuration includes a dynamic profile for dual-stack
subscribers.
282
Requirements
This L2TP LNS example requires the following hardware and software:
No special configuration beyond device initialization is required before you can configure this feature.
You must configure certain standard RADIUS attributes and Juniper Networks VSAs in the attribute
return list on the AAA server associated with the LNS for this example to work. Table 2 lists the
attributes with their required order setting and values. We recommend that you use the most current
Juniper Networks RADIUS dictionary, available in the Downloads box on the Junos OS Subscriber
Management page at https://www.juniper.net/documentation/en_US/junos/information-products/
pathway-pages/subscriber-access/index.html.
Table 28: VSA and Standard RADIUS Attribute Names, Order, and Values Required for Example
Table 28: VSA and Standard RADIUS Attribute Names, Order, and Values Required for Example
(Continued)
Overview
The LNS employs user group profiles to apply PPP attributes to the PPP subscribers that are tunneled
from the LAC. LACs in the network are clients of the LNS. The clients are associated with user group
profiles in the L2TP access profile configured on the LNS. In this example, the user group profile ce-l2tp-
group-profile specifies the following PPP attributes:
• A 30-second interval between PPP keepalive messages for L2TP tunnels from the client LAC
terminating on the LNS.
• A 200-second interval that defines how long the PPP subscriber session can be idle before it is
considered to have timed out.
• Both PAP and CHAP as the PPP authentication methods that apply to tunneled PPP subscribers at
the LNS.
The L2TP access profile ce-l2tp-profile defines a set of L2TP parameters for each client LAC. In this
example, the user group profile ce-l2tp-group-profile is associated with both clients, lac1 and lac2. Both
clients are configured to have the LNS renegotiate the link control protocol (LCP) with the PPP client
rather than accepting the pre-negotiated LCP parameters that the LACs pass to the LNS. LCP
renegotiation also causes authentication to be renegotiated by the LNS; the authentication method is
specified in the user group profile. The maximum number of sessions allowed per tunnel is set to 1000
for lac1 and to 4000 for lac2. A different password is configured for each LAC.
A local AAA access profile, aaa-profile, enables you to override the global AAA access profile, so that
you can specify an authentication order, a RADIUS server that you want to use for L2TP, and a password
for the server.
In this example, an address pool defines a range of IP addresses that the LNS allocates to the tunneled
PPP sessions. This example defines ranges of IPv4 and IPv6 addresses.
Two inline service interfaces are enabled on the MPC located in slot 5 of the router. For each interface,
10 Gbps of bandwidth is reserved for tunnel traffic on the interface’s associated PFE. These anchor
interfaces serve as the underlying physical interface. To enable CoS queue support on the individual
logical inline service interfaces, you must configure both services encapsulation (generic-services) and
hierarchical scheduling support on the anchors. The IPv4 address family is configured for both anchor
284
interfaces. Both anchor interfaces are specified in the lns_p1 service device pool. The LNS can balance
traffic loads across the two anchor interfaces when the tunnel group includes the pool.
This example uses the dynamic profile dyn-lns-profile2 to specify characteristics of the L2TP sessions
that are created or assigned dynamically when a subscriber is tunneled to the LNS. For many of the
characteristics, a predefined variable is set; the variables are dynamically replaced with the appropriate
values when a subscriber is tunneled to the LNS.
The interface to which the tunneled PPP client connects ($junos-interface-name) is dynamically created
in the routing instance ($junos-routing-instance) assigned to the subscriber. Routing options for access
routes include the route’s next hop address ($junos-framed-route-nexthop), metric ($junos-framed-
route-cost), and preference ($junos-framed-route-distance). For access-internal routes, a dynamic IP
address variable ($junos-subscriber-ip-address) is set.
The logical inline service interfaces are defined by the name of a configured anchor interface ($junos-
interface-ifd-name) and a logical unit number ($junos-interface-unit). The profile assigns l2tp-
encapuslation as the identifier for the logical interface and specifies that each interface can be used for
only a single session at a time.
The IPv4 address is set to a value returned from the AAA server. For IPv4 traffic an input firewall filter
$junos-input-filter and an output firewall filter $junos-output-filter are attached to the interface. The
loopback variable ($junos-loopback-interface) derives an IP address from a loopback interface (lo)
configured in the routing instance and uses it in IPCP negotiation as the PPP server address. Because
this is a dual-stack configuration, the IPv6 address family is also set, with the addresses provided by the
$junos-ipv6-address variable.
The $junos-ipv6-address variable is used because Router Advertisement Protocol is also configured.
This variable enables AAA to allocate the first address in the prefix to be reserved as the local address
for the interface. The minimal configuration for the Router Advertisement Protocol in the dynamic
profile specifies the $junos-interface-name and $junos-ipv6-ndra-prefix variables to dynamically assign
a prefix value in IPv6 neighbor discovery router advertisements.
The dynamic profile also includes the class of service configuration that is applied to the tunnel traffic.
The traffic-control profile (tc-profile) includes variables for the scheduler map ($junos-cos-scheduler-
map), shaping rate ($junos-cos-shaping-rate), overhead accounting ($junos-cos-shaping-mode), and
byte adjustment $junos-cos-byte-adjust). The dynamic profile applies the CoS configuration—including
the forwarding class, the output traffic-control profile, and the rewrite rules—to the dynamic service
interfaces.
The tg-dynamic tunnel group configuration specifies the access profile ce-l2tp-profile, the local AAA
profile aaa-profile, and the dynamic profile dyn-lns-profile2 that are used to dynamically create LNS
sessions and define the characteristics of the sessions. The lns_p1 service device pool associates a pool
of service interfaces with the group to enable LNS to balance traffic across the interfaces. The local
gateway address 203.0.113.2 corresponds to the remote gateway address that is configured on the LAC.
The local gateway name ce-lns corresponds to the remote gateway name that is configured on the LAC.
285
NOTE: This example does not show all possible configuration choices.
Configuration
IN THIS SECTION
Procedure | 285
Procedure
To quickly configure an L2TP LNS, copy the following commands, paste them in a text file, remove any
line breaks, and then copy and paste the commands into the CLI.
[edit]
edit access group-profile ce-l2tp-group-profile
set ppp idle-timeout 200
set ppp ppp-options pap
set ppp ppp-options chap
set ppp keepalive 30
top
edit access profile ce-l2tp-profile
set client lac1 l2tp maximum-sessions-per-tunnel 1000
set client lac1 l2tp interface-id l2tp-encapsulation-1
set client lac1 l2tp lcp-renegotiation
set client lac1 l2tp shared-secret "lac1-$ABC123"
set client lac1 user-group-profile ce-l2tp-group-profile
set client lac2 l2tp maximum-sessions-per-tunnel 4000
set client lac2 l2tp interface-id l2tp-encap-2
set client lac2 l2tp lcp-renegotiation
set client lac2 l2tp shared-secret "lac2-$ABC123"
set client lac2 user-group-profile ce-l2tp-group-profile
top
edit access profile aaa-profile
286
up 2
edit access-internal route $junos-subscriber-ip-address
set qualified-next-hop $junos-interface-name
up 5
edit interfaces $junos-interface-ifd-name unit $junos-interface-unit
set dial-options l2tp-interface-id l2tp-encapsulation
set dial-options dedicated
set family inet filter input $junos-input-filter
set family inet filter output $junos-output-filter
set family inet unnumbered-address $junos-loopback-interface
set family inet6 address $junos-ipv6-address
set family inet6 filter input $junos-input-ipv6-filter
set family inet6 filter output $junos-output-ipv6-filter
up 3
edit protocols router-advertisement
set interface $junos-interface-name prefix $junos-ipv6-ndra-prefix
top
[edit class-of-service]
edit rewrite-rules dscp rewriteDSCP forwarding-class expedited-forwarding
set loss-priority high code-point af11
set loss-priority high code-point af12
top
edit dynamic-profiles dyn-lns-profile2 class-of-service traffic-control-profiles tc-profile
set scheduler-map $junos-cos-scheduler-map
set shaping-rate $junos-cos-shaping-rate
set overhead-accounting $junos-cos-shaping-mode
set overhead-accounting bytes $junos-cos-byte-adjust
up
edit interfaces $junos-interface-ifd-name unit $junos-interface-unit
set forwarding-class expedited-forwarding
set output-traffic-control-profile tc-profile
set rewrite-rules dscp rewriteDSCP
edit interfaces si-5/0/0
set output-control-profile-remaining tc-profile
top
set services l2tp tunnel-group tg-dynamic l2tp-access-profile ce-l2tp-profile
set services l2tp tunnel-group tg-dynamic aaa-access-profile aaa-profile
set services l2tp tunnel-group tg-dynamic local-gateway address 203.0.113.2
set services l2tp tunnel-group tg-dynamic local-gateway gateway-name ce-lns
288
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For
instructions on how to do that, see Using the CLI Editor in Configuration Mode.
1. Configure a user group profile that defines the PPP configuration for tunnel subscribers.
[edit access]
user@host# edit group-profile ce-l2tp-group-profile
[edit access group-profile ce-l2tp-group-profile]
user@host# set ppp keepalive 30
user@host# set ppp idle-timeout 200
user@host# set ppp ppp-options chap
user@host# set ppp ppp-options pap
2. Configure an L2TP access profile that defines the L2TP parameters for each client LAC. This
includes associating a user group profile with the client and specifying the identifier for the inline
services logical interface that represents an L2TP session on the LNS.
NOTE: If user-group-profile is modified or deleted, the existing LNS subscribers, which were
using this Layer 2 Tunneling Protocol client configuration, go down.
3. Configure a AAA access profile to override the global access profile for the order of AAA
authentication methods and server attributes.
4. Configure IPv4 and IPv6 address-assignment pools to allocate addresses for the clients (LACs).
5. Configure the peer interface to terminate the tunnel and the PPP server-side IPCP address
(loopback address).
7. Configure the anchor service interfaces with services encapsulation, hierarchical scheduling, and
the address family.
9. Configure a dynamic profile that dynamically creates L2TP logical interfaces for dual-stack
subscribers.
10. Configure shaping, scheduling, and rewrite rules, and apply in the dynamic profile to tunnel traffic.
[edit class-of-service]
user@host# edit rewrite-rules dscp rewriteDSCP forwarding-class expedited-forwarding
user@host# set loss-priority high code-point af11
user@host# set loss-priority high code-point af12
[edit dynamic-profiles dyn-lns-profile2 class-of-service traffic-control-
profiles tc-profile]
user@host# set scheduler-map $junos-cos-scheduler-map
user@host# set shaping-rate $junos-cos-shaping-rate
user@host# set overhead-accounting $junos-cos-shaping-mode
user@host# set overhead-accounting bytes $junos-cos-byte-adjust
[edit dynamic-profiles dyn-lns-profile2 class-of-service interfaces “$junos-
interface-ifd-name” unit "$junos-interface-unit"]
user@host# set forwarding-class expedited-forwarding
user@host# set output-traffic-control-profile tc-profile
user@host# set rewrite-rules dscp rewriteDSCP
[edit class-of-service interfaces si-5/0/0]
user@host# set output-traffic-control-profile-remaining tc-profile
292
11. Configure the L2TP tunnel group to bring up dynamic LNS sessions using the pool of inline service
interfaces to enable load-balancing.
Results
From configuration mode, confirm the access profile, group profile, AAA profile, and address-assignment
pools configuration by entering the show access command. Confirm the inline services configuration by
entering the show chassis command. Confirm the interface configuration by entering the show
interfaces command. Confirm the dynamic profile configuration by entering the show dynamic-profiles
command. Confirm the tunnel group configuration by entering the show services l2tp command. If the
output does not display the intended configuration, repeat the configuration instructions in this example
to correct it.
[edit]
user@host# show access
group-profile ce-l2tp-group-profile {
ppp {
idle-timeout 200;
ppp-options {
pap;
chap;
}
keepalive 30;
}
}
profile ce-l2tp-profile {
client lac1 {
l2tp {
maximum-sessions-per-tunnel 1000;
interface-id l2tp-encapsulation-1;
lcp-renegotiation;
shared-secret "lac1-$ABC123"; ## SECRET-DATA
293
}
user-group-profile ce-l2tp-group-profile;
}
client lac2 {
l2tp {
maximum-sessions-per-tunnel 4000;
interface-id l2tp-encap-2;
lcp-renegotiation;
shared-secret "lac2-$ABC123"; ## SECRET-DATA
}
user-group-profile ce-l2tp-group-profile;
}
}
profile aaa-profile {
authentication-order radius;
radius-server {
198.51.100.193 secret "$ABC123"; ## SECRET-DATA
}
}
address-assignment {
pool client-pool1 {
family inet {
network 192.168.1.1/16;
range lns-v4-pool-range {
low 192.168.1.1;
high 192.168.255.255;
}
}
}
pool client-ipv6-pool2 {
family inet6 {
prefix 2001:DB8::/32;
range lns-v6-pool-range {
low 2001:DB8:1::/48;
high 2001:DB8:ffff::/48;
}
}
}
}
[edit]
user@host# show chassis
294
fpc 5 {
pic 0 {
inline-services {
bandwidth 10g;
}
}
pic 2 {
inline-services {
bandwidth 10g;
}
}
}
[edit]
user@host# show interfaces
ge-5/0/1 {
vlan-tagging;;
unit 11 {
vlan-id 11;
family inet {
address 203.0.113.2/24;
}
}
}
si-5/0/0 {
hierarchical-scheduler maximum-hierarchy-levels 2;
encapsulation generic-services;
unit 0 {
family inet;
}
}
si-5/2/0 {
hierarchical-scheduler maximum-hierarchy-levels 2;
encapsulation generic-services;
unit 0 {
family inet;
}
}
lo0 {
unit 0 {
family inet {
address 127.0.0.1/32;
295
}
}
}
[edit]
user@host# show dynamic-profiles
dyn-lns-profile2 {
routing-instances {
"$junos-routing-instance" {
interface "$junos-interface-name";
routing-options {
access {
route $junos-framed-route-ip-address-prefix {
next-hop "$junos-framed-route-nexthop";
metric "$junos-framed-route-cost";
preference "$junos-framed-route-distance";
}
}
access-internal {
route $junos-subscriber-ip-address {
qualified-next-hop "$junos-interface-name";
}
}
}
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
dial-options {
l2tp-interface-id l2tp-encapsulation;
dedicated;
}
family inet {
filter {
input "$junos-input-filter";
output "$junos-output-filter";
}
unnumbered-address "$junos-loopback-interface";
}
family inet6 {
address $junos-ipv6-address;
296
input $junos-input-ipv6-filter;
output $junos-output-ipv6-filter;
}
}
}
}
protocols {
router-advertisement {
interface "$junos-interface-name" {
prefix $junos-ipv6-ndra-prefix;
}
}
}
class-of-service {
rewrite-rules {
dscp rewriteDSCP {
forwarding-class expedited-forwarding {
loss-priority high code-point af11
loss-priority high code-point af12
}
}
}
traffic-control-profiles {
tc-profile {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
overhead-accounting "$junos-cos-shaping-mode" bytes "$junos-cos-
byte-adjust";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
forwarding-class expedited-forwarding;
output-traffic-control-profile tc-profile;
rewrite-rules {
dscp rewriteDSCP;
}
}
}
}
}
}
297
[edit]
user@host# show services l2tp
tunnel-group tg-dynamic {
l2tp-access-profile ce-l2tp-profile;
aaa-access-profile aaa-profile;
local-gateway {
address 203.0.113.2;
gateway-name ce-lns;
}
service-device-pool lns_p1;
dynamic-profile dyn-lns-profile2;
}
When you are done configuring the device, enter commit from configuration mode.
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services
Interfaces
The L2TP tunnel group specifies attributes that apply to L2TP tunnels and sessions from a group of LAC
clients. These attributes include the access profile used to validate L2TP connection requests made to
the LNS on the local gateway address, a local access profile that overrides the global access profile, the
keepalive timer, and whether the IP ToS value is reflected.
NOTE: If you delete a tunnel group, all L2TP sessions in that tunnel group are terminated. If you
change the value of the local-gateway-address, service-device-pool, or service-interface
statements, all L2TP sessions using those settings are terminated. If you change or delete other
statements at the [edit services l2tp tunnel-group name] hierarchy level, new tunnels you
establish use the updated values but existing tunnels and sessions are not affected.
2. Specify the service anchor interface responsible for L2TP processing on the LNS.
This service anchor interface is required for static LNS sessions, and for dynamic LNS sessions that
do not balance traffic across a pool of anchor interfaces. The interface is configured at the [edit
interfaces] hierarchy level.
3. (Optional; for load-balancing dynamic LNS sessions only) Specify a pool of inline service anchor
interfaces to enable load-balancing of L2TP traffic across the interfaces.
6. Configure the local gateway address on the LNS; corresponds to the IP address that is used by
LACs to identify the LNS.
7. (Optional) Configure the local gateway name on the LNS, returned in the SCCRP message to the
LAC. The name must match the remote gateway name configured on the LAC, or the tunnel cannot
be created.
8. (Optional) Configure the interval at which the LNS sends hello messages if it has received no
messages from the LAC.
9. (Optional) Specify a local access profile that overrides the global access profile to configure RADIUS
server settings for the tunnel group.
This local profile is configured at the [edit access profile] hierarchy level.
10. (Optional) Configure the LNS to reflect the IP ToS value from the inner IP header to the outer IP
header (applies to CoS configurations).
11. (Optional) Specify a dynamic service profile to be applied to the L2TP session at login, along with
any parameters to pass to the service.
Services are applied to L2TP sessions for activation or later modified by vendor-specific attributes
(VSAs) from the RADIUS server or in RADIUS Change of Authorization (CoA) requests. Starting in Junos
300
OS Release 18.1R1, you can apply services to L2TP sessions by means of dynamic service profiles
without involving RADIUS. In multivendor environments, customers might use only standard RADIUS
attributes to simplify management by avoiding the use of VSAs from multiple vendors. However, this
complicates the application of services to L2TP sessions because VSAs are generally required to apply
services. Local dynamic service profile activation enables you to avoid that problem. You can also use
local service profile activation to provide default services when RADIUS servers are down.
You can apply services to all subscribers in a tunnel group or to all subscribers using a particular LAC.
You can configure a maximum of 12 services per tunnel group or LAC hostname.
After configuring one or more dynamic service profiles that define services, you apply them in the tunnel
group or in the access profile configuration for a LAC client by specifying the service profile names. You
can list more than one profile to be activated, separated by an ampersand (&). You can also specify
parameters to be used by the service profile that might override values configured in the profile itself,
such as a downstream shaping rate for a CoS service.
The locally configured list of services (via service profiles) serves as local authorization that is applied by
authd during client session activation. This list of services is subject to the same validation and
processing as services originating from external authority, such as RADIUS. These services are presented
during subscriber login.
You can still use RADIUS VSAs or CoA requests in concert with the service profiles. If services are
sourced from an external authority as authorization during authentication or during subscriber session
provisioning (activation), the services from the external authority take strict priority over those in the
local configuration. If a service applied with RADIUS is the same as a service applied with a service
profile in the CLI, but with different parameters, the RADIUS service is applied with a new session ID
and takes precedence over the earlier service profile.
You can issue commands to deactivate or reactivate any service you have previously activated for a
tunnel group or LAC.
Define the dynamic service profiles that you want to later apply to a tunnel group or LAC.
• Specify one or more service profiles and any parameters to be passed to the services.
• Specify one or more service profiles and any parameters to be passed to the services.
NOTE: When service profiles are configured for a LAC client and for a tunnel group that uses
that client, only the LAC client service profile is applied. It overrides the tunnel group
configuration. For example, in the following configuration, the tunnel group, tg-LAC-3, uses
the LAC client, LAC-3, so the LAC3 configuration overrides the tunnel group configuration.
Consequently only the cos-A3 service is activated for subscribers in the tunnel group, rather
than Cos2 and fw1. The shaping rate passed for the service is 24 Mbps.
[edit]
user@host# set services l2tp tunnel-group tg-LAC-3 service-profile cos2(31000000)&fw1
user@host# set access profile prof-lac client LAC-3 l2tp service-profile cos-A3(24000000)
You can deactivate any service applied to a subscriber session by issuing the following command:
You can reactivate any service applied to a subscriber session by issuing the following command:
To display the services sessions for all current subscriber sessions, use the show subscribers extensive
or show network-access aaa subscribers session-id id-number detail command.
To understand how local service application works, the following examples illustrate the various
configuration possibilities. First, consider the following dynamic service profile configurations, cos2 and
fw1:
dynamic-profiles {
cos2 {
variables {
shaping-rate default-value 10m;
shaping-rate-in default-value 10m;
302
data-in-filter uid;
data-in-policer uid;
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
family inet;
}
}
}
class-of-service {
traffic-control-profiles {
TrafficShaper {
scheduler-map a;
shaping-rate "$shaping-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
output-traffic-control-profile TrafficShaper;
}
}
}
}
}
|
dynamic-profiles {
fw1 {
variables {
v6input default-value v6ingress;
v6output default-value v6egress;
input default-value upstrm-filter;
output default-value dwnstrm-filter;
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
family inet;
}
303
}
}
}
}
The following statement applies both services to all subscribers in tunnel group tg1; a parameter value
of 31 Mbps is passed to the cos2 service:
[edit]
user@host# set services l2tp tunnel-group tg1 service-profile cos2(31000000)&fw1
In the cos2 service profile, the shaping rate is provided by a user-defined variable with a default value of
10m, or 1Mbps. After the L2TP session is up, cos2 and fw1 are activated with service session IDs of 34
and 35, respectively.
The parameter passed to cos2 is used as the value for $shaping-rate; consequently the shaping rate for
the service is adjusted from the default value of 10 Mbps to 31 Mbps, as shown in the following
command output. Although the output indicates the adjusting application is RADIUS CoA, the
304
adjustment is a consequence of the parameter passed to the service profile. That operation uses the
same internal framework as a CoA and is reported as such.
Now the cos2 service is deactivated from the CLI for subscriber session 27.
The following output shows cos2 is gone, leaving only fw1 as an active service.
Session ID: 27
PFE Flow ID: 42
Login Time: 2017-08-30 07:29:39 IST
Service Sessions: 1
IP Address Pool: ipv4_pool
Accounting interval: 600
Frame/cell mode: Frame
Overhead accounting bytes: -38
Calculated downstream data rate: 1000000 kbps
Adjusted downstream data rate: 1000000 kbps
v6output: v6egress
The reactivated cos2 service uses the default shaping rate, 10 Mbps, from the service profile.
Next, a RADIUS CoA request is received, which includes the Activate-Service VSA (26-65). The VSA
specifies and activates the service and specifies a change in the shaping rate of cos2 from the default 10
Mbps to 12 Mbps. The cos2 service session 36 still appears in the output, but is superseded by the new
service session initiated by the CoA, 49.
output: dwnstrm-filter
v6input: v6ingress
v6output: v6egress
When a service is applied by both the CLI configuration and a RADIUS VSA (26-65), but with different
parameters, the RADIUS configuration overrides the CLI configuration. In the following example, the CLI
configuration applies the cos2 service profile with a value of 31 Mbps for the shaping rate.
[edit]
user@host# set services l2tp tunnel-group tg1 service-profile cos2(31000000)
The RADIUS Access-Accept message service activation VSA (26-65) applies cos2 with a value of 21
Mbps for the shaping rate.
The CLI configuration activates service session 22 with a shaping rate of 31 Mbps. The RADIUS VSA
activates service session 23 with a shaping rate of 21 Mbps.
shaping-rate: 21000000
shaping-rate-in: 10m
You can create a pool of inline service interfaces, also known as a service device pool, to enable load-
balancing of L2TP traffic across the interfaces. The pool is supported for dynamic LNS configurations,
where it provides a set of logical interfaces that can be dynamically created and allocated to L2TP
sessions on the LNS. The pool is assigned to an LNS tunnel group. L2TP maintains the state of each
inline service interface and uses a round-robin method to evenly distribute the load among available
interfaces when new session requests are accepted.
NOTE: Load balancing is available only for dynamically created subscriber interfaces.
LNS sessions anchored on an MPC are not affected by a MIC failure as long as some other path to the
peer LACs exists. If the MPC hosting the peer interface fails and there is no path to peer LACs, the
failure initiates termination and clean-up of all the sessions on the MPC.
If the MPC anchoring the LNS sessions itself fails, the Routing Engine does not relocate sessions to
another slot and all sessions are terminated immediately. New sessions can come up on another
available interface when the client retries.
310
You can configure L2TP to dynamically assign inline service interfaces for L2TP tunnels. You must define
one or more dynamic profiles and assign a profile to each tunnel group. The LNS supports IPv4-only,
IPv6-only, and dual-stack IPv4/IPv6 sessions.
[edit]
user@host# edit dynamic-profiles profile-name
2. Configure the interface to be dynamically assigned to the routing instance used by the tunneled PPP
clients.
3. Configure the routing options for access routes in the routing instance.
4. Configure the routing options for access-internal routes in the routing instance.
5. Define the interfaces used by the dynamic profile. The variable is dynamically replaced by one of the
configured inline service interfaces.
8. Configure each logical interface to be used for only one session at a time.
9. Configure the address family for the logical interfaces and enable the local address on the LNS that
provides local termination for the L2TP tunnel to be derived from the specified interface name.
NOTE: Dynamic LNS sessions require you to include the dial-options statement in the
dynamic profile, which in turn requires you to include the family inet statement. This has the
following consequences:
312
• You must always configure family inet regardless of whether you configure IPv4-only,
IPv6-only, or dual-stack interfaces in the profile.
• When you configure IPv4-only interfaces, you configure only family inet and you must
configure the interface address under family inet.
• When you configure IPv6-only interfaces , you must also configure family inet6 and you
must configure the interface address under family inet6. You do not configure the address
under family inet.
• When you configure dual-stack, IPv4/IPv6 interfaces, you configure both family inet and
family inet6 and an interface address under each family.
See Broadband Subscriber Sessions User Guide for information about using variables for
IPv6-only and dual-stack addressing in dynamic profiles.
Release Description
18.1R1 Starting in Junos OS Release 18.1R1, you can apply services to L2TP sessions by means of dynamic
service profiles without involving RADIUS.
16.2R1 Starting in Junos OS Release 16.2, you are not required to explicitly specify a bandwidth for L2TP LNS
tunnel traffic using inline services.
RELATED DOCUMENTATION
IN THIS SECTION
You can configure inline service interfaces on MX Series routers with MPCs to support reassembly of
fragmented IP packets for an L2TP connection. When packets are transmitted over an L2TP connection,
the packets may be fragmented during transmission and need to be reassembled before they are
processed further. Efficient reassembly is important for network throughput, scalability, and graceful
response to congestion.
Fragmentation of IP packets for transmission and the need to reassemble the IP packets at a destination
is a feature of how Layer 2 (the frame layer) and Layer 3 (the packet layer) operate. The maximum size of
a frame, set by the Maximum Transmission Unit (MTU) value, and the maximum size of a packet are
determined independently. Typically the packet size can far exceed the MTU size defined for the
outgoing connection. If the packet size (data plus IP and other headers) exceeds the configured frame
size (usually set by the transport medium limits), the packet must be fragmented and split across multiple
frames for transmission.
Frames are always processed immediately, when they arrive (if error-free), but packet fragments cannot
be processed until the whole packet has been reassembled. Each packet fragment inside a frame series,
except the last packet fragment, has the more fragments (MF) IP header bit set, indicating that this
packet is part of a whole. The last packet fragment inside a frame does not have this MF bit set and
therefore ends the fragment sequence. After all of the fragments of a packet have arrived, the entire
packet can be reassembled.
In an L2TP connection, packets are transmitted between the L2TP Access Concentrator (LAC) and the
L2TP Network Server (LNS). For an IP packet being transmitted over an L2TP connection, the packet is
fragmented at one of the following locations:
• At an intermediate router when the LAC and LNS are not directly connected and the MTU size on
the router is less than that on the LAC or LNS.
IP reassembly parameters configured on inline service interfaces of the LAC and the LNS determine how
the fragments are reassembled on these interfaces to ensure efficient reassembly over an L2TP
315
connection. Figure 17 on page 315 shows IP fragmentation and reassembly for inbound subscriber
traffic in a simplified L2TP network.
1. Subscriber traffic arrives on the LAC subscriber-facing interface, pp0.1, in the packet format [MAC]
[PPPoE] [PPP] [IP] [Payload]. The PPPoE header is stripped off and the L2TP tunnel header is added,
creating the tunnel packet, [IP] [UDP] [L2TP] [PPP] [IP] [Payload].
2. The packet is sent out the LAC’s peer WAN interface, ge-1/0/0, on the L2TP tunnel. If the packet
size is larger than the MTU of the WAN interface, the packet is fragmented on the L2TP tunnel
header. The LAC then sends the fragments to the LNS.
3. When the fragments arrive on the LNS peer WAN interface, ge-3/0/0, a route lookup steers the
fragments to the LNS reassembly inline interface, si-2/1/1.
4. The fragments are reassembled on interface si-2/1/1 and the packet is sent to the LNS inline
interface, si-2/2/2.
5. L2TP decapsulates the L2TP tunnel header and the PPP header on the si-2/2/2 inline interface,
leaving the IP header and the payload. A route lookup on the IP header sends the packet to the LNS’s
core-facing interface, xe-4/1/3.
Figure 18 on page 316 shows IP fragmentation and reassembly for outbound subscriber traffic in a
simplified L2TP network.
1. Subscriber traffic arrives on the LNS core-facing interface, xe-4/1/3. A route lookup steers the
packet to the LNS inline interface, si-2/2/2.
2. On interface si-2/2/2, L2TP encapsulates the packet with the L2TP header and PPP header. and then
creates the L2TP tunnel packet, [IP] [UDP] [L2TP] [PPP] [IP] [Payload].
3. Route lookup on the L2TP tunnel IP header sends the packet to the LNS’s peer WAN interface,
ge-3/0/0. If the packet size is larger than the MTU of the WAN interface, the packet is fragmented
on the L2TP tunnel header. The LNS then sends the fragments to the LAC.
4. When the fragments arrive on the LAC peer WAN interface, ge-1/0/0, a route lookup steers the
fragments to the LAC reassembly inline interface, si-3/0/1.
5. The fragments are reassembled on this interface and the packet is sent to the subscriber-facing
interface, pp0.1.
6. L2TP decapsulates the L2TP tunnel header on the pp0.1 inline interface, leaving [PPP] [IP] [Payload].
Then PPPoE and MAC encapsulation takes place on the packet. The packet, now consisting of [MAC]
[PPPoE] [PPP] [IP] [Payload] is sent out the access interface to the subscriber.
317
This procedure shows how to configure a service interface on a LAC or LNS to reassemble fragmented
IP packets. This example creates a service set that configures the IP reassembly parameters for L2TP
fragments. The service set is then associated with the L2TP service.
• Configured L2TP.
1. Configure the chassis-level bandwidth used by the inline services interface on the FPC and PIC slot
for inline IP fragment reassembly.
[edit chassis]
user@host# set fpc 2 pic 1 inline-services bandwidth 10g
2. Configure the interface-level logical unit used by the inline services (si-) interface on the FPC and PIC
slot for inline IP fragment reassembly.
[edit interfaces]
user@host# set si-2/1/0 unit 0 family inet
user@host# set si-2/1/0 unit 0 service-domain inside
NOTE: This configuration is not unique to L2TP. However, you must configure the family
(inet) and service domain (inside) as shown.
3. Configure the service set (set1) for IP reassembly in the input match direction. (The local option
loops the reassembled packets back to the local interface.)
[edit services]
user@host# set service-set set1
[edit services service-set set1]
user@host# set ip-reassembly-rules ipr_rule1
user@host# set next-hop-service inside-service-interface si-2/1/0.0
user@host# set next-hop-service outside-service-interface-type local
318
NOTE:
• You must configure both inside (si- interface) and outside type (local) service interfaces
statements. The reassembly rule is not formulated outside of the service set; this
statement simply initiates the reassembly process.
• You can configure only one service interface for each service-set.
5. Configure the service set (set1) for IP reassembly to bind to the L2TP service.
NOTE:
• The service set must be defined at the [edit services] hierarchy level.
• You cannot delete a service set instance if it is associated with an L2TP service.
RELATED DOCUMENTATION
IN THIS SECTION
L2TP failover enables a failed L2TP endpoint to resynchronize with its nonfailed peer during recovery
and restart of the L2TP protocol on the failed endpoint. L2TP failover is enabled by default.
The failover and L2TP peer resynchronization process does all of the following:
• Prevents the nonfailed endpoint from prematurely terminating a tunnel while the failed endpoint is
recovering.
• Reestablishes the sequence numbers required for the operation of the L2TP control protocol.
• Resolves inconsistencies in the tunnel and session databases of the failed endpoint and the nonfailed
endpoint.
The router supports both the L2TP failover protocol method (described in RFC 4951, Fail Over
Extensions for Layer 2 Tunneling Protocol (L2TP) "failover") and the L2TP silent failover method. The
differences between these two methods are as follows:
• The L2TP failover protocol method requires a nonfailed endpoint to wait an additional recovery time
period while the failed endpoint is recovering to prevent the nonfailed endpoint from prematurely
disconnecting the tunnel. The additional recovery period delays the detection of tunnel keepalive
failures.
If a peer on an MX series router negotiates failover protocol with an MX Series peer that is not
configured for failover protocol, both use the silent failover method. If the negotiation is with a third-
party device that does not support failover protocol, the MX Series peer falls back to silent failover;
whether the third-party peer recovers in this case depends on how resynchronization is implemented
on that device.
• Silent failover operates entirely within the failed endpoint and does not require nonfailed endpoint
support—this improves interoperability between peers. Silent failover does not require additional
320
recovery time by the nonfailed endpoint, which also eliminates the potential for degraded
responsiveness to the loss of tunnel connectivity. Starting in Junos OS Release 15.1R6, 16.1R5,
16.2R2, 17.1R2, and 17.2R1, silent failover is the default resynchronization method in Junos OS.
• L2TP on the LAC by default attempts to negotiate the L2TP failover protocol first. When L2TP
determines that the remote peer supports the L2TP failover protocol, then the L2TP failover protocol
method is used.
• When L2TP determines that the remote peer does not support the L2TP failover protocol, then the
L2TP silent failover method is used. Falling back on this secondary method prevents the failover from
forcing a disconnection of the tunnel to the peer and all its sessions.
The L2TP implementation on MX Series routers supports resynchronization between a failed L2TP
endpoint and its peer nonfailed endpoint. Peer resynchronization enables L2TP to recover from a
daemon or router restart or a Routing Engine switchover.
• Prevents the nonfailed endpoint from prematurely terminating a tunnel while the failed endpoint is
recovering.
• Reestablishes the sequence numbers required for the operation of the L2TP control protocol.
• Resolves inconsistencies in the tunnel and session databases of the failed endpoint and the nonfailed
endpoint.
You can configure the peer resynchronization method you want the router to use. Both the L2TP
failover protocol method and the L2TP silent failover method are supported.
321
In Junos OS Releases through 15.1R5, 16.1R4, 16.2R1, and 17.1R1, the default behavior is for L2TP on
the LAC to attempt to negotiate the L2TP failover protocol with the LNS. When the LNS supports this
method and negotiation is successful, the L2TP failover protocol is used when either peer fails. When
negotiation for L2TP failover protocol fails, then the peers use silent failover when either peer fails. This
behavior is called failover-protocol-fall-back-to-silent-failover. Falling back to the silent failover method
when failover protocol negotiation is unsuccessful prevents a subsequent peer failure from forcing a
disconnection of the tunnel to the peer and all the associated sessions.
NOTE: The behavior just described applies when both peers are MX Series routers. If one
endpoint is a third-party device, then the behavior for that device depends on its L2TP
implementation.
You can disable the default behavior and force the LAC or the LNS to operate only in silent failover
mode. This configuration can be useful when the peer routers either are configured for silent failover or
incorrectly negotiate to use the failover protocol even though they do not support it. Another reason to
use this statement is that the failover protocol method keeps the tunnel open with the failed peer, in
case the failed peer is able to recover from the failure and resynchronize with the nonfailed peer. This
behavior keeps the tunnel up and the subscribers logged in while traffic is not flowing, preventing
service level agreements from being met. When you issue this statement and the peer supports only
failover protocol, the nonfailed endpoint (LAC or LNS) uses silent failover for recovery.
• Configure disabling.
Starting in Junos OS Releases 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, the default failover
resynchronization method is changed to silent failover. Consequently, the disable-failover-protocol
statement no longer needs to be used and is deprecated. If you upgrade from a lower-numbered release
where the default method is failover-protocol-fall-back-to-silent-failover, and your configuration
includes the disable-failover-protocol statement, the configuration is still supported, but the CLI notifies
you that the statement is deprecated.
In these releases, you can still configure which method you want an endpoint to use, failover protocol or
silent failover.
If the negotiation fails, the endpoint falls back to the silent failover method.
15.1R6 Starting in Junos OS Release 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, silent failover is the default
resynchronization method in Junos OS.
15.1R6 Starting in Junos OS Release 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, the disable-failover-protocol
statement is deprecated, because the change in default resynchronization method makes it unnecessary.
15.1R6 Starting in Junos OS Releases 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, the default failover
resynchronization method is changed to silent failover. Consequently, the disable-failover-protocol
statement no longer needs to be used and is deprecated.
15.1R5 In Junos OS Releases through 15.1R5, 16.1R4, 16.2R1, and 17.1R1, the default behavior is for L2TP on
the LAC to attempt to negotiate the L2TP failover protocol with the LNS.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the Severity Level to Filter Which L2TP Messages Are Logged | 328
The Junos OS trace feature tracks L2TP operations and records events in a log file. The error
descriptions captured in the log file provide detailed information to help you solve problems.
NOTE: This topic refers to tracing L2TP operations on MX Series routers. To trace L2TP
operations on M Series routers, see Tracing L2TP Operations.
By default, nothing is traced. When you enable the tracing operation, the default tracing behavior is as
follows:
1. Important events are logged in a file located in the /var/log directory. By default, the router uses the
filename jl2tpd. You can specify a different filename, but you cannot change the directory in which
trace files are located.
2. When the trace log file filename reaches 128 kilobytes (KB), it is compressed and renamed
filename.0.gz. Subsequent events are logged in a new file called filename, until it reaches capacity
again. At this point, filename.0.gz is renamed filename.1.gz and filename is compressed and renamed
filename.0.gz. This process repeats until the number of archived files reaches the maximum file
number. Then the oldest trace file—the one with the highest number—is overwritten.
You can optionally specify the number of trace files to be from 2 through 1000. You can also
configure the maximum file size to be from 10 KB through 1 gigabyte (GB). (For more information
about how log files are created, see the System Log Explorer.)
324
By default, only the user who configures the tracing operation can access log files. You can optionally
configure read-only access for all users.
The following topics describe how to configure all aspects of tracing L2TP operations:
By default, the name of the file that records trace output for L2TP is jl2tpd. You can specify a different
name with the file option.
• Specify the name of the file used for the trace output.
You can optionally specify the number of compressed, archived trace log files to be from 2 through
1000. You can also configure the maximum file size to be from 10 KB through 1 gigabyte (GB); the
default size is 128 kilobytes (KB).
The archived files are differentiated by a suffix in the format .number.gz. The newest archived file
is .0.gz and the oldest archived file is .(maximum number)-1.gz. When the current trace log file reaches
the maximum size, it is compressed and renamed, and any existing archived files are renamed. This
process repeats until the maximum number of archived files is reached, at which point the oldest file is
overwritten.
For example, you can set the maximum file size to 2 MB, and the maximum number of files to 20. When
the file that receives the output of the tracing operation, filename, reaches 2 MB, filename is
compressed and renamed filename.0.gz, and a new file called filename is created. When the new
filename reaches 2 MB, filename.0.gz is renamed filename.1.gz and filename is compressed and
renamed filename.0.gz. This process repeats until there are 20 trace files. Then the oldest file,
filename.19.gz, is simply overwritten when the next oldest file, filename.18.gz is compressed and
renamed to filename.19.gz.
• Specify the name, number, and size of the file used for the trace output.
By default, only the user who configures the tracing operation can access the log files. You can enable all
users to read the log file and you can explicitly set the default behavior of the log file.
To explicitly set the default behavior, only the user who configured tracing can read the log file:
By default, the trace operation output includes all lines relevant to the logged events.
Starting in Junos OS Release 14.1, you can apply filters to L2TP to limit tracing to particular subscribers
or domains. Subscriber filtering simplifies troubleshooting in a scaled environment by enabling you to
focus on a reduced set of trace results.
For subscriber usernames that have the expected form of user@domain, you can filter on the user, the
domain, or both. You can use an asterisk (*) as a wildcard to substitute for characters at the beginning or
end of either term or both terms to match a greater number of subscribers.
NOTE: You cannot filter results using a wildcard in the middle of the user or domain terms. For
example, the following uses of the wildcard are not supported: tom*[email protected],
tom125@ex*.com.
When you enable filtering by username, traces that have insufficient information to determine the
username are automatically excluded.
NOTE: This syntax is different than the syntax used to filter subscribers on M Series routers.
• Filter results for the specific subscriber with the username, [email protected].
• Filter results for all subscribers whose username begins with tom.
• Filter results for all subscribers whose username ends with tom.
• Filter results for subscribers with the username tom at all domains beginning with ex.
• Filter results for all subscribers at all domains that end with ample.com.
• Filter results for all subscribers whose username begins with tom at domains that end with
example.com.
By default, only important events are logged. You can specify which events and operations are logged by
specifying one or more tracing flags.
The messages associated with a logged event are categorized according to severity level. You can use
the severity level to determine which messages are logged for the event type. A low severity level is less
restrictive—filters out fewer messages—than a higher level. When you configure a severity level, all
messages at that level and all higher (more restrictive) levels are logged.
The following list presents severity levels in order from lowest (least restrictive) to highest (most
restrictive). This order also represents the significance of the messages; for example, error messages are
of greater concern than info messages.
• verbose
• info
• notice
• warning
• error
The severity level that you configure depends on the issue that you are trying to resolve. In some cases
you might be interested in seeing all messages relevant to the logged event, so you specify all. You can
also specify verbose with the same result, because verbose is the lowest (least restrictive) severity level;
it has nothing to do with the terseness or verbosity of the messages. Either choice generates a large
amount of output. You can specify a more restrictive severity level, such as notice or info to filter the
messages. By default, the trace operation output includes only messages with a severity level of error.
Release Description
14.1 Starting in Junos OS Release 14.1, you can apply filters to L2TP to limit tracing to particular subscribers
or domains. Subscriber filtering simplifies troubleshooting in a scaled environment by enabling you to
focus on a reduced set of trace results.
329
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the Maximum Number of Pseudowire Logical Interface Devices Supported on the Router | 340
Changing the Anchor Point for a Pseudowire Subscriber Logical Interface Device | 343
Configuring the Transport Logical Interface for a Pseudowire Subscriber Logical Interface | 346
Configuring Layer 2 Circuit Signaling for Pseudowire Subscriber Logical Interfaces | 347
Configuring Layer 2 VPN Signaling for Pseudowire Subscriber Logical Interfaces | 348
Configuring the Service Logical Interface for a Pseudowire Subscriber Logical Interface | 350
Subscriber management supports the creation of subscriber interfaces over point-to-point MPLS
pseudowires. The pseudowire subscriber interface capability enables service providers to extend an
MPLS domain from the access-aggregation network to the service edge, where subscriber management
is performed. Service providers can take advantage of MPLS capabilities such as failover, rerouting, and
uniform MPLS label provisioning, while using a single pseudowire to service a large number of DHCP
and PPPoE subscribers in the service network.
NOTE: Pseudowire subscriber logical interfaces are supported on Modular Port Concentrators
(MPCs) with Ethernet Modular Interface Cards (MICs) only.
The pseudowire is a tunnel that is either an MPLS-based Layer 2 VPN or Layer 2 circuit. The pseudowire
tunnel transports Ethernet encapsulated traffic from an access node (for example, a DSLAM or other
aggregation device) to the MX Series router that hosts the subscriber management services. The
termination of the pseudowire tunnel on the MX Series router is similar to a physical Ethernet
termination, and is the point at which subscriber management functions are performed. A service
332
provider can configure multiple pseudowires on a per-DSLAM basis and then provision support for a
large number of subscribers on a specific pseudowire.
Figure 19 on page 332 shows an MPLS network that provides subscriber management support.
At the access node end of the pseudowire, the subscriber traffic can be groomed into the pseudowire in
a variety of ways, limited only by the number and types of interfaces that can be stacked on the
pseudowire. You specify an anchor point, which identifies the logical tunnel interface that terminates the
pseudowire tunnel at the access node.
Figure 20 on page 333 shows the protocol stack for a pseudowire subscriber logical interface. The
pseudowire is a virtual device that is stacked above the logical tunnel anchor point on the physical
interface (the IFD), and supports a circuit-oriented Layer 2 protocol (either Layer 2 VPN or Layer 2
circuit). The Layer 2 protocol provides the transport and service logical interfaces, and supports the
protocol family (IPv4, IPv6, or PPPoE).
Starting in Junos OS Release 18.3R1, on MX Series routers with MPC and MIC interfaces, the support
for pseudowire subscriber service interface over redundant logical tunnels is introduced in Layer 3 VPNs
and draft-rosen multicast VPNs. Earlier, Layer 3 VPNs provided support for pseudowire subscriber
services over logical tunnel interfaces only, and these interfaces used unicast routing protocols, such as
OSPF or BGP. With this support, you can provision a multicast routing protocol, Protocol Independent
Multicast (PIM), on the pseudowire subscriber interfaces, which gets terminated on the virtual routing
and forwarding (VRF) routing instance. Additionally, there is an increase in the scaling numbers of the
pseudowire logical interface devices that provides additional resiliency support for pseudowire
subscriber interfaces on redundant logical tunnel interfaces.
NOTE: When a pseudowire subscriber service interface is anchored to a redundant logical tunnel
whose member interface (or FPC) does not exist, the tunnel interface comes down. In such cases,
the pseudowire interfaces (physical and logical) should also be down, but however, the
pseudowire subscriber logical interface state remains up, although the Layer 2 circuit services,
333
such as ping toward a customer edge (CE) device from the service side of the pseudowire
subscriber service interface, are not available.
This is because the transport side of the pseudowire subscriber logical interface stays up causing
the services to be up.
The pseudowire configuration is transparent to the subscriber management applications and has no
impact on the packet payloads that are used for subscriber management. Subscriber applications such as
DHCP and PPPoE can be stacked over Layer 2 similar to the way in which they are stacked over a
physical interface.
334
Starting with Junos OS release 16.1R1, family inet and family inet6 are supported on the services side
of an MPLS pseudowire subscriber as well as non-subscriber logical interface.
Starting with Junos OS Release 16.1R1, Inline IPFIX is supported on the services side of an MPLS
pseudowire subscriber logical interface.
Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, CCC encapsulation is supported
on the transport side of an MPLS pseudowire subscriber logical interface.
Prior to Junos OS Release 19.1R1, the only supported encapsulation type on the pseudowire subscriber
interfaces included:
Starting in Junos OS Release 19.1R1, additional encapsulations are added to the pseudowire subscriber
transport and service logical interfaces. The transport logical interface supports Ethernet VPLS
encapsulation, and provisions for terminating the interface on the l2backhaul-vpn routing-instance. The
service logical interface supports circuit cross-connect (CCC) encapsulation, and provisions for
terminating the interface on locally switched Layer 2 circuits.
With the support of additional encapsulation types, you can benefit from demux of a l2backhaul VPN
into multiple VPN services, such as Layer 2 circuit and Layer 3 VPN. Because pseudowire subscriber
interfaces are anchored on redundant logical tunnels, this enhancement also provides line card
redundancy.
Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, distributed denial-of-service
(DDoS) protection is supported on the services side of an MPLS pseudowire subscriber logical interface.
Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, Policer and Filter are supported
on the services side of an MPLS pseudowire subscriber logical interface.
Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, accurate transmit statistics on
logical interface are supported on the services side of an MPLS pseudowire subscriber logical interface.
Starting with Junos OS Release 17.3R1 and later releases, stateful anchor point redundancy support is
provided for pseudowire subscriber logical interface by the underlying redundant logical tunnel interface
(rlt) in active-backup mode. This redundancy protects the access and the core facing link against anchor
PFE (Packet Forwarding Engine) failure.
335
In MPLS pseudowire deployments that use pseudowire subscriber logical interfaces, failure of the
Packet Forwarding Engine hosting the logical tunnel that anchors those logical interfaces leads to traffic
loss and subsequent subscriber session loss.
The Packet Forwarding Engine does not rely on the control plane for failure detection; instead it uses a
liveness detection mechanism, with an underlying heartbeat-based algorithm, to detect the failure of
other Packet Forwarding Engines in the system. The failure of a Packet Forwarding Engine also indicates
the failure of the hosted logical tunnel, which ultimately lead to session loss. To avoid this session loss, a
redundant anchor point is required to which the session can be moved without losing any traffic.
Starting from Junos OS Release 17.3 onward, pseudowire subscriber logical interfaces can be
instantiated over an underlying redundant logical tunnel (rlt) interface in active-backup mode. This is in
addition to installing pseudowires over a single logical tunnel interfaces. The most noticeable advantage
of implementing the pseudowire subscriber logical interface over redundant logical tunnel interfaces is
to provide redundancy of the underlying forwarding path.
Prior to Junos OS Release 18.3R1, you could specify a maximum of 2048 pseudowire subscriber
redundant logical tunnel interface devices for an MX Series router. Starting in Junos OS Release 18.3R1,
on MX Series routers with MPC and MIC interfaces, the pseudowire redundant logical interface devices
scaling numbers has increased to 7000 devices to provide additional resiliency support.
Junos OS Release 17.3 also supports an enhanced aggregated infrastructure for a Packet Forwarding
Engine to provide anchor point redundancy. Enhanced aggregated infrastructure requires a minimum of
one control logical interface that needs to be created on a redundant logical tunnel interface. Both
transport and services logical interfaces created for the pseudowire subscriber logical interface are
stacked on the underlaying control logical interface for the redundant logical tunnel. This stacking model
is used for both redundant and nonredundant pseudowire subscriber logical interfaces.
The following events have to trigger the removal of the physical interface from a redundant group:
• Hardware failure on Modular PIC Concentrator (MPC) or Modular Interfaces Card (MIC).
Figure 21 on page 336 provides the details of pseudowire subscriber logical interface stacking over a
redundant logical tunnel interface.
Figure 21: Pseudowire Subscriber Logical Interface Stacking over Redundant Logical Tunnel Interface
337
NOTE: Static service ifl is not stacked over transport ifl when RLT is used.
By default, Link Protection for redundant tunnel interfaces is revertive. In case of the active link failure,
traffic is routed through the backup link. When the active link is reestablished, traffic is automatically
routed back to the active link. This causes traffic loss and subscriber session loss.
To overcome the traffic and session loss, you can configure nonrevertive link protection for redundant
tunnel interfaces by using the configuration statement set interfaces rltX logical-tunnel-options link-
protection non-revertive. With this configuration, when the active link is reestablished, traffic is not
routed back to the active link and continue to be forwarded on the backup link. Therefore, there is no
traffic loss or subscriber session loss. You can also manually switch traffic from the backup link to the
active link by using the request interface (revert | switchover) interface-name command.
NOTE:
• A control logical interface is created implicitly on an redundant tunnel interface with the
pseudowire subscriber logical interface configuration and thus no additional configuration is
needed.
• A redundant logical tunnel interface allows 32 member logical tunnel physical interfaces.
However, a pseudowire subscriber logical interface hosted on the redundant logical tunnel
interface limits the number of logical tunnel physical interfaces to two.
NOTE: You cannot disable the underlying redundant logical tunnel (rlt) interface or the
underlying logical tunnel (lt) interface when a pseudowire is anchored on that interface. If you
want to disable the underlying interface, you must first deactivate the pseudowire.
Starting in Junos OS Release 18.4R1, the support for inline distribution of single-hop Bidirectional
Forwarding Detection (BFD) sessions is extended to pseudowire subscriber over redundant logical
tunnel interfaces. For pseudowire subscriber over logical tunnel interfaces, the interfaces are anchored
on a single Flexible PIC Concentrator (FPC), as a result, the inline distribution of single-hop BFD sessions
is supported by default. With pseudowire redundant logical interfaces, the member logical tunnel
interfaces can be hosted on different linecards. Because the distribution address is not available for the
redundant logical interfaces, the distribution of single-hop BFD sessions was operated in a centralized
mode before Junos OS Release 18.4R1.
338
With the support for inline distribution of single-hop BFD sessions over pseudowire redundant logical
interfaces, there is a scaling advantage of up to 2000 single-hop BFD sessions at an interval of one
second, and improvement in detection time enhancing the performance of the sessions.
The BFD operation for pseudowire subscriber over redundant logical interfaces is as follows:
1. When a new BFD session gets added it can either be anchored on an active or a backup FPC.
2. When either of the FPCs fail or reboot, all the sessions hosted on that FPC go down, and re-
anchoring is triggered for the next available distribution address. The BFD sessions come back up
after the sessions are installed on the other FPC and BFD packet exchange is started.
However, it is also possible that the sessions on the backup FPC might not go down when active FPC
fails depending on the BFD detection time configured, as the forwarding state for the new active
FPC might take some time to be programmed.
3. When the active FPC fails, all the BFD sessions get anchored on the backup FPC. Similarly, if the
backup FPC fails, all the BFD sessions get anchored on the active FPC.
4. The BFD session re-anchoring is not triggered when the active FPC is online again.
5. With the non-revertive behavior enabled, when the previously active FPC is online again, the
sessions are not expected to go down. With the default revertive behavior, it is possible that
forwarding state needs to be updated and depending on the detection time configuration, the
session may or may not flap.
NOTE: Take the following into consideration with the support of inline distribution of single-hop
BFD sessions on pseudowire subscriber over logical tunnel interfaces:
• On FPC type MPC 7e, with the activation of 7000 routing instance, it takes about six minutes
for the 7000 BGP sessions to get established on the pseudowire subscriber interfaces
anchored on redundant logical tunnel interfaces.
• A new system log error message - JTASK_SCHED_SLIP - is recorded during nonstop active
routing (NSR). This is expected behavior of NSR with high scale and can be safely ignored,
unless there are other issues, such as session flaps, that require action to be taken.
A pseudowire subscriber logical interface terminates an MPLS pseudowire tunnel from an access node
to the MX Series router that hosts subscriber management, and enables you to perform subscriber
management services at the interface.
1. Specify the number of pseudowire logical interfaces that the router can support.
See "Configuring the Maximum Number of Pseudowire Logical Interface Devices Supported on the
Router" on page 340.
2. Configure the pseudowire subscriber logical interface device.
See "Configuring a Pseudowire Subscriber Logical Interface Device" on page 341.
3. Configure the transport logical interface.
See "Configuring the Transport Logical Interface for a Pseudowire Subscriber Logical Interface" on
page 346.
4. Configure the signaling for the pseudowire subscriber interface. You can use either Layer 2 circuit
signaling or Layer 2 VPN signaling. The two signaling types are mutually exclusive for a given
pseudowire.
• To configure Layer 2 circuit signaling, see "Configuring Layer 2 Circuit Signaling for Pseudowire
Subscriber Logical Interfaces" on page 347.
• To configure Layer 2 VPN signaling, see "Configuring Layer 2 VPN Signaling for Pseudowire
Subscriber Logical Interfaces" on page 348.
5. Configure the service logical interface.
See "Configuring the Service Logical Interface for a Pseudowire Subscriber Logical Interface" on
page 350.
6. Configure the underlying interface device.
See Configuring an Underlying Interface for Dynamic PPPoE Subscriber Interfaces.
7. Configure CoS parameters and BA classification.
See CoS Configuration Overview for MPLS Pseudowire Subscriber Interfaces .
8. (Optional) Associate a dynamic profile with the pseudowire subscriber logical interface.
You can associate DHCP, PPPoE, IP demux, and VLAN dynamic profiles with pseudowire subscriber
logical interfaces. The support is similar to the typical Ethernet interface support.
NOTE: When using a PPPoE dynamic profile to create a pseudowire subscriber logical
interface over a demux interface device, the dynamic profile must explicitly specify the
correct pseudowire interface device over which the interface is created. The dynamic profile
does not automatically create the interface over the demux0 interface device, as is the case
with a VLAN demux interface.
9. (Optional) Configure interface set support for pseudowire subscriber logical interfaces.
340
You must set the maximum number of pseudowire logical interface devices (pseudowire tunnels) that
the router can use for subscriber logical interfaces. Setting the maximum number also defines the
interface names for the pseudowire interfaces. When you subsequently configure the interfaces, you
must specify the interface names in the range from ps0 up to ps(device-count - 1).
For example, if you set the maximum number of devices to 5, then you can configure only interfaces
ps0, ps1, ps2, ps3, and ps4.
Before Junos OS Release 17.2R1, you could specify a maximum of 2048 pseudowire logical interface
devices for an MX Series router. Starting in Junos OS Release 17.2R1, on MX Series routers with MPC
and MIC interfaces, the pseudowire logical interface devices scaling numbers has increased to 7000
devices to provide additional resiliency support.
Similarly, before Junos OS Release 18.3R1, you could specify a maximum of 2048 pseudowire subscriber
redundant logical tunnel (rlt) interface devices for an MX Series router. Starting in Junos OS Release
18.3R1, on MX Series routers with MPC and MIC interfaces, the pseudowire redundant logical interface
devices scaling numbers has increased to 7000 devices to provide additional resiliency support.
Starting in Junos OS Release 20.4R1, on MX2010 and MX2020 routers with the MX2K-MPC9E or
MX2K-MPC11E line card, you can specify up to 18000 pseudowire logical interface devices.
The PFE hosting the maximum pseudowire logical interface devices provides the configuration flexibility
needed for special cases that might occur for business edge scenarios. However, you can exceed the
available PFE resources as you configure additional services on the pseudowire logical interface devices
ports. To support a scaled configuration, ensure that you populate the appropriate number of PFEs for
the chassis, and that you distribute the pseudowire logical interface devices across the PFEs in such a
way that ensures that no PFE is overwhelmed by the anticipated peak load. As part of the network
planning for your particular deployment, you must consider the exact mix of the distribution of the
pseudowire logical interface devices and the services associated with the devices.
BEST PRACTICE: A configured pseudowire logical interface device consumes resources from
shared pools even when the device has no active subscriber logical interfaces. To conserve
resources, do not deploy an excessive number of pseudowire devices that you do not intend to
use.
341
To configure the number of pseudowire logical interface devices that you want the router to support:
[edit chassis]
user@host# edit pseudowire-service
To configure a pseudowire logical interface device that the router uses for subscriber logical interfaces,
you specify the logical tunnel that processes the pseudowire termination. You can also use redundant
logical tunnels to provide redundancy for member logical tunnels. You can configure additional optional
parameters for the interface device, such as VLAN tagging method, MTU, and gratuitous ARP support.
NOTE: You must create a logical tunnel for the pseudowire logical interface device. If you are
using redundant logical tunnels, you must create the redundant tunnel.
1. Specify that you want to configure the pseudowire subscriber logical interface device.
NOTE: The available interface names are determined by the [edit chassis pseudowire-service
device-count] statement. The names you specify must be in the range ps0 through
ps(device-count - 1). If you specify an interface name outside that range, the pseudowire
interface is not created.
2. Specify the logical tunnel interface that is the anchor point for the pseudowire logical interface
device. The anchor point must be an lt device in the format lt-fpc/pic/port.
342
CAUTION: Do not reconfigure the logical tunnel interface that is associated with the
pseudowire subscriber interface device unless you first deactivate all subscribers that
are using the pseudowire subscriber interface.
NOTE: Tunnel services must be enabled on the lt interface that is the anchor point or a
member link in a redundant logical tunnel. You use the command, set chassis fpc slot-number
pic pic-number tunnel-services bandwidth bandwidth to enable tunnel services.
NOTE: You cannot disable the underlying logical tunnel (lt) interface or redundant logical
tunnel (rlt) interface when a pseudowire is anchored on that interface. If you want to disable
the underlying interface, you must first deactivate the pseudowire.
3. (Optional) Specify the MAC address for the pseudowire logical interface device.
NOTE: You should ensure that you change the MAC address before passing traffic or binding
subscribers on the pseudowire port. Changing the MAC address when the pseudowire port is
active (for example, while an upper layer protocol is negotiating) can negatively impact
network performance until adjacencies learn of the new MAC address.
4. (Optional) Specify the VLAN tagging method used for the pseudowire logical interface device. You
can specify single tagging, dual (stacked) tagging, mixed (flexible) tagging, or no tagging.
See Enabling VLAN Tagging for additional information about VLAN tagging.
5. (Optional) Specify the encapsulation type for the pseudowire logical interface device.
343
Starting in Junos OS Release 19.1R1, you can configure additional encapsulations – Ethernet VPLS
and circuit cross-connect-based encapsulations – for the transport and service pseudowire
subscriber logical interface devices, respectively.
[edit interfaces]
user@host# set logical-interface-unit encapsulation encapsulation-type
6. (Optional) Specify the MTU for the pseudowire logical interface device. If you do not explicitly
configure the MTU, the router uses the default value of 1500.
You cannot dynamically change an anchor point that has active pseudowire devices stacked above it.
You must commit certain changes before you move the anchor point. Examples of this situation include
344
moving the anchor point from one logical tunnel to another logical tunnel, from a logical tunnel to a
redundant logical tunnel, and from a redundant logical tunnel to a logical tunnel.
1. Deactivate the stacked pseudowires and commit. This may require bringing down any subscribers
using the pseudowires.
[edit interfaces]
user@host# deactivate psnumber
user@host# commit
2. Change the anchor on the deactivated pseudowire to the new logical tunnel interface and commit.
[edit interfaces]
user@host# set psnumber anchor-point lt-fpc/pic/port
user@host# commit
[edit interfaces]
user@host# activate psnumber
user@host# commit
To move the anchor point from a logical tunnel interface to a redundant logical tunnel interface:
1. Deactivate the stacked pseudowires and commit. This may require bringing down any subscribers
using the pseudowires.
[edit interfaces]
user@host# deactivate psnumber
user@host# commit
a. Create the tunnel and set the maximum number of devices allowed.
[edit chassis]
user@host# set redundancy-group interface-type redundant-logical-tunnel device-count count
345
3. Change the anchor on the deactivated pseudowire to the new redundant logical tunnel interface and
commit.
[edit interfaces]
user@host# set psnumber anchor-point rltnumber
user@host# commit
[edit interfaces]
user@host# activate psnumber
user@host# commit
To move the anchor point from a redundant logical tunnel interface to a logical tunnel interface that is a
member of the redundant logical tunnel:
346
1. Deactivate the stacked pseudowires; this may require bringing down any subscribers using the
pseudowires. Delete the redundant logical tunnel interface and commit your changes.
[edit interfaces]
user@host# deactivate psnumber
user@host# delete rltnumber
user@host# commit
2. Change the anchor on the deactivated pseudowire to the new logical tunnel interface and commit.
[edit interfaces]
user@host# set psnumber anchor-point lt-fpc/pic/port
user@host# commit
[edit interfaces]
user@host# activate psnumber
user@host# commit
This topic describes how to configure a pseudowire transport logical interface. A pseudowire device can
have only one transport logical interface.
A pseudowire logical device and its related pseudowire logical interfaces are dependent on the state of
the underlying logical transport interface device, which is either the Layer 2 VPN or Layer 2 circuit.
NOTE: We recommend that you use unit 0 to represent the transport logical interface for the
pseudowire device. Non-zero unit numbers represent service logical interfaces used for
pseudowire subscriber interfaces.
1. Specify that you want to configure the pseudowire subscriber logical interface device.
[edit]
user@host# edit interfaces ps0
2. Specify that you want to configure unit 0, which represents the transport logical interface.
3. (Optional) Specify the encapsulation method for the transport logical interface.
Starting in Junos OS Release 19.1R1, you can configure Ethernet VPLS encapsulation, in addition to
circuit cross-connect-based encapsulations for pseudowire subscriber transport logical interfaces.
4. (Optional) Configure the termination of the transport logical interface on l2backhaul-vpn routing-
instance. This support is enabled from Junos OS Release 19.1R1.
This topic describes the steps for configuring Layer 2 circuit signaling used for the pseudowire
subscriber logical interface support. You can also use Layer 2 VPN signaling for pseudowire subscriber
logical interfaces. The two methods are mutually exclusive; you can use only one method for a particular
pseudowire.
1. Specify that you want to configure Layer 2 circuit parameters at the protocols hierarchy level.
[edit protocols]
user@host# edit l2circuit
2. Specify the IP address of the neighbor, to identify the PE router used for the Layer 2 circuit.
4. Configure the virtual circuit ID that identifies the Layer 2 circuit for the pseudowire.
For more information about Layer 2 circuits, see Configuring Interfaces for Layer 2 Circuits.
This topic describes the steps for configuring Layer 2 VPN signaling used for the pseudowire subscriber
logical interface support. You can also use Layer 2 circuit signaling for pseudowire subscriber logical
interfaces. The two methods are mutually exclusive; you can use only one method on a particular
pseudowire.
[edit]
user@host# edit routing-instances l2vpn0
349
4. Configure the unique identifier for the routes that belong to the Layer 2 VPN.
5. Configure the VPN routing and forwarding (VRF) target of the routing instance.
6. Specify that you want to configure the Layer 2 VPN protocol for the routing instance.
8. Specify the site name and site identifier for the Layer 2 VPN.
9. Specify the interface that connects to the site, and the remote interface to which you want the
specified interface to connect.
10. Configure the tracing options for traffic that uses the Layer 2 VPN.
This topic describes how to configure a pseudowire service logical interface. Service logical interfaces
represent the attachment circuits for pseudowire logical interfaces.
As described in the "Pseudowire Subscriber Logical Interfaces Overview" on page 331, you can choose
whether to configure a service logical interface together with a higher subscriber logical interface,
depending upon the business need. In a broadband edge configuration, the higher subscriber logical
interface is the demarcation point for subscribers. However, in a business edge configuration, the
service logical interface is the demarcation point for the business subscribers, and also serves as the
subscriber logical interface, so no subscriber logical interfaces are explicitly configured.
NOTE: Non-zero unit numbers represent service logical interfaces used for pseudowire
subscriber interfaces. Use unit 0 to represent the transport logical interface for the pseudowire
device.
1. Specify that you want to configure the pseudowire subscriber logical interface device.
[edit]
user@host# edit interfaces ps0
351
2. Configure the unit for the service logical interface. Use a non-zero unit number.
3. (Optional) Specify the encapsulation type for the service logical interface.
Starting in Junos OS Release 19.1R1, you can configure circuit cross-connect-based encapsulations,
in addition to the Ethernet VPLS, VLAN bridge, and VLAN VPLS encapsulations for pseudowire
subscriber service logical interfaces.
The pseudowire subscriber service logical interfaces support single-tagged traffic, double-tagged
traffic, and list of VLANs on the single logical interface.
4. (Optional) Configure filters and policers on the family circuit cross-connect encapsulation.
6. Configure the interface to respond to ARP requests when the device has an active route to the ARP
request target address.
7. Specify that you want to configure the protocol family information. Pseudowire service logical
interfaces support IPv4 (inet), IPv6 (inet6), and PPPoE (pppoe) protocol families.
For example, to configure the IPv4 family:
8. (Optional) Configure the termination of the service logical interface on locally switched Layer 2
circuits. This support is enabled from Junos OS Release 19.1R1.
[edit protocols]
user@host# set l2circuit local-switching interface ps0.1 encapsulation-type ethernet-vlan ignore-
encapsulation-mismatch ignore-mtu-mismatch
Release Description
20.4R1 Starting in Junos OS Release 20.4R1, on MX2010 and MX2020 routers with the MX2K-MPC9E or
MX2K-MPC11E line card, you can specify up to 18000 pseudowire logical interface devices.
19.1R1 Starting in Junos OS Release 19.1R1, additional encapsulations are added to the pseudowire subscriber
transport and service logical interfaces. The transport logical interface supports Ethernet VPLS
encapsulation, and provisions for terminating the interface on the l2backhaul-vpn routing-instance. The
service logical interface supports circuit cross-connect (CCC) encapsulation, and provisions for
terminating the interface on locally switched Layer 2 circuits.
19.1R1 Starting in Junos OS Release 19.1R1, you can configure additional encapsulations – Ethernet VPLS and
circuit cross-connect-based encapsulations – for the transport and service pseudowire subscriber logical
interface devices, respectively.
353
19.1R1 Starting in Junos OS Release 19.1R1, you can configure Ethernet VPLS encapsulation, in addition to
circuit cross-connect-based encapsulations for pseudowire subscriber transport logical interfaces.
19.1R1 Starting in Junos OS Release 19.1R1, you can configure circuit cross-connect-based encapsulations, in
addition to the Ethernet VPLS, VLAN bridge, and VLAN VPLS encapsulations for pseudowire subscriber
service logical interfaces.
18.4R1 Starting in Junos OS Release 18.4R1, the support for inline distribution of single-hop Bidirectional
Forwarding Detection (BFD) sessions is extended to pseudowire subscriber over redundant logical
tunnel interfaces.
18.3R1 Starting in Junos OS Release 18.3R1, on MX Series routers with MPC and MIC interfaces, the support
for pseudowire subscriber service interface over redundant logical tunnels is introduced in Layer 3 VPNs
and draft-rosen multicast VPNs.
18.3R1 Starting in Junos OS Release 18.3R1, on MX Series routers with MPC and MIC interfaces, the
pseudowire redundant logical interface devices scaling numbers has increased to 7000 devices to
provide additional resiliency support.
18.3R1 Starting in Junos OS Release 18.3R1, on MX Series routers with MPC and MIC interfaces, the
pseudowire redundant logical interface devices scaling numbers has increased to 7000 devices to
provide additional resiliency support.
17.3R1 Starting with Junos OS Release 17.3R1 and later releases, stateful anchor point redundancy support is
provided for pseudowire subscriber logical interface by the underlying redundant logical tunnel interface
(rlt) in active-backup mode. This redundancy protects the access and the core facing link against anchor
PFE (Packet Forwarding Engine) failure.
17.2R1 Starting in Junos OS Release 17.2R1, on MX Series routers with MPC and MIC interfaces, the
pseudowire logical interface devices scaling numbers has increased to 7000 devices to provide
additional resiliency support.
16.1R1 Starting with Junos OS release 16.1R1, family inet and family inet6 are supported on the services side of
an MPLS pseudowire subscriber as well as non-subscriber logical interface.
16.1R1 Starting with Junos OS Release 16.1R1, Inline IPFIX is supported on the services side of an MPLS
pseudowire subscriber logical interface.
15.1R3 Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, CCC encapsulation is supported
on the transport side of an MPLS pseudowire subscriber logical interface.
354
15.1R3 Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, distributed denial-of-service
(DDoS) protection is supported on the services side of an MPLS pseudowire subscriber logical interface.
15.1R3 Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, Policer and Filter are supported
on the services side of an MPLS pseudowire subscriber logical interface.
15.1R3 Starting with Junos OS Release 15.1R3 and 16.1R1 and later releases, accurate transmit statistics on
logical interface are supported on the services side of an MPLS pseudowire subscriber logical interface.
RELATED DOCUMENTATION
IN THIS SECTION
Supported Access Models for Dynamic-Bridged GRE Tunnels on the Wi-Fi Access Gateway | 360
Configuring a Pseudowire Subscriber Logical Interface Device for the Wi-Fi Access Gateway | 361
Configuring VLAN Subscriber Interfaces for Dynamic-Bridged GRE Tunnels on Wi-Fi Access Gateways | 366
Configuring Untagged Subscriber Interfaces for Dynamic-Bridged GRE Tunnels on Wi-Fi Access
Gateways | 371
Wi-Fi access gateway (WAG) provides the public with Wi-Fi access from a residential Wi-Fi network or
from a business Wi-Fi network. At home, subscribers have their existing Wi-Fi network; however, a part
of their network is available for the general public to use. Members of the public who have an account
with the same Internet service provider as the subscriber has at home can access the Internet and
mobile network through the public part of the subscriber’s Wi-Fi connection when they are in close
proximity to the subscriber’s home. WAG authenticates and connects subscribers regardless of their
physical location.
357
Starting in Junos OS Release 17.2R1, service providers can deploy the MX Series router as a broadband
network gateway (BNG) within their network, and then deploy the BNG as a WAG. Figure 22 on page
357 shows a sample topology.
After a WAG has been deployed, service providers can configure the WAG to create secure wireless
home network connections for computers, laptops, and other Wi-Fi electronic products (such as game
systems, tablets, or mobile phones). WAG offers wireline and mobile service providers the following
deployments and business value opportunities:
• Wireline service providers–The WAG deployment is based on an in-home division of access points or
public access points, and works with any Wi-Fi access point that creates a generic routing
encapsulation (GRE) tunnel to the MX Series router. This deployment protects subscribers and
reduces churn by including free Wi-Fi with a paid wireline subscription. For added value, service
providers can also sell ad hoc access or mode, such as airport, public safety, search-and-rescue, and
café access.
• Mobile service providers–The WAG deployment is based on the mobile service provider’s own access
points, or wholesale and retail with the wireline service provider. Service providers that offer
quadruple play, where TV, Internet, wireless, and landline phone services are combined, can leverage
both wireline and wireless assets. This deployment offsets costs in mobile packet core and radio
access network infrastructures with the ability to offload mobile data. For added value, service
providers can offer Wi-Fi for all devices with a mobile data place as a competitive differentiator.
Customers who purchase broadband can also receive Wi-Fi on any community Wi-Fi access point.
Subscribers have a private and secure home connection, and can also access a public connection that is
358
shared by other subscribers. To maintain a level of security and protect the private home connection, the
two networks are separated. This separation ensures a strong level of bandwidth on the subscribers’
personal connections.
Subscriber services such as authentication, authorization, and accounting (AAA); address assignment;
hierarchical quality of service (QoS); lawful intercept; and class of service (CoS) are supported for
individual Dynamic Host Configuration Protocol (DHCP) subscribers within the GRE tunnels. Using GRE
tunnels for Wi-Fi provides the following benefits:
• Wi-Fi users who are not directly connected through Layer 2 to WAG are authenticated because GRE
tunnels transmit Layer 2 information across any IP network.
• Services based on user equipment-specific information are applied using the media access control
(MAC) address or Subscriber Identity Module (SIM) card.
• Services are applied in the network, not just at the Wi-Fi access point.
• The soft GRE or Ethernet-over-GRE standard is supported on most Wi-Fi access points. For services
using the Ethernet over GRE standard, only one side of the tunnel needs to be configured; the other
end learns the remote IP addresses of all remote tunnel endpoints by examining the incoming GRE
packets.
Figure 23 on page 359 shows an MX Series router broadband network gateway (BNG) deployed as a
Wi-Fi access gateway (WAG). The WAG provides a multiservice edge with a full broadband feature set
359
that is highly reliable because of the included redundant hardware. Ethernet frames from the user
equipment device must be tunneled to the BNG across an IP cloud or public Internet.
To support the MX Series BNG deployed as a WAG, dynamic-bridged generic routing encapsulation
(GRE) tunnels are created and terminated at the BNG when it receives GRE traffic from the wireless
access point (WAP). Dynamic Host Configuration Protocol (DHCP) subscribers are transported through
GRE tunnels as either VLAN-tagged per service set identifier (SSID) or untagged. When the user
equipment device connects to the SSID and begins to send traffic, the access point initiates a Layer 2
soft GRE or Ethernet-over-GRE connection to the MX Series BNG and the BNG dynamically builds the
GRE tunnel. GRE tunnels are cleared after all of the subscribers within a GRE tunnel have logged out and
a configurable timer has expired.
This deployment model supports a full set of services per user equipment device and per access point.
Subscriber services such as authentication, authorization, and accounting (AAA); address assignment;
hierarchical quality of service (QoS); lawful intercept; and class of service (CoS) are supported for
individual DHCP subscribers within the GRE tunnels. No additional service cards are required for GRE or
QoS because all features run inline on MPCs.
External RADIUS proxy supports Extensible Authentication Protocol (EAP) Subscriber Identity Module
(SIM), Tunneled Transport Layer Security (TTLS), and Authentication and Key Agreement (AKA)
protocols. The External RADIUS proxy also integrates with HTTP redirect to the Web portal.
The MX Series as WAG deployment model also supports the wholesale of access point access to
multiple retail service providers. This wholesaling allows the local breakout of traffic or Layer 3 handoff
to retail service providers.
360
IN THIS SECTION
Dynamic-bridged generic routing encapsulation (GRE) tunnels and the Wi-Fi access gateway support
interface stacks for VLAN-tagged and untagged subscribers. Subscriber features such as dynamic and
service profiles for DHCP subscribers, lawful intercept, firewall filters, and change of authorization (CoA)
are supported.
Scaling limitations of pseudowire subscriber interface devices (psn IFDs) require that multiple tunnels
share the same psn IFD. The pseudowire is a virtual device that is stacked above the logical tunnel
anchor point on the physical interface (the IFD).
NOTE: The psn IFD used to service dynamic GRE tunnel terminations cannot be simultaneously
used to service MPLS pseudowire terminations.
Subscriber services and lawful intercept are supported only at the IP demultiplexing (demux)
interface level.
NOTE: A GRE tunnel cannot have both untagged and tagged subscribers.
The tagged model and the untagged model are described in the following sections:
To make provisioning and troubleshooting easier for VLAN-tagged subscribers, use the same set of
VLANs on all of the Wi-Fi access points. Doing this requires that the same pseudowire subscriber
interface service logical interface (psn IFL) (associated with a VLAN ID) on a psn IFD represents multiple
GRE tunnels.
A dynamic VLAN demux interface (demux0.yyyyyyyy) is created for each VLAN tag and is stacked over
the tunnel psn interface (psn.xxxxxxxx). There can be multiple VLANs (single and dual-tagged) over the
361
same GRE tunnel. The subscribers' IP demux interfaces are then created over the VLAN demux
interface.
Untagged Subscribers
Untagged DHCP subscribers can be created directly over the GRE tunnel. For each subscriber, an IP
demux interface (demux0.yyyyyyyy) is created and is stacked over the tunnel psn logical interface
(psn.xxxxxxxx). There can be multiple subscribers over the same GRE tunnel.
NOTE: A GRE tunnel cannot have both untagged and tagged subscribers.
• If the subscriber traffic is VLAN-tagged, see "Configuring VLAN Subscriber Interfaces for
Dynamic-Bridged GRE Tunnels on Wi-Fi Access Gateways" on page 366.
• If the subscriber traffic is untagged, see "Configuring Untagged Subscriber Interfaces for Dynamic-
Bridged GRE Tunnels on Wi-Fi Access Gateways" on page 371.
• Configure the maximum number of pseudowire logical interfaces devices. See "Configuring the
Maximum Number of Pseudowire Logical Interface Devices Supported on the Router" on page 340.
• Configure a tunnel interface. See Tunnel Interface Configuration on MX Series Routers Overview.
362
To configure the pseudowire subscriber logical interface device on which the dynamic-bridged GRE
tunnel is built on the MX Series router Wi-Fi access gateway:
1. Specify that you want to configure the pseudowire subscriber logical interface device.
For example:
2. Specify the logical tunnel interface that is the anchor point for the pseudowire logical device
interface.
For example:
For example:
4. Configure the mixed VLAN tagging method for the pseudowire logical interface device.
NOTE: You must configure flexible-vlan-tagging even if only untagged subscriber packets are
being transported on the dynamic-bridged GRE tunnel.
For example:
5. Specify that you want to configure unit 0, which represents the transport logical interface.
For example:
6. Specify the Ethernet CCC encapsulation method for the transport logical interface.
For example:
• Configure the pseudowire logical device on which to build the dynamic-bridged GRE tunnel. See
"Configuring a Pseudowire Subscriber Logical Interface Device for the Wi-Fi Access Gateway" on
page 361.
• Configure interface lo0 with the source IP address of the GRE tunnels for the Wi-Fi access gateway
(WAG). Use the IP address of the MX Series router that you want to receive the incoming GRE traffic.
This address cannot be the primary or preferred address on lo0. See Configuring a Loopback
Interface.
To configure the conditions for enabling dynamic-bridged generic routing encapsulation (GRE) tunnel
creation on the MX Series router WAG, you configure one or more GRE tunnel groups. Multiple GRE
tunnel groups can have the same source-address or the same destination-networks value, but you
cannot use a specific source-address and destination-networks combination in more than one GRE
tunnel group.
[edit services]
user@host# set soft-gre group-name
For example:
[edit services]
user@host# set soft-gre AP-Group1
2. Specify the source IP address of the GRE tunnels for the WAG. Use the IP address of the MX Series
router that you configured to receive the incoming GRE traffic.
For example:
For example:
4. Specify the pseudowire subscriber interface device (IFD) on which to build the dynamic-bridged GRE
tunnels.
For example:
For example:
6. (Optional) Configure the number of seconds that a GRE tunnel remains up after the last subscriber
session on the tunnel has ended.
For example:
To configure subscriber interfaces for VLAN-tagged Dynamic Host Configuration Protocol (DHCP)
subscribers on dynamic-bridged generic routing encapsulation (GRE) tunnels:
[edit]
user@host# set dynamic-profiles profile-name
For example:
[edit]
user@host# set dynamic-profiles tunnel_profile
2. Define the interface with the internal variable used by the router to match the interface name of the
receiving interface.
For example:
For example:
For example:
6. Enable the local address for the interface to be derived from the loopback interface address.
For example:
For example:
For example:
c. Specify that the VLAN dynamic profile accepts any type of VLAN Ethernet packet.
For example:
d. Specify the outer and inner stacked VLAN ranges that you want the dynamic profile to use.
For example:
For example:
For example:
c. Specify that the VLAN dynamic profile accepts any type of VLAN Ethernet packet.
For example:
d. Specify the VLAN range that you want the dynamic profile to use.
profile-name]
user@host# set ranges low-tag-high-tag
For example:
To configure subscriber interfaces for untagged Dynamic Host Configuration Protocol (DHCP)
subscribers on dynamic-bridged generic routing encapsulation (GRE) tunnels:
[edit]
user@host# set dynamic-profiles profile-name
For example:
[edit]
user@host# set dynamic-profiles tunnel_demux
2. Define the interface with the internal variable used by the router to match the interface name of the
receiving interface.
For example:
For example:
5. Configure the variable for the underlying interface of the demux interfaces.
For example:
For example:
17.2R1 Starting in Junos OS Release 17.2R1, service providers can deploy the MX Series router as a broadband
network gateway (BNG) within their network, and then deploy the BNG as a WAG.
7 CHAPTER
IN THIS SECTION
IN THIS SECTION
References | 379
Service providers can manage subscribers over a wireless network to the home instead of having to run
fiber to the building. The subscribers are in a fixed location, typically a residence, with customer
premises equipment (CPE) that exchanges wireless radio signals with the provider network. The wireless
network uses a fiber backhaul tower to handle traffic for the last miles from a hard-wired network to the
subscribers. Multiple towers can relay traffic between each other to and from the fiber optic network.
Starting in Junos OS Release 19.2R1, MX Series routers acting as BNGs can support subscribers in
Third-Generation Partnership Project (3GPP) fixed wireless access networks, enabling the integration of
fixed wireless subscribers with the wireline subscriber management backend.
You can find a helpful summary of related terminology in "Fixed Wireless Access Network Overview" on
page 375.
376
Figure 24 on page 376 shows a representative topology for a fixed wireless access network.
Figure 25 on page 377 shows the GPRS tunneling protocol (GTP) signaling messages in the fixed
wireless access network that are necessary to activate and deactivate a default bearer. The messages
are actually request and response pairs, but for simplicity the pairs are represented in the figure with
bidirectional arrows. The Default Bearer Active line represents the activated default bearer that will
carry data traffic.
377
Figure 25: Signaling Messages for Bringing Default Bearer Up and Down
1. The user equipment (UE) sends an Attach Request to the eNodeB, which forwards the message to
the mobility management entity (MME). The request includes the APN.
2. The MME exchanges Identity request/response messages with the UE to determine the
International Mobile Subscriber Identity (IMSI) or other identifier of the UE.
3. The MME sends the identifier to the Home Subscriber Server (HSS) to authenticate the UE.
4. The MME exchanges Location Update request/response messages with the HSS. In this exchange,
the MME provides the HSS with its own address. The HSS acknowledges the update and sends
subscription information for the UE from its database.
5. The MME sends a Create Session Request to the System Architecture Evolution gateway (SAEGW).
The MME first compares the APN provided by the UE with the APN for which it is authorized
according to the subscription information from the HSS. If there is a match, the MME includes that
378
APN in the Create Session Request. If it does not match, then the MME instead includes the APN
authorized by the HSS.
• Validates the APN requested by the subscriber. If you have configured authentication, the BNG
communicates with the RADIUS server to accomplish that task.
• Receives the R-TEID-C, which consists of the IP address of the S11 interface on the MME and
the MME’s allocated identifier.
• The L-TEID-C is the IP address of the S11 interface on the BNG and the BNG’s allocated
identifier.
• The L-TEID-U is the IP address of the S1-U interface on the BNG and the BNG’s allocated
identifier.
• Allocates an IP address for the pseudowire interface it creates for the session. The address
comes from either a locally configured address pool on the BNG or from the RADIUS server.
• Creates the session and sends the Create Session response to the MME. The response includes
the IP address that the SAEGW has assigned for the bearer and both L-TEID-C and L-TEID-U.
7. The MME exchanges messages with the eNodeB, which then establishes the bearer component
from the UE to eNodeB.
8. The UE signals to the eNodeB that attachment is complete; the eNodeB notifies the MME.
9. The MME and SAEGW exchange Modify Bearer request/response messages to determine the final
parameters for the bearer.
When the BNG receives the request, it creates the dynamic pseudowire (ps) interface that will
receive the GTP-U encapsulated data packets from the eNodeB. The BNG creates one dynamic ps
interface per UE. The BNG also receives the R-TEID-U from the eNodeB in the Modify Bearer
request. After creating the interface, the BNG sends a Modify Bearer response to the MME.
10. The default bearer is now active and subscriber data traffic can pass back and forth between the
UE through eNodeB to the SAEGW and then the connected PDN.
However, if the residential gateway is a DHCP client, it first begins the DHCP message exchange
for the subscriber. The exchange takes place on the default bearer. After DHCP operations have
completed to bind the subscriber and provide the DHCP configuration, then data traffic passes over
the bearer.
379
The MME and SAEGW also exchange Delete Session request and response messages. When the
SAEGW receives the request, it initiates the subscriber logout process, much as it would for a wireline
DHCP subscriber.
Figure 26 on page 379 shows the DHCP connection for the case where the RG creates DHCP
subscribers. The DHCP control packets are exceptioned to the Routing Engine as for any other DHCP
deployment. The behavior for creating and controlling the DHCP subscribers is the same as for a
wireline broadband network. When the subscriber is bound, the UE can then start sending data traffic
for the subscriber.
References
For detailed information about all aspects of a fixed wireless network, read the 3GPP technical
specifications that define everything. Table 29 on page 379 lists the most relevant specifications.
Table 29: 3GPP Technical Specifications for Fixed Wireless Access Networks
3GPP TS 23.401 (Release 15) General Packet Radio Service (GPRS) enhancements for Evolved
Universal Terrestrial Radio Access Network (E-UTRAN) access
380
Table 29: 3GPP Technical Specifications for Fixed Wireless Access Networks (Continued)
Stage 3
Table 30 on page 380 explains terminology used for 3GPP fixed wireless access networks.
Term Description
3GPP The 3rd Generation Partnership Project is an international standards organization that
develops specifications and protocols for wireless telephony.
381
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
APN The access point name identifies the packet data network (PDN), such as the Internet, that
the subscriber wants to access. When a subscriber requests access, the UE passes the
requested APN to the eNodeB, which sends it to the MME for authorization. If the
subscriber does not request an APN, the MME can authorize a default APN.
Each PDN that the user subscribes to has an APN and an associated packet data network
gateway (PGW) that the UE uses to access the PDN.
The combination of APN and PGW is called a PDN subscription context. One context is
the default APN, which always connects to a PDN such as the Internet unless the user
activates another APN.
The HSS maintains subscriber profiles, The MME uses the profile from the HSS to validate
whether the subscriber is actually subscribed to the requested APN.
You can also think of the APN as the set of service-level and connection parameters—such
as QoS parameters—that is authorized for the UE. A given UE can access many APNs.
• Network Identifier—This defines the external PDN that the user connects to through a
PGW. This part of the APN is mandatory. It can be as simple as internet or have a more
complicated structure such as example.net. The network identifier can optionally
specify a requested subscriber service.
Operator Identifier—(Optional) This defines the provider whose PDN the user connects
to through a PGW. This part of the APN is often omitted. If present, it consists of the
provider’s Mobile Network Code (MNC) and Mobile Country Code (MCC).
An APN that includes both a Network Identifier and an Operator Identifier corresponds to
a DNS name for the PGW.
network-id.mncmnc-number.mccmcc-number.gprs
• fixed-wireless
382
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
• web.example.net
• internet.mnc99.mcc999.gprs
Bearer A bearer is the tunnel that connects the UE to a PDN through the PGW. A default bearer
is established to a default PGW whenever the UE is activated. Activation means here that
the UE is on and has performed authentication.
A UE device has a default bearer for each PGW to which it connects. For example, if user
equipment connects to the Internet through one PGW and a corporate intranet through
another PGW, two default bearers will be active.
Default bearers are best-effort. The UE can establish dedicated bearers to other PDNs
that can have different QoS requirements, such as a guaranteed bit rate (GBR).
Bearers encapsulate user data with GTP-U. The GTP-U information is in turn sent over a
UDP connection and inside IP packets.
eNodeB The hardware (typically in a radio tower) that connects directly to the UE over the air and
to the wireless network core. Also called evolved Node B or E-UTRAN Node B.
• Locates the MME that authenticates the UE (SIM card) with information from the
subscriber profile maintained on the HSS.
• Maintains the S1-U data plane interface with the SAEGW on the BNG. An S1-U
interface can support multiple eNodeBs.
GPRS The general packet radio service is the data standard that defines the specifications that
enable wireless networks to carry IP packets to external networks.
GR The home gateway router that provides the interface between the subscriber’s network
and the UE. Also called a residential gateway router.
383
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
GTP The GPRS tunneling protocol governs the creation and use of GTP tunnels that carry
traffic between two GPRS support nodes (GSNs), such as an MME and an SGW.
Each GTP tunnel is identified by a TEID. The receiving end of a tunnel assigns locally the
TEID that the transmitting side uses. The tunnel endpoints on the nodes exchange
messages to communicate the TEID values to each other.
GTP-C The GPRS tunneling protocol, control plane. GTP-C tunnels carry packet data units and
signaling messages in the control plane (S11 interface) between tunnel endpoints on the
MME and the SAEGW on the BNG.
GTP-U The GPRS tunneling protocol, user plane. GTP-U tunnels carry packet data units and
signaling messages in the user (data) plane (S1-U interface) between tunnel endpoints on
the eNodeB and the SAEGW on the BNG.
HSS The Home Subscriber Server maintains a database of subscriber and service information.
This information supports call (connection) control and session management. The HSS has
the following functions:
• Provides authentication information from the subscriber profile to the MME. The MME
uses that information to authenticate the UE for the wireless access network
connection.
• Identifies the APN that represents and defines the connection for the UE.
IMSI The International Mobile Subscriber Identity number that identifies a 3GPP subscriber.
The IMSI consists of a mobile country code, a mobile network code, and a mobile station
identification number.
MEI The Mobile Equipment Identity number that uniquely identifies the subscriber device.
384
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
MME The mobility management entity is the control node for the wireless access network,
communicating with eNodeB, HSS, and SAEGW. Some of its functions include the
following:
• Authenticates the UE with the HSS by using various types of UE identification, such as
IMSI, MEI, or MSISDN.
• Maintains the S11 control plane interface with the SAEGW on the BNG. An S11
interface can support multiple MMEs.
• Manages the UE idle state (so the device is reachable from other devices and services),
and performs idle-mode paging of UE.
MSISDN The Mobile Subscriber ISDN Number (telephone number) that is assigned to the mobile
subscriber.
385
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
PGW The packet data network gateway provides the UE with connectivity to external networks
such as the Internet. Traffic to and from the UE is processed by the PGW. The BNG
functions as an SAEGW, which includes the functions of both PGW and SGW.
• Enforces policy.
S11 The GTPv2-based control plane interface that connects the MME and the SAEGW on the
BNG. GTP-C tunnels carry control messages.
S1-MME The GTPv2-based control plane interface that connects eNodeB and the MME.
S1-U The GTPv1-based user plane interface that connects eNodeB and the SAEGW on the
BNG. S1-U is also called the data plane interface. GTP-U tunnels on the interface carry
user payloads.
S6a Interface that connects the MME and the HSS, which use this interface to exchange
subscriber, service, and UE information.
SAEGW The System Architecture Evolution gateway that includes the functions of both the SGW
and the PGW. It enables the BNG to act as both SGW and PGW.
386
Table 30: Terminology for a 3GPP Fixed Wireless Access Network (Continued)
Term Description
SGW The serving gateway routes and forwards subscriber data packets. The BNG functions as
an SAEGW, which includes the functions of both PGW and SGW.
• Terminates S1-U interfaces with eNodeBs and S11 interfaces with MMEs.
TEID A tunnel endpoint identifier that uniquely identifies a GTP tunnel endpoint in the scope of
a path. A fully qualified TEID consists of an IP address concatenated with a locally
allocated identifier. Four TEIDs are defined, together they uniquely identify a default
bearer session:
• L-TEID-C consists of the IP address of the S11 interface on the BNG and the BNG’s
allocated identifier.
• L-TEID-U consists of the IP address of the S1-U interface on the BNG and the BNG’s
allocated identifier
• R-TEID-C consists of the IP address of the S11 interface on the MME and the MME’s
allocated identifier.
• R-TEID-U consists of the IP address of the S1-U interface on the eNodeB and the
eNodeB’s allocated identifier
UE The user equipment that connects to the wireless network’s eNodeB and to the
subscriber’s network. UE corresponds to what is called CPE in other contexts.
In some cases, the UE consists of a SIM card and a residential gateway router (RG) that can
host the SIM. In other cases the SIM might be in a separate device that connects to the
RG. In both cases, the SIM provides the wireless radio connectivity to eNodeB in the fixed
wireless access network.
• Reduce last-mile installation and maintenance costs by using radio backhaul towers connected to
hard-wired network instead of providing fiber to the building.
387
The fixed wireless access configuration enables the SAEGW on the BNG. At a minimum you must
configure an APN, the control plane and the data plane.
The following procedure assumes that you have configured separately any of the following that apply
for your APN:
• Access profile
• Dynamic profile
• Address pool
1. Specify the name of the pseudowire physical interface that anchors all incoming GTP-U (S1-U
interface) tunnels on the BNG.
2. Define an access point name for the user equipment by specifying the connection and service
parameters that the subscriber’s device can use to connect to the PGW to access a PDN.
a. (Optional) Associate an authentication or accounting profile with the APN that specifies
authentication or accounting parameters.
b. (Optional) Specify one or more authentication parameters that the BNG sends to the external
AAA server for subscribers using this APN. You configure details about the external server in the
access profile that you associate with the APN. Some networks might not use this authentication,
because the HSS has already authenticated the UE and determined subscriber access. Other
networks might not use this because they use Diameter for online charging.
d. (Optional) Specify a text description for the APN. You can use this to provide more information
about the APN than its name alone can convey. The description for an APN appears in subscriber
profiles in the HSS database.
e. Associate a dynamic profile with the APN to create the dynamic fixed wireless interface.
389
NOTE: Services such as CoS and firewall filters are applied as part of the DHCP
configuration.
f. (Optional) Specify the name of the address pool for IPv4 addresses assigned to the APN.
g. (Optional)
3. Configure the control plane by specifying the name of the MME and the IPv4 address of the S11
interface on the BNG. The S11 interface is the reference point or connection between the MME and
the SAEGW on the BNG for control packets.
4. Configure the data plane by specifying the name of the eNodeB and the IPv4 address for the S1-U
interface on the BNG. The S1-U interface is the reference point or connection between the eNodeB
and the SAEGW on the BNG for subscriber data traffic.
For example, the following configuration specifies the S11 interface address as 192.0.2.30 and the S1-U
interface address as 192.0.2.100. The pseudowire anchor is ps0. The APN is named internet-basic; it has
both an access profile for RADIUS parameters and a dynamic client profile attached. The authentication
390
password is $ABC123. The username includes the domain name example.net and the subscriber’s IMSI.
The data type is the required IPv4. A descriptive string, fwa-basic-subscribers-phoenix, is associated
with the APN.
The APN uses the default routing instance, because no other routing instance is configured. IP
addresses are supplied by RADIUS, because the configuration does not specify a local pool.
fixed-wireless-access {
anchor-point ps0;
control-plane mme-45 {
s11 {
v4-address ip-address;
}
}
data-plane x-s1u-20 {
s1-u {
v4-address 192.0.2.100;
}
}
apn internet-basic {
aaa-profile fwa-radius-prof;
apn-data-type ipv4
authentication {
password $ABC123;
username-include {
domain-name example.net;
imsi;
}
}
description fwa-basic-subscribers-phoenix;
dynamic-profile fwa-dyn-profile;
}
}
The dynamic profile that you attach to the APN creates the dynamic interface for fixed wireless access.
The following configuration is a simple example:
dynamic-profiles fwa-dyn-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
family inet {
391
The anchor point interface configuration is also very simple. For example:
interfaces {
ps0 {
anchor-point {
rlt-0/1/10;
}
flexible-vlan-tagging;
}
}
IN THIS SECTION
Purpose | 391
Action | 391
Purpose
Determine status information and statistics for fixed wireless access configurations.
Action
• To display a list of all interfaces on the BNG supporting fixed wireless access subscribers:
• To display detailed information about fixed wireless access subscribers, including username and IP
address, dynamic profile, local and remote TEIDs, and remote and local IP addresses for the BNG
connection to eNodeBs and MMEs:
• To view statistics for messages exchanged between the BNG, eNodeB, and MME:
19.2R1 Starting in Junos OS Release 19.2R1, MX Series routers acting as BNGs can support subscribers in
Third-Generation Partnership Project (3GPP) fixed wireless access networks, enabling the integration of
fixed wireless subscribers with the wireline subscriber management backend.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the Number and Size of Fixed Wireless Access Log Files | 394
393
Configuring a Regular Expression for Fixed Wireless Access Messages to Be Logged | 395
The Junos OS trace feature tracks fixed wireless access operations and records events in a log file. The
error descriptions captured in the log file provide detailed information to help you solve problems.
By default, nothing is traced. When you enable the tracing operation, the default tracing behavior is as
follows:
1. Important events are logged in a file located in the /var/log directory. By default, the router uses the
filename tcpfwdd. You can specify a different filename, but you cannot change the directory in which
trace files are located.
2. When the trace log file filename reaches 128 kilobytes (KB), it is compressed and renamed
filename.0.gz. Subsequent events are logged in a new file called filename, until it reaches capacity
again. At this point, filename.0.gz is renamed filename.1.gz and filename is compressed and renamed
filename.0.gz. This process repeats until the number of archived files reaches the maximum file
number. Then the oldest trace file—the one with the highest number—is overwritten.
You can optionally specify the number of trace files to be from 2 through 1000. You can also
configure the maximum file size to be from 10 KB through 1 gigabyte (GB). (For more information
about how log files are created, see the System Log Explorer.)
By default, only the user who configures the tracing operation can access log files. You can optionally
configure read-only access for all users.
The following topics describe how to configure all aspects of tracing fixed wireless access operations:
By default, the name of the file that records trace output for fixed wireless access is bbe-fwsd. You can
specify a different name with the file option.
• Specify the name of the file used for the trace output.
Configuring the Number and Size of Fixed Wireless Access Log Files
You can optionally specify the number of compressed, archived trace log files to be from 2 through
1000. You can also configure the maximum file size to be from 10 KB through 1 gigabyte (GB); the
default size is 128 kilobytes (KB).
The archived files are differentiated by a suffix in the format .number.gz. The newest archived file
is .0.gz and the oldest archived file is .(maximum number)-1.gz. When the current trace log file reaches
the maximum size, it is compressed and renamed, and any existing archived files are renamed. This
process repeats until the maximum number of archived files is reached, at which point the oldest file is
overwritten.
For example, you can set the maximum file size to 2 MB, and the maximum number of files to 20. When
the file that receives the output of the tracing operation, filename, reaches 2 MB, filename is
compressed and renamed filename.0.gz, and a new file called filename is created. When the new
filename reaches 2 MB, filename.0.gz is renamed filename.1.gz and filename is compressed and
renamed filename.0.gz. This process repeats until there are 20 trace files. Then the oldest file,
filename.19.gz, is simply overwritten when the next oldest file, filename.18.gz is compressed and
renamed to filename.19.gz.
• Specify the name, number, and size of the file used for the trace output.
By default, only the user who configures the tracing operation can access the log files. You can enable all
users to read the log file and you can explicitly set the default behavior of the log file.
To explicitly set the default behavior, only the user who configured tracing can read the log file:
By default, the trace operation output includes all messages relevant to the logged events.
By default, only important events are logged. You can specify which events and operations are logged by
specifying one or more tracing flags.
RELATED DOCUMENTATION
Configuration Statements
address-change-immediate-update | 443
allow-snooped-clients | 447
always-write-option-82 | 449
bfd | 465
chap | 472
client | 479
detection-time | 489
dhcp-local-server | 493
dhcp-relay | 506
dial-options | 538
drain | 546
failover-resync | 583
failure-action | 586
flexible-vlan-tagging | 588
holddown-interval | 620
input-hierarchical-policer | 637
interface-id | 642
ipcp-suggest-dns-option | 656
keepalive | 658
keepalives | 660
l2tp | 664
l2tp-access-profile | 674
lcp-renegotiation | 682
liveness-detection | 684
mac | 693
maximum-sessions-per-tunnel | 700
method | 705
minimum-interval | 710
minimum-receive-interval | 712
mtu | 716
multiplier | 720
no-adaptation | 726
next-hop-service | 732
no-allow-snooped-clients | 734
no-gratuitous-arp-request | 736
on-demand-ip-address | 740
pap | 760
ppp-options | 777
proxy-mode | 799
relay-option-82 | 812
session-mode | 858
session-options | 860
soft-gre | 866
stacked-vlan-tagging | 870
transmit-interval | 902
tunnel-group | 908
untagged | 933
vlan-tagging | 942
vlan-tags | 947
404
IN THIS SECTION
Syntax | 404
Description | 404
Options | 405
Syntax
aaa-access-profile profile-name;
Hierarchy Level
Description
Specify a AAA access profile that overrides the AAA access profile configured for the routing instance
with the access-profile statement. You can configure a profile to specify the RADIUS server settings for
a tunnel group or for a LAC client, or both. The AAA access profile configured for the client takes
precedence over the AAA access profile configured for the tunnel group, which takes precedence over
the access profile configured for the routing instance.
405
Options
profile-name Name of the local access profile for the tunnel group or client.
Release Information
Support at the [edit access profile profile-name client client-name l2tp] hierarchy level introduced in
Junos OS Release 12.1.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 406
Description | 406
406
Options | 406
Syntax
aaa-context aaa-context-name;
Hierarchy Level
Description
Specify the logical-system:routing-instance (LS:RI) that the subscriber session uses for AAA (RADIUS)
interactions like authenticating and accounting. For example, this may correspond to the LS:RI for a
retail ISP that provides services to the subscriber.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 408
Description | 408
Options | 408
Syntax
aaa-options aaa-options-name {
aaa-context aaa-context-name;
access-profile profile-name;
subscriber-context subscriber-context-name
}
Hierarchy Level
[edit access]
Description
Define a set of AAA options for authorizing and configuring a subscriber or set of subscribers with a
subscriber access profile.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 409
Description | 410
Options | 410
Syntax
aaa-options aaa-options-name;
410
Hierarchy Level
Description
Specify a set of AAA options that is used for authentication of PPP subscribers. The set of options is
defined globally with the aaa-options aaa-options-name statement at the [edit access] hierarchy level.
You can specify the option set in a dynamic PPP profile or in a group profile.
• In a dynamic PPP profile—In this case, usernames are examined and modified for dynamic PPP
subscribers logging in by means of the subscriber and AAA contexts that are specified in the AAA
options set. The option set must include the access-profile profile-name statement to specify the
name of a subscriber access profile.
• In a group profile—In this case, usernames are examined and modified for tunneled PPP subscribers
on the LNS logging in by means of the subscriber and AAA contexts that are specified in the AAA
options set.
NOTE: When PPP options are configured in both a group profile and a dynamic profile, the
dynamic profile configuration takes complete precedence over the group profile when the
dynamic profile includes one or more of the PPP options that can be configured in the group
profile. Complete precedence means that there is no merging of options between the profiles.
The group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
This meant that aaa-options configured in a group profile is not applied when the dynamic profile
includes any PPP-option, even when the dynamic profile does not include aaa-options.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 412
Description | 412
Syntax
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
Hierarchy Level
Description
NOTE: Starting in Junos OS Release 15.1, we recommend that you use only access routes for
framed route support. We recommend that you do not use access-internal routes. If you
configure the access-internal statement in the dynamic profile, it is ignored. The subscriber’s
address is stored in the session database entry before the dynamic profile installs the framed
route, enabling the next-hop address to be resolved when it is not explicitly specified in the
Framed-Route RADIUS attribute [22] or Framed-IPv6-Route attribute [99].
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
413
Release Information
Release Description
15.1 Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 414
Description | 414
Syntax
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
Hierarchy Level
Description
(Releases earlier than Junos OS Release 15.1) Dynamically configure access-internal routes in a dynamic
client profile. Access-internal routes are optional, but are used instead of access routes if the next-hop
address is not specified in the Framed-Route Attribute [22] for IPv4 or the Framed-IPv6-Route attribute
[99] for IPv6.
NOTE: Starting in Junos OS Release 15.1, we recommend that you use only access routes for
framed route support. We recommend that you do not use access-internal routes. If you
configure the access-internal statement in the dynamic profile, it is ignored. The subscriber’s
address is stored in the session database entry before the dynamic profile installs the framed
route, enabling the next-hop address to be resolved when it is not explicitly specified in the
Framed-Route RADIUS attribute (22) or Framed-IPv6-Route attribute [99].
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
415
Release Information
Release Description
15.1 Starting in Junos OS Release 15.1, we recommend that you use only access routes for framed route
support.
RELATED DOCUMENTATION
IN THIS SECTION
Description | 420
Options | 421
416
access-line {
adsl-overhead-bytes bytes;
adsl-total-adjust percentage;
adsl2-overhead-bytes bytes;
adsl2-total-adjust percentage;
adsl2-plus-overhead-bytes bytes;
adsl2-plus-total-adjust percentage;
gfast-bonded-overhead-adjust percentage
gfast-bonded-overhead-bytes bytes
gfast-bonded-total-adjust percentage
gfast-overhead-adjust percentage
gfast-overhead-bytes bytes
gfast-total-adjust percentage
hierarchical-access-network-detection;
other-overhead-adjust percentage;
other-overhead-bytes bytes;
other-total-adjust percentage;
sdsl-bonded-overhead-bytes bytes
sdsl-bonded-overhead-adjust percentage
sdsl-bonded-total-adjust percentage
sdsl-overhead-adjust percentage;
sdsl-overhead-bytes bytes;
sdsl-total-adjust percentage;
vdsl-overhead-adjust percentage;
vdsl-overhead-bytes bytes;
vdsl-total-adjust percentage;
vdsl2-annex-q-bonded-overhead-adjust percentage
vdsl2-annex-q-bonded-overhead-bytes bytes
vdsl2-annex-q-bonded-total-adjust percentage
vdsl2-annex-q-overhead-adjust percentage
vdsl2-annex-q-overhead-bytes bytes
vdsl2-annex-q-total-adjust percentage
vdsl2-bonded-overhead-adjust percentage
417
vdsl2-bonded-overhead-bytes bytes
vdsl2-bonded-total-adjust percentage
vdsl2-overhead-adjust percentage;
vdsl2-overhead-bytes bytes;
vdsl2-total-adjust percentage;
}
access-line {
attributes {
preference (dsl | pon);
}
dsl {
adsl {
overhead-bytes bytes;
total-adjust percent;
}
adsl2 {
overhead-bytes bytes;
total-adjust percent;
}
adsl2-plus {
overhead-bytes bytes;
total-adjust percent;
}
gfast {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
gfast-bonded {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
other {
overhead-adjust percent;
overhead-bytes bytes;
418
total-adjust percent;
}
sdsl {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
sdsl-bonded {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
type tlv-value {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
vdsl {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
vdsl2 {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
vdsl2-annex-q {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
vdsl2-annex-q-bonded {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
}
hierarchical-access-network-detection;
pon {
gpon {
overhead-adjust percent;
overhead-bytes bytes;
419
total-adjust percent;
}
other {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
twdm-pon {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
type tlv-value {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
wdm-pon {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
xg-pon1 {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
xgs-pon {
overhead-adjust percent;
overhead-bytes bytes;
total-adjust percent;
}
}
}
Hierarchy Level
[edit system]
420
Description
Configure values to adjust data rates by a percentage of the actual data rate, or adjust encapsulation
overhead by adding to or subtracting from the total cell or frame bytes a specified number of bytes.
Depending on the value, it may be reported to AAA, CoS, or both.
The actual (unadjusted) downstream and upstream data rates, line type, and encapsulation mode are
received from the access node by the ANCP agent in ANCP port messages, or by the PPPoE daemon
from the PPPoE intermediate agent (PPPoE-IA) in PADI or PADR messages. The ANCP agent or PPPoE
daemon subsequently adjusts rates and bytes based on the configuration.
Adjustments are applied to all subscribers using access lines of the specific subscriber access line type:
• Adjusted and unadjusted downstream and upstream rates are always reported to AAA in response to
an AAA request.
• Adjusted and unadjusted downstream rates and overhead byte adjustments are reported to CoS, but
only when you include the qos-adjust statement at the [edit protocols ancp] hierarchy level.
AAA reports the adjusted values to the RADIUS server in the Access-Request and Accounting-Request
messages through Juniper Networks VSAs 26-141, Downstream-Calculated-Qos-Rate Rate, and
26-142, Upstream-Calculated-Qos-Rate.
The ANCP agent reports these values to the LAC in an L2TP network. The LAC passes the rates to the
LNS in the following messages and AVPs:
NOTE: Starting in Junos OS Release 19.3R1, the pre-existing adjustment options were renamed
and placed in the new dsl stanza. The old DSL options are deprecated, but they redirect to the
new location. The hierarchical-access-network-detection option is unchanged.
BEST PRACTICE: We recommend that you update your scripts to use the dsl statement when
you upgrade to Junos OS Release 19.3R1 or higher releases. The redirect function will be
supported for only a limited time.
421
Options
adsl-overhead- Number of bytes added to or subtracted from the actual downstream cell overhead
bytes bytes for all subscribers on an ADSL access line to account for the traffic encapsulation
overhead. The adjusted value is reported to CoS when you include the qos-adjust
statement at the [edit protocols ancp] hierarchy level.
NOTE: This option replaces the adsl-bytes statement at the [edit protocols
ancp qos-adjust] hierarchy level.
• Default: 0 bytes
adsl-total-adjust Adjustment factor applied globally to the downstream and upstream data rates for
percentage all subscribers on an ADSL access line. The adjusted rate is reported only to AAA.
adsl2-overhead- Number of bytes added to or subtracted from the actual downstream cell overhead
bytes bytes for all subscribers on an ADSL2 access line to account for the traffic encapsulation
overhead. The adjusted value is reported to CoS when you include the qos-adjust
statement at the [edit protocols ancp] hierarchy level.
• Default: 0 bytes
adsl2-total- Adjustment factor applied globally to the downstream and upstream data rates for
adjust all subscribers on an ADSL2 access line. The adjusted rate is reported only to AAA.
percentage
422
adsl2-plus- Number of bytes added to or subtracted from the actual downstream cell overhead
overhead-bytes for all subscribers on an ADSL2+ access line to account for the traffic encapsulation
bytes
overhead. The adjusted value is reported to CoS when you include the qos-adjust
statement at the [edit protocols ancp] hierarchy level.
• Default: 0 bytes
adsl2-plus-total- Adjustment factor applied globally to the downstream and upstream data rates for
adjust all subscribers on an ADSL2+ access line. The adjusted rate is reported only to AAA.
percentage
gfast-bonded- Adjustment factor in percent that is applied to the downstream and upstream
overhead-adjust bonded data overhead rates for all subscribers on a G.fast high speed bonded DSL
percentage
line connected to a PON tree infrastructure.
gfast-bonded- Number of bytes added to or subtracted from the actual downstream cell bonded
overhead-bytes overhead for all subscribers on a G.fast high speed bonded DSL line connected to a
bytes
PON tree infrastructure. Specify G.fast bonded value in bytes.
• Default: 0 bytes
gfast-bonded- Adjustment factor in percent that is globally applied to the downstream and
total-adjust upstream bonded data rates for all subscribers on a G.fast high speed bonded DSL
percentage
line connected to a PON tree infrastructure.
gfast-overhead- Adjustment factor in percent that is applied to the downstream and upstream data
adjust overhead rates for all subscribers on a G.fast high speed DSL line connected to a
percentage
PON tree infrastructure.
gfast-overhead- Number of bytes added to or subtracted from the actual downstream cell overhead
bytes bytes for all subscribers on a G.fast high speed DSL line connected to a PON tree
infrastructure.
• Default: 0 bytes
gfast-total-adjust Adjustment factor in percent that is globally applied to the downstream and
percentage upstream data rates for all subscribers on a G.fast high speed bonded DSL line
connected to a PON tree infrastructure.
hierarchical- Enable parsing of ANCP subscriber access loop attributes (TLVs) for backhaul line
access-network- identifiers, to recognize when the access node references a logical interface set
detection
rather than an individual subscriber. If the Access-Aggregation-Circuit-ID-ASCII
attribute (TLV 0x03) string begins with a # sign, then the remainder of the string
represents a logical intermediate node (DPU-C or PON tree) in the access network to
which the subscriber is attached. The string is used as the name of a CoS Level 2
interface set that groups subscribers.
424
These TLVs can be parsed in ANCP messages or PPPoE IA tags in PADR messages.
• Default: Disabled, in case some users include an initial # character for some other
purpose.
other-overhead- Adjust the actual downstream rate for an access line of DSL type OTHER by
adjust multiplying the rate by the specified percentage. The adjusted rate is reported to
percentage
CoS when you include the qos-adjust statement at the [edit protocols ancp]
hierarchy level.
The router reports some access technology types as DSL type OTHER. For example,
when an OLT sends PON rates in DSL TLVs, the DSL type is set to OTHER.
other-overhead- Number of bytes added to or subtracted from the actual downstream frame
bytes bytes overhead for all subscribers on an access line of DSL type OTHER to account for the
traffic encapsulation overhead. The adjusted value is reported to CoS when you
include the qos-adjust statement at the [edit protocols ancp] hierarchy level.
The router reports some access technology types as DSL type OTHER. For example,
when an OLT sends PON rates in DSL TLVs, the DSL type is set to OTHER.
• Default: 0 bytes
425
other-total- Adjustment factor applied globally to the downstream and upstream data rates for
adjust all subscribers on an access line of DSL type OTHER. The adjusted rate is reported
percentage
only to AAA.
The router reports some access technology types as DSL type OTHER. For example,
when an OLT sends PON rates in DSL TLVs, the DSL type is set to OTHER.
sdsl-bonded- Adjust the actual downstream rate for an SDSL bonded access line by multiplying
overhead-adjust the rate by the specified percentage.
percentage
• Range: 80 through 100 percent
sdsl-bonded- Number of bytes added to or subtracted from the actual downstream frame
overhead-bytes overhead for all subscribers on an SDSL bonded access line to account for the traffic
bytes
encapsulation overhead.
• Default: 0 bytes
sdsl-bonded- Adjustment factor applied globally to the downstream and upstream data rates for
total-adjust all subscribers on an SDSL bonded access line. This value is reported to AAA.
percentage
• Range: 0 through 100 percent
sdsl-overhead- Adjust the actual downstream rate for an SDSL access line by multiplying the rate by
adjust the specified percentage. The adjusted rate is reported to CoS when you include the
percentage
qos-adjust statement at the [edit protocols ancp] hierarchy level.
sdsl-overhead- Number of bytes added to or subtracted from the actual downstream frame
bytes bytes overhead for all subscribers on an SDSL access line to account for the traffic
encapsulation overhead. The adjusted value is reported to CoS when you include the
qos-adjust statement at the [edit protocols ancp] hierarchy level.
NOTE: This option replaces the sdsl-bytes statement at the [edit protocols
ancp qos-adjust] hierarchy level.
• Default: 0 bytes
sdsl-total-adjust Adjustment factor applied globally to the downstream and upstream data rates for
percentage all subscribers on an SDSL access line. The adjusted rate is reported only to AAA.
vdsl-overhead- Adjust the actual downstream rate for a VDSL access line by multiplying the rate by
adjust the specified percentage. The adjusted rate is reported to CoS when you include the
percentage
qos-adjust statement at the [edit protocols ancp] hierarchy level.
vdsl-overhead- Number of bytes added to or subtracted from the actual downstream frame
bytes bytes overhead for all subscribers on a VDSL access line to account for the traffic
427
encapsulation overhead. The adjusted value is reported to CoS when you include the
qos-adjust statement at the [edit protocols ancp] hierarchy level.
NOTE: This option replaces the vdsl-bytes statement at the [edit protocols
ancp qos-adjust] hierarchy level.
• Default: 0 bytes
vdsl-total-adjust Adjustment factor applied globally to the downstream and upstream data rates for
percentage all subscribers on a VDSL access line. The adjusted rate is reported only to AAA.
vdsl2-annex-q- Adjust the actual downstream rate for a VDSL2 annex q bonded access line by
bonded- multiplying the rate by the specified percentage. The adjusted rate is reported to
overhead-adjust
percentage AAA.
vdsl2-annex-q- Number of bytes added to or subtracted from the actual downstream frame
bonded- overhead for all subscribers on a VDSL2 annex q bonded access line to account for
overhead-bytes
bytes the traffic encapsulation overhead.
• Default: 0 bytes
vdsl2-annex-q- Adjustment factor applied globally to the downstream and upstream data rates for
bonded-total- all subscribers on a VDSL2 annex q bonded access line. The adjusted rate is reported
adjust
percentage to AAA.
vdsl2-annex-q- Adjust the actual downstream rate for a VDSL2 annex q access line by multiplying
overhead-adjust the rate by the specified percentage. The adjusted rate is reported to AAA.
percentage
• Range: 80 through 100 percent
vdsl2-annex-q- Number of bytes added to or subtracted from the actual downstream frame
overhead-bytes overhead for all subscribers on a VDSL2 annex q access line to account for the traffic
bytes
encapsulation overhead.
• Default: 0 bytes
vdsl2-annex-q- Adjustment factor applied globally to the downstream and upstream data rates for
total-adjust all subscribers on a VDSL2 annex q access line. The adjusted rate is reported to AAA.
percentage
vdsl2-bonded- Adjust the actual downstream rate for a VDSL2 bonded access line by multiplying
overhead-adjust the rate by the specified percentage. The adjusted rate is reported to AAA.
percentage
• Range: 80 through 100 percent
vdsl2-bonded- Number of bytes added to or subtracted from the actual downstream frame
overhead- overhead for all subscribers on a VDSL2 bonded access line to account for the traffic
bytesbytes
encapsulation overhead.
• Default: 0 bytes
vdsl2-bonded- Adjustment factor applied globally to the downstream and upstream data rates for
total-adjust all subscribers on a VDSL2 bonded access line. The adjusted rate is reported to AAA.
percentage
• Range: 0 through 100 percent
vdsl2-overhead- Adjust the actual downstream rate for a VDSL2 access line by multiplying the rate by
adjust the specified percentage. The adjusted rate is reported to CoS when you include the
percentage
qos-adjust statement at the [edit protocols ancp] hierarchy level.
429
vdsl2-overhead- Number of bytes added to or subtracted from the actual downstream frame
bytes bytes overhead for all subscribers on a VDSL2 access line to account for the traffic
encapsulation overhead. The adjusted value is reported to CoS when you include the
qos-adjust statement at the [edit protocols ancp] hierarchy level.
• Default: 0 bytes
vdsl2-total- Adjustment factor applied globally to the downstream and upstream data rates for
adjust all subscribers on a VDSL2 access line. The adjusted rate is reported only to AAA.
percentage
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
430
Release Information
gfast-bonded-overhead-adjust vdsl2-annex-q-bonded-overhead-adjust
gfast-bonded-overhead-bytes vdsl2-annex-q-bonded-overhead-bytes
gfast-bonded-total-adjust vdsl2-annex-q-bonded-total-adjust
gfast-overhead-adjust vdsl2-annex-q-overhead-adjust
gfast-overhead-bytes vdsl2-annex-q-overhead-bytes
gfast-total-adjust vdsl2-annex-q-total-adjust
sdsl-bonded-overhead-bytes vdsl2-bonded-overhead-bytes
sdsl-bonded-overhead-adjust vdsl2-bonded-total-adjust
sdsl-bonded-total-adjust vdsl2-bonded-total-adjust
RELATED DOCUMENTATION
access-line-information (L2TP)
IN THIS SECTION
Syntax | 431
Description | 432
Options | 432
Syntax
access-line-information <connection-speed-update>;
Hierarchy Level
Description
Configure a LAC to forward subscriber line identification and other DSL attributes in ICRQ messages to
the LNS by means of L2TP AVPs for all tunnels to all LNSs or for only tunnels with the specified
endpoint for a particular LNS. Optionally, configure the LAC to send initial line rates in ICCN messages
and subsequent rate updates in CSUN messages.
Configure an LNS to process such line information for all tunnels from all LACs or for only tunnels with
the specified endpoint for a particular LAC. Optionally, configure the LNS to process rate updates
received in CSUN messages from the LAC.
Including this statement at the [edit services l2tp destination ip-address] hierarchy level is useful when
you know that some endpoints in the network do not support this feature or have an incorrect
implementation. Configuring at this level enables you to restrict the transmission or processing of this
information to only LACs and LNSs, respectively, that you know support the feature.
This statement has no effect on existing subscribers; it applies only to new subscribers.
Options
connection- (Optional) On the LAC, include the Connect Speed Update Enable AVP (98) in ICCN
speed-update messages from the LAC to alert the LNS that the LAC might send CSUN messages that
report speed changes originating with the ANCP agent.
On the LNS, enable processing of CSUN updates. If this option is not configured on the
LNS, CSUN updates cannot be processed even when the Connect Speed Update Enable
AVP (98) is received from the LAC. In that case, only rates received in AVP 24 (Tx
speed) and AVP 38 (Rx speed) in ICCN messages can be applied.
Release Information
Support at the [edit services l2tp] hierarchy level introduced in Junos OS Release 14.2.
Support for the LNS introduced in Junos OS Release 17.4R1 on MX Series routers.
RELATED DOCUMENTATION
Configuring the Reporting and Processing of Subscriber Access Line Information | 240
IN THIS SECTION
Syntax | 433
Description | 434
Options | 434
Syntax
access-profile profile-name;
434
Hierarchy Level
Description
Specify the name of the access profile that includes the username stripping configuration.
Options
profile-name Name of the subscriber access profile that includes a subscriber username stripping
configuration.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 435
Description | 435
Options | 436
Syntax
address ip-address {
access-line-information <connection-speed-update>;
drain;
routing-instance routing-instance-name {
drain;
}
}
Hierarchy Level
Description
Specify the IP address and other attributes for the L2TP destination.
436
Options
ip-address—IP address of the destination; corresponds to the IP address that is used by LACs to identify
the LNS.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 437
Description | 437
Options | 437
Syntax
address ip-address; {
drain;
routing-instance routing-instance-name {
drain;
}
}
Hierarchy Level
Description
Specify the IP address for the L2TP tunnel destination when the name statement at the [edit services
l2tp tunnel] hierarchy level specifies only the name of the tunnel rather than both the name and the
destination address. Do not include the address statement when the name statement provides both the
tunnel name and the destination address.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
438
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 438
Description | 439
Options | 439
Syntax
address address;
439
Hierarchy Level
Description
Options
address—Local IP address; corresponds to the IP address that is used by LACs to identify the LNS. When
the LAC is an MX Series router, this address matches the remote gateway address configured in the LAC
tunnel profile.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 440
Description | 440
Options | 440
Syntax
address server-ip-address;
Hierarchy Level
Description
Specify the IP address of the remote gateway device at the L2TP tunnel endpoint, the LNS.
Options
• Default: 0.0.0.0.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 442
Description | 442
Options | 442
Syntax
address client-ip-address;
Hierarchy Level
Description
Specify the IP address of the source gateway device at the local L2TP tunnel endpoint, the LAC. This
value overrides the default address for the logical system or routing instance.
Options
• Default: 0.0.0.0.
Release Information
RELATED DOCUMENTATION
address-change-immediate-update
IN THIS SECTION
Syntax | 443
Description | 443
Default | 444
Syntax
address-change-immediate-update;
Hierarchy Level
Description
Configure the router to send an Interim-Accounting message to the RADIUS server immediately after
on-demand IPv4 allocation and de-allocation.
444
Changes to this setting take effect for new subscriber logins. Existing subscribers are not impacted by
this change except when the AAA daemon restarts.
Default
Release Information
RELATED DOCUMENTATION
Enabling Immediate Interim Accounting Messages for On-Demand IPv4 Address Changes
Conserving IPv4 Addresses for Dual-Stack PPP Subscribers Using On-Demand IPv4 Address
Allocation
aggregated-inline-services-options (Aggregated
Inline Services)
IN THIS SECTION
Syntax | 445
445
Description | 445
Syntax
aggregated-inline-services-options {
primary-interface interface-name;
secondary-interface interface-name;
}
Hierarchy Level
Description
Configure the members of an aggregated inline service interface bundle to provide 1:1 stateful LNS
redundancy for an LNS sessions in a tunnel group.
• You must configure unit 0 family inet for each bundle; otherwise, the session fails to come up.
• The primary (active) and secondary (backup) interfaces must be on different MPCs. If you
configure both interfaces on the same MPC, the subsequent configuration commit fails.
446
• The bandwidth configured at the [edit chassis fpc slot pic number inline-services bandwidth]
hierarchy level must be the same for both member links.
• When you configure an si interface as a member of an aggregated inline services bundle, you
can no longer configure that si interface independently. You can configure only the parent
bundle; the bundle’s configuration is applied immediately to all member interfaces.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
Configuring an L2TP LNS with Inline Service Interfaces | 254
447
allow-snooped-clients
IN THIS SECTION
Syntax | 447
Description | 448
Default | 448
Syntax
allow-snooped-clients;
Hierarchy Level
Description
Use the statement at the [edit ... dhcpv6] hierarchy levels to explicitly enable snooping support on the
router for DHCPv6 relay agent.
Default
Release Information
Support at the [edit ... dhcpv6] hierarchy levels introduced in Junos OS Release 12.1.
RELATED DOCUMENTATION
always-write-option-82
IN THIS SECTION
Syntax | 449
Description | 450
Syntax
always-write-option-82;
Hierarchy Level
Description
Override the DHCP relay agent information option (option 82) in DHCP packets destined for a DHCP
server. The use of this option causes the DHCP relay agent to perform one of the following actions,
depending on how it is configured:
• If the DHCP relay agent is configured to add option 82 information to DHCP packets, it clears the
existing option 82 values from the DHCP packets and inserts the new values before forwarding the
packets to the DHCP server.
• If the DHCP relay agent is not configured to add option 82 information to DHCP packets, it clears
the existing option 82 values from the packets, but does not add any new values before forwarding
the packets to the DHCP server.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 451
Description | 451
Options | 453
Syntax
anchor-point lt-device;
Hierarchy Level
Description
Specify the anchor-point, a logical tunnel (lt) interface that identifies the logical tunnel interface that
terminates the MPLS pseudowire tunnel at the access node. The other end of the tunnel terminates on
the pseudowire subscriber logical interface, which is configured on an MX Series router that hosts
subscriber management and enables you to perform subscriber management services at the interface.
The pseudowire is a virtual device that is stacked above the logical tunnel anchor point on the physical
interface (the IFD), and supports a circuit-oriented Layer 2 protocol (either Layer 2 VPN or Layer 2
452
circuit). The Layer 2 protocol provides the transport and service logical interfaces, and supports the
protocol family (IPv4, IPv6, or PPPoE).
NOTE: You cannot dynamically change an anchor point that has active pseudowire devices
stacked above it. If you need to change such an anchor point, you must perform the following
steps:
1. Deactivate the stacked pseudowires and commit. This may require bringing down any
subscribers using the pseudowires.
[edit interfaces]
user@host# deactivate psnumber
user@host# commit
[edit interfaces]
user@host# set psnumber anchor-point lt-new-lt-interface-number
user@host# commit
[edit interfaces]
user@host# activate psnumber
user@host# commit
NOTE: You cannot disable the underlying logical tunnel (lt) interface or redundant logical tunnel
(rlt) interface when a pseudowire is anchored on that interface. If you want to disable the
underlying interface, you must first deactivate the pseudowire.
1. Deactivate the stacked pseudowires and commit. This may require bringing down any
subscribers using the pseudowires.
453
[edit interfaces]
user@host# deactivate psnumber
user@host# commit
[edit interfaces]
user@host# set interfaces underlying-interface-name disable
user@host# commit
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 454
Description | 454
Default | 455
Options | 455
Syntax
Hierarchy Level
Description
Set the format for the name used for a tunnel, the tunnel assignment ID.
NOTE: Before you downgrade to a Junos OS Release that does not support this statement,
unconfigure the statement by issuing no services l2tp tunnel assignment-id-format.
455
Default
assignment-Id
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 456
Description | 456
Options | 457
Syntax
authentication [ authentication-protocols ];
Hierarchy Level
Description
Specify the order in which the router tries to negotiate PPP authentication protocols when verifying
that a PPP client can access the network. By default, the router tries to negotiate Challenge Handshake
Authentication Protocol (CHAP) authentication first, and then tries Password Authentication Protocol
(PAP) authentication if the attempt to negotiate CHAP authentication is unsuccessful.
457
You can specify one or both authentication protocols. If you specify both CHAP and PAP in either order,
you must enclose the set of protocol names within square brackets ([ ]).
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 458
458
Description | 458
Syntax
avp {
bearer-type;
calling-number;
cisco-nas-port-info;
}
Hierarchy Level
Description
Specify the action taken on L2TP AVPs that are negotiated when the first session is created; these AVPs
are contained in the L2TP packets that are switched by the tunnel switch profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 459
Description | 460
Options | 460
Syntax
bandwidth bandwidth-value;
460
Hierarchy Level
Description
Configure the amount of bandwidth in gigabits per second reserved on each Packet Forwarding Engine
for tunnel traffic using inline services. Configuring the bandwidth creates a virtual tunnel interface that is
represented as si-<fpc/pic/port>.
Starting in Junos OS Release 16.2, you are not longer required to explicitly specify a bandwidth for L2TP
LNS tunnel traffic using inline services. When you do not specify a bandwidth, the maximum bandwidth
supported on the PIC is automatically available for the inline services; inline services can use up to this
maximum value. In earlier releases, you must specify a bandwidth when you enable inline services with
the inline-services statement.
Options
bandwidth- Amount of bandwidth in Gbps to reserve for tunnel traffic using inline services. You can
value configure bandwidth values can be as follows:
• 1g
• 10g through 100g in 10 Gbps increments: 10g, 20g, 30g, 40g, 50g, 60g, 70g, 80g,
90g, 100g
• 100g through 400g in 100 Gbps increments: 100g, 200g, 300g, 400g
NOTE: Values of 100 Gbps and up are available only on MPC7E, MPC8E, and
MPC9E line cards.
Release Information
100g option added in Junos OS Release 18.2R1 on MX Series Routers with MPC7E, MPC8E, and
MPC9E line cards.
50g, 60g, 70g, 80g, 90g, 200g, 300g and 400g options added in Junos OS Release 18.3R1.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 462
Description | 462
Options | 462
Syntax
bandwidth bandwidth-value;
Hierarchy Level
Description
(ACX Series, MX Series 5G Universal Routing Platforms and T4000 Core Routers only) Configure the
amount of bandwidth in gigabits per second reserved on each Packet Forwarding Engine for tunnel
traffic using tunnel services. Configuring the bandwidth creates a virtual tunnel interface that is
represented as lt-<fpc/pic/port>.
Options
bandwidth-value—Amount of bandwidth in Gbps to reserve for tunnel traffic using tunnel services:
• 1g
• 10g through 100g in 10 Gbps increments: 10g, 20g, 30g, 40g, 50g, 60g, 70g, 80g, 90g, 100g
• 100g through 400g in 100 Gbps increments: 100g, 200g, 300g, 400g
• On T4000 routers, the bandwidth values can be 10g through 100g in 10 Gbps increments: 10g, 20g,
30g, 40g, 50g, 60g, 70g, 80g, 90g, 100g.
463
NOTE: The bandwidth that you specify determines the port number of the tunnel interfaces that
are created. When you specify a bandwidth of 1g, the port number is always 10. When you
specify any other bandwidth, the port number is always 0.
NOTE: If you specify a bandwidth that is not compatible with the type of DPCs or MPCs and
their respective Packet Forwarding Engine, tunnel services are not activated. For example, you
cannot specify 1 gigabit per second bandwidth for a Packet Forwarding Engine on a 10-Gigabit
Ethernet 4-port DPC or 16x10GE 3D MPC.
When the tunnel bandwidth is unspecified in the Routing Engine CLI, the maximum tunnel
bandwidth for MPC3E is 60G.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 464
Description | 464
Options | 465
Syntax
bearer-type action;
Hierarchy Level
Description
Specify the action taken on the Bearer Type AVP (18) in the L2TP packets during tunnel switching if the
AVP is negotiated when the first session is created.
465
Options
• regenerate—Regenerate the AVP based on the local policy at the LTS and send it in the switched
packet. The local policy may or may not use the value for the AVP received during negotiation for the
first session.
• Default: relay
Release Information
RELATED DOCUMENTATION
bfd
IN THIS SECTION
Syntax | 466
466
Description | 467
Syntax
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
468
IN THIS SECTION
Syntax | 468
Description | 468
Options | 469
Syntax
calling-number action;
Hierarchy Level
Description
Specify the action taken on the Calling Number AVP (22) in the L2TP packets during tunnel switching if
the AVP is negotiated when the first session is created.
469
Options
• regenerate—Regenerate the AVP based on the local policy at the LTS and send it in the switched
packet. The local policy may or may not use the value for the AVP received during negotiation for the
first session.
• Default: relay
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 470
470
Description | 470
Options | 471
Syntax
Hierarchy Level
Description
Modify the length of the Challenge Handshake Authentication Protocol (CHAP) challenge by specifying
the minimum and maximum allowable length, in bytes.
BEST PRACTICE: We recommend that you configure both the minimum length and the
maximum length of the CHAP challenge to at least 16 bytes.
471
Options
• Range: 8 through 63
• Default: 16
maximum-length Maximum length, in bytes, of the CHAP challenge. The maximum-length must be
equal to or greater than the minimum-length.
• Range: 8 through 63
• Default: 32
Release Information
RELATED DOCUMENTATION
chap
IN THIS SECTION
Syntax | 472
Description | 473
Syntax
chap {
access-profile name;
challenge-length minimum minimum-length maximum maximum-length;
default-chap-secret name;
local-name name;
passive;
}
Hierarchy Level
Description
Allow each side of a link to challenge its peer, using a “secret” known only to the authenticator and that
peer. The secret is not sent over the link.
By default, PPP CHAP is disabled. If CHAP is not explicitly enabled, the interface makes no CHAP
challenges and denies all incoming CHAP challenges.
For ATM2 IQ interfaces only, you can configure CHAP on the logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
BEST PRACTICE: On inline service (si) interfaces for L2TP, only the chap statement itself is
typically used for subscriber management. We recommend that you leave the subordinate
statements at their default values.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 474
Description | 474
Syntax
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
chap (L2TP)
IN THIS SECTION
Syntax | 476
Description | 476
Syntax
chap;
Hierarchy Level
Description
(MX Series routers only) Specify CHAP authentication for PPP subscribers in an L2TP LNS user group
profile.
Release Information
RELATED DOCUMENTATION
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
Configuring an L2TP LNS with Inline Service Interfaces | 254
IN THIS SECTION
Syntax | 477
Description | 477
Options | 478
Syntax
cisco-nas-port-info action;
Hierarchy Level
Description
Specify the action taken on the Cisco NAS Port Info AVP (100) in the L2TP packets during tunnel
switching if the AVP is negotiated when the first session is created.
Options
• regenerate—Regenerate the AVP based on the local policy at the LTS and send it in the switched
packet. The local policy may or may not use the value for the AVP received during negotiation for the
first session.
• Default: relay
Release Information
RELATED DOCUMENTATION
client
IN THIS SECTION
Syntax | 479
Description | 480
Options | 481
Syntax
client client-name {
chap-secret chap-secret;
group-profile profile-name;
ike {
allowed-proxy-pair {
remote remote-proxy-address local local-proxy-address;
}
pre-shared-key (ascii-text character-string | hexadecimal hexadecimal-
digits);
ike-policy policy-name;
interface-id string-value;
}
l2tp {
aaa-access-profile profile-name;
interface-id interface-id;
lcp-renegotiation;
local-chap;
maximum-sessions number;
maximum-sessions-per-tunnel number;
multilink {
drop-timeout milliseconds;
fragment-threshold bytes;
480
}
override-result-code session-out-of-resource;
ppp-authentication (chap | pap);
ppp-profile profile-name;
sessions-limit-group;
service-profile profile-name(parameter)&profile-name;
shared-secret shared-secret;
}
pap-password pap-password;
ppp {
cell-overhead;
encapsulation-overhead bytes;
framed-ip-address ip-address;
framed-pool framed-pool;
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
primary-dns primary-dns;
primary-wins primary-wins;
secondary-dns secondary-dns;
secondary-wins secondary-wins;
}
user-group-profile profile-name;
}
Hierarchy Level
Description
NOTE: Subordinate statement support depends on the platform. See individual statement topics
for more detailed support information.
Options
client-name A peer identity. For L2TP clients, you can use a special name to configure a default client.
This client enables the LNS to accept any LAC to establish the session. On M Series
routers, use * for the default client configuration. On MX Series routers, use default.
chap-secret For interfaces with PPP encapsulation on which the PPP Challenge Handshake
Authentication Protocol (CHAP) is configured, configure the shared secret (the CHAP
secret key associated with a peer), as defined in RFC 1994. This statement is not
supported for L2TP LNS on MX Series routers.
• Values:
group- Associate a group profile with a client. This statement is not supported for L2TP LNS on
profile MX Series routers.
• Values:
pap- Configure the Password Authentication Protocol (PAP) password. This statement is not
password supported for L2TP LNS on MX Series routers.
• Values:
• password—PAP password.
user-group- Apply a configured PPP group profile to PPP users. If user-group-profile is modified or
profile deleted, the existing LNS subscribers, which were using this Layer 2 Tunneling Protocol
client configuration, go down.
• Values:
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 483
Description | 483
Default | 483
Options | 484
483
Syntax
delimiter delimiter;
Hierarchy Level
Description
Specify up to eight characters that the router uses to determine which part of the subscriber login string
to discard—leaving the remainder for use as a modified username—when subscriber username stripping
is configured in a subscriber access profile. The characters to the right of the delimiter are discarded
along with the delimiter. Use the "parse-direction" on page 765 statement when more than one
delimiter appears in a username to determine the characters that are stripped by identifying the desired
delimiter. A given subscriber login string can result in multiple different modified usernames depending
on the number and placement of delimiters and the direction of stripping.
Default
Options
delimiter Character that specifies the boundary between the part of the original username that is kept
and the part that is discarded.
Release Information
RELATED DOCUMENTATION
destination (L2TP)
IN THIS SECTION
Syntax | 485
Description | 485
Syntax
destination {
address ip-address {
access-line-information <connection-speed-update>;
drain;
routing-instance routing-instance-name {
drain;
}
}
lockout-timeout seconds;
name destination-name {
drain;
}
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
486
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 486
Description | 487
Syntax
destination-equal-load-balancing;
487
Hierarchy Level
Description
Enable the LAC to balance the L2TP session load equally across multiple LNSs by selecting tunnels
according to how many sessions currently exist for the destination and tunnel.
Disabled by default. By default, tunnel selection within a preference level is strictly random. The
weighted-load-balancing statement must be disabled to successfully enable this statement.
Release Information
RELATED DOCUMENTATION
destruct-timeout (L2TP)
IN THIS SECTION
Syntax | 488
Description | 488
Options | 489
Syntax
destruct-timeout seconds;
Hierarchy Level
Description
Set how long the router attempts to maintain dynamic destinations, tunnels, and sessions after they
have been destroyed.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, unconfigure the statement by issuing no services l2tp destruct-timeout.
489
Options
• Default: 300
Release Information
RELATED DOCUMENTATION
detection-time
IN THIS SECTION
Syntax | 490
Description | 490
490
Syntax
detection-time {
threshold milliseconds;
}
Hierarchy Level
Description
Enable failure detection. The BFD failure detection timers are adaptive and can be adjusted to be faster
or slower. For example, the timers can adapt to a higher value if the adjacency fails, or a neighbor can
negotiate a higher value for a timer than the one configured.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
491
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
IN THIS SECTION
Syntax | 491
Description | 492
Options | 492
Syntax
device-count number;
492
Hierarchy Level
Description
Configure the number of pseudowire logical devices available to the router. The statement also defines
the available interface names for the pseudowire interfaces.
NOTE: When you subsequently configure the pseudowire interfaces, you must specify the
interface names in the range from ps0 up to ps(device-count - 1). For example, if you set the
maximum number of devices to 5, then you can only configure interfaces ps0, ps1, ps2, ps3, and
ps4. If you specify an interface name outside that range, the pseudowire interface is not created.
Options
• Range: 1 through 7000, 1 through 18000 for MX2010 and MX2020 routers with the MX2K-MPC9E
or MX2K-MPC11E line card
Release Information
RELATED DOCUMENTATION
dhcp-local-server
IN THIS SECTION
Syntax | 493
Description | 505
Syntax
dhcp-local-server {
access-profile profile-name;
allow-active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
}
allow-bulk-leasequery {
max-connections number-of-connections;
max-empty-replies number-of-replies;
restricted-requestor;
494
timeout seconds;
}
allow-leasequery {
restricted-requestor;
}
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name ;
logical-system-name;
mac-address;
option-60;
option-82 <circuit-id> <remote-id>;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
dhcpv6 {
access-profile profile-name;
allow-active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
}
allow-bulk-leasequery {
max-connections number-of-connections;
max-empty-replies number-of-replies;
restricted-requestor;
timeout seconds;
}
allow-leasequery {
restricted-requestor;
}
authentication {
...
}
duplicate-clients incoming-interface;
group group-name {
495
access-profile profile-name;
authentication {
...
}
interface interface-name {
access-profile profile-name;
exclude;
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37)
{
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
dual-stack dual-stack-group-name;
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-
time seconds>;
trace;
upto upto-interface-name;
}
496
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up |
log-only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
497
}
delay-time seconds;
}
delegated-pool;
dual-stack dual-stack-group-name;
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
route-suppression;
server-duid-type type;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
498
}
}
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delegated-pool;
dual-stack dual-stack-group-name;
include-option-82 {
forcerenew;
nak;
}
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
reconfigure {
attempts attempt-count;
clear-on-terminate;
strict;
support-option-pd-exclude;
timeout timeout-value;
token token-value;
499
trigger {
radius-disconnect;
}
}
reauthenticate (<lease-renewal> <remote-id-mismatch >);
requested-ip-network-match subnet-mask;
route-suppression;
server-duid-type type;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
dual-stack-group name {
access-profile access-profile;
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name ;
logical-system-name;
mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
classification-key {
circuit-id circuit-id;
mac-address mac-address;
remote-id remote-id;
}
dual-stack-interface-client-limit number;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
500
only);
method {
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
on-demand-address-allocation;
protocol-primary (inet | inet6);
reauthenticate (<lease-renewal> <remote-id-mismatch >);
service-profile service-profile;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
duplicate-clients-in-subnet (incoming-interface | option-82);
dynamic-profile profile-name <aggregate-clients (merge | replace) | use-
primary primary-profile-name>;
forward-snooped-clients (all-interfaces | configured-interfaces | non-
configured-interfaces);
group group-name {
authentication {
...
}
dynamic-profile profile-name <aggregate-clients (merge | replace) | use-
primary primary-profile-name>;
interface interface-name {
exclude;
overrides {
asymmetric-lease-time seconds;
client-discover-match (option60-and-option82 | incoming-
interface);
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
501
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
include-option-82 {
forcerenew;
nak;
}
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
502
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
asymmetric-lease-time seconds;
client-discover-match (option60-and-option82 | incoming-interface);
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
include-option-82 {
forcerenew;
nak;
}
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
}
requested-ip-network-match subnet-mask
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
503
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
on-demand-address-allocation;
overrides {
asymmetric-lease-time seconds;
client-discover-match <option60-and-option82 | incoming-interface>;
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
504
}
}
delay-time seconds;
}
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
}
pool-match-order {
external-authority;
ip-address-first;
option-82;
}
protocol-primary;
reauthenticate (<lease-renewal> <remote-id-mismatch >);
reconfigure {
attempts attempt-count;
clear-on-terminate;
strict;
timeout timeout-value;
token token-value;
trigger {
radius-disconnect;
}
}
requested-ip-network-match subnet-mask;
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Configure Dynamic Host Configuration Protocol (DHCP) local server options on the router or switch to
enable the router or switch to function as an extended DHCP local server. The DHCP local server
receives DHCP request and reply packets from DHCP clients and then responds with an IP address and
other optional configuration information to the client.
The extended DHCP local server is incompatible with the DHCP server on J Series routers and,
therefore, is not supported on J Series routers. Also, the DHCP local server and the DHCP/BOOTP relay
server, which are configured under the [edit forwarding-options helpers] hierarchy level, cannot both be
enabled on the router or switch at the same time. The extended DHCP local server is fully compatible
with the extended DHCP relay feature.
The dhcpv6 stanza configures the router or switch to support Dynamic Host Configuration Protocol for
IPv6 (DHCPv6). The DHCPv6 local server is fully compatible with the extended DHCP local server and
the extended DHCP relay feature.
NOTE: When you configure the dhcp-local-server statement at the routing instance hierarchy
level, you must use a routing instance type of virtual-router.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
dhcp-relay
IN THIS SECTION
Syntax | 506
Description | 521
Syntax
dhcp-relay {
access-profile profile-name;
active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
topology-discovery;
}
active-server-group server-group-name;
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name;
507
logical-system-name;
mac-address;
option-60;
option-82 <circuit-id> <remote-id>;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
bulk-leasequery {
attempts number-of-attempts;
timeout seconds;
}
dhcpv6 {
access-profile profile-name;
active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
topology-discovery;
}
active-server-group server-group-name;
}
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name interface-name;
logical-system-name;
mac-address mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
bulk-leasequery {
508
attempts number-of-attempts;
timeout seconds;
trigger automatic;
}
duplicate-clients incoming-interface;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
forward-only-replies;
}
forward-snooped-clients (all-interfaces | configured-interfaces | non-
configured-interfaces);
group group-name {
access-profile profile-name;
active-server-group server-group-name;
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-
interface);
interface-name interface-name;
logical-system-name;
mac-address mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
509
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
interface interface-name {
access-profile profile-name;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
exclude;
overrides {
allow-snooped-clients;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
no-allow-snooped-clients;
no-bind-on-request;
relay-source interface-name;
send-release-on-delete;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-
time seconds>;
trace;
upto upto-interface-name;
}
}
lease-time-validation {
lease-time-threshold seconds;
violation-action action;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up |
log-only);
method {
bfd {
version (0 | 1 | automatic);
510
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
allow-snooped-clients;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
no-allow-snooped-clients;
no-bind-on-request;
relay-source interface-name;
send-release-on-delete;
}
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
511
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group relay-server-group;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-
string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
}
remote-id-mismatch disconnect;
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
leasequery {
attempts number-of-attempts;
timeout seconds;
}
lease-time-validation {
lease-time-threshold seconds;
violation-action action;
}
liveness-detection {
512
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-remote-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group relay-server-group;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
}
relay-option-vendor-specific{
host-name;
location;
remote-id-mismatch disconnect;
route-suppression;
server-group {
server-group-name {
server-ip-address;
514
}
}
server-response-time seconds;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
dual-stack-group dual-stack-group-name {
access-profile profile-name;
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name;
logical-system-name;
mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
classification-key {
circuit-id circuit-id;
mac-address mac-address;
remote-id remote-id;
}
dual-stack-interface-client-limit number;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
515
}
}
}
protocol-primary (inet | inet6);
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-remote-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
duplicate-clients-in-subnet (incoming-interface | option-82):
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
forward-only-replies;
forward-snooped-clients (all-interfaces | configured-interfaces | non-
configured-interfaces);
group group-name {
access-profile profile-name;
active-server-group server-group-name;
authentication {
password password-string;
516
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name interface-name;
logical-system-name;
mac-address;
option-60;
option-82 [circuit-id] [remote-id];
routing-instance-name;
user-prefix user-prefix-string;
}
vlan-tags;
}
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
interface interface-name {
access-profile profile-name;
exclude;
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up |
log-only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
517
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
}
}
overrides {
allow-no-end-option;
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
client-discover-match <option60-and-option82 | incoming-
interface>;
delay-authentication;
delete-binding-on-renegotiation;
disable-relay;
dual-stack dual-stack-group-name;
interface-client-limit number;
layer2-unicast-replies;
no-allow-snooped-clients;
no-bind-on-request;
proxy-mode;
relay-source
replace-ip-source-with;
send-release-on-delete;
trust-option-82;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
overrides {
allow-no-end-option
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
518
asymmetric-prefix-lease-time seconds;
client-discover-match (option60-and-option82 | incoming-interface);
delay-authentication;
delete-binding-on-renegotiation;
disable-relay;
dual-stack dual-stack-group-name;
interface-client-limit number;
layer2-unicast-replies;
no-allow-snooped-clients;
no-bind-on-request;
proxy-mode;
relay-source
replace-ip-source-with;
send-release-on-delete;
trust-option-82;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group group-name;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
local-server-group local-server-group;
relay-server-group relay-server-group;
}
}
relay-option-82 {
circuit-id {
prefix prefix;
use-interface-description (logical | device);
}
remote-id {
prefix prefix;
use-interface-description (logical | device);
519
}
server-id-override
}
remote-id-mismatch disconnect;
route-suppression:
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
leasequery {
attempts number-of-attempts;
timeout seconds;
}
lease-time-validation {
lease-time-threshold seconds;
violation-action action;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
520
no-snoop;
overrides {
allow-no-end-option
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-discover-match (option60-and-option82 | incoming-interface);
delay-authentication;
delete-binding-on-renegotiation;
disable-relay;
dual-stack dual-stack-group-name;
interface-client-limit number;
layer2-unicast-replies;
no-allow-snooped-clients;
no-bind-on-request;
proxy-mode;
relay-source
replace-ip-source-with;
send-release-on-delete;
trust-option-82;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group group-name;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
local-server-group local-server-group;
relay-server-group relay-server-group;
}
}
relay-option-82 {
521
circuit-id {
prefix prefix;
use-interface-description (logical | device);
}
remote-id {
prefix prefix;
use-interface-description (logical | device);
}
server-id-override
}
}
remote-id-mismatch disconnect;
route-suppression:
server-group {
server-group-name {
server-ip-address;
}
}
server-response-time seconds;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
[edit forwarding-options],
[edit logical-systems logical-system-name forwarding-options],
[edit logical-systems logical-system-name routing-instances routing-instance-
name forwarding-options],
[edit routing-instances routing-instance-name forwarding-options]
Description
Configure extended Dynamic Host Configuration Protocol (DHCP) relay and DHCPv6 relay options on
the router or switch to enable the router (or switch) to function as a DHCP relay agent. A DHCP relay
agent forwards DHCP request and reply packets between a DHCP client and a DHCP server.
522
DHCP relay supports the attachment of dynamic profiles and also interacts with the local AAA Service
Framework to use back-end authentication servers, such as RADIUS, to provide subscriber
authentication or client authentication. You can attach dynamic profiles and configure authentication
support on a global basis or for a specific group of interfaces.
The extended DHCP and DHCPv6 relay agent options configured with the dhcp-relay and dhcpv6
statements are incompatible with the DHCP/BOOTP relay agent options configured with the bootp
statement. As a result, the extended DHCP or DHCPv6 relay agent and the DHCP/BOOTP relay agent
cannot both be enabled on the router (or switch) at the same time.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 523
Description | 529
Syntax
dhcpv6 {
access-profile profile-name;
allow-active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
}
allow-bulk-leasequery {
max-connections number-of-connections;
max-empty-replies number-of-replies;
restricted-requestor;
timeout seconds;
}
allow-leasequery {
restricted-requestor;
}
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
524
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delete-binding-on-renegotiation;
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
526
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delegated-pool;
delete-binding-on-renegotiation;
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
527
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
528
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delegated-pool;
delete-binding-on-renegotiation;
interface-client-limit number;
multi-address-embedded-option-response;
process-inform {
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
reconfigure {
attempts attempt-count;
clear-on-terminate;
strict;
timeout timeout-value;
token token-value;
trigger {
radius-disconnect;
}
}
}
reauthenticate (<lease-renewal> <remote-id-mismatch >);
reconfigure {
attempts attempt-count;
clear-on-terminate;
strict;
support-option-pd-exclude;
timeout timeout-value;
token token-value;
trigger {
529
radius-disconnect;
}
}
requested-ip-network-match subnet-mask;
route-suppression;
server-duid-type type;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Configure DHCPv6 local server options on the router or switch to enable the router or switch to
function as a server for the DHCP protocol for IPv6. The DHCPv6 local server sends and receives
packets using the IPv6 protocol and informs IPv6 of the routing requirements of router clients. The local
server works together with the AAA service framework to control subscriber access (or DHCP client
access) and accounting.
The DHCPv6 local server is fully compatible with the extended DHCP local server and DHCP relay
agent.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 530
Description | 537
Syntax
dhcpv6 {
access-profile profile-name;
active-leasequery {
idle-timeout seconds;
peer-address address;
timeout seconds;
topology-discovery;
}
531
active-server-group server-group-name;
}
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name interface-name;
logical-system-name;
mac-address mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
bulk-leasequery {
attempts number-of-attempts;
timeout seconds;
trigger automatic;
}
duplicate-clients incoming-interface;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
forward-only-replies;
}
forward-snooped-clients (all-interfaces | configured-interfaces | non-
configured-interfaces);
group group-name {
access-profile profile-name;
active-server-group server-group-name;
authentication {
532
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name;
logical-system-name;
mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
interface interface-name {
access-profile profile-name;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
exclude;
overrides {
allow-snooped-clients;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
no-allow-snooped-clients;
533
no-bind-on-request;
relay-source interface-name;
send-release-on-delete;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
}
lease-time-validation {
lease-time-threshold seconds;
violation-action action;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
allow-snooped-clients;
534
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
no-allow-snooped-clients;
no-bind-on-request;
relay-source interface-name;
send-release-on-delete;
}
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group relay-server-group;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
535
relay-server-group relay-server-group;
}
}
remote-id-mismatch disconnect;
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
}
leasequery {
attempts number-of-attempts;
timeout seconds;
}
lease-time-validation {
lease-time-threshold seconds;
violation-action action;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
route-suppression;
service-profile dynamic-profile-name;
536
}
}
no-snoop;
overrides {
allow-snooped-clients;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
no-allow-snooped-clients;
no-bind-on-request;
relay-source interface-name;
send-release-on-delete;
}
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
relay-server-group relay-server-group;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
537
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
relay-server-group relay-server-group;
}
}
relay-option-vendor-specific{
host-name;
location;
remote-id-mismatch disconnect;
route-suppression;
server-group {
server-group-name {
server-ip-address;
}
}
server-response-time seconds;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Configure DHCPv6 relay options on the router or switch and enable the router or switch to function as
a DHCPv6 relay agent. A DHCPv6 relay agent forwards DHCPv6 request and reply packets between a
DHCPv6 client and a DHCPv6 server.
538
The DHCPv6 relay agent server is fully compatible with the extended DHCP local server and DHCP
relay agent. However, the options configured with the dhcpv6 statement are incompatible with the
DHCP/BOOTP relay agent options configured with the bootp statement. As a result, the DHCPv6 relay
agent and the DHCP/BOOTP relay agent cannot be enabled on the router or switch at the same time.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
dhcp-relay
DHCPv6 Relay Agent Overview
Specifying Authentication Support
dial-options
IN THIS SECTION
Syntax | 539
Description | 539
Options | 540
Syntax
dial-options {
ipsec-interface-id name;
l2tp-interface-id name;
(shared | dedicated);
}
Hierarchy Level
Description
Specify the options for configuring logical interfaces for group and user sessions in L2TP or IPsec
dynamic endpoint tunneling.
540
Options
dedicated—(LNS on M Series routers and MX Series routers only) Specify that a logical interface can
host only one session at a time.
ipsec-interface-id name—(M Series routers only) Interface identifier for group of dynamic peers. This
identifier must be replicated at the [edit access profile name client * ike] hierarchy level.
l2tp-interface-id name—Interface identifier that must be replicated at the [edit access profile name]
hierarchy level.
shared—(LNS on M Series routers only) Specify that a logical interface can host multiple (shared)
sessions at a time.
Release Information
RELATED DOCUMENTATION
Configuring the Identifier for Logical Interfaces that Provide L2TP Services
Configuring Dynamic Endpoints for IPsec Tunnels
Configuring Options for the LNS Inline Services Logical Interface | 270
541
IN THIS SECTION
Syntax | 541
Description | 541
Options | 542
Syntax
dial-options {
ipsec-interface-id name;
l2tp-interface-id name;
(shared | dedicated);
}
Hierarchy Level
Description
Specify the options for configuring logical interfaces in dynamic profiles for group and user sessions in
L2TP or IPsec dynamic endpoint tunneling.
542
Options
dedicated (LNS on M Series routers and MX Series routers only) Specify that a logical interface
can host only one session at a time.
ipsec-interface- Interface identifier for group of dynamic peers. This identifier must be replicated at
id name the [edit access profile name client * ike] hierarchy level. This option is not currently
supported for dynamic profiles.
l2tp-interface-id (MX Series routers only) L2TP interface identifier that must be replicated at the [edit
name access profile name] hierarchy level.
shared (LNS on M Series routers only) Specify that a logical interface can host multiple
(shared) sessions at a time
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 543
Description | 543
Syntax
disable-calling-number-avp;
Hierarchy Level
Description
Prevent the LAC from sending L2TP Calling Number AVP 22 in incoming-call request (ICRQ) packets to
the LNS. By default, the LAC in an L2TP network generates this AVP from the Calling-Station-Id and
sends it to the LNS.
Release Information
RELATED DOCUMENTATION
Preventing the LAC from Sending Calling Number AVP 22 to the LNS | 245
disable-failover-protocol (L2TP)
IN THIS SECTION
Syntax | 544
Description | 545
Syntax
disable-failover-protocol;
545
Hierarchy Level
Description
Configure the LAC or LNS to use only the silent failover method when resynchronizing with its peer in
the event of a control plane failover. This statement prevents the default behavior, where the LAC first
attempts to negotiate the failover protocol when it establishes control connections with the peer. If the
remote peer does not support the failover protocol, then the LAC falls back on the silent failover
method. Including this configuration is useful when the peers configured for silent failover or incorrectly
negotiate use of the failover protocol even though they do not support it.
BEST PRACTICE: We recommend that you include this statement on both the LAC and LNS to
prevent the use of failover protocol. When failover protocol is used, the nonfailed peer (LAC or
LNS) keeps the tunnel open with the failed peer, in case the failed peer is able to recover from
the failure and resynchronize with the nonfailed peer. This behavior keeps the tunnel up and the
subscribers logged in while traffic is not flowing, preventing service level agreements from being
met.
Starting in Junos OS Releases 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, the disable-failover-
protocol statement is deprecated and no longer needs to be used. The default failover resynchronization
method is changed to silent failover, rather than the previous default method of failover-protocol-fall-
back-to-silent-failover. The new default method conforms to our recommendation to use silent failover.
Consequently, there is no need to disable the failover protocol. Configurations that include this
statement are still supported when you upgrade to a release in which it is deprecated; The CLI informs
you of the deprecation if the statement is included.
Release Information
Statement deprecated in Junos OS Release 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1.
Release Description
15.1R6 Starting in Junos OS Releases 15.1R6, 16.1R5, 16.2R2, 17.1R2, and 17.2R1, the disable-failover-
protocol statement is deprecated and no longer needs to be used.
RELATED DOCUMENTATION
drain
IN THIS SECTION
Syntax | 546
Description | 547
Syntax
drain;
547
Hierarchy Level
Description
Prevent the creation of new sessions, destinations, and tunnels globally at an L2TP access concentrator
(LAC) or an L2TP network server (LNS). Prevent the creation of new tunnels and sessions for a specific
destination. Prevent the creation of new sessions for a specific tunnel.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 548
Description | 549
Options | 550
Syntax
dual-stack-group name {
access-profile access-profile;
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name ;
logical-system-name;
mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
classification-key {
circuit-id circuit-id;
mac-address mac-address;
549
remote-id remote-id;
}
dual-stack-interface-client-limit number;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
on-demand-address-allocation;
protocol-primary (inet | inet6);
reauthenticate (<lease-renewal> <remote-id-mismatch >);
service-profile service-profile;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Specifies common configuration settings that are used for both legs (DHCP and DHCPv6) of the DHCP
local server dual-stack, and names the dual-stack group.
550
When applied, the dual-stack configuration takes precedence over all other configurations, such as
those specified in global, group, or interface settings.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 551
Description | 553
Options | 553
Syntax
dual-stack-group name {
access-profile profile-name;
authentication {
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name;
logical-system-name;
mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
classification-key {
circuit-id circuit-id;
mac-address mac-address;
552
remote-id remote-id;
}
dual-stack-interface-client-limit number;
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
protocol-primary (inet | inet6);
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-remote-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
service-profile dynamic-proflle-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
553
Hierarchy Level
Description
Specifies common configuration settings that are used for both legs (DHCP and DHCPv6) of the DHCP
dual stack, and names the dual stack group.
The group is assigned to each leg of the DHCP dual-stack with the dual-stack statement in the
overrides stanza. When applied, the dual-stack configuration takes precedence over all other
configurations, such as those specified in global, group, or interface settings.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 554
Description | 555
Options | 556
Syntax
duplicate-clients incoming-interface;
Hierarchy Level
Description
Specify the criteria that the jdhcpd process uses to support duplicate clients. The router uses the
additional criteria to distinguish between the duplicate clients.
Duplicate clients have the same DUID (DHCP unique identifier). Typically, the router treats a request
from a duplicate client as a renegotiation, and replaces the existing client entry with a new entry.
However, in some cases, the duplicate request is from a different client, and replacement is not desired.
When you enable duplicate client support, the router uses the additional criteria to distinguish between
the two clients, and grants a lease to the new client while retaining the original client entry.
BEST PRACTICE: To allow duplicate clients over the incoming interface for DHCPv6 relay, you
must configure the relay-agent-interface-id statement to cause the DHCP relay agent to insert
the DHCPv6 Interface-ID option (option 18) in DHCPv6 packets destined for the DHCPv6
server.
Do not configure the use-interface-description statement, because option 18 must include the
interface name rather than an interface description.
CAUTION: We recommend that you do not enable or disable duplicate client support
mode when clients are bound, because different client keys are used to store the clients
in the database depending on the mode. Changing the mode removes clients from the
database and then adds them back with a different key.
Additionally, disabling duplicate client support mode causes all duplicate clients to be
deleted.
556
Options
incoming-interface Allow duplicate clients when the incoming DHCPv6 requests are received over
different underlying interfaces.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 557
Description | 557
557
Options | 558
Syntax
Hierarchy Level
Description
Configure how the router distinguishes between duplicate clients in the same subnet. Duplicate clients
are defined as clients that have the same hardware address or client ID.
NOTE: You must configure the duplicate-clients-in-subnet statement identically for both the
DHCP local server ([edit forwarding-options dhcp-relay]) and the DHCP relay agent ([edit
system services dhcp-local-server]).
558
Options
incoming- Use the incoming interface information in packets to differentiate between duplicate
interface clients.
option-82 Use the option 82 information to differentiate between duplicate clients. Starting in
Junos OS Release 16.1R5, 16.2R2, 17.1R2, and 17.2R1, only the ACI (suboption 1) and
ARI (suboption 2) are used. Other suboptions, such as Vendor-Specific (suboption 9) are
ignored.
Release Information
16.1R5 Starting in Junos OS Release 16.1R5, 16.2R2, 17.1R2, and 17.2R1, only the ACI (suboption 1) and ARI
(suboption 2) are used. Other suboptions, such as Vendor-Specific (suboption 9) are ignored.
RELATED DOCUMENTATION
dynamic-profile (L2TP)
IN THIS SECTION
Syntax | 559
Description | 559
Options | 559
Syntax
dynamic-profile profile-name;
Hierarchy Level
Description
Assign a dynamic profile to the tunnel group for dynamic LNS sessions.
Options
Release Information
RELATED DOCUMENTATION
dynamic-profile (PPP)
IN THIS SECTION
Syntax | 560
Description | 561
Syntax
dynamic-profile profile-name;
561
Hierarchy Level
Description
Specify the dynamic profile that is attached to the interface. On the MX Series routers, this statement is
supported on PPPoE interfaces only.
Release Information
RELATED DOCUMENTATION
dynamic-profiles
IN THIS SECTION
Syntax | 562
Description | 574
Options | 574
Syntax
dynamic-profiles {
profile-name {
class-of-service {
dynamic-class-of-service-options {
vendor-specific-tags tag;
}
interfaces {
interface-name ;
}
unit logical-unit-number {
classifiers {
type (classifier-name | default);
}
output-traffic-control-profile (profile-name | $junos-cos-
traffic-control-profile);
report-ingress-shaping-rate bps;
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer |
outer-and-inner);
inet-precedence (rewrite-name | default);
563
}
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
(scheduler-name) {
buffer-size (seconds | percent percentage | remainder |
temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low |
medium-high | high) protocol (any | non-tcp | tcp) drop-profile profile-name;
excess-priority (low | high | $junos-cos-scheduler-excess-
priority);
excess-rate (percent percentage | percent $junos-cos-
scheduler-excess-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
priority priority-level;
shaping-rate (rate | predefined-variable);
transmit-rate (percent percentage | rate | remainder) <exact
| rate-limit>;
}
}
traffic-control-profiles profile-name {
adjust-minimum rate;
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value | percent
$junos-cos-excess-rate);
excess-rate-high (percent percentage | proportion value);
excess-rate-low (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate) <burst-size bytes>;
max-burst-size cells;
overhead-accounting (frame-mode | cell-mode) <bytes byte-value>;
peak-rate rate;
scheduler-map map-name;
shaping-rate (percent percentage | rate | predefined-variable)
<burst-size bytes>;
shaping-rate-excess-high (percent percentage | rate) <burst-size
bytes>;
shaping-rate-excess-medium-high (percent percentage | rate)
564
<burst-size bytes>;
shaping-rate-excess-medium-low (percent percentage | rate)
<burst-size bytes>;
shaping-rate-excess-low (percent percentage | rate) <burst-size
bytes>;
shaping-rate-priority-high (percent percentage | rate) <burst-
size bytes>;
shaping-rate-priority-low (percent percentage | rate) <burst-
size bytes>;
shaping-rate-priority-medium (percent percentage | rate) <burst-
size bytes>;
shaping-rate-priority-medium-low (percent percentage | rate)
<burst-size bytes>;
shaping-rate-priority-strict-high (percent percentage | rate)
<burst-size bytes>;
sustained-rate rate;
}
}
firewall {
family family {
fast-update-filter filter-name {
interface-specific;
match-order [match-order];
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
only-at-create;
}
}
filter filter-name {
enhanced-mode-override;
instance-shared;
interface-shared;
interface-specific;
term term-name {
from {
match-conditions;
}
565
then {
action;
action-modifiers;
}
only-at-create;
filter filter-name {
interface-specific;
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
}
hierarchical-policer uid {
aggregate {
if-exceeding {
bandwidth-limit-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
premium {
if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
}
policer uid {
filter-specific;
if-exceeding {
(bandwidth-limit bps | bandwidth-percent percentage);
burst-size-limit bytes;
}
logical-bandwidth-policer;
566
logical-interface-policer;
physical-interface-policer;
then {
policer-action;
}
}
three-color-policer uid {
action {
loss-priority high then discard;
}
logical-interface-policer;
single-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
excess-burst-size bytes;
}
two-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
peak-burst-size bytes;
peak-information-rate bps;
}
}
}
}
interfaces interface-name {
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
}
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
567
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
encapsulation (atm-ccc-cell-relay | atm-ccc-vc-mux | atm-cisco-
nlpid | atm-tcc-vc-mux | atm-mlppp-llc | atm-nlpid | atm-ppp-llc | atm-ppp-vc-
mux | atm-snap | atm-tcc-snap | atm-vc-mux | ether-over-atm-llc | ether-vpls-
over-atm-llc | ether-vpls-over-fr | ether-vpls-over-ppp | ethernet | frame-relay-
ccc | frame-relay-ppp | frame-relay-tcc | frame-relay-ether-type | frame-relay-
ether-type-tcc | multilink-frame-relay-end-to-end | multilink-ppp | ppp-over-
ether | ppp-over-ether-over-atm-llc | vlan-bridge | vlan-ccc | vlan-vci-ccc |
vlan-tcc | vlan-vpls);
family family {
address address;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
568
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
unnumbered-address interface-name <preferred-source-address
address>;
}
filter {
input filter-name (
shared-name filter-shared-name;
}
output filter-name {
shared-name filter-shared-name;
}
}
host-prefix-only;
ppp-options {
aaa-options aaa-options-name;
569
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-
length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
reassemble-packets;
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
telemetry {
subscriber-statistics;
queue-statistics {
interface $junos-interface-name {
refresh rate;
queues queue set;
}
interface-set $junos-interface-set-name {
refresh rate;
queues queue set;
}
570
}
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
interfaces {
demux0 {...}
}
interfaces {
pp0 {...}
}
policy-options {
prefix-list uid {
ip-addresses;
dynamic-db;
}
}
predefined-variable-defaults predefined-variable <variable-option>
default-value;
profile-type remote-device-service;
protocols {
igmp {
interface interface-name {
accounting;
disable;
group-limit limit;
group-policy;
group-threshold value;
immediate-leave
log-interval seconds;
no-accounting;
oif-map;
passive;
promiscuous-mode;
ssm-map ssm-map-name;
ssm-map-policy ssm-map-policy-name
static {
group group {
source source;
}
}
version version;
571
}
}
mld {
interface interface-name {
(accounting | no-accounting);
disable;
group-limit limit;
group-policy;
group-threshold value;
immediate-leave;
log-interval seconds;
oif-map;
passive;
ssm-map ssm-map-name;
ssm-map-policy ssm-map-policy-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
version version;
}
}
router-advertisement {
interface interface-name {
current-hop-limit number;
default-lifetime seconds;
dns-server-address
(managed-configuration | no-managed-configuration);
max-advertisement-interval seconds;
min-advertisement-interval seconds;
(other-stateful-configuration | no-other-stateful-
configuration);
prefixprefix {
(autonomous | no-autonomous);
(on-link | no-on-link);
preferred-lifetime seconds;
572
valid-lifetime seconds;
}
reachable-time milliseconds;
retransmit-timer milliseconds;
}
}
}
routing-instances routing-instance-name {
interface interface-name;
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
rib routing-table-name {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
573
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
services {
captive-portal-content-delivery {
auto-deactivate value;
rule name {
match-direction (input | input-output | output);
term name {
then {
accept;
redirect url;
rewrite destination-address address <destination-
port port-number>;
syslog;
574
}
}
}
}
}
variables {
variable-name {
default-value default-value;
equals expression;
mandatory;
uid;
uid-reference;
}
}
version-alias profile-alias-string;
}
}
Hierarchy Level
[edit]
Description
Create dynamic profiles for use with DHCP or PPP client access.
Options
reassemble- (Optional) Enables IPv4 reassembly of fragmented GRE packets conveyed across a soft
packets GRE tunnel from a Wi-Fi access point to a Wi-Fi access gateway on a BNG. Reassembly
is supported for fragments that range in size from 256 bytes through 8192 bytes.
575
NOTE:
• The maximum reassembled packet size is 13,310 bytes; this requires an MTU
of 1500 bytes. The router drops reassembled packets that are larger than
13,310 bytes. The router also drops DHCP discover packets that are smaller
than the MTU.
• The WAG does not support soft GRE packets with keys. Fragmented packets
GRE with key are not reassembled.
• The order of the last arriving fragment is not guaranteed when the
reassembled packets are forwarded.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
Support at the filter, policer, hierarchical-policer, three-color-policer, and policy options hierarchy levels
introduced in Junos OS Release 11.4.
576
RELATED DOCUMENTATION
enable-ipv6-services-for-lac (L2TP)
IN THIS SECTION
Syntax | 576
Description | 577
Default | 577
Syntax
enable-ipv6-services-for-lac;
Hierarchy Level
Description
Enable the LAC to create the IPv6 address family (inet6) when establishing a tunnel for subscribers,
allowing IPv6 filters to be applied. By default, the LAC requires only family inet to enable forwarding into
an IP tunnel. It can apply IPv4 firewall filters to the session. Even when family inet6 is included in the
dynamic profile, by default it is not created and IPv6 firewall filters cannot be applied.
Default
Disabled.
Release Information
RELATED DOCUMENTATION
enable-snmp-tunnel-statistics (L2TP)
IN THIS SECTION
Syntax | 578
Description | 578
Default | 579
Syntax
enable-snmp-tunnel-statistics;
Hierarchy Level
Description
Enable collection of L2TP tunnel and global counters for SNMP statistics.
NOTE: The system load can increase when you enable these counters and also use RADIUS
interim accounting updates. We recommend you enable these counters when you are using only
SNMP statistics.
579
Default
Disabled.
Release Information
Statement introduced in Junos OS Release 12.1R4 and supported in later 12.1Rx releases.
Statement supported in Junos OS Release 12.2R2 and later 12.2Rx releases. (Not supported in Junos OS
Release 12.2R1.)
RELATED DOCUMENTATION
Enabling Tunnel and Global Counters for SNMP Statistics Collection | 144
enforce-strict-scale-limit-license (Subscriber
Management)
IN THIS SECTION
Syntax | 580
Description | 580
580
Syntax
enforce-strict-scale-limit-license;
Hierarchy Level
Description
Configure the router to strictly enforce the subscriber scaling license, and to not allow the normal grace
period. No additional subscribers are allowed to log in after the number of subscribers reaches the
maximum allowed for the license.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 581
Description | 582
Options | 582
Syntax
equals expression;
Hierarchy Level
Description
Configure an expression—a group of arithmetic operators, string operators, and operands—for a user-
defined variable that is evaluated at run time and returned as the variable value.
Options
Release Information
RELATED DOCUMENTATION
failover-resync
IN THIS SECTION
Syntax | 583
Description | 583
Options | 584
Syntax
Hierarchy Level
Description
Configure the method used by the LAC or the LNS to resynchronize with its peer in the event of a
control plane failover. Failure can be the result of a Routing Engine switchover, a daemon restart, or
some other cause. During tunnel setup, the L2TP endpoints negotiate the resynchronization method;
silent failover is the default.
With the silent failover method, only the failed endpoint is involved in recovering the tunnels and
sessions; the nonfailed endpoint remains unaware of the failure.
584
With the failover protocol method, the nonfailed endpoint keeps the tunnel open with the failed peer, in
case the failed peer is able to recover from the failure and resynchronize with the nonfailed peer. The
detection of tunnel keepalive failures is delayed. This behavior keeps the tunnel up and the subscribers
logged in while traffic is not flowing, preventing service level agreements from being met.
Options
failover-protocol Specify the L2TP failover protocol as the resynchronization method, but fall back to
silent failover if the other endpoint does not support it.
• Default: silent-failover
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 585
Description | 585
Syntax
failover-within-preference;
Hierarchy Level
Description
Enable L2TP LAC tunnel selection within a preference level. When the router is unable to connect to a
destination at a given preference level, it attempts to connect to another destination at the same level.
By default, when a connection attempt fails at one preference level, the next attempt is made at the next
lower level.
586
Release Information
RELATED DOCUMENTATION
failure-action
IN THIS SECTION
Syntax | 586
Description | 587
Options | 587
Syntax
Hierarchy Level
Description
Configure the action the router (or switch) takes when a liveness detection failure occurs.
Options
• Default: clear-binding
clear-binding—The DHCP client session is cleared when a liveness detection failure occurs, except when
maintain-subscribers interface-delete setting is configured and active.
clear-binding-if-interface-up—The DHCP client session is cleared only when a liveness detection failure
occurs and the local interface is detected as being up. Use this setting to distinguish failures from
between a liveness detection failure due to a local network error, and a host disconnecting from the
network. If the client binding is in the maintain-binding Finite State Machine (FSM) state when the
liveness detection failure detection occurs, then the binding is not deleted. Not supported for Layer 2
ARP/ND liveness detection on MX Series routers.
log-only—A message is logged to indicate the event; no action is taken and DHCP is left to manage the
failure and maintain the client binding. Not supported for Layer 2 ARP/ND liveness detection on MX
Series routers.
588
Release Information
RELATED DOCUMENTATION
flexible-vlan-tagging
IN THIS SECTION
Syntax | 589
Description | 589
Syntax
flexible-vlan-tagging;
Hierarchy Level
Description
Support simultaneous transmission of 802.1Q VLAN single-tag and dual-tag frames on logical interfaces
on the same Ethernet port, and on pseudowire logical interfaces.
This statement is supported on M Series and T Series routers, for Fast Ethernet and Gigabit Ethernet
interfaces only on Gigabit Ethernet IQ2 and IQ2-E, IQ, and IQE PICs, and for aggregated Ethernet
interfaces with member links in IQ2, IQ2-E, and IQ PICs or in MX Series DPCs, or on Ethernet interfaces
for PTX Series Packet Transport Routers or 100-Gigabit Ethernet Type 5 PIC with CFP.
This statement is supported on Gigabit Ethernet, 10-Gigabit Ethernet, 40-Gigabit Ethernet, and
aggregated Ethernet interfaces on EX Series and QFX Series switches.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 590
Description | 591
Options | 591
Syntax
Hierarchy Level
Description
Configure how the DHCP local server filters and handles DHCP snooped packets on the specified
interfaces.
Options
configured-interfaces—Perform the action only on interfaces that are configured as part of an interface
group.
non-configured-interfaces—Perform the action only on interfaces that are not configured as part of a
group.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 592
Description | 593
Options | 593
Syntax
Hierarchy Level
Description
Configure how DHCP relay agent filters and handles DHCP snooped packets on the specified interfaces.
The router or switch determines the DHCP snooping action to perform based on a combination of the
forward-snooped-clients configuration and the configuration of either the allow-snooped-clients
statement or the no-allow-snooped-clients statement.
The router (or switch) also uses this statement to determine how to handle snooped BOOTREPLY
packets received on non-configured interfaces.
Options
configured-interfaces—Perform the action only on interfaces that are configured as part of an interface
group.
non-configured-interfaces—Perform the action only on interfaces that are not part of a group.
Release Information
Support at the [edit forwarding-options dhcp-relay dhcpv6] hierarchy level introduced in Junos OS
Release 15.1X53-D56 for EX Series switches and Junos OS Release 17.1R1.
RELATED DOCUMENTATION
Configuring DHCP Snooped Packets Forwarding Support for DHCP Relay Agent
IN THIS SECTION
Syntax | 594
Description | 595
Options | 595
Syntax
fpc slot-number {
inline-services {
flow-table-size {
ipv4-flow-table-size units;
ipv4-flow-table-size units;
ipv6-extended-attrib;
}
}
ir-mode (R | IR);
pic number {
inline-services {
bandwidth (1g | 10g);
}
port-mirror-instance port-mirroring-instance-name-pic-level;
tunnel-services {
bandwidth (1g | 10g)
}
}
595
port-mirror-instance port-mirroring-instance-name-fpc-level;
}
Hierarchy Level
[edit chassis]
Description
Configure properties for the DPC or MPC and corresponding Packet Forwarding Engines to create
tunnel interfaces.
(MX Series Virtual Chassis only) When you configure chassis properties for MPCs installed in a Virtual
Chassis member router, statements included at the [edit chassis member member-id fpc slot slot-
number] hierarchy level apply to the MPC in the specified slot number only on the specified member
router in the Virtual Chassis. Statements included at the [edit chassis fpc slot slot-number] hierarchy
level apply to the MPCs in the specified slot number on each member router in the Virtual Chassis.
BEST PRACTICE: To ensure that the statement you use to configure MPC chassis properties in
an MX Series Virtual Chassis applies to the intended member router and MPC, we recommend
that you always include the member member-ID option before the fpc statement, where
member-id is 0 or 1 for a two-member MX Series Virtual Chassis.
Options
• Range: 0 through 11
pic number—Specify the number of the Packet Forwarding Engine. Each DPC includes four Packet
Forwarding Engines.
• Range: 0 through 4
596
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 597
Description | 597
Options | 597
Syntax
gateway-name gateway-name;
Hierarchy Level
Description
Specify the gateway name for the LNS, which the LNS returns to the LAC in response to the LAC’s
SCCRQ message. This name must match the remote gateway name configured on the LAC, or the tunnel
cannot be established.
Options
Release Information
RELATED DOCUMENTATION
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
IN THIS SECTION
Syntax | 598
Description | 599
Options | 599
Syntax
gateway-name server-name;
599
Hierarchy Level
Description
Specify the hostname expected by the remote gateway—the LNS—from the source gateway—the LAC—
when you set up a tunnel.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 600
Description | 600
Options | 601
Syntax
gateway-name client-name;
Hierarchy Level
Description
Specify the hostname provided by the source gateway—the LAC—to the remote gateway—the LNS—
when you set up a tunnel.
601
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 602
Description | 602
Syntax
gres-route-flush-delay;
Hierarchy Level
Description
For a subscriber network configured with either nonstop active routing (NSR) or graceful restart,
configure the router to wait 180 seconds (3 minutes) before removing (flushing) static or dynamic access
routes and access-internal routes from the forwarding table after a graceful Routing Engine switchover
(GRES) has taken place.
Release Information
RELATED DOCUMENTATION
Minimize Traffic Loss Due to Stale Route Removal After a Graceful Routing Engine Switchover | 34
603
IN THIS SECTION
Syntax | 603
Description | 607
Options | 608
Syntax
group group-name {
access-profile profile-name;
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
logical-system-name;
mac-address;
option-60;
option-82 <circuit-id> <remote-id>;
relay-agent-interface-id
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
604
}
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
606
client-discover-match <option60-and-option82>;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delegated-pool;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
607
protocol-attributes attribute-set-name;
rapid-commit;
}
reconfigure {
attempts attempt-count;
clear-on-terminate;
strict;
timeout timeout-value;
token token-value;
trigger {
radius-disconnect;
}
}
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Configure a group of interfaces that have a common configuration, such as authentication parameters. A
group must contain at least one interface.
608
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 609
Description | 614
Options | 614
Syntax
group group-name {
access-profile profile-name;
active-server-group server-group-name;
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
interface-name interface-name;
logical-system-name;
mac-address mac-address;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
aggregate-clients (merge | replace);
use-primary primary-profile-name;
}
forward-only {
logical-system <current | default | logical-system-name>;
routing-instance <current | default | routing-instance-name>;
}
610
interface interface-name {
access-profile profile-name;
exclude;
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
}
}
overrides {
allow-no-end-option;
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-discover-match <option60-and-option82 | incoming-interface>;
client-negotiation-match incoming-interface;
delay-authentication;
delete-binding-on-renegotiation;
disable-relay;
dual-stack dual-stack-group-name;
interface-client-limit number;
layer2-unicast-replies;
no-allow-snooped-clients;
no-bind-on-request;
proxy-mode;
611
relay-source
replace-ip-source-with;
send-release-on-delete;
trust-option-82;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time
seconds>;
trace;
upto upto-interface-name;
}
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-
only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
overrides {
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
612
client-discover-match <option60-and-option82>;
client-negotiation-match incoming-interface;
disable-relay;
dual-stack dual-stack-group-name;
interface-client-limit number;
layer2-unicast-replies;
no-allow-snooped-clients;
no-bind-on-request;
proxy-mode;
relay-source
replace-ip-source-with;
send-release-on-delete;
trust-option-82;
}
relay-agent-interface-id {
include-irb-and-l2;
keep-incoming-interface-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-agent-remote-id {
include-irb-and-l2;
keep-incoming-remote-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-option-82 <strict>;
use-vlan-id;
}
relay-option {
option-number option-number;
default-action {
drop;
forward-only;
local-server-group local-server-group;
relay-server-group relay-server-group;
}
equals (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
613
local-server-group local-server-group;
relay-server-group relay-server-group;
}
starts-with (ascii ascii-string | hexadecimal hexadecimal-string) {
drop;
forward-only;
local-server-group local-server-group;
relay-server-group relay-server-group;
}
}
relay-option-82 {
circuit-id {
prefix prefix;
use-interface-description (logical | device);
use-option-82;
}
remote-id {
prefix prefix;
use-interface-description (logical | device);
}
server-id-override
}
remote-id-mismatch disconnect;
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Description
Specify the name of a group of interfaces that have a common DHCP or DHCPv6 relay agent
configuration. A group must contain at least one interface. Use the statement at the [edit ... dhcpv6]
hierarchy levels to configure DHCPv6 support.
Options
group-name—Name of a group of interfaces that have a common DHCP or DHCPv6 relay agent
configuration.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
Support at the [edit ... dhcpv6] hierarchy levels introduced in Junos OS Release 11.4.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 615
Description | 616
Options | 616
Syntax
group-profile profile-name {
l2tp {
interface-id interface-id;
lcp-renegotiation;
local-chap;
maximum-sessions-per-tunnel number;
}
ppp {
cell-overhead;
encapsulation-overhead bytes;
framed-pool pool-id;
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
ppp-options {
aaa-options aaa-options-name;
chap;
ignore-magic-number-mismatch;
616
Hierarchy Level
[edit access]
Description
NOTE: Subordinate statement support depends on the platform. See individual statement topics
for more detailed support information.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
617
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 618
Description | 618
Options | 618
Syntax
hierarchical-scheduler {
implicit-hierarchy;
maximum-hierarchy-levels number;
}
Hierarchy Level
Description
• GRE tunnel interfaces configured on physical interfaces hosted on MIC or MPC line cards in MX
Series routers
Options
implicit- Configure four-level hierarchical scheduling. When you include the implicit-hierarchy
hierarchy option, a hierarchical relationship is formed between the CoS scheduler nodes at level 1,
level 2, level 3, and level 4. The implicit-hierarchy option is supported only on MPC/MIC
subscriber interfaces and interface sets on MX Series routers.
619
maximum- Specify the maximum number of hierarchical scheduling levels allowed for node scaling,
hierarchy- from 2 through 4 levels. The default number of levels is 3. The maximum-hierarchy-
levels
number levels option is supported on MPC/MIC or EQ DPC subscriber interfaces and interface
sets on MX Series routers.
• If you set maximum-hierarchy-levels to 2, interface sets are not allowed. In this case,
if you configure a level 2 interface set, you generate Packet Forwarding Engine
errors.
Release Information
Support on GRE tunnel interfaces configured on physical interfaces on MICs or MPCs in MX Series
routers added in Junos OS Release 13.3.
RELATED DOCUMENTATION
holddown-interval
IN THIS SECTION
Syntax | 620
Description | 621
Options | 621
Syntax
holddown-interval milliseconds;
Hierarchy Level
Description
Configure the time (in milliseconds) for which Bidirectional Forwarding Detection (BFD) holds a session
up notification.
Options
milliseconds—Interval specifying how long a BFD session must remain up before a state change
notification is sent.
• Default: 0
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
hello-interval (L2TP)
IN THIS SECTION
Syntax | 622
Description | 622
Options | 623
Syntax
hello-interval seconds;
Hierarchy Level
Description
Options
seconds—Interval, in seconds, after which the server sends a hello message if no messages are received.
A value of 0 means that no hello messages are sent.
• Default: 60 seconds
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 624
Description | 624
Options | 624
624
Syntax
identification name;
Hierarchy Level
Description
Specify the assignment ID of an L2TP tunnel. L2TP sessions with the same tunnel assignment
identification and destination are grouped into the same tunnel.
Options
Release Information
RELATED DOCUMENTATION
idle-timeout (Access)
IN THIS SECTION
Syntax | 625
Description | 626
Options | 626
Syntax
idle-timeout seconds;
Hierarchy Level
Description
Configure the idle timeout for a user. The router might consider a PPP session to be idle because of the
following reasons:
• There is no ingress or egress PPP control traffic. This is applicable only if keepalives are enabled.
Options
seconds—Number of seconds a user can remain idle before the session is terminated.
• Default: 0
Release Information
RELATED DOCUMENTATION
idle-timeout (L2TP)
IN THIS SECTION
Syntax | 627
Description | 628
Options | 628
Syntax
idle-timeout seconds;
Hierarchy Level
Description
Specify how long a tunnel is active after its last session is terminated. The timer starts when the session
is terminated and the tunnel is disconnected when the timer expires.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, unconfigure the statement by issuing no services l2tp tunnel idle-timeout.
Options
seconds—Length of the idle timeout. A value of 0 creates a persistent tunnel; that is, the tunnel remains
active indefinitely until the remote peer disconnects it or you issue the clear services l2tp tunnel
command.
• Default: 60
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 629
Description | 629
Syntax
ignore-magic-number-mismatch;
Hierarchy Level
Description
Prevent the Packet Forwarding Engine from performing a validation check for magic numbers received in
LCP keepalive (Echo-Request/Echo-Reply) exchanges for a group of tunneled PPP subscribers at the
LNS.
A mismatch occurs when the PPP magic number received from a remote peer in the keepalive exchange
does not match the value agreed upon during LCP negotiation. Disabling the validation check prevents
PPP from terminating the session when an unexpected number is received. Configuring this statement
630
has no effect on LCP magic number negotiation or on the exchange of keepalives when the remote peer
magic number is the expected negotiated number.
NOTE: Because magic number validation is not performed, the Packet Forwarding Engine does
not detect whether the remote peer sends the local peer’s magic number, which would indicate a
loopback or other network issue. This is considered to be an unlikely situation, because LCP
negotiation completed successfully, meaning no loopback was present at that time.
NOTE: You can also configure this behavior in a dynamic PPP profile. When PPP options are
configured in both a group profile and a dynamic profile, the dynamic profile configuration takes
complete precedence over the group profile when the dynamic profile includes one or more of
the PPP options that can be configured in the group profile. Complete precedence means that
there is no merging of options between the profiles. The group profile is applied to the subscriber
only when the dynamic profile does not include any PPP option available in the group profile.
This means that ignore-magic-number-mismatch configured in a group profile is not applied
when the dynamic profile includes any PPP option, even when the dynamic profile does not
include ignore-magic-number-mismatch statement.
Release Information
RELATED DOCUMENTATION
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
Understanding How the Router Processes Subscriber-Initiated PPP Fast Keepalive Requests | 93
IN THIS SECTION
Syntax | 631
Description | 632
Syntax
ignore-magic-number-mismatch;
Hierarchy Level
Description
Prevent the Packet Forwarding Engine from performing a validation check for magic numbers received in
LCP keepalive (Echo-Request/Echo-Reply) exchanges for dynamic PPP subscriber connections
terminated at the router or for dynamic tunneled PPP subscribers on LNS inline service interfaces.
A mismatch occurs when the PPP magic number received from a remote peer in the keepalive exchange
does not match the value agreed upon during LCP negotiation. Disabling the validation check prevents
PPP from terminating the session when an unexpected number is received. Configuring this statement
has no effect on LCP magic number negotiation or on the exchange of keepalives when the remote peer
magic number is the expected negotiated number.
For dynamic PPP subscriber connections terminated at the router, configure the statement at the [edit
dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” ppp-options] hierarchy
level.
For dynamic tunneled PPP subscribers on LNS inline service interfaces, configure the statement at the
[edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit “$junos-interface-
unit” ppp-options] hierarchy level.
NOTE: Because magic number validation is not performed, the Packet Forwarding Engine does
not detect whether the remote peer sends the local peer’s magic number, which would indicate a
loopback or other network issue. This is considered to be an unlikely situation, because LCP
negotiation completed successfully, meaning no loopback was present at that time.
NOTE: You can also configure this behavior in an L2TP group profile that applies to tunneled PPP
subscribers at the LNS. When PPP options are configured in both a group profile and a dynamic
profile, the dynamic profile configuration takes complete precedence over the group profile when
the dynamic profile includes one or more of the PPP options that can be configured in the group
profile. Complete precedence means that there is no merging of options between the profiles.
The group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
This means that "ignore-magic-number-mismatch" on page 629 configured in a group profile is
not applied when the dynamic profile includes any PPP option, even when the dynamic profile
does not include "ignore-magic-number-mismatch" on page 631.
Release Information
RELATED DOCUMENTATION
Preventing the Validation of PPP Magic Numbers During PPP Keepalive Exchanges | 102
Understanding How the Router Processes Subscriber-Initiated PPP Fast Keepalive Requests | 93
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
IN THIS SECTION
Syntax | 634
Description | 634
Options | 634
Syntax
Hierarchy Level
Description
Configure PPP Network Control Protocol (NCP) negotiation mode (active or passive) for dynamic and
static IPv4 and IPv6 PPP subscriber interfaces. You can also configure PPP NCP negotiation mode for
the PPP server in an IPv4/IPv6 dual-stack configuration.
Options
dual- Enable passive PPP NCP negotiation for the PPP server in an IPv4/IPv6 dual-stack
stack- configuration. The initiate-ncp dual-stack-passive statement overrides the initiate-ncp ip
passive
and initiate-ncp ipv6 statements if they are configured in an IPv4/IPv6 dual-stack
configuration.
ip Enable active PPP NCP negotiation for dynamic and static PPP subscriber interfaces
configured with the IPv4 (inet) protocol address family, and for which IPv4 address attributes
are assigned during authorization. By default, dynamic and static IPv4 subscriber interfaces
use passive PPP NCP negotiation. In an IPv4/IPv6 dual-stack configuration, use the initiate-
ncp ip statement to enable active PPP NCP negotiation for the IPv4 subscriber interface.
635
ipv6 Enable active PPP NCP negotiation for dynamic and static PPP subscriber interfaces
configured with the IPv6 (inet6) protocol address family, and for which IPv6 address
attributes are assigned during authorization. By default, dynamic and static IPv6 subscriber
interfaces use passive PPP NCP negotiation. In an IPv4/IPv6 dual-stack configuration, use
the initiate-ncp ipv6 statement to enable active PPP NCP negotiation for the IPv6
subscriber interface.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 636
Description | 636
Syntax
inline-services {
bandwidth (1g | 10g | 20g | 30g | 40g | 100g);
}
Hierarchy Level
Description
Enable inline services on PICs residing on MPCs and optionally specify a bandwidth for traffic on the
inline service interface.
NOTE: For an MPC, such as MPC2, always configure inline-services at the [chassis fpc slot-
number pic number] hierarchy level. Do not configure inline services for a service card such as
MS-MPC.
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
input-hierarchical-policer
IN THIS SECTION
Syntax | 637
Description | 638
Options | 638
Syntax
input-hierarchical-policer policer-name;
638
Hierarchy Level
Description
Apply a hierarchical policer to the Layer 2 input traffic for all protocol families at the physical or logical
interface.
Options
Release Information
RELATED DOCUMENTATION
Hierarchical Policers
layer2-policer (Hierarchical Policer)
639
IN THIS SECTION
Syntax | 639
Description | 639
Options | 640
Syntax
interface interface-name;
Hierarchy Level
Description
Options
Release Information
IN THIS SECTION
Syntax | 641
Description | 641
Options | 641
Syntax
interface service-interface-name;
Hierarchy Level
Description
Assign a service interface to a service interface pool. You specify more than one interface for each pool.
The interfaces are used to balance traffic loads. For an L2TP tunnel group, the interfaces must be inline
service interfaces (si). For a hybrid access tunnel group, the interfaces must be pseudowire service
interfaces (ps).
Options
Release Information
RELATED DOCUMENTATION
Configuring a Pool of Inline Services Interfaces for Dynamic LNS Sessions | 309
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
interface-id
IN THIS SECTION
Syntax | 642
Description | 643
Options | 643
Syntax
interface-id interface-id;
Hierarchy Level
Description
Options
interface-id—Identifier for the interface representing a Layer 2 Tunneling Protocol (L2TP) session
configured at the [edit interfaces interface-name unit local-unit-number dial-options] hierarchy level.
For more information about the interface ID, see Services Interface Naming Overview.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 644
Description | 650
Options | 650
Syntax
interfaces {
interface-name {
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
645
dynamic-profile profile-name;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-
time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address
address>;
}
filter {
646
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
host-prefix-only;
ppp-options {
chap;
pap;
}
proxy-arp;
service {
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
vlan-id;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
vlan-tagging;
}
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
pppoe-underlying-options {
max-sessions number;
}
647
}
demux0 {
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
demux-source {
source-prefix;
}
filter {
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-
time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address
address>;
}
filter {
input filter-name;
output filter-name;
}
vlan-id number;
648
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
}
}
}
stacked-interface-set {
interface-set-name interface-set-name {
interface-set-name interface-set-name;
}
}
}
Hierarchy Level
Description
Options
NOTE: Though we do not recommend it, you can also enter the specific name of the interface
you want to assign to the dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
ip-reassembly
IN THIS SECTION
Syntax | 651
Description | 652
Options | 652
Syntax
ip-reassembly {
profile profile-name
rule rule-name{
match-direction direction
};
}
Hierarchy Level
[edit services]
652
Description
NOTE: Inline IP reassembly configuration does not require you to configure the profile
statement. The profile configuration is used when IP reassembly is configured on services PICs.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ip-reassembly (L2TP)
IN THIS SECTION
Syntax | 653
Description | 653
Options | 654
Syntax
ip-reassembly {
service-set service-set-name;
}
Hierarchy Level
Description
NOTE: The service set must be defined at the [edit services] hierarchy level.
654
Options
service-set service-set-name Identifies the service set to be associated with the L2TP service.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 655
Description | 655
Options | 655
655
Syntax
ip-reassembly-rules rule-name;
Hierarchy Level
Description
Specify one or more previously configured IP reassembly rules to associate with the service set.
NOTE: The IP reassembly rule must be defined at the [edit services ip-reassembly rule] hierarchy
level.
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ipcp-suggest-dns-option
IN THIS SECTION
Syntax | 657
Description | 657
Syntax
ipcp-suggest-dns-option;
Hierarchy Level
Description
Configure the router to prompt Customer Premises Equipment (CPE) to negotiate both primary and
secondary DNS addresses during IPCP negotiation for terminated PPPoE and LNS subscribers. You can
configure this for dynamic or static PPPoE subscribers, dynamic or static LNS subscribers, and in an LNS
group profile.
Release Information
RELATED DOCUMENTATION
Ensuring IPCP Negotiation for Primary and Secondary DNS Addresses | 124
Configuring the PPP Attributes for a Group Profile
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
Configuring Dynamic Authentication for PPP Subscribers | 110
Applying PPP Attributes to L2TP LNS Subscribers per Inline Service Interface | 256
keepalive
IN THIS SECTION
Syntax | 658
Description | 659
Options | 659
Syntax
keepalive seconds;
Hierarchy Level
Description
Options
seconds—Time period that must elapse before the Junos OS checks the status of the Point-to-Point
Protocol (PPP) session by sending an echo request to the peer.
For L2TP on MX Series routers, the minimum recommended interval is 30 seconds. A value of 0 disables
generation of keepalive messages from the LNS.
• Default: 30 seconds
Release Information
RELATED DOCUMENTATION
keepalives
IN THIS SECTION
Syntax | 660
Description | 660
Default | 661
Options | 661
Syntax
Hierarchy Level
Description
Enable the sending of keepalives on a physical interface configured with PPP, Frame Relay, or Cisco
HDLC encapsulation.
661
For ATM2 IQ interfaces only, you can enable keepalives on a logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
Default
Sending of keepalives is enabled by default. The default keepalive interval is 10 seconds for PPP, Frame
Relay, or Cisco HDLC. The default down-count is 3 and the default up-count is 1 for PPP or Cisco HDLC.
Options
down-count number—The number of keepalive packets a destination must fail to receive before the
network takes down a link.
• Default: 3
• Default: 10 seconds
up-count number—The number of keepalive packets a destination must receive to change a link’s status
from down to up.
• Default: 1
Release Information
RELATED DOCUMENTATION
Configuring Keepalives
Configuring Frame Relay Keepalives
Applying PPP Attributes to L2TP LNS Subscribers per Inline Service Interface | 256
IN THIS SECTION
Syntax | 662
Description | 663
Default | 663
Options | 663
Syntax
keepalives {
interval seconds;
}
663
Hierarchy Level
Description
Starting in Junos OS Release 15.1R5, you can configure the PPP keepalive interval for subscriber
services in the range 1 second through 600 seconds. Subscriber PPP keepalives are handled by the
Packet Forwarding Engine. If you configure a value greater than 600 seconds, the number is accepted by
the CLI, but the Packet Forwarding Engine limits the interval to 600 seconds.
In earlier Junos OS releases, the range is from 1 second through 60 seconds. The Packet Forwarding
Engine limits any higher configured value to an interval of 60 seconds.
PPP keepalives for nonsubscriber services are handled by the Routing Engine with an interval range
from 1 second through 32,767 seconds.
Default
Options
• Default: 30 seconds for LNS-based PPP sessions. 10 seconds for all other PPP sessions.
664
Release Information
RELATED DOCUMENTATION
l2tp
IN THIS SECTION
Syntax | 665
Description | 667
Syntax
l2tp {
access-line-information <connection-speed-update>;
destination {
address ip-address {
access-line-information <connection-speed-update>;
drain;
routing-instance routing-instance-name {
drain;
}
}
lockout-timeout seconds;
name destination-name {
drain;
}
}
destination-equal-load-balancing;
destruct-timeout seconds;
disable-calling-number-avp;
disable-failover-protocol;
drain;
enable-ipv6-services-for-lac;
enable-snmp-tunnel-statistics;
failover-within-preference;
ip-reassembly;
maximum-sessions number;
rx-connect-speed-when-equal;
sessions-limit-group limit-group-name {
maximum-sessions number;
}
traceoptions {
debug-level level;
file filename <files number> <match regular-expression > <size maximum-
file-size> <world-readable | no-world-readable>;
filter {
protocol name;
user user@domain;
user-name username;
}
flag flag;
666
interfaces interface-name {
debug-level severity;
flag flag;
}
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
tunnel {
assignment-id-format (assignment-id | client-server-id);
failover-resync (failover-protocol | silent-failover);
idle-timeout seconds;
maximum-sessions number;
minimum-retransmission-timeout;
name name {
address ip-address {
drain;
routing-instance routing-instance-name {
drain;
}
}
drain;
}
nas-port-method;
retransmission-count-established count;
retransmission-count-not-established count;
rx-window-size packets;
tx-address-change (accept | ignore | ignore-ip-address | ignore-udp-
port | reject | reject-ip-address | reject-udp-port);
}
tunnel-group group-name {
aaa-access-profile profile-name;
dynamic-profile profile-name;
hello-interval seconds;
hide-avps;
l2tp-access-profile profile-name;
local-gateway {
address address;
gateway-name gateway-name;
}
maximum-send-window packets;
maximum-sessions number;
ppp-access-profile profile-name;
receive-window packets;
667
retransmit-interval seconds;
service-device-pool pool-name;
service-interface interface-name;
service-profile profile-name(parameter)&profile-name;
syslog {
host hostname {
facility-override facility-name;
log-prefix prefix-value;
services severity-level;
}
}
tos-reflect;
tunnel-switch-profile profile-name;
tunnel-timeout seconds;
}
tunnel-switch-profile profile-name;
tx-connect-speed-method method;
weighted-load-balancing;
}
Hierarchy Level
[edit services]
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
668
NOTE: Subordinate statement support depends on the platform. See individual statement topics
for more detailed support information.
Release Information
RELATED DOCUMENTATION
l2tp (Profile)
IN THIS SECTION
Syntax | 669
Description | 669
Options | 670
669
Syntax
l2tp {
interface-id interface-id;
lcp-renegotiation;
local-chap;
maximum-sessions number;
maximum-sessions-per-tunnel number;
multilink {
drop-timeout milliseconds;
fragment-threshold bytes;
}
override-result-code session-out-of-resource;
ppp-authentication (chap | pap);
ppp-profile profile-name;
sessions-limit-group;
service-profile profile-name(parameter)&profile-name;
shared-secret shared-secret;
}
Hierarchy Level
Description
Options
• Values:
lcp- Configure the L2TP network server (LNS) so it renegotiates the link control protocol
renegotiation (LCP) with the PPP client. When LCP renegotiation is disabled, LNS uses the pre-
negotiated LCP parameters between the L2TP access concentrator (LAC) and PPP
client to set up the session. When LCP renegotiation is enabled, authentication is
also renegotiated.
NOTE: This statement is not supported at the [edit access group-profile l2tp]
hierarchy level for L2TP LNS on MX Series routers.
local-chap Configure the Junos OS so that the LNS ignores proxy authentication attribute-value
pairs (AVPs) from the L2TP access concentrator (LAC) and reauthenticates the PPP
client using a Challenge Handshake Authentication Protocol (CHAP) challenge. When
you do this, the LNS directly authenticates the PPP client.
NOTE: This statement is not supported for L2TP LNS on MX Series routers.
maximum- Specify the maximum number of L2TP sessions for the chassis, all tunnels, a tunnel
sessions group, a session limit group, or a client.
671
• Values:
• Range: (Chassis, tunnel group, session limit group, or client) 1 through the
default maximum chassis limit
• Values:
The options for this statement are explained separately. Click the linked statement
for details.
• Values:
NOTE: This statement is not supported for L2TP LNS on MX Series routers.
• Values:
ppp-profile (M Series, T Series only) Specify the profile used to validate PPP session requests
through L2TP tunnels.
NOTE: This statement is not supported for L2TP LNS on MX Series routers.
sessions-limit- (MX Series only) Starting in Junos OS Release 16.1, specify in an L2TP access profile
group the session limit group to which a client is assigned by the profile.
service-profile Configure one or more dynamic service profiles to be applied to subscriber sessions
at activation for all subscribers in the specified tunnel group or on the specified LAC.
Services are typically applied to L2TP sessions with RADIUS VSAs or CoA requests.
In multivendor environments, you might use only standard attributes to simplify
management of multiple vendor VSAs. This statement enables you to apply services
without using an external authority such as RADIUS. The locally configured list of
services (service profiles) serves as local authorization that is applied by authd during
client session activation. This list of services is subject to the same validation and
processing as services originating from an external authority, such as RADIUS.
You can optionally specify parameters that are passed to the corresponding service
when it is activated for the session. The parameter might override values configured
in the profile itself, such as a downstream shaping rate for a CoS service. This
enables you to use the same service profile for multiple situations with different
requirements, or to modify a previously applied value for a service.
You can still use RADIUS VSAs or CoA requests together with the service profiles. If
services are sourced from an external authority as authorization during
authentication or during subscriber session provisioning (activation), the services
from the external authority take strict priority over those in the local configuration. If
a service applied with RADIUS is the same as a service applied with a service profile
in the CLI, but with different parameters, the RADIUS service is applied with a new
session ID and takes precedence over the earlier service profile.
When service profiles are configured on a LAC client and on a tunnel group that uses
that LAC client, the LAC configuration overrides the tunnel group configuration.
Only the service profile configured on the LAC client is applied to subscribers in the
tunnel group.
673
• Values:
• Values:
Release Information
RELATED DOCUMENTATION
l2tp-access-profile
IN THIS SECTION
Syntax | 674
Description | 674
Options | 674
Syntax
l2tp-access-profile profile-name;
Hierarchy Level
Description
Specify the profile used to validate all L2TP connection requests to the local gateway address.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 675
Description | 676
Options | 676
Syntax
l2tp-maximum-session number;
676
Hierarchy Level
Description
Specify the maximum number of L2TP sessions allowed on a physical service interface (si) or aggregated
service interface (asi).
New session requests on an interface are accepted only when the session count is less than the
maximum session limit. If the limit has been reached, subsequent requests are dropped and the LNS
responds with a CDN message (Result Code 2, Error Code 4). When a pool of interfaces is configured,
interfaces at the maximum limit are ignored in favor of an interface in the pool that has a lower session
count. For an asi interface, the configuration applies only to the asi interface. You cannot configure a
session limit on the individual member interfaces of an asi bundle.
Configuring the session limit to be less than the current number of sessions on the interface has no
effect on existing sessions, but prevents any new sessions from being created until the number of
session drops below the new limit.
Options
number Maximum number of L2TP sessions allowed for the interface. A value of 0 prevents the
interface from being considered.
• Default: 64,000
Release Information
RELATED DOCUMENTATION
Limiting the Number of L2TP Sessions Allowed by the LAC or LNS | 198
L2TP Session Limits and Load Balancing for Service Interfaces | 278
Configuring an L2TP LAC | 167
Configuring an L2TP LNS with Inline Service Interfaces | 254
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
L2TP for Subscriber Access Overview | 134
layer2-liveness-detection (Receive)
IN THIS SECTION
Syntax | 677
Description | 678
Syntax
layer2-liveness-detection;
678
Hierarchy Level
Description
Enable a DHCP client host to determine the state of the DHCPv4 or DHCPv6 client session from the
perspective of a router acting as a broadband network gateway (BNG). This statement causes the BNG
to conduct a host connectivity check on its directly connected DHCPv4 and DHCPv6 clients when it
receives ARP or Neighbor Discovery (ND) packets.
When the BNG receives either of these packets, it does the following:
1. Checks whether Layer 2 liveness detection for subscriber management is enabled globally for the
relevant address family, inet or inet6.
2. If liveness detection is not enabled, then the BNG responds as usual to the received packets without
checking the state of the client session.
If liveness detection is enabled for the family, then the BNG checks whether the client session is still
in the bound state.
3. If the client session is bound, the BNG responds to the client with the appropriate ARP or ND packet.
If the session is not bound, the BNG drops the received packet. It does not send an ARP or ND
response packet to the host, enabling the host to determine that the BNG considers the session to
be down.
This behavior can be referred to as the receive functionality for BNG Layer 2 liveness detection, as
opposed to the send functionality configured with the layer2-liveness-detection (Send)
statement for DHCP relay or DHCP local server.
The usefulness of the receive functionality depends on the ability of the DHCP client host to reclaim
resources from the stale client based on the absence of a response packet from the BNG for an unbound
client session. If this capability requires a change in the client implementation, you may want to use the
send functionality.
679
Release Information
RELATED DOCUMENTATION
layer2-liveness-detection (Send)
IN THIS SECTION
Syntax | 680
Description | 680
Options | 681
Syntax
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval seconds;
}
Hierarchy Level
Description
Configure a router acting as a broadband network gateway (BNG) to conduct a host connectivity check
on its directly connected DHCPv4 and DHCPv6 clients to determine the validity and state of the DHCP
client session, and to clean up inactive sessions.
The BNG sends ARP or ND request packets to the each DHCP client at a configurable interval, then
waits for a response. If it receives a response from a client before the interval times out, it sends another
request to the client when the timer expires.
681
If the BNG does not receive a response before the interval times out, it sets the timer to 30 seconds and
sends another request. This is the first retry attempt.
If it receives a response from a client before the 30-second interval times out, it sends another request
to the client when the timer expires. If the 30-second timer expires before a response is received, the
BNG sets the timer to 10 seconds and sends another request. This is the second retry attempt. If the
BNG does not receive a response within this interval it resets the timer to 10 seconds and sends another
request. The BNG continues to send requests at 10-second intervals until it either receives a response
from the client before the interval times out or exhausts the number of retry attempts.
The first retry attempt uses a 30-second interval. Subsequent retries occur at 10-second intervals. The
number of possible 10-second retries is therefore the total number of retries minus 1. For example, if
you configure 5 retries, there is one 30-second retry and up to four 10-second retries.
If the BNG attempts all the retries and never receives a response from a client within the interval, the
client session is declared to be down.
NOTE: The only option to the failure-action statement supported by Layer 2 liveness
detection is clear-binding.
Options
max-consecutive- Maximum number of consecutive times that the router sends an ARP request
retries number packet in the absence of an ARP response packet.
• Default: 3 retries
transmit-interval Initial interval that the router waits for an ARP response after sending an ARP
seconds request packet to the client or waits for an ND response packet after sending an
NG request packet to the client.
Release Information
RELATED DOCUMENTATION
lcp-renegotiation
IN THIS SECTION
Syntax | 682
Description | 683
Syntax
lcp-renegotiation;
683
Hierarchy Level
Description
Configure the L2TP network server (LNS) so it renegotiates the link control protocol (LCP) with the PPP
client. When LCP renegotiation is disabled, LNS uses the pre-negotiated LCP parameters between the
L2TP access concentrator (LAC) and PPP client to set up the session. When LCP renegotiation is
enabled, authentication is also renegotiated.
NOTE: This statement is not supported at the [edit access group-profile l2tp] hierarchy level for
L2TP LNS on MX Series routers.
Release Information
RELATED DOCUMENTATION
liveness-detection
IN THIS SECTION
Syntax | 684
Description | 685
Syntax
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
685
}
}
Hierarchy Level
Description
Configure bidirectional failure detection timers and authentication criteria for static routes.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 686
Description | 687
Options | 687
Syntax
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
687
Hierarchy Level
Description
Configure local authentication for terminated PPP subscribers. This enables the external RADIUS server
to pass implementation-specific configuration for successfully authenticated subscribers. Local
authentication enables the same dynamic profile to support both CPEs that do not negotiate
authentication protocols and CPEs that use PAP or CHAP authentication.
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
interface
Release Information
RELATED DOCUMENTATION
Configuring Local Authentication in Dynamic Profiles for Static Terminated IPv4 PPP Subscribers |
107
688
IN THIS SECTION
Syntax | 688
Description | 688
Options | 689
Syntax
local-gateway {
address address;
gateway-name gateway-name;
}
Hierarchy Level
Description
Specify the IP address or name for the local (LNS) gateway for L2TP tunnel.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
689
Options
address—Local IP address; corresponds to the IP address that is used by LACs to identify the LNS. When
the LAC is an MX Series router, this address matches the remote gateway address configured in the LAC
tunnel profile.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 690
Description | 690
Options | 690
690
Syntax
lockout-timeout seconds;
Hierarchy Level
Description
Set the duration of the timeout period for which all future destinations are locked out, meaning that
they are not considered for selection when a new tunnel is created. Destinations are locked out when
L2TP cannot connect to the destination during the tunnel selection process. This statement does not
affect destinations that are currently locked out.
NOTE: The ip-address option for the destination statement does not apply to the lockout-
timeout statement.
Options
seconds Length of the period during which the destination is locked out.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 692
Description | 692
Options | 692
Syntax
logical-system logical-system-name;
Hierarchy Level
Description
Specify a logical system for a tunnel. When you specify a logical system, you must also specify a routing
instance.
Options
Release Information
RELATED DOCUMENTATION
mac
IN THIS SECTION
Syntax | 693
Description | 693
Options | 694
Syntax
mac mac-address;
Hierarchy Level
Description
Use this statement at the [edit interfaces ... ps0] hierarchy level to configure the MAC address for a
pseudowire logical device that is used for subscriber interfaces over point-to-point MPLS pseudowires.
Options
mac-address—MAC address. Specify the MAC address as six hexadecimal bytes in one of the following
formats: nnnn.nnnn.nnnn or nn:nn:nn:nn:nn:nn. For example, 0000.5e00.5355 or 00:00:5e:00:53:55.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 695
Description | 695
695
Options | 695
Syntax
mac-address address;
Hierarchy Level
Description
Dynamically configure the MAC address variable for an access-internal route for unnumbered interfaces
such as DHCP subscriber interfaces.
Options
address—Either the specific MAC address you want to assign to the access-internal route or the MAC
address variable ($junos-subscriber-mac-address). The MAC address variable is dynamically replaced
with the value supplied by DHCP when a subscriber logs in.
696
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 697
Description | 697
Options | 697
Syntax
match-direction direction
Hierarchy Level
Description
Configure the direction in which the IP reassembly rule matching is applied. The match direction is used
with respect to the traffic flow through the inline services interface. You must configure a match
direction for an IP reassembly rule.
Options
direction Match direction. For inline IP reassembly, input is the only match direction supported.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
maximum-sessions (L2TP)
IN THIS SECTION
Syntax | 698
Description | 699
Options | 699
Syntax
maximum-sessions number;
Hierarchy Level
Description
Specify the maximum number of L2TP sessions for the chassis, all tunnels, a tunnel group, a session limit
group, or a client.
Options
• Range: (Chassis, tunnel group, session limit group, or client) 1 through the default maximum chassis
limit
Release Information
RELATED DOCUMENTATION
Limiting the Number of L2TP Sessions Allowed by the LAC or LNS | 198
Configuring an L2TP LAC | 167
Configuring an L2TP LNS with Inline Service Interfaces | 254
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
700
maximum-sessions-per-tunnel
IN THIS SECTION
Syntax | 700
Description | 700
Options | 701
Syntax
maximum-sessions-per-tunnel number;
Hierarchy Level
Description
NOTE: This statement is not supported at the [edit access group-profile l2tp] hierarchy level for
L2TP LNS on MX Series routers.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 702
Description | 702
Options | 703
Syntax
max-sessions number;
Hierarchy Level
Description
Options
number—Maximum number of sessions allowed in the tunnel. A value of 0 means that the maximum
configurable number of sessions is allowed.
• Default: 0
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 704
Description | 704
Default | 704
Options | 704
704
Syntax
medium type;
Hierarchy Level
Description
Default
ipv4
Options
type—Medium type for the tunnel. The only value currently available is ipv4.
705
Release Information
RELATED DOCUMENTATION
method
IN THIS SECTION
Syntax | 705
Description | 707
Syntax
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
706
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode (automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
Hierarchy Level
Description
NOTE: The "bfd" on page 465 stanza is not available at the [edit forwarding-options dhcp-relay
dual-stack-group dual-stack-group-name liveness-detection method] or [edit system services
dhcp-local-server dual-stack-group dual-stack-group-name liveness-detection hierarchy
levels.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 708
Description | 708
Options | 709
Syntax
metric route-cost;
Hierarchy Level
Description
Options
route-cost—Either the specific cost you want to assign to the access route or either of the following cost
variables:
Release Information
RELATED DOCUMENTATION
minimum-interval
IN THIS SECTION
Syntax | 710
Description | 711
Options | 711
Syntax
minimum-interval milliseconds;
Hierarchy Level
Description
Configure the minimum intervals at which the local routing device transmits hello packets and then
expects to receive a reply from a neighbor with which it has established a BFD session. This value
represents the minimum interval at which the local routing device transmits hello packets as well as the
minimum interval that the routing device expects to receive a reply from a neighbor with which it has
established a BFD session. Optionally, instead of using this statement, you can specify the minimum
transmit and receive intervals separately using the transmit-interval minimal-interval and minimum-
receive-interval statements.
Options
milliseconds — Specify the minimum interval value for BFD liveliness detection.
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
minimum-receive-interval
IN THIS SECTION
Syntax | 712
Description | 713
Options | 713
Syntax
minimum-receive-interval milliseconds;
Hierarchy Level
Description
Configure the minimum interval at which the local routing device (or switch) must receive a reply from a
neighbor with which it has established a BFD session.
Options
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
IN THIS SECTION
Syntax | 714
Description | 715
Options | 715
Syntax
minimum-retransmission-timeout seconds;
Hierarchy Level
Description
Configure the minimum (initial) interval that the LAC or the LNS waits for a response after transmitting
an L2TP control message to a peer. If no response has been received by the time the period expires, the
message is retransmitted. The timeout period is doubled for each retransmission until the maximum of
16 seconds is reached.
Options
• Range: 1, 2, 4, 8, or 16 seconds
• Default: 1
Release Information
RELATED DOCUMENTATION
mtu
IN THIS SECTION
Syntax | 716
Description | 717
Options | 719
Syntax
mtu bytes;
Hierarchy Level
Description
Specify the maximum transmission unit (MTU) size for the media or protocol. The default MTU size
depends on the device type. Changing the media MTU or protocol MTU causes an interface to be
deleted and added again.
To route jumbo data packets on an integrated routing and bridging (IRB) interface or routed VLAN
interface (RVI) on EX Series switches, you must configure the jumbo MTU size on the member physical
interfaces of the VLAN that you have associated with the IRB interface or RVI, as well as on the IRB
interface or RVI itself (the interface named irb or vlan, respectively).
CAUTION: For EX Series switches, setting or deleting the jumbo MTU size on an IRB
interface or RVI while the switch is transmitting packets might cause packets to be
dropped.
NOTE: The MTU for an IRB interface is calculated by removing the Ethernet header overhead
[6(DMAC)+6(SMAC)+2(EtherType)]. Because, the MTU is the lower value of the MTU configured
on the IRB interface and the MTU configured on the IRB’s associated bridge domain IFDs or IFLs,
the IRB MTU is calculated as follows:
718
• In case of Layer 2 IFL configured with the flexible-vlan-tagging statement, the IRB MTU is
calculated by including 8 bytes overhead (SVLAN+CVLAN).
• In case of Layer 2 IFL configured with the vlan-tagging statement, the IRB MTU is calculated
by including a single VLAN 4 bytes overhead.
NOTE:
• If a packet whose size is larger than the configured MTU size is received on the receiving
interface, the packet is eventually dropped. The value considered for MRU (maximum receive
unit) size is also the same as the MTU size configured on that interface.
• Not all devices allow you to set an MTU value, and some devices have restrictions on the
range of allowable MTU values. You cannot configure an MTU for management Ethernet
interfaces (fxp0, em0, or me0) or for loopback, multilink, and multicast tunnel devices.
• On ACX Series routers, you can configure the protocol MTU by including the mtu statement
at the [edit interfaces interface-name unit logical-unit-number family inet] or [edit interfaces
interface-name unit logical-unit-number family inet6] hierarchy level.
• If you configure the protocol MTU at any of these hierarchy levels, the configured value is
applied to all families that are configured on the logical interface.
• If you are configuring the protocol MTU for both inet and inet6 families on the same
logical interface, you must configure the same value for both the families. It is not
recommended to configure different MTU size values for inet and inet6 families that are
configured on the same logical interface.
• Starting in Release 14.2, MTU for IRB interfaces is calculated by removing the Ethernet
header overhead (6(DMAC)+6(SMAC)+2(EtherType)), and the MTU is a minimum of the two
values:
• Configured MTU
• For Layer 2 logical interfaces configured with vlan-tagging, IRB MTU is calculated by
including single VLAN 4 bytes overhead.
NOTE: Changing the Layer 2 logical interface option from vlan-tagging to flexible-
vlan-tagging or vice versa adjusts the logical interface MTU by 4 bytes with the
existing MTU size. As a result, the Layer 2 logical interface is deleted and re-added,
and the IRB MTU is re-computed appropriately.
For more information about configuring MTU for specific interfaces and router or switch combinations,
see Configuring the Media MTU.
Options
bytes—MTU size.
• Range: 256 through 9192 bytes, 256 through 9216 (EX Series switch interfaces), 256 through 9500
bytes (Junos OS 12.1X48R2 for PTX Series routers), 256 through 9500 bytes (Junos OS 16.1R1 for
MX Series routers)
NOTE: Starting in Junos OS Release 16.1R1, the MTU size for a media or protocol is
increased from 9192 to 9500 for Ethernet interfaces on the following MX Series MPCs:
• MPC1
• MPC2
• MPC2E
• MPC3E
• MPC4E
• MPC5E
• MPC6E
• Default: 1500 bytes (INET, INET6, and ISO families), 1448 bytes (MPLS), 1514 bytes (EX Series
switch interfaces)
720
Release Information
Support for Layer 2 VPNs and VPLS introduced in Junos OS Release 10.4.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Support at the[set interfaces interface-name unit logical-unit-number family ccc] hierarchy level
introduced in Junos OS Release 12.3R3 for MX Series routers.
RELATED DOCUMENTATION
multiplier
IN THIS SECTION
Syntax | 721
Description | 721
Options | 721
Syntax
multiplier number;
Hierarchy Level
Description
Configure the number of hello packets not received by the neighbor before Bidirectional Forwarding
Detection (BFD) declares the neighbor down.
Options
• Default: 3
722
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
IN THIS SECTION
Syntax | 723
Description | 723
Options | 723
Syntax
name destination-name {
drain;
}
Hierarchy Level
Description
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 724
Description | 725
Options | 725
Syntax
name name {
address ip-address {
drain;
routing-instance routing-instance-name {
drain;
}
}
drain;
}
Hierarchy Level
Description
Specify the local name and other attributes of the L2TP tunnel.
Options
name —Locally assigned name of the tunnel; in the format destination-name/tunnel-name or tunnel-
name.
NOTE: When only the tunnel name is provided, then you must identify the destination for the
tunnel by including the address ip-address statement at the [edit services l2tp tunnel name
name] hierarchy level.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
no-adaptation
IN THIS SECTION
Syntax | 726
Description | 727
Syntax
no-adaptation;
Hierarchy Level
Description
Configure Bidirectional Forwarding Detection (BFD) sessions to not adapt to changing network
conditions.
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
IN THIS SECTION
Syntax | 728
Description | 728
Syntax
nas-port-method cisco-avp;
Hierarchy Level
Description
Globally configure the LAC to interoperate with Cisco LNS devices by including the Cisco NAS Port Info
AVP (100) in the ICRQ to the LNS. This AVP conveys the physical NAS port number identifier and the
type of the physical port, such as Ethernet or ATM.
NOTE: This global configuration can be overridden by the configuration in a tunnel profile or by
the RADIUS configuration.
Release Information
RELATED DOCUMENTATION
Globally Configuring the LAC to Interoperate with Cisco LNS Devices | 172
Configuring a Tunnel Profile for Subscriber Access | 202
LAC Interoperation with Third-Party LNS Devices | 171
IN THIS SECTION
Syntax | 729
Description | 730
Syntax
nas-port-method cisco-avp;
Hierarchy Level
Description
Configure the LAC to interoperate with Cisco LNS devices by including the Cisco NAS Port Info AVP
(100) in the ICRQ to the LNS. This AVP conveys the physical NAS port number identifier and the type of
the physical port, such as Ethernet or ATM.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 731
Description | 731
Options | 731
Syntax
next-hop next-hop;
Hierarchy Level
Description
Dynamically configure the next-hop address for an access route. Access routes are typically unnumbered
interfaces.
The next-hop gateway can be specified explicitly in the framed route, as either the subscriber’s fixed
address (common for business subscribers) or 0.0.0.0. Alternatively, the absence of the gateway address
implies address 0.0.0.0. The address 0.0.0.0, whether implicit or explicitly configured, resolves to the
subscriber’s assigned address (host route).
If the RADIUS Framed-Route attribute (22) or Framed-IPv6-Route attribute [99] does not specify the
next-hop gateway—as is common—the variable representing the next-hop automatically resolves to the
subscriber’s IP address.
Options
next-hop—Either the specific next-hop address you want to assign to the access route or one of the
following next-hop address predefined variables.
• For IPv4 access routes, use the variable, $junos-framed-route-nexthop. The route prefix variable is
dynamically replaced with the value in Framed-Route RADIUS attribute [22].
732
• For IPv6 access routes, use the variable, $junos-framed-route-ipv6-nexthop. The variable is
dynamically replaced with the value in Framed-IPv6-Route RADIUS attribute [99].
Release Information
RELATED DOCUMENTATION
next-hop-service
IN THIS SECTION
Syntax | 733
Description | 733
Options | 733
Syntax
next-hop-service {
inside-service-interface interface-name.unit-number;
outside-service-interface interface-name.unit-number;
outside-service-interface-type interface-type;
service-interface-pool name;
}
Hierarchy Level
Description
Specify interface names or a service interface pool for the forwarding next-hop service set. You cannot
specify both a service interface pool and an inside or outside interface.
Options
service-interface-pool name—Name of the pool of logical interfaces configured at the [edit services
service-interface-pools pool pool-name] hierarchy level. You can configure a service interface pool
only if the service set has a PGCP rule configured. The service set cannot contain any other type of rule.
734
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
no-allow-snooped-clients
IN THIS SECTION
Syntax | 735
Description | 735
Syntax
no-allow-snooped-clients;
Hierarchy Level
Description
Use the statement at the [edit ... dhcpv6] hierarchy levels to explicitly disable snooping support for
DHCPv6 relay agent.
NOTE: In Junos OS Release 10.0 and earlier, DHCP snooping is enabled by default. In Release
10.1 and later, DHCP snooping is disabled by default.
Release Information
Support at the [edit ... dhcpv6] hierarchy levels introduced in Junos OS Release 12.1.
RELATED DOCUMENTATION
no-gratuitous-arp-request
IN THIS SECTION
Syntax | 736
Description | 737
Default | 737
Syntax
no-gratuitous-arp-request;
737
Hierarchy Level
Description
For Ethernet interfaces and pseudowire logical interfaces, do not respond to gratuitous ARP requests.
Default
Release Information
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 738
Description | 738
Syntax
no-snoop;
Hierarchy Level
Description
DHCP snooping provides DHCP security by identifying incoming DHCP packets. In the default DHCP
snooping configuration, all traffic is snooped. You can optionally use the forward-snooped-clients
statement to evaluate the snooped traffic and to determine if the traffic is forwarded or dropped, based
on whether or not the interface is configured as part of a group.
In both the default configuration and in configurations using the forward-snooped-clients statement, all
DHCP traffic is forwarded from the hardware control plane to the routing plane of the routing instance
to ensure that all DHCP packets are intercepted. In certain topologies, such as a Metropolitan Routing
Ring topology, forwarding all DHCP traffic to the control plane can result in excessive traffic. The no-
snoop configuration statement disables the snooping filter for DHCP traffic that can be directly
forwarded on the hardware control plane, such as Layer 3 unicast packets with a valid route, causing
those DHCP packets to bypass the slower routing plane.
Release Information
RELATED DOCUMENTATION
on-demand-ip-address
IN THIS SECTION
Syntax | 740
Description | 740
Default | 741
Syntax
on-demand-ip-address;
Hierarchy Level
Description
For IPv4 and IPv6 dual-stack PPP subscribers, enables on-demand allocation and de-allocation of an
IPv4 address after initial PPP authentication for a subscriber who does not have an existing IPv4
address.
741
• When you change this setting for a dynamic PPP interface (at the [edit dynamic-profiles] hierarchy
level), the change takes effect only for new subscriber logins.
• When you change this setting for a static PPP interface (at the [edit interfaces pp0] hierarchy level,
the subscribers on the interface are logged out.
• When you change this setting globally (at the [edit protocols ppp-service] hierarchy level), the change
takes effect only for new subscriber logins.
If you enable on-demand allocation at both the interface and global levels, the global configuration takes
precedence and changes take effect for new subscriber logins.
Default
Release Information
RELATED DOCUMENTATION
Conserving IPv4 Addresses for Dual-Stack PPP Subscribers Using On-Demand IPv4 Address
Allocation
Configuring Static On-Demand IPv4 Address Allocation for Dual-Stack PPP Subscribers
Configuring Dynamic On-Demand IPv4 Address Allocation for Dual-Stack PPP Subscribers
Configuring Global On-Demand IPv4 Address Allocation for Dual-Stack PPP Subscribers
742
IN THIS SECTION
Syntax | 742
Description | 744
Options | 744
Syntax
options {
accounting-session-id-format (decimal | description);
calling-station-id-delimiter delimiter-character;
calling-station-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
chap-challenge-in-request-authenticator;
client-accounting-algorithm (direct | round-robin);
client-authentication-algorithm (direct | round-robin);
coa-dynamic-variable-validation;
ethernet-port-type-virtual;
interface-description-format {
exclude-adapter;
exclude-channel;
exclude-sub-interface;
}
ip-address-change-notify message;
juniper-access-line-attributes;
nas-identifier identifier-value;
743
nas-port-extended-format {
adapter-width width;
ae-width width;
port-width width;
slot-width width;
stacked-vlan-width width;
vlan-width width;
atm {
adapter-width width;
port-width width;
pw-width width;
slot-width width;
vci-width width;
vpi-width width;
}
}
nas-port-id-delimiter delimiter-character;
nas-port-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
order {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
postpend-vlan-tags;
}
postpend-vlan-tags;
}
nas-port-type {
ethernet {
port-type;
}
}
override {
calling-station-id remote-circuit-id;
nas-ip-address tunnel-client-gateway-address;
nas-port tunnel-client-nas-port;
nas-port-type tunnel-client-nas-port-type;
744
}
remote-circuit-id-delimiter;
remote-circuit-id-fallback;
remote-circuit-id-format {
agent-circuit-id;
agent-remote-id;
}
revert-interval interval;
service-activation {
dynamic-profile (optional-at-login | required-at-login);
extensible-service (optional-at-login | required-at-login);
}
vlan-nas-port-stacked-format;
}
Hierarchy Level
Description
Options
accounting- (EX Series, MX Series only) Configure the format the router or switch uses to
session-id-format identify the accounting session. The default is decimal.
• Values:
calling-station-id- (MX Series, T Series only) Starting in Junos OS Release 13.1, specify the character
delimiter that the router uses as a separator between the concatenated values in the Calling-
Station-ID (RADIUS IETF attribute 31) string. The router uses the delimiter when
you configure more than one value in the calling-station-id-format statement. The
default is the hash (#) character.
• Values:
chap-challenge- (MX Series only) Starting in Junos OS Release 15.1, configure the authd process to
in-request- insert the random challenge generated by the NAS into the Request Authenticator
authenticator
field of Access-Request packets, if the challenge value is 16 bytes long. If you
enable the chap-challenge-in -request-authenticator statement and the random
challenge is not 16 bytes long, authd ignores the statement and uses the default
behavior, which inserts the random challenge as the CHAP-Challenge attribute
(RADIUS attribute 60) in Access-Request packets.
client- (EX Series, MX Series only) Starting in Junos OS Release 13.2X50-D10 for EX Series
accounting- switches, configure the access method the router uses to access RADIUS
algorithm
accounting servers. The default is the direct option.
• Values:
client- (EX Series, M Series, MX Series only) Starting in Junos OS Release 13.2X50-D10 for
authentication- EX Series switches, configure the method that the authenticator uses to access
algorithm
RADIUS authentication servers when there are multiple servers configured. Initially,
a RADIUS client sends a request to a RADIUS authentication or accounting server.
The router or switch, acting as the authenticator, waits for a response from the
server before sending another request.
When there are multiple RADIUS server connections configured for a client, the
authenticator attempts to reach the different servers in the order that they are
configured. If there is no response from the first RADIUS server, the authenticator
attempts to reach the next RADIUS server. This process repeats until the client is
either granted access or there are no more configured servers.
If the direct method is configured, the authenticator always treats the first server in
the list as the primary server. The authenticator moves on to the second server only
if the attempt to reach the first server fails. If the round-robin method is configured,
746
the server chosen first will be rotated based on which server was used last. The first
server in the list is treated as a primary for the first authentication request, but for
the second request, the second server configured is treated as primary, and so on.
With this method, all of the configured servers receive roughly the same number of
requests on average so that no single server has to handle all of the requests.
NOTE: The round-robin access method is not recommended for use with EX
Series switches.
• Values:
• direct—Use the direct access method. The authenticator contacts the first
RADIUS server on the list for each request, the second server if the first one
fails, and so on.
coa-dynamic- (EX Series, M Series, MX Series only) Starting in Junos OS Release 13.2X50-D10 for
variable- EX Series switches, specify that when a CoA operation includes a change to a client
validation
profile dynamic variable that cannot be applied (such as an update to a non-existent
filter), the router does not apply any changes to client profile dynamic variables in
the request, and responds with a NACK message.
• Default: If you do not configure this statement, the router does not apply any
incorrect variable updates, but does make any other changes to the client profile
dynamic variables, and responds with an ACK message.
ethernet-port- (EX Series, M Series, MX Series only) Specify the physical port type the router or
type-virtual switch uses to authenticate clients. The router or switch passes a port type of
ethernet in RADIUS attribute 61 (NAS-Port-Type) by default. This statement
specifies a port type of virtual.
access-loop-id- Specify that the Agent-Remote-Id and Agent-Circuit-Id are generated locally when
local these values are not present in the client database.
747
ip-address- (MX Series only) Starting in Junos OS Release 13.1, for on-demand address
change-notify allocation for dual-stack PPP subscribers, specify that the BNG includes the IPv4-
Release-Control VSA (26–164) in the Access-Request that is sent during on-demand
IP address allocation and in the Interim-Accounting messages that are sent to report
an address change. The configuration of this statement has no effect when on-
demand IP address allocation or deallocation is not configured.
Optionally, configure a message that is included in the VSA when it is sent to the
RADIUS server.
• Range: Up to 32 characters.
juniper-access- Configure AAA to add Juniper Networks access line VSAs to the RADIUS
line-attributes authentication and accounting request messages for subscribers. If the router has
not received and processed the corresponding ANCP attributes from the access
node, then AAA provides only the following in these RADIUS messages:
• Default: The Juniper Networks access line VSAs are not added to the RADIUS
authentication and accounting request messages. However, the DSL Forum VSA
—if available—is added to RADIUS messages by default.
nas-identifier (EX Series, MX Series, SRX Series only) Configure the value for the client RADIUS
attribute 32 (NAS-Identifier). This attribute is used for authentication and
accounting requests. This statement was introduced in Junos OS Release 15.1X49-
D110 for SRX300, SRX320, SRX340, SRX345, and SRX550M Series devices.
nas-port-id- (MX Series only) Starting in Junos OS Release 11.4, specify the character that the
delimiter router uses as a separator between the concatenated values in the NAS-Port-ID
string. The router uses the delimiter when you configure more than one value in the
nas-port-id-format statement. The default is the hash (#) character. This statement
was introduced in Junos OS Release 13.2X50-D10 for EX Series switches.
remote-circuit-id- (MX Series only) Starting in Junos OS Release 13.3R1 on MX Series, configure a
delimiter delimiter character for the remote circuit ID string when you use the remote-circuit-
id-format statement to configure the string to use instead of the Calling-Station ID
in L2TP Calling Number AVP 22. If more than one value is configured for the remote
circuit ID format, the delimiter character is used as a separator between the
concatenated values in the resulting remote circuit ID string. The default is the hash
(#) character.
remote-circuit-id- (MX Series only) Starting in Junos OS Release 13.3R1 on MX Series, configure the
fallback fallback value for the LAC to send in L2TP Calling Number AVP 22, either the
configured Calling-Station-ID or the default underlying interface. Use of the fallback
value is triggered when the components of the override string you configured with
the remote-circuit-id-format statement—the ACI, the ARI, or both ACI and ARI—are
not received by the LAC in the PPPoE Active Discovery Request (PADR) packet.
• Values:
remote-circuit-id- (MX Series only) Starting in Junos OS Release 13.3R1 on MX Series, configure the
format format of the string that overrides the Calling-Station-ID format in the Calling
Number AVP 22 sent by the LAC to the LNS in the ICRQ packet when an L2TP
session is being established. You can specify the ACI, the ARI, or both the ACI and
ARI. This statement enables you to decouple the AVP 22 value from the RADIUS
Calling-Station-ID attribute (31); the values for AVP 22 and the Calling-Station-ID
attribute are the same when you use the calling-station-id-format statement to
configure AVP 22.
• Values:
service-activation (MX Series only) Starting in Junos OS Release 16.2, specify whether subscribers are
allowed to log in even when service activation failures related to configuration
750
errors occur during family activation request processing by authd for a newly
authenticated subscriber. Configuration errors include missing or incorrect syntax,
missing or incomplete references to dynamic profiles, and missing or incomplete
variables.
You can enable separate configurations for subscriber login services for two service-
activation types: dynamic-profile and extensible-service. You configure the
dynamic-profile type services in the dynamic profile at the [edit dynamic-profiles]
hierarchy level; the profile is used to provide dynamic subscriber access and services
for broadband applications. The extensible-service type is for business services
configured in an operation script and provisioned by the Extensible Subscriber
Services Manager daemon (essmd).
• Default:
• Values:
vlan-nas-port- (MX Series only) Configure RADIUS attribute 5 (NAS-Port) to include the S-VLAN
stacked-format ID, in addition to the VLAN ID, for subscribers on Ethernet interfaces.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
751
Release Information
nas-identifier introduced in Junos OS Release 15.1X49-D110 for SRX300, SRX320, SRX340, SRX345,
and SRX550M Series devices.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 752
Description | 752
Options | 753
Syntax
override {
calling-station-id remote-circuit-id;
nas-ip-address tunnel-client-gateway-address;
nas-port tunnel-client-nas-port;
nas-port-type tunnel-client-nas-port-type;
}
Hierarchy Level
Description
Options
calling-station- Override the Calling-Station-ID format for the string that the LAC sends to the LNS in
id remote- the Calling Number AVP 22. AVP 22 is included in the incoming-call request (ICRQ)
circuit-id
packet when the L2TP session is being established.
If you have configured the calling-station-id-format statement, the LAC sends AVP 22
in a different format that can include other information in addition to the ACI or ARI.
In this case, the LNS sends the value of AVP 22 to the RADIUS server as the Calling-
Station-ID attribute (31).
If you do not want the AVP 22 value to be used as the Calling-Station-ID attribute (31)
for some subscribers, you can override that format in the access profile by including
the calling-station-id remote-circuit-id override option. You must also configure the
new format to be used with the remote-circuit-id-format statement; you can specify:
the ACI, ARI, or both the ACI and ARI received from the PADR packet.
nas-ip-address Check the SDB to determine whether the session’s LAC endpoint IP address is
tunnel-client- available. If so, use that value in the RADIUS NAS-IP-Address attribute (4). The LNS
gateway-
address subsequently sends the attribute to the RADIUS server in Access-Request and
accounting messages. If the value is not present, the attribute is not sent.
nas-port Check the SDB to determine whether the LAC NAS port information is conveyed to
tunnel-client- the LNS in the Cisco Systems NAS Port Info AVP (100). If so, use that value in the
nas-port
RADIUS NAS-Port attribute (5). The LNS subsequently sends the attribute to the
RADIUS server in Access-Request and accounting messages. If the value is not
present, the LNS sends its local IP address.
nas-port-type Check the SDB to determine whether the LAC NAS port information is conveyed to
tunnel-client- the LNS in the Cisco Systems NAS Port Info AVP (100). If so, override the value of the
nas-port-type
RADIUS NAS-Port-Type attribute (61) at the LNS with that value. Otherwise, use the
original NAS-Port-Type in attribute 61.
Release Information
RELATED DOCUMENTATION
Override the Calling-Station-ID Format for the Calling Number AVP | 246
RADIUS Servers and Parameters for Subscriber Access
IN THIS SECTION
Syntax | 754
Description | 755
Syntax
overrides {
allow-no-end-option;
allow-snooped-clients;
always-write-giaddr;
always-write-option-82;
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
755
Hierarchy Level
Description
Override the default configuration settings for the extended DHCP relay agent. Specifying the overrides
statement with no subordinate statements removes all DHCP relay agent overrides at that hierarchy
level. Use the statement at the [edit ... dhcpv6] hierarchy levels to configure DHCPv6 support.
756
The following statements are supported at both the [edit ... dhcp-relay] and [edit ... dhcpv6] hierarchy
levels.
• allow-snooped-clients
• asymmetric-lease-time
• delete-binding-on-renegotiation
• dual-stack
• interface-client-limit
• no-allow-snooped-clients
• no-bind-on-request
• relay-source
• send-release-on-delete
The following statements are supported at the [edit ... dhcpv6] hierarchy levels only.
• asymmetric-prefix-lease-time
All other statements are supported at the [edit ... dhcp-relay] hierarchy levels only.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
Support at the [edit ... dhcpv6] hierarchy levels introduced in Junos OS Release 11.4.
757
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 757
Description | 758
Options | 758
Syntax
overrides {
event {
catastrophic-failure {
reboot (master | standby);
}
}
interfaces {
family (inet | inet6) {
layer2-liveness-detection;
ipoe-dynamic-arp-enable;
receive-gratuitous-arp;
}
}
no-unsolicited-ra;
ra-initial-interval-max seconds;
ra-initial-interval-min seconds;
758
shmlog {
disable;
file filename <files maximum-no-files> <size maximum-file-size>;
filtering enable;
log-name {
all;
logname {
<brief | detail | extensive | none | terse>;
<file-logging |no-file-logging>;
}
}
log-type (debug | info | notice);
|
}
Hierarchy Level
Description
Override the default configuration settings for the Junos OS enhanced subscriber management software
for subscriber management.
Options
ra-initial- Specify the high end of the range from which the router randomly selects an interval
interval-max for sending the first three unsolicited IPv6 router advertisement messages. You must
seconds
also configure the ra-initial-interval-min option.
• Range: 1 through 16
759
ra-initial- Specify the low end of the range from which the router randomly selects an interval for
interval-min sending the first three unsolicited IPv6 router advertisement messages. You must also
seconds
configure the ra-initial-interval-max option.
• Range: 1 through 16
ipoe-dynamic- Enable dynamic ARP to resolve the MAC address for IPv4 framed host (32-bit) routes.
arp-enable By default the framed route is permanently associated with the source MAC address
received in the packet that triggered creation of the dynamic VLAN.
receive- Enable the router to compare the source MAC address received in a gratuitous ARP
gratuitous-arp request or reply packet with the value in the ARP cache. The router updates the cache
with the received MAC address when it determines this address is different from the
cache entry.
This situation occurs when an IPv4 address is moved to a different device. The device
broadcasts a gratuitous ARP reply packet with its MAC address as the source MAC
address. When the receive-gratuitous-arp option is configured, the router compares
the MAC addresses and updates the cache to associate the IPv4 address with the new
MAC address.
If the receive-gratuitous-arp option is not configured, the router does not accept the
gratuitous ARP request or reply packet and cannot quickly learn about the new
address. Instead, the original dynamic ARP entry in the cache eventually times out.
Before deleting the entry, the router sends an ARP request for the target IP address.
The client responds with the new MAC address. This delay in learning about the new
address means there is a period during which the MAC address in the ARP cache does
not match the address in the new device’s NIC.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
pap
IN THIS SECTION
Syntax | 761
Description | 761
Syntax
pap {
access-profile name;
default-pap-password password;
local-name name;
local-password password;
passive;
}
Hierarchy Level
Description
Configure the Password Authentication Protocol (PAP). Use PAP authentication as a means to provide a
simple method for the peer to establish its identity using a two-way handshake. This is done only upon
initial link establishment.
After the link is established, an ID and password pair is repeatedly sent by the peer to the authenticator
until authentication is acknowledged or the connection is terminated.
BEST PRACTICE: On inline service (si) interfaces for L2TP, only the pap statement itself is
typically used for subscriber management. We recommend that you leave the subordinate
statements at their default values.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
762
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 763
Description | 763
Syntax
pap;
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
pap (L2TP)
IN THIS SECTION
Syntax | 764
Description | 764
Syntax
pap;
Hierarchy Level
Description
(MX Series routers only) Specify PAP authentication for PPP subscribers in an L2TP LNS user group
profile.
765
Release Information
RELATED DOCUMENTATION
Applying PPP Attributes to L2TP LNS Subscribers with a User Group Profile | 259
IN THIS SECTION
Syntax | 765
Description | 766
Default | 766
Options | 766
Syntax
Hierarchy Level
Description
Specify the direction in which a subscriber login string is parsed to identify the first delimiter that
matches one configured with the "delimiter" on page 482 statement. When subscriber username
stripping is configured in a subscriber access profile, the characters to the right of the identified
delimiter are stripped and discarded along with the delimiter. characters become the new, modified
username.
Default
left-to-right
Options
left-to- Parse the subscriber login string from left to right up to the delimiter.
right
For example, when the direction is left-to-right, the characters /@$%# are configured as the
delimiters, and the login string is [email protected]$84, the @ is reached before the $, so
the username is modified to drgt21.
right-to- Parse the subscriber login string from right to left up to the delimiter.
left
For example, when the direction is right-to-left, the characters /@$%# are configured as the
delimiters, and the login string is [email protected]$84, the $ is reached before the @, so
the username is modified to [email protected].
767
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 768
Description | 768
Options | 769
Syntax
pic pic-number {
ce1 {
e1 port-number {
channel-group group-number timeslots slot-number;
}
}
ct3 {
port port-number {
t1 link-number {
channel-group group-number timeslots slot-number;
}
}
}
framing (sdh | sonet);
idle-cell format {
itu-t;
payload-pattern payload-pattern-byte;
}
inline-services {
bandwidth (1g | 10g);
}
max-queues-per-interface (8 | 4);
no-concatenate;
}
Hierarchy Level
Description
Options
• Range: 0 through 3
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 770
770
Description | 770
Options | 770
Syntax
pool pool-name {
interface service-interface-name;
}
Hierarchy Level
Description
Define a pool of service interfaces that can be assigned to an L2TP tunnel group for traffic load-
balancing. The interfaces in the pool must be inline service interfaces (si). The service device pool is
required for dynamic LNS sessions.
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
771
Release Information
RELATED DOCUMENTATION
Configuring a Pool of Inline Services Interfaces for Dynamic LNS Sessions | 309
IN THIS SECTION
Syntax | 771
Description | 773
Syntax
pp0 {
unit logical-unit-number {
keepalives interval seconds;
772
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
}
output filter-name {
precedence precedence;
}
773
}
}
}
}
Hierarchy Level
Description
Configure the dynamic PPPoE logical interface in a dynamic profile. When the router creates a dynamic
PPPoE logical interface on an underlying Ethernet interface configured with PPPoE (ppp-over-ether)
encapsulation, it uses the information in the dynamic profile to determine the properties of the dynamic
PPPoE logical interface.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 774
Description | 775
Options | 775
Syntax
ppp {
cell-overhead;
encapsulation-overhead bytes;
framed-pool framed-pool;
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
ppp-options {
aaa-options aaa-options-name;
chap;
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru;
mtu;
pap;
peer-ip-address-optional;
775
}
primary-dns primary-dns;
primary-wins primary-wins;
secondary-dns secondary-dns;
secondary-wins secondary-wins;
}
Hierarchy Level
Description
Options
cell-overhead (M Series, MX Series, PTX Series, T Series only) Configure the session to use
Asynchronous Transfer Mode (ATM)-aware egress shaping on the IQ2 PIC.
encapsulation- (MX Series, T Series only) Configure the encapsulation overhead for class-of-service
overhead calculations.
framed-pool (M Series, MX Series, PTX Series, T Series only) Configure the address pool.
idle-timeout (EX4600, M Series, MX Series, OCX1100, PTX Series, QFX Series, T Series only)
Configure the idle timeout for a user. Starting in Junos OS Release 11.1, this
statement is available on the QFX Series. Starting in Junos OS Release 14.1X53-
D20, this statement is available on OCX Series switches.The router might consider
a PPP session to be idle because of the following reasons:
776
• Values: seconds—Number of seconds a user can remain idle before the session is
terminated.
• Default: 0
interface-id (M Series, MX Series, PTX Series, T Series only) Configure the interface identifier.
interface-id
• Values: interface-id—Identifier for the interface representing a Layer 2 Tunneling
Protocol (L2TP) session configured at the [edit interfaces interface-name unit
local-unit-number dial-options] hierarchy level. For more information about the
interface ID, see Services Interface Naming Overview.
keepalive (M Series, MX Series, PTX Series, T Series only) Configure the keepalive interval for
an L2TP tunnel.
• Values: seconds—Time period that must elapse before the Junos OS checks the
status of the Point-to-Point Protocol (PPP) session by sending an echo request
to the peer.
• Default: 30 seconds
primary-dns (EX Series, SRX Series only) Configure the primary Domain Name System (DNS)
server.
primary-wins (M Series, MX Series, PTX Series, T Series only) Configure the primary Windows
Internet name server.
secondary-wins (M Series, MX Series, PTX Series, SRX Series, T Series only) Configure the
secondary Windows Internet name server.
Release Information
Statement idle-timeout introduced in Junos OS Release 11.1 for the QFX Series.
Statement idle-timeout introduced in Junos OS Release 14.1X53-D20 for OCX Series switches.
RELATED DOCUMENTATION
ppp-options
IN THIS SECTION
Syntax | 778
778
Description | 779
Syntax
ppp-options {
authentication [ authentication-protocols ];
mru size;
mtu (size | use-lower-layer);
chap {
access-profile name;
challenge-length minimum minimum-length maximum maximum-length;
default-chap-secret name;
local-name name;
passive;
}
compression {
acfc;
pfc;
}
dynamic-profile profile-name;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
lcp-max-conf-req number
lcp-restart-timer milliseconds;
loopback-clear-timer seconds;
ncp-max-conf-req number
ncp-restart-timer milliseconds;
on-demand-ip-address
pap {
access-profile name;
default-pap-password password;
local-name name;
local-password password;
passive;
779
}
}
Hierarchy Level
Description
For ATM2 IQ interfaces only, you can configure CHAP on the logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
BEST PRACTICE: On inline service (si) interfaces for L2TP, only the chap and pap statements are
typically used for subscriber management. We recommend that you leave the other statements
subordinate to ppp-options—including those subordinate to chap and pap—at their default
values.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 780
Description | 781
Options | 782
Syntax
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
781
ipcp-suggest-dns-option;
lcp-connection-update;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
Hierarchy Level
Description
NOTE: PPP options can also be configured in a group profile with the ppp-options (L2TP)
statement. The following behavior determines the interaction between the PPP options
configured in a group profile and the PPP options configured in a dynamic profile:
782
• When PPP options are configured only in the group profile, the group profile options are
applied to the subscriber.
• When PPP options are configured in both a group profile and a dynamic profile, the dynamic
profile configuration takes complete precedence over the group profile when the dynamic
profile includes one or more of the PPP options that can be configured in the group profile.
Complete precedence means that there is no merging of options between the profiles. The
group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
Options
• At least the first address family has been successfully negotiated and the session is
active.
Otherwise PPP takes no action on the VSA. If you do not enable the lcp-connection-
update option, PPP processes the notification from authd, but takes no action.
• Default: Disabled
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
ppp-options (L2TP)
IN THIS SECTION
Syntax | 784
Description | 784
Syntax
ppp-options {
aaa-options aaa-options-name;
chap;
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru;
mtu;
pap;
peer-ip-address-optional;
}
Hierarchy Level
Description
Configure PPP-specific properties in a group profile that applies to tunneled PPP subscribers at the LNS.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
NOTE: PPP options can also be configured for an inline service interface within a dynamic profile
with the ppp-options (Dynamic PPP) statement. The following behavior determines the
interaction between the PPP options configured in a group profile and the PPP options
configured in a dynamic profile:
• When PPP options are configured only in the group profile, the group profile options are
applied to the subscriber.
785
• When PPP options are configured in both the dynamic profile and the group profile, the group
profile options are applied to the subscriber only when the dynamic profile PPP options do
not include any of the following attributes: "aaa-options" on page 409, "chap" on page 474,
"ipcp-suggest-dns-option" on page 656, mru, mtu, "pap" on page 762, and peer-ip-address-
optional. When any of these attributes is present, the dynamic profile is applied to the
subscriber.
When PPP options are configured in both a group profile and a dynamic profile, the dynamic
profile configuration takes complete precedence over the group profile when the dynamic
profile includes one or more of the PPP options that can be configured in the group profile.
Complete precedence means that there is no merging of options between the profiles. The
group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 786
Description | 786
Options | 787
Syntax
preference route-distance;
Hierarchy Level
Description
Options
route-distance—Either the specific distance you want to assign to the access route or either of the
following distance variables:
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 788
Description | 788
Options | 789
Syntax
preference number;
Hierarchy Level
Description
Specify the preference for a tunnel. You can specify up to 8 levels of preference, and you can assign the
same preference to a maximum of 31 tunnels. When you define multiple preferences for a destination,
you increase the probability of a successful connection.
Options
number—Number that indicates the order in which the router attempts to connect to the destination.
Zero is the highest level of preference.
• Default: 2000
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 790
Description | 790
Options | 790
Syntax
primary-interface interface-name;
Hierarchy Level
Description
Specify the primary (active) inline services member link in the asi bundle. You must also configure a
secondary (backup) member link on a different MPC with the secondary-interface statement. The
secondary member provides 1:1 redundancy for subscriber service sessions on the primary member link.
The bandwidth configured at the [edit chassis fpc slot pic number inline-services bandwidth] hierarchy
level must be the same for both member links.
Redundancy is not achievable if you configure the primary and secondary interface on the same MPC,
because both member interfaces go down if the card goes down. Consequently, if you configure both
interfaces on the same MPC, the subsequent configuration commit fails.
Options
Release Information
RELATED DOCUMENTATION
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
Configuring an L2TP LNS with Inline Service Interfaces | 254
profile (Access)
IN THIS SECTION
Syntax | 791
Description | 798
Options | 798
Syntax
profile profile-name {
accounting {
792
address-change-immediate-update
accounting-stop-on-access-deny;
accounting-stop-on-failure;
ancp-speed-change-immediate-update;
coa-immediate-update;
coa-no-override service-class-attribute;
duplication;
duplication-filter;
duplication-vrf {
access-profile-name profile-name;
vrf-name vrf-name;
}
immediate-update;
order [ accounting-method ];
send-acct-status-on-config-change;
statistics (time | volume-time);
update-interval minutes;
wait-for-acct-on-ack;
}
accounting-order (radius | [accounting-order-data-list]);
authentication-order [ authentication-methods ];
client client-name {
chap-secret chap-secret;
group-profile profile-name;
ike {
allowed-proxy-pair {
remote remote-proxy-address local local-proxy-address;
}
pre-shared-key (ascii-text character-string | hexadecimal
hexadecimal-digits);
ike-policy policy-name;
interface-id string-value;
}
l2tp {
aaa-access-profile profile-name;
interface-id interface-id;
lcp-renegotiation;
local-chap;
maximum-sessions number;
maximum-sessions-per-tunnel number;
multilink {
drop-timeout milliseconds;
fragment-threshold bytes;
793
}
override-result-code session-out-of-resource;
ppp-authentication (chap | pap);
ppp-profile profile-name;
service-profile profile-name(parameter)&profile-name;
sessions-limit-group limit-group-name;
shared-secret shared-secret;
}
pap-password pap-password;
ppp {
cell-overhead;
encapsulation-overhead bytes;
framed-ip-address ip-address;
framed-pool framed-pool;
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
primary-dns primary-dns;
primary-wins primary-wins;
secondary-dns secondary-dns;
secondary-wins secondary-wins;
}
user-group-profile profile-name;
}
domain-name-server;
domain-name-server-inet;
domain-name-server-inet6;
local {
flat-file-profile profile-name;
}
preauthentication-order preauthentication-method;
provisioning-order (gx-plus | jsrc | pcrf);
radius {
accounting-server [ ip-address ];
attributes {
exclude {
attribute-name packet-type;
standard-attribute number {
packet-type [ access-request | accounting-off | accounting-
on | accounting-start | accounting-stop ];
}
vendor-id id-number {
vendor-attribute vsa-number {
794
juniper-access-line-attributes;
nas-identifier identifier-value;
nas-port-extended-format {
adapter-width width;
ae-width width;
port-width width;
pw-width width;
slot-width width;
stacked-vlan-width width;
vlan-width width;
atm {
adapter-width width;
port-width width:
slot-width width;
vci-width width:
vpi-width width;
}
}
nas-port-id-delimiter delimiter-character;
nas-port-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
order {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
postpend-vlan-tags;
}
postpend-vlan-tags;
}
nas-port-type {
ethernet {
port-type;
}
}
override {
calling-station-id remote-circuit-id;
nas-ip-address tunnel-client-gateway-address;
796
nas-port tunnel-client-nas-port;
nas-port-type tunnel-client-nas-port-type;
}
remote-circuit-id-delimiter;
remote-circuit-id-fallback {
remote-circuit-id-format;
agent-circuit-id;
agent-remote-id;
}
revert-interval interval;
service-activation {
dynamic-profile (optional-at-login | required-at-login);
extensible-service (optional-at-login | required-at-login);
}
vlan-nas-port-stacked-format;
}
preauthentication-server ip-address;
}
radius-server server-address {
accounting-port port-number;
accounting-retry number;
accounting-timeout seconds;
dynamic-request-port
port port-number;
preauthentication-port port-number;
preauthentication-secret password;
retry attempts;
routing-instance routing-instance-name;
secret password;
max-outstanding-requests value;
source-address source-address;
timeout seconds;
}
service {
accounting {
statistics (time | volume-time);
update-interval minutes;
}
accounting-order (activation-protocol | local | radius);
}
session-limit-per-username number;
session-options {
client-idle-timeout minutes;
797
client-idle-timeout-ingress-only;
client-session-timeoutminutes;
pcc-context {
input-service-filter-name filter-name;
input-service-set-name service-set-name;
ipv6-input-service-filter-name filter-name;
ipv6-input-service-set-name service-set-name;
ipv6-output-service-filter-name filter-name;
ipv6-output-service-set-name service-set-name;
output-service-filter-name filter-name;
output-service-set-name service-set-name;
profile-name pcef-profile-name;
}
strip-user-name {
delimiter [ delimiter ];
parse-direction (left-to-right | right-to-left);
}
}
subscriber username {
delegated-pool delegated-pool-name;
framed-ip-address ipv4-address;
framed-ipv6-pool ipv6-pool-name;
framed-pool ipv4-pool-name;
password password;
target-logical-system logical-system-name <target-routing-instance
(default | routing-instance-name>;
target-routing-instance (default | routing-instance-name);
}
}
Hierarchy Level
[edit access]
798
Description
Configure a subscriber access profile that includes subscriber access, L2TP, or PPP properties.
Options
For CHAP, the name serves as the mapping between peer identifiers and CHAP secret keys. This entity
is queried for the secret key whenever a CHAP challenge or response is received.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
proxy-mode
IN THIS SECTION
Syntax | 799
Description | 800
Syntax
proxy-mode;
Hierarchy Level
Description
Enable DHCP relay proxy mode on the extended DHCP relay. Proxy mode supports all extended DHCP
relay functionality.
You cannot configure both the DHCP relay proxy and the extended DHCP local server on the same
interface.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 801
Description | 801
Syntax
ps0 {
anchor-point lt-device;
mtu bytes;
mac mac-address;
no-gratuitous-arp-request;
(flexible-vlan-tagging | stacked-vlan-tagging | untagged | vlan-tagging);
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 803
Description | 803
Syntax
pseudowire-service {
device-count number;
}
Hierarchy Level
[edit chassis]
Description
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 804
Description | 805
Options | 805
Syntax
qualified-next-hop interface-name {
mac-address address;
}
Hierarchy Level
Description
Dynamically configure the qualified next-hop and the MAC address for an access-internal route for
DHCP and PPP subscriber interfaces.
Options
interface-name—Either the specific interface you want to assign to the access route or the variable, or
the $junos-interface-name variable. The variable is dynamically replaced with the value supplied by
DHCP or PPP when a subscriber logs in.
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 806
Description | 809
Options | 809
Syntax
radius {
accounting-server [ ip-address ];
attributes {
exclude
attribute-name packet-type;
standard-attribute number {
packet-type [ access-request | accounting-off | accounting-on |
accounting-start | accounting-stop ];
}
vendor-id id-number {
vendor-attribute vsa-number {
packet-type [ access-request | accounting-off | accounting-
on | accounting-start | accounting-stop ];
}
}
}
ignore {
807
dynamic-iflset-name;
framed-ip-netmask;
idle-timeout;
input-filter;
logical-system-routing-instance;
output-filter;
session-timeout;
standard-attribute number;
vendor-id id-number {
vendor-attribute vsa-number;
}
}
}
authentication-server [ ip-address ];
options {
accounting-session-id-format (decimal | description);
calling-station-id-delimiter delimiter-character;
calling-station-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
chap-challenge-in-request-authenticator;
client-accounting-algorithm (direct | round-robin);
client-authentication-algorithm (direct | round-robin);
coa-dynamic-variable-validation;
ethernet-port-type-virtual;
interface-description-format {
exclude-adapter;
exclude-channel;
exclude-sub-interface;
}
ip-address-change-notify message;
juniper-access-line-attributes;
nas-identifier identifier-value;
nas-port-extended-format {
adapter-width width;
ae-width width;
port-width width;
slot-width width;
stacked-vlan-width width;
vlan-width width;
808
atm {
adapter-width width;
port-width width:
slot-width width;
vci-width width:
vpi-width width;
}
}
nas-port-id-delimiter delimiter-character;
nas-port-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
order {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
nas-identifier;
postpend-vlan-tags;
}
postpend-vlan-tags;
}
nas-port-type {
ethernet {
port-type;
}
}
override {
calling-station-id remote-circuit-id;
nas-ip-address tunnel-client-gateway-address;
nas-port tunnel-client-nas-port;
nas-port-type tunnel-client-nas-port-type;
}
remote-circuit-id-delimiter;
remote-circuit-id-fallback;
remote-circuit-id-format {
agent-circuit-id;
agent-remote-id;
}
revert-interval interval;
809
service-activation {
dynamic-profile (optional-at-login | required-at-login);
extensible-service (optional-at-login | required-at-login);
}
vlan-nas-port-stacked-format;
}
preauthentication-server ip-address;
}
Hierarchy Level
Description
Configure the RADIUS parameters that the router uses for AAA authentication and accounting for
subscribers.
Options
accounting-server (MX Series only) Specify a list of the RADIUS accounting servers used for
accounting for DHCP, L2TP, and PPP clients.
authentication- (SRX Series only) Specify a list of the RADIUS authentication servers used to
server authenticate DHCP, L2TP, and PPP clients. The servers in the list are also used as
RADIUS dynamic-request servers, from which the router accepts and processes
RADIUS disconnect requests, CoA requests, and dynamic service activations and
deactivations.
preauthentication- (MX Series only) Starting in Junos OS Release 13.3, specify the RADIUS
server preauthentication server, which is used for the LLID service.
810
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
reject-unauthorized-ipv6cp
IN THIS SECTION
Syntax | 811
811
Description | 811
Default | 811
Syntax
reject-unauthorized-ipv6cp;
Hierarchy Level
Description
Configure the router to reject any IPv6 Control Protocol (IPv6CP) negotiation messages on dynamic
interfaces when no appropriate IPv6 address or prefix has been received from AAA. IPv6CP negotiation
attempts are also rejected when only a Framed-IPv6-Prefix attribute is received but router
advertisement is not enabled in the dynamic profile.
NOTE: IPv6CP negotiation messages are not rejected for static interfaces.
Default
IPv6CP negotiation is allowed regardless of the presence of IPv6 attributes received from AAA.
812
Release Information
RELATED DOCUMENTATION
relay-option-82
IN THIS SECTION
Syntax | 812
Description | 814
Syntax
relay-option-82 {
circuit-id {
include-irb-and-l2;
keep-incoming-circuit-id ;
813
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-vlan-id;
}
remote-id {
include-irb-and-l2;
keep-incoming-remote-id ;
no-vlan-interface-name;
prefix prefix;
use-interface-description (logical | device);
use-vlan-id;
}
server-id-override
vendor-specific{
host-name;
location;
}
}
Hierarchy Level
Description
Enable or disable the insertion of the DHCP relay agent information option (option 82) in DHCP packets
destined for a DHCP server.
To enable insertion of option 82 information in DHCP packets, you must specify at least one of the
circuit-id or remote-id statements.
You can use the relay-option-82 statement and its subordinate statements at the [edit forwarding-
options dhcp-relay] hierarchy level to control insertion of option 82 information globally, or at the [edit
forwarding-options dhcp-relay group group-name] hierarchy level to control insertion of option 82
information for a named group of interfaces.
To restore the default behavior (option 82 information is not inserted into DHCP packets), use the
delete relay-option-82 statement.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 815
Description | 815
Syntax
remote-gateway {
address server-ip-address;
gateway-name server-name;
}
Hierarchy Level
Description
Specify the IP address and hostname of the remote gateway at the L2TP tunnel endpoint, the LNS.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
816
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 817
Description | 817
Options | 817
Syntax
report-ingress-shaping-rate bps;
Hierarchy Level
Description
Report the ingress shaping rate in bits per second that is used as the receive speed (Rx) for the LAC to
send to the LNS. The ingress shaping rate is used when the method for deriving the connect speed is
configured as service-profile with the tx-connect-speed statement at the [edit services l2tp] hierarchy
level.
NOTE: This statement is supported only when the effective shaping-rate statement is included
at the [edit chassis] hierarchy level. If it is not, the subscriber login fails and a system log message
is generated. There is no commit check failure because a commit check cannot be performed at
run time.
Options
Release Information
RELATED DOCUMENTATION
Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS | 237
Transmission of Tx and Rx Connection Speeds from LAC to LNS | 226
Guidelines for Configuring Dynamic CoS for Subscriber Access
Applying a Classifier to a Subscriber Interface in a Dynamic Profile
IN THIS SECTION
Syntax | 819
Description | 819
Options | 819
Syntax
Description
Remove the specified destination from the destination lockout list immediately, before its lockout period
expires. As a result, the L2TP process can again consider the destination during the selection of new
tunnels.
Options
view
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
retransmission-count-established (L2TP)
IN THIS SECTION
Syntax | 820
Description | 821
Options | 821
Syntax
retransmission-count-established count;
821
Hierarchy Level
Description
Set the maximum number of times control messages are retransmitted for established tunnels.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, unconfigure the statement by issuing no services l2tp tunnel retransmission-count-
established.
Options
count—Number of retransmissions.
• Range: 2 through 30
• Default: 7
Release Information
RELATED DOCUMENTATION
retransmission-count-not-established (L2TP)
IN THIS SECTION
Syntax | 822
Description | 823
Options | 823
Syntax
retransmission-count-not-established count;
Hierarchy Level
Description
Set the maximum number of times control messages are retransmitted for tunnels that are not
established.
BEST PRACTICE: Before you downgrade to a Junos OS Release that does not support this
statement, unconfigure the statement by issuing no services l2tp tunnel retransmission-count-
not-established.
Options
count—Number or retransmissions.
• Range: 2 through 30
• Default: 5
Release Information
RELATED DOCUMENTATION
route (Access)
IN THIS SECTION
Syntax | 824
Description | 825
Options | 825
Syntax
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
Hierarchy Level
Description
Options
prefix—Either the specific route prefix that you want to assign to the access route or one of the
following route prefix variables.
• For IPv4 access routes, use the variable, $junos-framed-route-ip-address-prefix. The route prefix
variable is dynamically replaced with the value in Framed-Route RADIUS attribute [22].
• For IPv6 access routes, use the variable, $junos-framed-route-ipv6-address-prefix. The variable is
dynamically replaced with the value in Framed-IPv6-Route RADIUS attribute [99]. When you use this
variable, you must configure it at either of the following hierarchy levels:
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 826
Description | 827
Options | 827
Syntax
route subscriber-ip-address {
next-hop next-hop;
qualified-next-hop underlying-interface {
mac-address address;
}
}
Hierarchy Level
Description
Options
subscriber-ip-address—Either the specific IP address you want to assign to the access-internal route or
the subscriber IP address variable ($junos-subscriber-ip-address). The subscriber IP address variable is
dynamically replaced with the value supplied by DHCP or PPP when a subscriber logs in.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 828
Description | 829
Options | 829
Syntax
Hierarchy Level
Description
Configure the jdhcpd process to suppress the installation of access, access-internal, or destination
routes during client binding.
NOTE: You cannot suppress access-internal routes when the subscriber is configured with both
IA_NA and IA_PD addresses over IP demux interfaces—the IA_PD route relies on the IA_NA
route for next hop connectivity.
Options
access (DHCPv6 only) Suppress installation of access routes. You can use the access and
access-internal options in the same statement for DHCPv6.
destination (DHCPv4 only) Suppress installation of destination routes. This option and the access-
internal option are mutually exclusive; however, the access-internal option also
suppresses destination routes.
Release Information
RELATED DOCUMENTATION
Preventing DHCP from Installing Access, Access-Internal, and Destination Routes by Default
IN THIS SECTION
Syntax | 830
Description | 830
Options | 831
Syntax
routing-instance routing-instance-name;
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 832
Description | 832
Options | 832
Syntax
routing-instance routing-instance-name {
drain;
}
Hierarchy Level
Description
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 833
Description | 834
Options | 834
Syntax
routing-instance routing-instance-name {
drain;
}
Hierarchy Level
Description
Specify the routing instance in which the tunnel to the destination address is created.
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 835
Description | 836
Options | 837
Syntax
routing-instances routing-instance-name {
interface interface-name;
multicast-snooping-options {
}
routing-options {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
836
interface interface-name {
no-qos-adjust;
}
}
rib routing-table-name {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
}
Hierarchy Level
[edit dynamic-profiles]
[edit logical-systems logical-system-name ]
Description
Dynamically configure an additional routing entity for a router in a dynamic client profile or a dynamic
service profile.
837
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
Support at the logical-systems hierarchy level was introduced in Junos OS Release 14.2.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 838
Description | 839
838
Syntax
routing-options {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
rib routing-table-name {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
839
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 840
Description | 841
Options | 841
Syntax
rule rule-name {
match-direction direction;
}
Hierarchy Level
Description
Configure an IP reassembly rule, which is used for inline IP reassembly on the inline services interface.
The IP reassembly rule can be attached to a service set to indicate that the service set is of type IP
reassembly. For inline IP reassembly, each rule must include the match-direction statement, which
specifies the direction in which the match is applied.
NOTE: If you configure an IP reassembly rule, then you must configure the match-direction
statement.
NOTE: To create more than one IP reassembly rule, include the rule statement multiple times.
Options
• Range: Up to 63 characters
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
842
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 842
Description | 842
Syntax
rx-connect-speed-when-equal
Hierarchy Level
Description
Enable sending the receive connect speed, which is represented by AVP 38, even when its value is equal
to that of the transmit connect speed, which is represented by AVP 24. By default, AVP 38 is sent from
843
the LAC to the LNS during the establishment of an L2TP tunnel session, only when its value is different
from AVP 24. You can override the default setting with this configuration statement.
Release Information
RELATED DOCUMENTATION
Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS | 237
Transmission of the Receive Connect Speed AVP When Transmit and Receive Connect Speeds are
Equal | 236
rx-window-size (L2TP)
IN THIS SECTION
Syntax | 844
Description | 844
Options | 844
Syntax
rx-window-size packets;
Hierarchy Level
Description
Options
packets—Number of packets that a peer can transmit without receiving an acknowledgment from the
router. By default, this value is set to 4 packets. If the receive window size is configured to its default
value, the router does not send the Receive Window Size AVP (AVP 10) in the first tunnel negotiation
packet that is sent to its peer.
• Default: 4
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 845
Description | 846
Options | 846
Syntax
secondary-interface interface-name;
846
Hierarchy Level
Description
Specify the secondary (backup) inline services member link in the asi bundle. You must also configure a
primary (active) member link on a different MPC with the primary-interface statement. The secondary
member provides 1:1 redundancy for subscriber service sessions on the primary member link. The
bandwidth configured at the [edit chassis fpc slot pic number inline-services bandwidth] hierarchy level
must be the same for both member links.
Redundancy is not achievable if you configure the primary and secondary interface on the same MPC,
because both member interfaces go down if the card goes down. Consequently, if you configure both
interfaces on the same MPC, the subsequent configuration commit fails.
Options
Release Information
RELATED DOCUMENTATION
Configuring 1:1 LNS Stateful Redundancy on Aggregated Inline Service Interfaces | 271
Configuring an L2TP LNS with Inline Service Interfaces | 254
IN THIS SECTION
Syntax | 847
Description | 847
Options | 848
Syntax
secret password;
Hierarchy Level
Description
Options
password—Cleartext password.
Release Information
RELATED DOCUMENTATION
service-device-pool (L2TP)
IN THIS SECTION
Syntax | 849
Description | 849
Options | 849
Syntax
service-device-pool pool-name;
Hierarchy Level
Description
Assign a pool of service interfaces to the tunnel group to balance traffic across.
NOTE: The service interface configuration is required for static LNS sessions. Either the service
interface configuration or the service device pool configuration can be used for dynamic LNS
sessions.
Options
Release Information
RELATED DOCUMENTATION
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
IN THIS SECTION
Syntax | 850
Description | 851
Options | 851
Syntax
service-device-pools {
pool pool-name {
interface service-interface-name;
}
}
851
Hierarchy Level
[edit services]
Description
Configure one or more pools of service interfaces that can be assigned to an L2TP tunnel group for
traffic load-balancing. The interfaces in the pool must be inline service interfaces (si). The service device
pool is required for dynamic LNS sessions.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Configuring a Pool of Inline Services Interfaces for Dynamic LNS Sessions | 309
852
IN THIS SECTION
Syntax | 852
Description | 852
Options | 853
Syntax
service-interface interface-name;
Hierarchy Level
Description
NOTE: On MX Series routers, the service interface configuration is required for static LNS
sessions. Either the service interface configuration or the service device pool configuration can
be used for dynamic LNS sessions.
853
Options
interface- Name of the service interface. The ae, si, and sp interface types are supported as follows:
name
• asix—(MPCs on MX Series routers) Aggregated inline services interface.
Release Information
RELATED DOCUMENTATION
service-profile (L2TP)
IN THIS SECTION
Syntax | 854
Description | 854
Options | 855
Syntax
service-profile profile-name(parameter)&profile-name;
Hierarchy Level
Description
Configure one or more dynamic service profiles to be applied to subscriber sessions at activation for all
subscribers in the specified tunnel group or on the specified LAC. Services are typically applied to L2TP
sessions with RADIUS VSAs or CoA requests. In multivendor environments, you might use only standard
attributes to simplify management of multiple vendor VSAs. This statement enables you to apply
services without using an external authority such as RADIUS. The locally configured list of services
(service profiles) serves as local authorization that is applied by authd during client session activation.
855
This list of services is subject to the same validation and processing as services originating from an
external authority, such as RADIUS.
You can optionally specify parameters that are passed to the corresponding service when it is activated
for the session. The parameter might override values configured in the profile itself, such as a
downstream shaping rate for a CoS service. This enables you to use the same service profile for multiple
situations with different requirements, or to modify a previously applied value for a service.
You can still use RADIUS VSAs or CoA requests together with the service profiles. If services are sourced
from an external authority as authorization during authentication or during subscriber session
provisioning (activation), the services from the external authority take strict priority over those in the
local configuration. If a service applied with RADIUS is the same as a service applied with a service
profile in the CLI, but with different parameters, the RADIUS service is applied with a new session ID
and takes precedence over the earlier service profile.
When service profiles are configured on a LAC client and on a tunnel group that uses that LAC client,
the LAC configuration overrides the tunnel group configuration. Only the service profile configured on
the LAC client is applied to subscribers in the tunnel group.
Options
profile-name Name of a dynamic service profile that defines a service to be applied to L2TP subscriber
sessions. You can specify one or more service profiles, separated by an ampersand (&).
parameter (Optional) Value to be passed to the service when it is activated on the subscriber
session.
Release Information
RELATED DOCUMENTATION
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
Configuring an L2TP Access Profile on the LNS | 261
service-rate-limiter (Access)
IN THIS SECTION
Syntax | 856
Description | 857
Options | 857
Syntax
service-rate-limiter {
rx-multiplier rx-multiplier;
service-name service-profile-name;
tx-multiplier tx-multiplier;
}
Hierarchy Level
[edit access]
857
Description
Specify a dynamic service profile that provides rates for upstream and downstream traffic that the LAC
communicates to the LNS. When the Juniper Networks Activate-Service VSA (26-65) is received in the
RADIUS Access-Accept message at subscriber login, the VSA is evaluated to determine whether the
configured name is also conveyed in the VSA. If it is, the rate values are collected and stored in the
session database for the subscriber and then sent in the ICCN message to the LNS. You can either
define the rate values as defaults in the service profile or configure them to be passed by RADIUS in
VSA 26-65. When they are passed by the VSA, the first value is taken as the receive speed (the
upstream rate from the subscriber to the LAC) and the second value is taken as the transmit speed (the
downstream rate from the LAC to the subscriber).
The multipliers convert the rates from Kbps to bps, which is required for the AVPs. You can also use the
multiplier options to adjust the rates up or down. The adjusted values correspond to the Juniper
Networks RADIUS VSAs, Rx-Connect-Speed (26-163) and Tx-Connect-Speed (26-162). These values are
stored as such in the session database (SDB). Because the values are available in the SDB before the
L2TP connection is negotiated, the LAC includes them in the ICCN message as AVP 38 (Rx connect
speed) and AVP 24 (Tx connect speed). The rate values are treated as RADIUS-sourced values and
consequently have the highest precedence among multiple sources.
Options
rx-multiplier (Optional) Multiplier applied to convert the Rx connect speed value Kbps to bps and
optionally adjust the rate up or down.
• Default: 1000
service-profile- Name of the dynamic service profile conveyed in VSA 26-65 that specifies upstream
name and downstream traffic rates.
tx-multiplier (Optional) Multiplier applied to convert the Tx connect speed value Kbps to bps and
optionally adjust the rate up or down.
• Default: 1000
Release Information
RELATED DOCUMENTATION
session-mode
IN THIS SECTION
Syntax | 859
Description | 859
Options | 859
Syntax
Hierarchy Level
Description
Options
• Default: automatic
automatic Configure single-hop BFD sessions if the peer is directly connected to the router interface
and multihop BFD sessions if the peer is not directly connected to the router interface.
single-hop Configure single hop BFD sessions and non-passive DHCP clients.
860
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
session-options
IN THIS SECTION
Syntax | 860
Description | 861
Options | 862
Syntax
session-options {
client-group [ group-names ];
861
client-idle-timeout minutes;
client-idle-timeout-ingress-only;
client-session-timeoutminutes;
pcc-context {
input-service-filter-name filter-name;
input-service-set-name service-set-name;
ipv6-input-service-filter-name filter-name;
ipv6-input-service-set-name service-set-name;
ipv6-output-service-filter-name filter-name;
ipv6-output-service-set-name service-set-name;
output-service-filter-name filter-name;
output-service-set-name service-set-name;
profile-name pcef-profile-name;
}
strip-user-name {
delimiter [ delimiter ];
parse-direction (left-to-right | right-to-left);
}
}
Hierarchy Level
Description
(MX Series and SRX Series devices) Define options to place limits on subscriber access based on how
long the session has been up, how long the user has been inactive, or both.
(MX Series) Define options to modify a subscriber username at login based on the subscriber’s access
profile.
(MX Series) Specify characteristics related to policy and charging control (PCC) rules, such as the PCEF
profile that contains the rules, service sets to process the rules, and service filters for the service sets.
862
Options
client- (MX Series only) Specify the grace period that begins after an authenticated user
idle- terminates all sessions and connections. Authentication is not required if a new connection
timeout
is initiated during the grace period by the same user.
During this period, the router determines whether the subscriber is inactive by monitoring
data traffic, both upstream from the user (ingress) and downstream to the user (egress).
Control traffic is ignored. The subscriber is not considered idle as long as data traffic is
detected in either direction. When no traffic is detected for the duration of the idle time
out, non-DHCP subscribers (such as L2TP or PPP) are gracefully logged out, similarly to a
RADIUS-initiated disconnect or a CLI-initiated logout; DHCP subscribers are disconnected.
Client idle timeouts are most often used for residential services rather than business
services. The most practical use case for this timeout is in a PPP access model. It is not
practical for DHCP or DHCPv6 subscribers.
Although you can use the client-idle-timeout statement for dynamically configured
subscriber VLANs, this configuration is useful only in limited circumstances (such as IP over
Ethernet without DHCP and with fixed addresses) and is not typically used. If you do use
the idle timeout for VLANs, the timeout period starts when the VLAN is instantiated. It
resets when a client session is created or an existing session is reactivated. When no traffic
is detected on an authenticated VLAN for the duration of the timeout, the VLAN is
considered inactive and is deleted. If no client sessions are ever created on the VLAN, then
the VLAN is removed when the timeout expires.
• Values: minutes—Number of minutes of idle time that elapse before the session is
terminated. The value that you specify must be determined locally with consideration of
the services and policies that you offer.
client- (MX Series only) Starting in Junos OS Release 16.2, specify that only ingress traffic is
idle- monitored for subscriber idle timeout processing for the duration of the idle timeout period
timeout-
ingress- that you specify with the client-idle-timeout statement. If no ingress traffic is received for
only the duration of the timeout, then the subscriber is gracefully logged out (non-DHCP
subscribers) or disconnected (DHCP subscribers).
863
If you configure client-idle-timeout alone, then both ingress and egress traffic are
monitored during the idle timeout. Monitoring only ingress traffic is useful in cases where
the LNS sends traffic to the remote peer even when the peer is not up, such as when the
LNS does not have PPP keepalives enabled and therefore does not detect that the peer is
not up. Because the LAC monitors both ingress and egress traffic by default, in this
situation it receives the egress traffic from the LNS and either does not log out the
subscriber or delays detection of inactivity until the egress traffic ceases. When you specify
that only ingress traffic is monitored in this case, the LAC can detect that the peer is
inactive and then initiate logout.
client- (SRX Series, vSRX only) Specify the amount of time after which user sessions are
session- terminated, regardless of user activity (also known as a forced or hard authentication
timeout
timeout).
Alternatively, when you want subscribers to be identified as inactive before they are
terminated, use the related statements, client-idle-timeout and client-idle-timeout-ingress-
only. Use client-idle-timeout alone to specify a period of time during which both ingress
and egress subscriber data traffic is monitored; if no traffic is detected for the duration of
the period, the subscriber is considered inactive and is terminated. Add the client-idle-
timeout-ingress-only statement to monitor only ingress traffic for the duration of the
timeout set with the client-idle-timeout statement.
BEST PRACTICE: We recommend that you do not configure a session timeout for
subscribers receiving voice services. Because the session timeout is a simple time-
based timeout, it is likely to interrupt subscribers actively using a voice service and
terminate their calls unexpectedly (from the subscriber viewpoint). This result is a
particular concern for emergency services calls.
Client session timeouts are most often used for residential services rather than business
services. The most practical use case for this timeout is in a PPP access model when no
voice services are offered. For DHCP or DHCPv6 subscribers, the session timeout is used
as the DHCP lease timer if no other lease time configuration is present.
Although you can use the client-session-timeout statement for dynamically configured
subscriber VLANs, this configuration is useful only in limited circumstances (such as IP over
Ethernet without DHCP and with fixed addresses) and is not typically used. If you do use
the session timeout for VLANs, the timeout period starts when the VLAN is instantiated.
• Values: minutes—Number of minutes after which user sessions are terminated. The
value that you specify must be determined locally with consideration of the services and
policies that you offer.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
sessions-limit-group (L2TP)
IN THIS SECTION
Syntax | 865
865
Description | 865
Options | 865
Syntax
sessions-limit-group limit-group-name {
maximum-sessions number;
}
Hierarchy Level
Description
Create a group of clients so that you can limit the number of L2TP sessions allowed for the client group.
You can create up to 200 groups.
Options
limit-group-name Identifier of the session-limit group for which the session limit is configured.
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
866
Release Information
RELATED DOCUMENTATION
Limiting the Number of L2TP Sessions Allowed by the LAC or LNS | 198
Configuring an L2TP LAC | 167
Configuring an L2TP LNS with Inline Service Interfaces | 254
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces | 297
L2TP for Subscriber Access Overview | 134
soft-gre
IN THIS SECTION
Syntax | 867
Description | 867
Options | 867
Syntax
soft-gre group-name {
destination-networks [prefix] {
dynamic-profile profile-name;
service-interface psn;
source-address wag-ip-address;
<tunnel-idle-timeout seconds>;
}
Hierarchy Level
[edit services]
Description
Configure the conditions for enabling dynamic-bridged generic routing encapsulation (GRE) tunnel
creation on the MX Series router Wi-Fi access gateway (WAG).
Options
destination- Use the specified IP subnets from which soft-GRE connection requests from the
networks [prefix] customer can be processed.
service-interface Use the specified pseudowire subscriber interface device (IFD) on which the
psn tunnels are built.
source-address Use the specified source IP address of the GRE tunnels for the WAG. This is the IP
wag-ip-address address on which incoming GRE traffic must be received by the MX Series router.
tunnel-idle- (Optional) Use the specified number of seconds that a GRE tunnel remains up after
timeout seconds the last subscriber session on the tunnel has ended. If set to 0, then no idle timeout
is set, and the tunnel remains up for an unlimited period of time.
• Default: 120
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 869
Description | 869
Syntax
source-gateway {
address client-ip-address;
gateway-name client-name;
}
Hierarchy Level
Description
Specify the IP address and hostname of the source gateway at the local L2TP tunnel endpoint, the LAC.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
870
Release Information
RELATED DOCUMENTATION
stacked-vlan-tagging
IN THIS SECTION
Syntax | 870
Description | 871
Syntax
stacked-vlan-tagging;
871
Hierarchy Level
Description
For Gigabit Ethernet IQ interfaces, Gigabit Ethernet, 10-Gigabit Ethernet LAN/WAN PIC, and 100-
Gigabit Ethernet Type 5 PIC with CFP, enable stacked VLAN tagging for all logical interfaces on the
physical interface.
For pseudowire subscriber interfaces, enable stacked VLAN tagging for logical interfaces on the
pseudowire service.
Release Information
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 872
Description | 872
Options | 873
Syntax
Hierarchy Level
Description
Configure the router or switch to collect time statistics, or both volume and time statistics, for the
sessions being managed by AAA.
873
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 874
Description | 874
Syntax
strip-user-name {
delimiter delimiter;
parse-direction (left-to-right | right-to-left);
}
Hierarchy Level
Description
Configure the details of username stripping for a subscriber access profile. This configuration determines
how a portion of a subscriber login string is identified and discarded, leaving the remainder for
subsequent use as a modified username by an external AAA server for session authentication and
accounting. For example, the modified username might appear in RADIUS Access-Request, Acct-Start,
and Acct-Stop messages, as well as RADIUS-initiated disconnect requests and change of authorization
(CoA) requests.
You can use the aaa-options aaa-options-name statement at the [edit access] hierarchy level to define
options that specify the LS:RI context for AAA authorization and configuration for a specific subscriber
or a set of subscribers, overriding any such configuration within a domain map.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 875
Description | 876
Options | 876
Syntax
subscriber-context subscriber-context-name;
876
Hierarchy Level
Description
Specify the logical-system:routing-instance (LS:RI) in which the subscriber interface is placed. For
example, this may correspond to the LAC-facing interface on the LNS that is accessed by all requests
from a subscriber residence.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 877
Description | 879
Syntax
subscriber-management {
enable;
enforce-strict-scale-limit-license;
gres-route-flush-delay;
}
overrides {
event {
catastrophic-failure {
reboot (master | standby);
}
}
interfaces {
family (inet | inet6) {
layer2-liveness-detection;
878
ipoe-dynamic-arp-enable;
receive-gratuitous-arp;
}
}
no-unsolicited-ra;
ra-initial-interval-max seconds;
ra-initial-interval-min seconds;
shmlog {
disable;
file filename <files maximum-no-files> <size maximum-file-size——–>;
filtering enable;
log-name {
all;
logname {
<brief | detail | extensive | none | terse>;
<file-logging |no-file-logging>;
}
}
log-type (debug | info | notice);
|
}
redundancy {
interface name {
local-inet-address v4-address;
local-inet6-address v6-address;
shared-key string;
virtual-inet-address virtual-v4-address;
virtual-inet6-address virtual-v6-address;
}
no-advertise-routes-on-backup;
protocol {
pseudo-wire;
vrrp;
}
}
traceoptions {
file filename <files number> <match regular-expression > <size maximum-
file-size> <world-readable | no-world-readable>;
flag flag;
}
}
879
Hierarchy Level
Description
Configure global services for subscriber management, such as maintaining subscribers, tracing
operations, and enabling enhanced subscriber management.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Configuring the Router to Maintain DHCP Subscribers During Interface Delete Events
Configuring Junos OS Enhanced Subscriber Management
DHCP Liveness Detection Using ARP and Neighbor Discovery Packets
Minimize Traffic Loss Due to Stale Route Removal After a Graceful Routing Engine Switchover | 34
How to Configure M:N Subscriber Redundancy with VRRP and DHCP Binding Synchronization
880
tag (Access)
IN THIS SECTION
Syntax | 880
Description | 880
Options | 881
Syntax
tag route-tag;
Hierarchy Level
Description
Options
route-tag—Either the specific tag you want to assign to the access route or either of the following tag
variables:
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 882
Description | 882
Options | 883
Syntax
tag2 route-tag2;
Hierarchy Level
Description
883
Options
route- One of the following values the specific tag2 value you want to assign to the access route or
tag2 the following predefined variable:
Release Information
RELATED DOCUMENTATION
threshold (detection-time)
IN THIS SECTION
Syntax | 884
884
Description | 885
Options | 885
Syntax
threshold milliseconds;
Hierarchy Level
Description
Specify the threshold for the adaptation of the detection time. When the BFD session detection time
adapts to a value equal to or greater than the threshold, a single trap and a single system log message
are sent.
NOTE: The threshold time must be greater than or equal to the minimum-interval or the
minimum-receive-interval.
Options
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
886
threshold (transmit-interval)
IN THIS SECTION
Syntax | 886
Description | 887
Options | 887
Syntax
threshold milliseconds;
Hierarchy Level
Description
Specify the threshold for detecting the adaptation of the transmit interval. When the BFD session
transmit interval adapts to a value greater than the threshold, a single trap and a single system message
are sent.
Options
NOTE: The threshold value specified in the threshold statement must be greater than the
value specified in the minimum-interval statement for the transmit-interval statement.
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
888
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
tos-reflect (L2TP)
IN THIS SECTION
Syntax | 888
Description | 888
Syntax
tos-reflect;
Hierarchy Level
Description
Configure the LNS to reflect the IP ToS value in the inner IP header to the outer IP header. When CoS
rewrite rules are also configured ([edit class-of-service interfaces interface-name unit logical-unit-
number rewrite-rules]), the rewrite is performed only on the inner IP ToS; the outer IP TOS value is not
affected.
889
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 889
Description | 890
Syntax
trace;
890
Hierarchy Level
Description
Enable trace operations for a group of interfaces or for a specific interface within a group. Use the
statement at the [edit ... dhcpv6] hierarchy levels to configure DHCPv6 support.
Release Information
Support at the [edit ... dhcpv6] hierarchy levels introduced in Junos OS Release 11.4.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 891
Description | 892
Options | 892
Syntax
traceoptions {
debug-level level;
file filename <files number> <match regular-expression > <size maximum-file-
size> <world-readable | no-world-readable>;
filter {
protocol name;
user user@domain;
user-name username;
}
flag flag;
interfaces interface-name {
debug-level level;
flag flag;
892
}
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
Hierarchy Level
Description
Options
debug-level level—Trace level for PPP, L2TP, RADIUS, and UDP; this option does not apply to L2TP on
MX Series routers:
file filename—Name of the file to receive the output of the tracing operation. Enclose the name within
quotation marks. All files are placed in the directory /var/log.
files number—(Optional) Maximum number of trace files to create before overwriting the oldest one. If
you specify a maximum number of files, you also must specify a maximum file size with the size option.
• Default: 3 files
filter—Additional filter to refine the output to display particular subscribers. Filtering based on the
following subscriber identifiers simplifies troubleshooting in a scaled environment.
893
• protocol name—One of the following protocols; this option does not apply to L2TP on MX Series
routers:
• l2tp
• ppp
• radius
• udp
• user user@domain—Username of a subscriber; this option does not apply to L2TP on M Series
routers. Optionally use an asterisk (*) as a wildcard to substitute for characters at the beginning or
end of either term or both terms.
• user-name username—Username of a subscriber; this option does not apply to L2TP on MX Series
routers.
flag flag—Tracing operation to perform. To specify more than one tracing operation, include multiple flag
statements. You can include the following flags:
interfaces interface-name—Apply L2TP traceoptions to a specific services interface. This option does
not apply to L2TP on MX Series routers.
• debug-level level—Trace level for the interface; this option does not apply to L2TP on MX Series
routers:
• flag flag—Tracing operation to perform for the interface. This option does not apply to L2TP on MX
Series routers. To specify more than one tracing operation, include multiple flag statements. You can
include the following flags:
• all—Trace everything.
• ipc—Trace L2TP Inter-Process Communication (IPC) messages between the PIC and the Routing
Engine.
level—Specify level of tracing to perform. The option you configure enables tracing of events at that
level and all higher (more restrictive) levels. You can specify any of the following levels:
• verbose—Match verbose messages. This is the lowest (least restrictive) severity level; when you
configure verbose, messages at all higher levels are traced. Therefore, the result is the same as when
you configure all.
• Default: error
match regular-expression—(Optional) Refine the output to include lines that contain the regular
expression.
size maximum-file-size—(Optional) Maximum size of each trace file. By default, the number entered is
treated as bytes. Alternatively, you can include a suffix to the number to indicate kilobytes (KB),
megabytes (MB), or gigabytes (GB). If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 896
Description | 897
Options | 897
Syntax
traceoptions {
file <filename> <files number> <match regular-expression > <size maximum-
file-size> <world-readable | no-world-readable>;
filter {
aci regular-expression;
ari regular-expresion;
service-name regular-expresion;
underlying-interface interface-name;
user user@domain;
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
Hierarchy Level
Description
Options
file filename—Name of the file to receive the output of the tracing operation. Enclose the name within
quotation marks. All files are placed in the directory /var/log.
files number—(Optional) Maximum number of trace files to create before overwriting the oldest one. If
you specify a maximum number of files, you also must specify a maximum file size with the size option.
• Default: 3 files
filter—Additional filter to refine the output to display particular subscribers. Filtering based on the
following subscriber identifiers simplifies troubleshooting in a scaled environment.
BEST PRACTICE: Due to the complexity of agent circuit identifiers and agent remote identifiers,
we recommend that you do not try an exact match when filtering on these options. For service
names, searching on the exact name is appropriate, but you can also use a regular expression
with that option.
• aci regular-expression—Regular expression to match the agent circuit identifier provided by PPP
client.
• ari regular-expression—Regular expression to match the agent remote identifier provided by PPP
client.
flag flag—Tracing operation to perform. To specify more than one tracing operation, include multiple flag
statements. You can include the following flags:
898
level—Level of tracing to perform. You can specify any of the following levels:
• Default: error
match regular-expression—(Optional) Refine the output to include lines that contain the regular
expression.
size maximum-file-size—(Optional) Maximum size of each trace file. By default, the number entered is
treated as bytes. Alternatively, you can include a suffix to the number to indicate kilobytes (KB),
megabytes (MB), or gigabytes (GB). If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option.
• Default: 128 KB
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 900
Description | 901
Options | 901
Syntax
traceoptions {
file filename <files number> <match regular-expression > <size maximum-file-
size> <world-readable | no-world-readable>;
flag flag;
}
Hierarchy Level
Description
Options
file filename—Name of the file to receive the output of the tracing operation. Enclose the filename
within quotation marks. All files are placed in the directory /var/log.
files number—(Optional) Maximum number of trace files to create before overwriting the oldest one. If
you specify a maximum number of files, you also must specify a maximum file size with the size option.
• Default: 3 files
flag flag—Tracing operation to perform. To specify more than one tracing operation, include multiple flag
statements. You can include the following flags:
match regular-expression—(Optional) Refine the output to include lines that contain the regular
expression.
size maximum-file-size—(Optional) Maximum size of each trace file. By default, the number entered is
treated as bytes. Alternatively, you can include a suffix to the number to indicate kilobytes (KB),
megabytes (MB), or gigabytes (GB). If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option.
• Default: 128 KB
Release Information
RELATED DOCUMENTATION
transmit-interval
IN THIS SECTION
Syntax | 903
Description | 903
Syntax
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
tunnel (L2TP)
IN THIS SECTION
Syntax | 904
Description | 905
Syntax
tunnel {
assignment-id-format (assignment-id | client-server-id);
failover-resync (failover-protocol | silent-failover);
idle-timeout seconds;
maximum-sessions number;
minimum-retransmission-timeout;
name name {
address ip-address {
drain;
routing-instance routing-instance-name {
drain;
905
}
}
drain;
}
nas-port-method;
retransmission-count-established count;
retransmission-count-not-established count;
rx-window-size packets;
tx-address-change (accept | ignore | ignore-ip-address | ignore-udp-port |
reject | reject-ip-address | reject-udp-port);
}
Hierarchy Level
Description
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 906
Description | 907
Options | 907
Syntax
tunnel tunnel-id {
identification name;
logical-system logical-system-name;
max-sessions number;
medium type;
nas-port-method cisco-avp;
preference number;
remote-gateway {
address server-ip-address;
gateway-name server-name;
}
routing-instance routing-instance-name;
907
secret password;
source-gateway {
address client-ip-address;
gateway-name client-name;
}
type tunnel-type;
}
Hierarchy Level
Description
Define the attributes of a tunnel for the tunnel profile. You can define up to 31 tunnels for each tunnel
profile.
Options
tunnel-id—Unique integer that identifies a tunnel defined within a profile. For a subscriber, RADIUS
attributes and VSAs can supply or override the attributes defined here for the tunnel.
• Range: 1 through 31
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
tunnel-group
IN THIS SECTION
Syntax | 908
Description | 909
Options | 909
Syntax
tunnel-group group-name {
aaa-access-profile profile-name;
dynamic-profile profile-name;
hello-interval seconds;
hide-avps;
l2tp-access-profile profile-name;
local-gateway address {
address address;
gateway-name gateway-name;
}
maximum-send-window packets;
909
maximum-sessions number;
ppp-access-profile profile-name;
receive-window packets;
retransmit-interval seconds;
service-device-pool pool-name;
service-interface interface-name;
service-profile profile-name(parameter)&profile-name;
syslog {
host hostname {
services severity-level;
facility-override facility-name;
log-prefix prefix-value;
}
}
tos-reflect;
tunnel-switch-profile profile-name;
tunnel-timeout seconds;
}
Hierarchy Level
Description
NOTE: Subordinate statement support depends on the platform. See individual statement topics
for more detailed support information.
Options
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 911
Description | 911
Options | 911
Syntax
tunnel-profile profile-name;
Hierarchy Level
Description
Specify the name of an L2TP tunnel profile that defines the tunnel to which PPP subscriber traffic is
switched.
Options
profile-name—Unique name that identifies the tunnel profile; configured with the tunnel-profile
statement at the [edit access] hierarchy level.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 912
Description | 913
Options | 913
Syntax
tunnel-profile profile-name {
tunnel tunnel-id {
identification name;
logical-system logical-system-name;
max-sessions number;
medium type;
nas-port-method cisco-avp;
preference number;
remote-gateway {
address server-ip-address;
gateway-name server-name;
}
routing-instance routing-instance-name;
secret password;
source-gateway {
address client-ip-address;
gateway-name client-name;
913
}
type tunnel-type;
}
}
Hierarchy Level
[edit access]
Description
Options
profile-name—Unique name that identifies the tunnel profile. The profile can be referenced from within
a domain map or by the RADIUS Tunnel-Group VSA [26-64].
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 914
Description | 915
Options | 915
Syntax
tunnel-switch-profile profile-name;
Hierarchy Level
Description
Specify a tunnel switch profile that determines whether packets in an L2TP session from a LAC are
switched to another session that has a different destination LNS.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 916
916
Description | 916
Options | 917
Syntax
tunnel-switch-profile profile-name {
avp {
bearer-type action;
calling-number action;
cisco-nas-port-info action;
}
tunnel-profile profile-name;
}
Hierarchy Level
[edit access]
Description
Define a tunnel switch profile for subscriber access; specify actions to take for L2TP AVPs in the
switched packets and the profile for the tunnel to which the PPP traffic is switched.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
917
Options
profile-name—Unique name that identifies the tunnel switch profile. The profile can be applied as a
default or referenced from within a domain map, a tunnel group, or by the RADIUS Tunnel-Group VSA
[26-64].
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 918
Description | 918
Default | 918
Options | 919
Syntax
Hierarchy Level
Description
Configure whether the LAC accepts, ignores, or rejects requests from an LNS to change the destination
IP address, UDP port, or both.
When configured to ignore change requests, the LAC continues to send packets to the original address
or port, but accepts packets from the new address or port.
When configured to reject change requests, the LAC sends a StopCCN message to the original address
or port and then terminates the connection to that LNS. This method has precedence over the ignore
configuration.
Default
The LAC accepts IP address or UDP port change requests from the LNS.
919
Options
ignore-ip-address Ignore a change request for IP address, but accept a change request for UDP port.
ignore-udp-port Ignore a change request for UDP port, but accept a change request for IP address.
reject-ip-address Reject a change request for IP address, but accept a change request for UDP port.
reject-udp-port Reject a change request for UDP port, but accept a change request for IP address.
Release Information
RELATED DOCUMENTATION
Configuring How the LAC Responds to Address and Port Changes Requested by the LNS | 168
920
IN THIS SECTION
Syntax | 920
Description | 920
Options | 921
Syntax
tx-connect-speed-method method;
Hierarchy Level
Description
Specify the method that determines how to derive the connect speed values sent from the LAC to the
LNS.
When the session is being established, the speeds are included in the Incoming-Call-Connected (ICCN)
message. The transmit speed is conveyed in AVP 24 (Tx-Connect-Speed) and the receive speed is
conveyed in AVP 38 (Rx-Connect-Speed). Both values are in bits per seconds (bps). The LAC typically
921
uses the static or pppoe-ia-tags method, because values for other configured methods are not available
when the session is being established.
When connect speed updates are configured, the LAC sends the updated values for each session to the
LNS in Connect-Speed-Update-Notification (CSUN) messages. The updated speeds are conveyed in the
Connect Speed Update AVP (97).
When connection speed values are not available from the configured method, the LAC falls back to
another source for the values. See "Transmission of Tx and Rx Connection Speeds from LAC to LNS" on
page 226 for tables describing the LAC fallback behavior by Junos OS release.
Options
• actual—(Junos OS Releases 15.1, 16.1, 16.2, 17.1) The speed is derived from the CoS
effective shaping rate that is enforced on the level 3 node based on local policy. In the
supported releases, actual is the default method and has the highest preference among all
configured methods.
This method is not available starting in Junos OS Release 17.2. However, it is configurable
in the Tunnel-Tx-Speed-Method VSA (26-94). If you do so, it is translated to the service-
profile method.
• ancp—The speed is derived from the configured ANCP value for the underlying interface.
This value results from a user-defined percentage correction to the values received from
the access node; this is configured per subscriber access line. The percentage accounts for
encapsulation differences between, the router, the access loop, and the Layer 1 transport
overhead. The initial rate sent to the LNS is the ANCP value reported at the time the ICCN
is sent. The ANCP value is not available for the ICCN message and falls over to another
method. You can change the configured correction after a subscriber has logged in, but
those changes do not affect the actual rate used by the LNS for that subscriber.
• none—This method prevents the LAC from sending AVP 24 and AVP 38 to the LNS. This
option also overrides the Juniper Networks RADIUS VSAs, Tx-Connect-Speed (26-162) and
Rx-Connect-Speed (26-163).
• pppoe-ia-tags—The speed is derived from the PPPoE IA tags received by the LAC from the
DSLAM. This speed value is transmitted when a subscriber logs in and it cannot
subsequently be changed. The value of Actual-Data-Rate-Downstream (VSA 26-129) is
used for AVP 24. The value of Actual-Data-Rate-Upstream (VSA 26-130) is used for AVP
38; it is sent only when the values differ.
922
NOTE: This speed derived from the IA tags does not apply to subscribers that are
already logged in; it is effective only for subscribers that log in after this setting has
been saved.
• service-profile—(Junos OS Releases 17.2 and higher) The downstream (Tx) speed is derived
from the actual CoS that is enforced on the L3 node based on local policy. The upstream
(Rx) speed is the value configured in the dynamic service profile; no adjustment is made to
this value. The service-profile value is not available for the ICCN message and falls over to
another method.
The service-profile method is supported only when the effective shaping-rate statement is
included at the [edit chassis] hierarchy level. If it is not, the commit check fails. If the
method is received from RADIUS in VSA 26-94, a system log message is generated instead,
because no commit check is performed in this case.
• static—(Junos OS Releases 13.3, 14.1, and 14.2; Junos OS Releases 17.2 and higher) The
speed is derived from the configured static Layer 2 speed. For Ethernet VLANs, this is the
recommended (advisory) shaping rate configured on the PPPoE logical interface underlying
the subscriber interface. If the advisory shaping rate is not configured on the underlying
interface, then the actual speed of the underlying physical port is used. In the supported
releases, static is the default method.
In Junos OS Releases 15.1, 16.1, 16.2, and 17.2, the static method is configurable for
backward compatibility, but it is not supported. If you configure this method in the CLI or
in the Tunnel-Tx-Speed-Method VSA (26-94), the LAC falls back to the port speed of the
subscriber access interface.
NOTE: For ge and xe interfaces, the port speed value is set to 1,000,000,000 and
for ae interfaces, the port speed value is set to 0. The value is sent in both AVP 24
and AVP 38.
• Default:
Release Information
RELATED DOCUMENTATION
Configuring the Method to Derive the LAC Connection Speeds Sent to the LNS | 237
Transmission of Tx and Rx Connection Speeds from LAC to LNS | 226
IN THIS SECTION
Syntax | 924
Description | 924
Default | 924
924
Options | 924
Syntax
type tunnel-type;
Hierarchy Level
Description
Default
l2tp
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 925
Description | 927
Options | 927
Syntax
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
926
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
mru size;
mtu (size | use-lower-layer);
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
}
output filter-name {
precedence precedence;
927
}
}
}
filter {
input filter-name;
output filter-name;
}
}
Hierarchy Level
Description
In a dynamic profile, configure a logical unit number for the dynamic PPPoE logical interface. You must
configure a logical interface to be able to use the router.
Options
logical-unit-number—Variable used to specify the unit number when the PPPoE logical interface is
dynamically created. In the unit logical-unit-number statement for dynamic PPPoE logical interfaces,
you must use the predefined variable $junos-interface-unit in place of logical-unit-number. The $junos-
interface-unit predefined variable is dynamically replaced with the unit number supplied by the router
when the subscriber logs in.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 928
Description | 932
Options | 932
Syntax
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
929
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
dial-options {
ipsec-interface-id name;
l2tp-interface-id name;
(shared | dedicated);
}
encapsulation (atm-ccc-cell-relay | atm-ccc-vc-mux | atm-cisco-nlpid | atm-
tcc-vc-mux | atm-mlppp-llc | atm-nlpid | atm-ppp-llc | atm-ppp-vc-mux | atm-snap
| atm-tcc-snap | atm-vc-mux | ether-over-atm-llc | ether-vpls-over-atm-llc |
ether-vpls-over-fr | ether-vpls-over-ppp | ethernet | frame-relay-ccc | frame-
relay-ppp | frame-relay-tcc | frame-relay-ether-type | frame-relay-ether-type-
tcc | multilink-frame-relay-end-to-end | multilink-ppp | ppp-over-ether | ppp-
over-ether-over-atm-llc | vlan-bridge | vlan-ccc | vlan-vci-ccc | vlan-tcc |
vlan-vpls);
family family {
address address;
demux-destination,
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
930
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-
max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name {
shared-name filter-shared-name;
}
output filter-name {
931
shared-name filter-shared-name;
}
}
host-prefix-only;
keepalives {
interval seconds;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
service {
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
932
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
Hierarchy Level
Description
Configure a logical interface on the physical device. You must configure a logical interface to be able to
use the physical device.
Options
logical-unit-number—The specific unit number of the interface you want to assign to the dynamic
profile, or one of the following predefined variables:
• $junos-underlying-interface-unit—For static VLANs, the unit number variable. The static unit
number variable is dynamically replaced with the client unit number when the client session begins.
The client unit number is specified by the DHCP when it accesses the subscriber network.
• $junos-interface-unit—The unit number variable on a dynamic underlying VLAN interface for which
you want to enable the creation of dynamic VLAN subscriber interfaces based on the ACI.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
Agent Circuit Identifier-Based Dynamic VLANs Overview
untagged
IN THIS SECTION
Syntax | 933
Description | 934
Syntax
untagged;
Hierarchy Level
Description
Specify that the router supports untagged traffic on pseudowire subscriber interfaces.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 935
Description | 935
Options | 935
Syntax
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
Hierarchy Level
Description
Configure a local username that authd can use to request authentication for terminated PPP
subscribers. This enables the external RADIUS server to pass implementation-specific configuration for
successfully authenticated subscribers. Local authentication supports CPEs that do not negotiate
authentication protocols in the same dynamic profile as CPEs that use only PAP or CHAP
authentication.
The username takes the following format when you use the default delimiter:
mac-address.circuit-id.remote-id@domain-name
Options
circuit-id Include the agent circuit identifier (ACI) in the local username.
936
delimiter Specify the character that separates components that make up the concatenated
character username.
domain-name Specify the domain name that ends the local username created for the subscribers.
name The username is sent to RADIUS in the Access-Request message. The string can
include the following characters: a through z, A through Z, 0 through 9, “-“, or “.”.
mac-address Include the MAC address from the client PDU in the local username.
remote-id Include the agent remote identifier (ARI) in the local username.
interface
Release Information
RELATED DOCUMENTATION
Configuring Local Authentication in Dynamic Profiles for Static Terminated IPv4 PPP Subscribers |
107
version (BFD)
IN THIS SECTION
Syntax | 937
Description | 938
Options | 938
Syntax
version (0 | 1 | automatic);
Hierarchy Level
Description
Options
• Default: automatic
Release Information
RELATED DOCUMENTATION
Example: Configuring Group Liveness Detection with BFD for DHCP Local Server Clients
Example: Configuring Global Liveness Detection with BFD for DHCP Relay Agent Clients
Configuring BFD for LDP LSPs
939
IN THIS SECTION
Syntax | 939
Description | 939
Syntax
weighted-load-balancing;
Hierarchy Level
Description
Specify that the router considers tunnel weight when selecting from among multiple tunnels that share
the same preference level. A higher maximum session limit on a tunnel corresponds to a higher tunnel
weight. A tunnel with a higher weight is more likely to be selected than a tunnel with a lower weight.
The distribution of sessions across all tunnels in the preference level, on average, is proportional to the
tunnel weight
Disabled by default. By default, tunnel selection within a preference level is strictly random. The
destination-equal-load-balancing statement must be disabled to successfully enable this statement.
940
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 940
Description | 941
Options | 941
Syntax
Hierarchy Level
Description
For VLAN demux, Fast Ethernet, Gigabit Ethernet, and Aggregated Ethernet interfaces only, bind a
802.1Q VLAN tag ID to a logical interface.
Options
number—A valid VLAN identifier. When used in the dynamic-profiles hierarchy, specify the $junos-vlan-
id predefined variable to dynamically obtain the VLAN identifier.
• For aggregated Ethernet, 4-port, 8-port, and 12-port Fast Ethernet PICs, and for management and
internal Ethernet interfaces, 1 through 1023.
• For 48-port Fast Ethernet and Gigabit Ethernet PICs, 1 through 4094.
Release Information
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles
vlan-tagging
IN THIS SECTION
Syntax | 942
Description | 943
Default | 944
Options | 944
Syntax
vlan-tagging;
vlan-tagging;
943
Hierarchy Level
Description
For Fast Ethernet and Gigabit Ethernet interfaces, aggregated Ethernet interfaces configured for VPLS,
and pseudowire subscriber interfaces, enable the reception and transmission of 802.1Q VLAN-tagged
frames on the interface.
944
NOTE: For QFX Series configure VLAN identifier for untagged packets received on the physical
interface of a trunk mode interface. Enable VLAN tagging. The platform receives and forwards
single-tag frames with 802.1Q VLAN tags.
On EX Series switches except for EX4300 and EX9200 switches, the vlan-tagging and family
ethernet-switching statements cannot be configured on the same interface. Interfaces on
EX2200, EX3200, EX3300, EX4200, and EX4500 switches are set to family ethernet-switching
by the default factory configuration. EX6200 and EX8200 switch interfaces do not have a default
family setting.
Default
Options
native-vlan-id— (SRX Series)Configures a VLAN identifier for untagged packets. Enter a number from 0
through 4094.
NOTE: The native-vlan-id can be configured only when either flexible-vlan-tagging mode or
interface-mode trunk is configured.
Release Information
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
RELATED DOCUMENTATION
vlan-tagging (Dynamic)
IN THIS SECTION
Syntax | 945
Description | 946
Syntax
vlan-tagging;
946
Hierarchy Level
Description
For Fast Ethernet and Gigabit Ethernet interfaces and aggregated Ethernet interfaces configured for
VPLS, enable the reception and transmission of 802.1Q VLAN-tagged frames on the interface.
NOTE: For Ethernet, Fast Ethernet, Tri-Rate Ethernet copper, Gigabit Ethernet, 10-Gigabit
Ethernet, and aggregated Ethernet interfaces supporting VPLS, the Junos OS supports a subset
of the IEEE 802.1Q standard for channelizing an Ethernet interface into multiple logical
interfaces, allowing many hosts to be connected to the same Gigabit Ethernet switch, but
preventing them from being in the same routing or bridging domain.
Release Information
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs
Configuring the L2TP LNS Peer Interface | 266
947
vlan-tags
IN THIS SECTION
Syntax | 947
Description | 947
Options | 948
Syntax
Hierarchy Level
Description
For Gigabit Ethernet IQ and IQE interfaces only, binds TPIDs and 802.1Q VLAN tag IDs to a logical
interface. You must include the stacked-vlan-tagging statement at the [edit interfaces interface-name]
hierarchy level.
948
Options
inner A TPID (optional) and a valid VLAN identifier in the format tpid.vlan-id. When used in
[tpid].vlan-id the dynamic-profiles hierarchy, specify the $junos-vlan-id predefined variable to
dynamically obtain the VLAN ID.
• Range: For VLAN ID, 1 through 4094. VLAN ID 0 is reserved for tagging the priority
of frames.
outer A TPID (optional) and a valid VLAN identifier in the format tpid.vlan-id. When used in
[tpid].vlan-id the dynamic-profiles hierarchy, specify the $junos-stacked-vlan-id predefined variable.
• Range: For VLAN ID, 1 through 511 for normal interfaces, and 512 through 4094 for
VLAN CCC interfaces. VLAN ID 0 is reserved for tagging the priority of frames.
Release Information
RELATED DOCUMENTATION
Operational Commands
IN THIS SECTION
Syntax | 952
Description | 952
Options | 953
Syntax
Description
Clear all Layer 2 Tunneling Protocol (L2TP) destinations and all tunnels and sessions that belong to the
destinations. This command is available only for LAC on MX Series routers.
NOTE: You cannot issue the clear services l2tp destination command in parallel with statistics-
related show services l2tp commands from separate terminals. If this clear command is running,
then you must press Ctrl+c to make the command run in the background before issuing any of
the show commands listed in the following table:
show services l2tp destination extensive show services l2tp summary statistics
953
show services l2tp destination statistics show services l2tp tunnel extensive
show services l2tp session extensive show services l2tp tunnel statistics
Options
local- Clear only the L2TP destinations and all tunnels and sessions associated with
gateway gateway- the specified local gateway address.
address
peer- Clear only the L2TP destinations and all tunnels and sessions associated with
gateway gateway- the peer gateway with the specified address.
address
clear
Output Fields
When you enter this command, you are provided feedback on the status of your request.
954
Sample Output
Destination 2 closed
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 955
Description | 955
Options | 955
Syntax
Description
Clear the lockout timer for all or only the specified Layer 2 Tunneling Protocol (L2TP) destinations and
all tunnels and sessions that belong to the destinations. Clearing the lockout timer removes the
destination from the lockout list. This command is available only for LAC on MX Series routers.
NOTE: You cannot issue the clear services l2tp destination command in parallel with statistics-
related show services l2tp commands from separate terminals. If this clear command is running,
then you must press Ctrl+c to make the command run in the background before issuing any of
the show commands listed in the following table:
show services l2tp destination extensive show services l2tp summary statistics
show services l2tp destination statistics show services l2tp tunnel extensive
show services l2tp session extensive show services l2tp tunnel statistics
Options
local-gateway gateway-address (Optional) Unlock only the L2TP destination with the specified local
gateway address.
956
peer-gateway gateway-address (Optional) Unlock only the L2TP destination with the specified
address.
clear
Output Fields
When you enter this command, you are provided no feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 957
Description | 957
Options | 958
Syntax
Description
(M10i and M7i routers only) Clear Layer 2 Tunneling Protocol (L2TP) sessions on LNS.
(MX Series routers only) Clear L2TP sessions on LAC and LNS.
NOTE: On MX Series routers, you cannot issue the clear services l2tp session command in
parallel with statistics-related show services l2tp commands from separate terminals. If this clear
958
command is running, then you must press Ctrl+c to make the command run in the background
before issuing any of the show commands listed in the following table:
show services l2tp destination extensive show services l2tp summary statistics
show services l2tp destination statistics show services l2tp tunnel extensive
show services l2tp session extensive show services l2tp tunnel statistics
Options
interface interface-name Clear only the L2TP sessions using the specified adaptive services or inline
services interface. The interface type depends on the line card as follows:
local-gateway gateway- Clear only the L2TP sessions associated with the specified local gateway
address address.
959
local-gateway-name Clear only the L2TP sessions associated with the specified local gateway
gateway-name name.
local-session-id session- Clear only the L2TP sessions with this identifier for the local endpoint of the
id L2TP session.
local-tunnel-id tunnel-id Clear only the L2TP sessions associated with the specified local tunnel
identifier.
peer-gateway gateway- Clear only the L2TP sessions associated with the peer gateway with the
address specified address.
peer-gateway-name Clear only the L2TP sessions associated with the peer gateway with the
gateway-name specified name.
tunnel-group group- Clear only the L2TP sessions associated with the specified tunnel group. This
name option is not available for L2TP LAC on MX Series routers.
user username (M Series routers only) Clear only the L2TP sessions for the specified
username.
clear
Output Fields
When you enter this command, you are provided feedback on the status of your request.
960
Sample Output
Sample Output
command-name
command-name
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 961
Description | 962
Options | 962
Syntax
Description
(M10i and M7i routers: LNS only. MX Series routers: LAC and LNS.) Clear statistics for Layer 2 Tunneling
Protocol (L2TP) sessions.
Options
interface interface-name Clear only the L2TP sessions using the specified adaptive services or inline
services interface. The interface type depends on the line card as follows:
local-gateway gateway- Clear statistics for only the L2TP sessions associated with the local gateway
address with the specified address.
local-gateway-name Clear statistics for only the L2TP sessions associated with the local gateway
gateway-name with the specified name.
local-session-id session-id Clear statistics for only the L2TP sessions with this identifier for the local
endpoint of the L2TP session.
local-tunnel-id tunnel-id Clear statistics for only the L2TP sessions associated with the specified
local tunnel identifier.
peer-gateway gateway- Clear statistics for only the L2TP sessions associated with the peer gateway
address with the specified address.
peer-gateway-name Clear statistics for only the L2TP sessions associated with the peer gateway
gateway-name with the specified name.
tunnel-group group-name Clear statistics for only the L2TP sessions associated with the specified
tunnel group. This option is not available for L2TP LAC on MX Series
routers.
user username Clear statistics for only the L2TP sessions for the specified username. This
option is not available for L2TP LAC on MX Series routers.
963
view
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 964
Description | 964
Options | 965
Syntax
Description
(M10i and M7i routers: LNS only. MX Series routers: LAC and LNS.) Clear Layer 2 Tunneling Protocol
(L2TP) tunnels.
NOTE: On MX Series routers, you cannot issue the clear services l2tp tunnel command in
parallel with statistics-related show services l2tp commands from separate terminals. If this clear
command is running, then you must press Ctrl+c to make the command run in the background
before issuing any of the show commands listed in the following table:
965
show services l2tp destination extensive show services l2tp summary statistics
show services l2tp destination statistics show services l2tp tunnel extensive
show services l2tp session extensive show services l2tp tunnel statistics
Options
sp-fpc/pic/port (Optional) Clear only the L2TP tunnels using the specified adaptive services
interface. This option is not available for L2TP on MX Series routers.
local-gateway gateway- Clear only the L2TP tunnels associated with the local gateway with the
address specified address.
local-gateway-name Clear only the L2TP tunnels associated with the local gateway with the
gateway-name specified name.
local-tunnel-id tunnel-id Clear only the L2TP tunnels that have the specified local tunnel identifier.
peer-gateway gateway- Clear only the L2TP tunnels associated with the peer gateway with the
address specified address.
966
peer-gateway-name Clear only the L2TP tunnels associated with the peer gateway with the
gateway-name specified name.
tunnel-group group-name Clear only the L2TP tunnels in the specified tunnel group. This option is not
available for L2TP LAC on MX Series routers.
view
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 967
Description | 967
Options | 968
Syntax
Description
(M10i and M7i routers: LNS only. MX Series routers: LAC only.) Clear statistics for Layer 2 Tunneling
Protocol (L2TP) tunnels.
968
Options
interface sp-fpc/pic/port Clear statistics for only the L2TP tunnels using the specified adaptive
services interface. This option is not available for L2TP LAC on MX
Series routers.
local-gateway gateway- Clear statistics for only the L2TP tunnels associated with the local
address gateway with the specified address.
local-gateway-name gateway- Clear statistics for only the L2TP tunnels associated with the local
name gateway with the specified name.
local-tunnel-id tunnel-id Clear statistics for only the L2TP tunnels that have the specified local
tunnel identifier.
peer-gateway gateway- Clear statistics for only the L2TP tunnels associated with the peer
address gateway with the specified address.
peer-gateway-name gateway- Clear statistics for only the L2TP tunnels associated with the peer
name gateway with the specified name.
tunnel-group group-name Clear statistics for only the L2TP tunnels in the specified tunnel group.
This option is not available for L2TP LAC on MX Series routers.
clear
Output Fields
When you enter this command, you are provided feedback on the status of your request.
969
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 970
Description | 970
Options | 970
Syntax
Description
Manually revert L2TP data traffic from the designated backup link to the designated primary link of an
aggregated inline service interface bundle interface for which 1:1 redundancy is configured, or manually
switch data traffic from the primary link to the backup link.
NOTE: When 1:1 redundancy protection is configured for an aggregated inline service interface,
if the primary link fails, the router automatically routes data traffic destined for the L2TP session
on that link to the backup link. However, the router does not automatically route data traffic
back to the primary link when the primary link is subsequently reestablished. Instead, you
manually divert traffic back to the primary link by issuing the request interface revert operational
command.
Options
revert Restore data traffic for the LNS session to the primary link.
switchover Transfer data traffic for the LNS session to the secondary (backup) link.
view
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Sample Output
Release Information
IN THIS SECTION
Syntax | 972
Description | 972
Options | 973
Syntax
Description
Display information about active subscribers regardless of the subscriber’s operational state, for all
subscribers (local access loops), the subscriber associated with the access line specified by an ACI, or the
subscriber associated with the specified ANCP neighbor (access node).
After an ancpd restart, this command displays orphaned entries (marked with an o) for subscriber
sessions that were established before the restart but which have not yet been reestablished. As sessions
are reestablished, the number of orphaned entries displayed by the command decreases. The number
reaches zero when all sessions are reestablished or when the orphaned-interface timer expires.
973
Options
identifier identifier (Optional) Display information about the subscriber associated with the
access line (ACI) specified by the access identifier.
ip-address ip-address (Optional) Display information about the subscribers connected to the access
node specified by the IP address.
system-name mac- (Optional) Display information about the subscribers connected to the access
address node specified by the MAC address.
view
Output Fields
Table 31 on page 974 lists the output fields for the show ancp subscriber command. Output fields are
listed in the approximate order in which they appear.
974
Loop Identifier Access loop identifier as sent by the access node and brief none
configured to map the subscriber to an interface.
DSL Line State State of the DSL line: Idle, Showtime, or Silent. brief detail
Access Type Type of access line employed by the access node: brief detail none
ADSL1, ADSL2, ADSL2+, VDSL1, VDSL2, SDSL, G.fast,
VDSL2 Annex Q, SDSL bonded, VDSL2 bonded, G.fast
bonded VDSL2 Annex Q bonded or OTHER.
Interface Name of the interface set or logical interface. brief detail none
975
Rate Kbps Actual downstream data rate for this local loop. brief none
Access Loop Access loop circuit identifier as sent by the access node detail
Circuit Identifier and configured to map the subscriber to an interface.
Aggregate Circuit ASCII identifier for the subscriber access loop; value of detail
Identifier the Access-Aggregation-Circuit-ID-ASCII attribute (TLV
0x0003).
Aggregate Circuit Binary identifier for the VLAN circuit ID. detail
Identifier Binary
DSL Line Data Data link protocol employed on the access loop: AAL5 detail
Link or Ethernet.
976
DSL Line Encapsulation type on the access loop, for Ethernet detail
Encapsulation only:
• 1—Untagged Ethernet
• 2—Single-tagged Ethernet
• 2—PPPoA null
• 3—IPoA LLC
• 4—IPoA null
Interface Type Type of interface employed for subscriber traffic: ifl for detail
a single VLAN or interface-set for a configured group
of VLANs.
Actual Net Data Actual upstream data rate for this local loop, in Kbps. detail
Upstream
Actual Net Data Actual downstream data rate for this local loop, in detail
Downstream Kbps.
977
Minimum Net Minimum upstream data rate desired by the operator detail
Data Upstream for this local loop, in Kbps.
Maximum Net Maximum upstream data rate desired by the operator detail
Data Upstream for this local loop, in Kbps.
Attainable Net Maximum attainable upstream data rate for this local detail
Data Upstream loop, in Kbps.
Attainable Net Maximum attainable downstream data rate for this local detail
Data Downstream loop, in Kbps.
Minimum Low Minimum upstream data rate desired by the operator detail
Power Data for this local loop in low power state, in Kbps.
Upstream
Sample Output
Release Information
IN THIS SECTION
Syntax | 983
Syntax | 983
Description | 983
Options | 984
Syntax
Syntax
Description
Display information about active Bidirectional Forwarding Detection (BFD) subscriber sessions.
984
Options
view
Output Fields
Table 32 on page 984 describes the output fields for the show bfd subscriber session command.
Output fields are listed in the approximate order in which they appear.
Address IP Address on which the BFD subscriber session is active. All levels
State State of the BFD subscriber session: Up, Down, Init (initializing), All levels
or Failing.
Interface Interface on which the BFD subscriber session is active. All levels
Detect Time Negotiated time interval, in seconds, used to detect BFD control All levels
packets.
Transmit Time interval, in seconds, used by the transmitting system to All levels
Interval send BFD control packets.
985
Multiplier Negotiated multiplier by which the time interval is multiplied to All levels
determine the detection time for the transmitting system.
TX interval Time interval, in seconds, used by the host system to transmit detail extensive
BFD control packets.
RX interval Time interval, in seconds, used by the host system to receive detail extensive
BFD control packets.
Local Local diagnostic information about failing BFD subscriber detail extensive
diagnostic sessions.
Remote Remote diagnostic information about failing BFD subscriber detail extensive
diagnostic sessions.
Remote state Indication that the remote system's BFD packets have been detail extensive
received and whether the remote system is receiving transmitted
control packets.
routing table Value of the routing table index. A value of 0 (zero) denotes a detail extensive
index route in the default routing table managed by enhanced
subscriber management.
Local min TX Minimum amount of time, in seconds, between control packet extensive
interval transmissions on the local system.
Remote min TX Minimum amount of time, in seconds, between control packet extensive
interval transmissions on the remote system.
min RX interval Minimum amount of time, in seconds, between control packet extensive
detections on the remote system.
Local Authentication code used by the local system to identify that extensive
discriminator BFD subscriber session.
Remote Authentication code used by the remote system to identify that extensive
discriminator BFD subscriber session.
Sample Output
The output for the show bfd subscriber session brief command is identical to that for the show bfd
subscriber session command.
command-name
988
Detect Transmit
Address State Interface Time Interval
Multiplier
203.0.113.6 Up demux0.3221225504 90.000 30.000
3
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
routing table index 0
Min async interval 30.000, min slow interval 30.000
Adaptive async TX interval 30.000, RX interval 30.000
Local min TX interval 30.000, minimum RX interval 30.000, multiplier 3
Remote min TX interval 30.000, min RX interval 30.000, multiplier 3
Local discriminator 29, remote discriminator 1073741826
Detect Transmit
Address State Interface Time Interval
Multiplier
203.0.113.10 Up demux0.3221225505 90.000 30.000
3
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
routing table index 0
Min async interval 30.000, min slow interval 30.000
Adaptive async TX interval 30.000, RX interval 30.000
Local min TX interval 30.000, minimum RX interval 30.000, multiplier 3
989
Detect Transmit
Address State Interface Time Interval
Multiplier
203.0.113.14 Up demux0.3221225506 90.000 30.000
3
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
routing table index 0
Min async interval 30.000, min slow interval 30.000
Adaptive async TX interval 30.000, RX interval 30.000
Local min TX interval 30.000, minimum RX interval 30.000, multiplier 3
Remote min TX interval 30.000, min RX interval 30.000, multiplier 3
Local discriminator 31, remote discriminator 1073741828
Detect Transmit
Address State Interface Time Interval
Multiplier
203.0.113.18 Up demux0.3221225507 90.000 30.000
3
Local diagnostic None, remote diagnostic None
Remote state Up, version 1
routing table index 0
Min async interval 30.000, min slow interval 30.000
Adaptive async TX interval 30.000, RX interval 30.000
Local min TX interval 30.000, minimum RX interval 30.000, multiplier 3
Remote min TX interval 30.000, min RX interval 30.000, multiplier 3
Local discriminator 32, remote discriminator 1073741829
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 990
Description | 991
Options | 991
Syntax
<profile-name profile-name>
<service-id service-id>
Description
Display dynamic profile (client or service) information for all subscribers or for subscribers specified by
client ID or service session ID. You can filter the output by also specifying a dynamic profile.
NOTE:
• The output does not display the variable stanzas defined in the dynamic profile configuration.
• The variables in the profile configuration are replaced with subscriber specific values.
• If the conditional variable in the dynamic profile is evaluated as NULL, the subscriber value for
the variable is displayed as NONE in the command output.
• The variable is also displayed as NONE when the variable (any variable and not necessarily
conditional) in the dynamic profile has no value associated with it.
• The format in which the configuration is displayed looks similar, but not exactly the same as
the format of the show configuration dynamic-profiles command.
Options
client-id client-id Display dynamic profile information for subscribers associated with the
specified client.
profile-name profile-name (Optional) Display dynamic profile information for the specified subscriber
or service profile.
service-id service-id Display dynamic profile information for subscribers associated with the
specified service session.
992
view
Output Fields
This command displays the dynamic client or service profile configuration for each subscriber.
Sample Output
shaping-rate 100m;
}
}
interfaces {
pp0 {
unit 1073741831 {
output-traffic-control-profile tcp1;
}
}
}
scheduler-maps {
smap1_UID1024 {
forwarding-class best-effort scheduler sch1_UID1023;
}
}
schedulers {
sch1_UID1023 {
transmit-rate percent 40;
buffer-size percent 40;
priority low;
}
}
}
}
filter-service {
interfaces {
pp0 {
unit 1073741831 {
family {
inet {
filter {
input input-filter_UID1026 precedence 50;
output output-filter_UID1027 precedence 50;
}
}
}
}
}
}
firewall {
family {
inet {
filter input-filter_UID1026 {
994
interface-specific;
term t1 {
then {
policer policer1_UID1025;
service-accounting;
}
}
term rest {
then accept;
}
}
filter output-filter_UID1027 {
interface-specific;
term rest {
then accept;
}
}
}
}
policer policer1_UID1025 {
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 15k;
}
then discard;
}
}
}
cos-service {
class-of-service {
scheduler-maps {
smap2_UID1029 {
forwarding-class assured-forwarding scheduler sch2_UID1028;
}
}
schedulers {
sch2_UID1028 {
transmit-rate percent 60;
buffer-size percent 60;
priority high;
}
}
}
995
}
bsimmons
}
}
}
}
}
firewall {
family {
inet {
filter input-filter_UID1026 {
interface-specific;
term t1 {
then {
policer policer1_UID1025;
service-accounting;
}
}
term rest {
then accept;
}
}
filter output-filter_UID1027 {
interface-specific;
term rest {
then accept;
}
}
}
}
policer policer1_UID1025 {
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 15k;
}
then discard;
}
}
}
997
Release Information
IN THIS SECTION
Syntax | 997
Description | 997
Options | 998
Syntax
Description
Options
brief | detail | extensive | terse (Optional) Display the specified level of output.
view
Output Fields
Table 33 on page 998 lists the output fields for the show interfaces ps0 command. Output fields are
listed in the approximate order in which they appear.
Physical Interface
Enabled State of the interface. Possible values are described in the brief detail
“Enabled Field” section under Common Output Fields extensive none
Description.
Interface index Physical interface index number, which reflects its initialization detail extensive
sequence. none
SNMP ifIndex SNMP index number for the physical interface. detail extensive
none
999
Link-level type Encapsulation being used on the physical interface. brief detail
extensive
Device flags Information about the physical device. Possible values are brief detail
described in the “Device Flags” section under Common Output extensive none
Fields Description.
Interface flags Information about the interface. Possible values are described in brief detail
the “Interface Flags” section under Common Output Fields extensive none
Description.
Last flapped Date, time, and how long ago the interface went from down to detail extensive
up or up to down. The format is Last flapped: year-month-day none
hours:minutes:seconds: timezone (hours:minutes:seconds ago).
or Never. For example, Last flapped: 2002-04-26 10:52:40 PDT
(04:33:20 ago).
input packets Number of packets received on the logical interface. detail extensive
none
output packets Number of packets transmitted on the logical interface. detail extensive
none
Logical Interface
Index Logical interface index number (which reflects its initialization detail extensive
sequence). none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive
none
Generation Unique number for use by Juniper Networks technical support detail extensive
only.
Flags Information about the logical interface. Possible values are brief detail
described in the “Logical Interface Flags” section under Common extensive none
Output Fields Description.
Traffic Total number of bytes and packets received and transmitted on detail extensive
statistics the logical interface. These statistics are the sum of the local and
transit statistics. When a burst of traffic is received, the value in
the output packet rate field might briefly exceed the peak cell
rate. This counter usually takes less than 1 second to stabilize.
IPv6 transit Number of IPv6 transit bytes and packets received and detail extensive
statistics transmitted on the logical interface if IPv6 statistics tracking is
enabled.
NOTE: The packet and byte counts in these fields include traffic
that is dropped and does not leave the router.
Local statistics Statistics for traffic received from and transmitted to the Routing detail extensive
Engine. When a burst of traffic is received, the value in the
output packet rate field might briefly exceed the peak cell rate.
This counter usually takes less than 1 second to stabilize.
Transit Statistics for traffic transiting the router. When a burst of traffic detail extensive
statistics is received, the value in the output packet rate field might briefly
exceed the peak cell rate. This counter usually takes less than 1
second to stabilize.
NOTE: The packet and byte counts in these fields include traffic
that is dropped and does not leave the router.
1002
Flags Information about the protocol family flags. Possible values are detail extensive
described in the “Family Flags” section under Common Output none
Fields Description.
Addresses, Information about the addresses configured for the protocol detail extensive
Flags family. Possible values are described in the “Addresses Flags” none
section under Common Output Fields Description.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1005
Description | 1005
Options | 1006
Syntax
Description
(M Series, T Series, and MX Series routers only) Display general information about redundancy for
aggregated multiservices (AMS) interfaces configured for warm standby, adaptive services and link
1006
services intelligent queuing (IQ) interfaces, aggregated Ethernet interfaces redundancy, and LNS
aggregated inline service interfaces.
NOTE: When you run the show interfaces redundancy command on an MX80 router, it displays
the error message, error:the redundancy-interface-process subsystem is not running. This is
because an MX80 router does not have a redundant FPC and does not support link protection.
Options
view
Output Fields
Table 34 on page 1006 lists the output fields for the show interfaces redundancy command. Output
fields are listed in the approximate order in which they appear.
Last Change Timestamp for the last change in status. This value All levels
resets after a primary Routing Engine switchover event
if any of the following conditions is met:
Current Status Physical status of the primary and secondary All levels
interfaces.
Sample Output
Interface : rlsq0:0
State : On primary
Last change : 00:45:46
Primary : lsq-0/2/0:0
Secondary : lsq-1/2/0:0
1009
Interface : asi0
State : On primary
Last change : 00:03:42
Primary : si-1/0/0
Secondary : si-0/0/0
Mode : hot-standby
Current status : both up
Interface :ams0
State : On primary
Last change : 00:39:52
Primary : mams-5/0/0
Secondary : mams-5/1/0
Mode : warm-standby
Current status : both up
Replication state : Disconnected
Release Information
IN THIS SECTION
Syntax | 1010
Description | 1010
Options | 1010
Syntax
Description
Options
Starting in Junos OS Release 17.3, the * (asterisk) wildcard character is supported for
the interface name for debugging purpose. With this support, you can match any
string of characters in that position in the interface name. For example, so* matches
all SONET/SDH interfaces.
view
1011
Output Fields
Table 35 on page 1011 lists the output fields for the show ppp interface command. Output fields are
listed in the approximate order in which they appear.
Session Name of the logical interface on which the session is running. All levels
Phase PPP process phase: Authenticate, Pending, Establish, LCP, All levels
Network, Disabled, and Tunneled.
Session flags Special conditions present in the session: Bundled, TCC, No- All levels
keepalives, Looped, Monitored, and NCP-only.
protocol State Protocol state information. See specific protocol state fields for None
information. specified
Keepalive settings Keepalive settings for the PPP sessions on the L2TP network extensive
server (LNS). LNS-based PPP sessions are supported only on
service interfaces (si).
RE Keepalive Keepalive statistics for the packets handled by the Routing extensive
statistics Engine.
• LCP echo req Tx—LCP echo requests sent from the Routing
Engine.
• LCP echo rep Tx—LCP echo responses sent from the Routing
Engine.
• Negotiated options:
• PFC—Protocol-Field-Compression. A configuration
option that provides a method to negotiate the
compression of the PPP Protocol field.
• Negotiated options:
• Negotiated options:
OSINLCP State OSI Network Layer Control Protocol (OSINLCP) protocol state extensive
information (all platforms except M120 and M320 routers):
• State:
Sample Output
State: Opened
Last started: 2020-02-11 15:06:00 PDT
Last completed: 2020-02-11 15:06:00 PDT
Negotiated options:
Magic number: 906403799, Initial Advertised MRU: 1492, Local MRU: 1492,
Peer MRU: 149
Connection-Update-Requests: 1
Authentication: Off
IPCP
State: Opened
Last started: 2020-02-11 15:06:00 PDT
Last completed: 2020-02-11 15:06:00 PDT
Negotiated options:
Local address: 198.51.100.30, Remote address: 203.0.113.9
Negotiation mode: Passive
IPV6CP
State: Opened
Last started: 2020-02-11 15:06:00 PDT
Last completed: 2020-02-11 15:06:00 PDT
Negotiated options:
Local interface identifier: 2001:db8::fc73:cba, Remote interface
identifier: 2001:db8::3a
Negotiation mode: Passive
Release Information
IN THIS SECTION
Syntax | 1032
Description | 1032
Options | 1032
Syntax
Description
Options
recovery (Optional) Display recovery state of PPP after a GRES or restart. It is safe to force another
GRES or restart only when the recovery state indicates the recovery is done.
NOTE: When you issue this command option during the recovery process, the
command may time out or fail silently rather than display output. Recovery is not
complete until the command displays Recovery state: recovery done.
view
Output Fields
Table 36 on page 1033 lists the output fields for the show ppp statistics command. Output fields are
listed in the approximate order in which they appear.
Sessions in Number of PPP sessions disabled. Number of sessions where the none detail
disabled phase link is either administratively or physically down. Once the PPP
process learns from the kernel that Layer 2 is ready to send and
receive traffic, it will do a phase transition from disabled to
established. When LCP and NCP transitions through states, links
transition to the establish phase when terminate packets are
exchanged or some other failure, such as authentication or
expiration of a timer occurs.
1034
Sessions in Number of PPP sessions in establish phase. In order to establish none detail
establish phase communications over a point-to-point link, each end of the PPP
link must first send LCP packets to configure and test the data
link.
Sessions in Number of PPP sessions in authenticate phase. Each end of the none detail
authenticate PPP link must first send LCP packets to configure the data link
phase during the link establishment phase. After the link has been
established, PPP provides for an optional authentication phase
before proceeding to the Network-Layer Protocol (NLP) phase.
Sessions in Number of PPP sessions in the network phase. After a link has none detail
network phase been established and optional facilities have been negotiated as
needed by the LCP, PPP must send Network Control Protocol
(NCP) packets to choose and configure one or more network-
layer protocols, such as IP, IPX, or AppleTalk. Once each of the
chosen network-layer protocols has been configured, datagrams
from each network-layer protocol can be sent over the link.
Bundles in Number of unique bundles to which PPP links are referring. none detail
pending phase
1035
Type If you specify the memory keyword, the following memory memory
statistics are displayed for Ethernet interfaces on M120 and
M320 routers.
Free Number of instances of the structure that are on the free list. detail
Types with a number in the Free column are pooled structures,
and are typically types that are often used.
Limit Maximum number of instances that can be on the free list. Types detail
with a number in the Limit column are pooled structures, and are
typically types that are often used.
Total size Total amount of memory being used by a type of structure detail
(includes active and free instances).
Subscriber Number of PPP subscriber sessions that are in the process of none
sessions being recovered.
pending
retention
Subscriber Number of PPP subscriber sessions that have recovered after a none
sessions GRES or restart.
recovered OK
Subscriber Number of PPP subscriber sessions that have failed to recover none
sessions after a GRES or restart.
recovery failed
Sample Output
Non-tagged 8 2
Total 21088 172 0
Release Information
IN THIS SECTION
Syntax | 1043
Description | 1043
Options | 1044
Syntax
Description
Options
view
Output Fields
Table 37 on page 1044 lists the output fields for the show ppp summary command. Output fields are
listed in the approximate order in which they appear.
Session flags Special conditions present in the session, such as Bundled, TCC, No-
keepalives, Looped, Monitored, and NCP-only.
1045
Sample Output
Release Information
IN THIS SECTION
Syntax | 1046
Description | 1046
Syntax
Description
Display statistics for fixed wireless access messages. The statistics are collected on the primary Routing
Engine because that is where the UDP port is maintained.
view
Output Fields
Table 38 on page 1047 lists the output fields for the show system subscriber-management resiliency
command. Output fields are listed in the approximate order in which they appear.
1047
GTPv2 Message type supported by the General Packet Radio Service (GPRS) Tunnelling
Message Protocol, version 2.
When the dynamic pseudowire interface is created, the SAEGW sends a Modify
Bearer response message to the MME.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1049
Description | 1049
Options | 1049
Syntax
Description
Display the inline IP reassembly statistics for the Packet Forwarding Engines on one or more MPCs or
Next Gen Services MX-SPC3 services card. Inline IP reassembly statistics are collected at the Packet
Forwarding Engine level.
NOTE: For more information on MPCs that support inline IP reassembly, refer to Protocols and
Applications Supported on the MPC1E for MX Series Routers.
Options
none Displays standard inline IP reassembly statistics for all MPCs or MX-SPC3 services card.
fpc fpc (Optional) Displays inline IP reassembly statistics for the specified MPC or MX-SPC3 services
card.
NOTE: Starting with Junos OS Release 14.2, the FPC option is not displayed for MX
Series routers that do not contain switch fabrics, such as MX80 and MX104 routers.
1050
pfe pfe (Optional) Displays inline IP reassembly for the specified Packet Forwarding Engine slot. You
must specify an FPC slot number before specifying a Packet Forwarding Engine slot.
view
Output Fields
Table 39 on page 1050 lists the output fields for the show services inline ip-reassembly statistics
command. Output fields are listed in the approximate order in which they appear.
NOTE: The output fields displayed (per Packet Forwarding Engine) are arranged in a logical sequence
from top to bottom to enable users to understand how the inline IP reassembly statistics are gathered.
The information about total number of fragments received is displayed first, and then the information
about the reassembled packets and those pending reassembly are displayed. Then, the reasons why
the fragments were dropped or not reassembled are displayed. Finally, the information about the
fragments reassembled, fragments dropped, and fragments sent to the backup user plane PIC
(services PIC) are displayed.
1051
Table 39: show services inline ip-reassembly statistics Output Fields (Continued)
Total Fragments Received Total number of fragments received and the current
rate of fragments received for inline IP reassembly.
The following information is also displayed:
• Intermediate Fragments—Number of
intermediate fragments received and current rate
of intermediate fragments processed.
Table 39: show services inline ip-reassembly statistics Output Fields (Continued)
Fragments Dropped Reasons Total number of fragments dropped reasons and the
current rate of total fragment dropped reasons. The
number of dropped reasons and rate corresponding
to each of the following reasons are also displayed:
NOTE:
Table 39: show services inline ip-reassembly statistics Output Fields (Continued)
Reassembly Errors Reasons Number of errors during reassembly and the current
rate of reassembly errors. The number of errors and
the rate for each of the following types of errors are
also displayed:
• ASIC errors
Aged out packets Number of aged out packets and the current number
of packets aged out per second in the instant
preceding the command’s execution.
Table 39: show services inline ip-reassembly statistics Output Fields (Continued)
Total Fragments Dropped Total number of fragments dropped and the current
rate of total number of fragments dropped. The
number of fragments dropped and rate
corresponding to each of the following reasons are
also displayed:
• ASIC errors
Total fragments punted to UPIC Number of fragments sent to the backup user plane
PIC (services PIC) and current rate of fragments sent
per second in the instant preceding the command’s
execution
• These fields indicate how many of the packet fragments received were then dropped due to a
particular reason.
For example, consider a packet that has 10 fragments, 9 of which have been received and stored in
memory. When the tenth fragment arrives, if the memory runs out (Buffers not available), then this
1055
fragment is dropped. Because the tenth fragment has been dropped, the other 9 fragments must also
be dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field)
is incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 10.
For the next packet arriving, which also has 10 fragments, the first four fragments are stored but the
memory runs out for the fifth fragment. Then the first 5 fragments (fifth and the first four) are
dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field) is
incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 5.
For fragments of the packet, if memory becomes available, the next 5 fragments (6 through 10) that
arrive are stored in memory. The fragments are stored until the timeout period elapses, and are
eventually dropped. In this case, the Aged out packets field is incremented by 1 and the Aged out
fragments field (under the Total Fragments Dropped field) is incremented by 5.
The fragment counters (after both packets have been processed) are as follows:
• Current rate refers to the current total number fragments dropped per second in the instant
preceding the command’s execution.
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ip-reassembly | 651
IN THIS SECTION
Syntax | 1057
Description | 1058
Options | 1058
Syntax
Description
Options
view
Output Fields
Table 40 on page 1058 lists the output fields for the show services l2tp client command. Output fields
are listed in the approximate order in which they appear.
Client Name
Sessions Number of L2TP sessions established for tunnels in the tunnel group.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1060
Description | 1060
Options | 1060
Syntax
Description
Options
local-gateway gateway- (Optional) Display L2TP session information for only the specified local
address gateway address.
peer-gateway gateway- (Optional) Display L2TP session information for only the specified peer
address gateway address.
statistics (Optional) Display the number of control packets and bytes transmitted
and received for the destination. You cannot include this option with
any of the level options, brief, detail, or extensive.
view
Output Fields
Table 41 on page 1061 lists the output fields for the show services l2tp destination command. Output
fields are listed in the approximate order in which they appear.
Tunnels Number of tunnel connections for the destination in the All levels for total
following categories:
extensive for active
• total and failed
• active
• failed
1062
Sessions Number of session connections for the destination in All levels for total
the following categories:
extensive for active
• total and failed
• active
• failed
Connections Number of total, active, and failed tunnel and session extensive
connections for the destination.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1067
Description | 1067
Options | 1067
Syntax
Description
Display a list of destinations that are currently locked out and the time remaining for each to remain in
the lockout state.
Options
view
Output Fields
Table 42 on page 1067 lists the output fields for the show services l2tp destination lockout command.
Output fields are listed in the approximate order in which they appear.
Table 42: show services l2tp destination lockout Output Fields (Continued)
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1069
Description | 1069
Options | 1070
Syntax
Description
(M10i and M7i routers only) Display information about active L2TP sessions for LNS.
(MX Series routers only) Display information about active L2TP sessions for LAC and LNS.
1070
Options
interface interface-name (Optional) Display L2TP session information for only the specified adaptive
services or inline services interface. The interface type depends on the line
card as follows:
local-gateway gateway- (Optional) Display L2TP session information for only the specified local
address gateway address.
local-gateway- (Optional) Display L2TP session information for only the specified local
name gateway-name gateway name.
local-session-id session-id (Optional) Display L2TP session information for only the specified local
session identifier.
local-tunnel-id tunnel-id (Optional) Display L2TP session information for only the specified local
tunnel identifier.
peer-gateway gateway- (Optional) Display L2TP session information for only the specified peer
address gateway address.
peer-gateway-name (Optional) Display L2TP session information for only the specified peer
gateway-name gateway name.
statistics (Optional) Display the number of control packets and bytes transmitted and
received for the session. You cannot include this option with any of the
level options, brief, detail, or extensive.
tunnel-group group-name (Optional) Display L2TP session information for only the specified tunnel
group. To display information about L2TP CPU and memory usage, you can
include the tunnel group name in the show services service-sets memory-
usage group-name and show services service-sets cpu-usage group-name
commands. This option is not available for L2TP LAC on MX Series routers.
1071
user username (M Series routers only) (Optional) Display L2TP session information for only
the specified username.
view
Output Fields
Table 43 on page 1071 lists the output fields for the show services l2tp session command. Output fields
are listed in the approximate order in which they appear.
Tunnel local ID Identifier of the local endpoint of the tunnel, as assigned by the All levels
L2TP network server (LNS).
Session local Identifier of the local endpoint of the L2TP session, as assigned All levels
ID by the LNS.
Session remote Identifier of the remote endpoint of the L2TP session, as All levels
ID assigned by the L2TP access concentrator (LAC).
1072
Bundle ID (LNS only) Bundle identifier. Indicates the session is part of a All levels
multilink bundle. Sessions that have a blank Bundle field are not
participating in the Multilink Protocol. Sessions in a multilink
bundle might belong to different L2TP tunnels. For L2TP output
organized by bundle ID, issue the show services l2tp multilink
extensive command.
Mode (LNS) Mode of the interface representing the session: shared or extensive
exclusive.
Username (LNS only) Name of the user logged in to the session. All levels
Local name For LNS, name of the LNS instance in which the session was extensive
created. For LAC, name of the LAC.
Remote name For LNS, name of the LAC from which the session was created. extensive
For LAC, name of the LAC instance.
Local MRU (LNS only) Maximum receive unit (MRU) setting of the local extensive
device, in bytes.
Remote MRU (LNS only) MRU setting of the remote device, in bytes. extensive
1074
Tx speed Transmit speed of the session conveyed from the LAC to the extensive
LNS, in bits per second (bps) and the source method from which
the speed is derived.
For Junos OS Release 17.2 and Release 17.3, only the current
(update) line speed can be displayed on MX Series routers.
Rx speed Receive speed of the session conveyed from the LAC to the LNS, extensive
in bits per second (bps) and the source method from which the
speed is derived.
For Junos OS Release 17.2 and Release 17.3, only the current
(update) line speed can be displayed on MX Series routers.
• 1—Synchronous framing
• 2—Asynchronous framing
LCP (LNS only) Whether Link Control Protocol (LCP) renegotiation is extensive
renegotiation configured: On or Off.
Interface ID (LNS only) Identifier used to look up the logical interface for this extensive
session.
Policer burst Maximum policer burst size configured for this session. extensive
size
Create time Date and time when the call was created. extensive
Up time Length of time elapsed since the call became active, in hours, extensive
minutes, and seconds.
Idle time Length of time elapsed since the call became idle, in hours, extensive
minutes, and seconds.
1078
Statistics since Date and time when collection of the following statistics began: extensive
Sample Output
Control Tx 6 196
Control Rx 4 150
Data Tx 0 0
Data Rx 1 80
Errors Tx 0
Errors Rx 0
State: Established
Statistics since: Mon Aug 1 13:27:47 2011
Packets Bytes
Data Tx 4 51
Data Rx 3 36
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1084
Description | 1084
Options | 1084
Syntax
Description
Display information about all session-limit groups or a specific session limit group.
Options
view
Output Fields
Table 44 on page 1084 lists the output fields for the show services l2tp session-limit-group command.
Output fields are listed in the approximate order in which they appear.
Tunnels Number of tunnels associated with the session-limit group in the tunnel group.
1085
Maximum limit Maximum number of sessions allowed for the session-limit group.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1086
Description | 1086
Options | 1087
Syntax
Description
(M10i and M7i routers: LNS only. MX Series routers: LAC and LNS.) Display Layer 2 Tunneling Protocol
(L2TP) summary information.
1087
Options
none Display complete L2TP summary information. For LNS on M Series routers, display
L2TP summary information for all adaptive services interfaces. For LNS on MX Series
routers, display L2TP summary information for all inline services interfaces.
interface sp- (Optional) Display L2TP summary information for only the specified adaptive services
fpc/pic/port interface. This option is not available for L2TP on MX Series routers.
statistics (Optional) Display a summary of control packets and bytes transmitted and received.
view
Output Fields
Table 45 on page 1087 lists the output fields for the show services l2tp summary command. Output
fields are listed in the approximate order in which they appear.
Administrative state Administrative state of the tunnel is drain. In this state you cannot
configure new sessions, destinations, or tunnels at the LAC or LNS.
Failover within a preference State of this tunnel selection method on the LAC. When enabled,
level tunnel selection fails over within a preference level. When disabled,
tunnel selection drops to the next lower preference level. Not
displayed for LNS on M Series routers.
1088
Weighted load balancing State of this tunnel selection method on the LAC. When enabled, the
maximum session limit of a tunnel determines its weight within a
preference level. Tunnel selection proceeds from greatest to least
weight. When disabled, selection defaults to a round robin method.
Not displayed for LNS on M Series routers.
Destination equal load State of this tunnel selection method on the LAC. When enabled, the
balancing LAC selects tunnels based on the session count for destinations and
the tunnel session count. Not displayed for LNS on M Series routers.
Tunnel authentication State of tunnel authentication, indicating whether the LAC and LNS
challenge exchange an authentication challenge and response during the
establishment of the tunnel. The state is Enabled when a secret is
configured in the tunnel profile or on the RADIUS server in the
Tunnel-Password attribute [69]. The state is Disabled when the secret
is not present. Not displayed for LNS on M Series routers.
Calling number avp When the state is Enabled, the LAC includes the value of the Calling
Number AVP 22 in ICRQ packets sent to the LNS. When the state is
Disabled, the attribute is not sent to the LNS. Not displayed for LNS
on M Series routers.
Failover Protocol When the state is enabled, the LAC operates in the default failover-
protocol-fall-back-to-silent-failover manner. When the state is
disabled, the disable-failover-protocol statement has been issued and
the LAC operates only in silent failover mode. Not displayed for LNS
on M Series routers.
1089
Tx connect speed method The connection speed method configured to send the speed values in
the L2TP Tx Connect Speed (AVP 24) and L2TP Rx Connect Speed
(AVP 38). Possible values are:
• actual
This is the default value in Junos OS Releases 15.1, 16.1, 16.2, and
17.1. It is deprecated in Junos Releases 17.2 and higher.
• ancp
• none
• pppoe-ia-tag
• service-profile
• static
This is the default value in Junos Releases 13.3, 14.1, 14.2, 17.2
and higher. It is deprecated in Junos OS Releases 15.1, 16.1, 16.2,
and 17.1.
Rx speed avp when equal Indicates if the Rx connect speed when equal configuration is enabled
or disabled.
Tunnel Tx Address Change Action taken by LAC when it receives a request from a peer to change
the destination IP address, UDP port, or both:
Min Retransmission Minimum number of seconds that the local peer waits for the initial
Timeout for control packets response after transmitting an L2TP control packet. If no response has
been received by the time the period expires, the local peer
retransmits the packet.
Min Retransmission Minimum number of seconds that the local peer waits for the initial
Timeout for control packets response after transmitting an L2TP control packet. If no response has
been received by the time the period expires, the local peer
retransmits the packet.
Max Retransmissions for Maximum number of times control messages are retransmitted for
Established Tunnel established tunnels.
Max Retransmissions for Maximum number of times control messages are retransmitted for
Not Established Tunnel tunnels that are not established.
Tunnel Idle Timeout Period that a tunnel can be inactive–that is, carrying no traffic–before
it times out and is torn down.
Destruct Timeout Period that the router attempts to maintain dynamic destinations,
tunnels, and sessions after they have been destroyed.
1091
Reassembly Service Set Indicates active IP reassembly configured for the interface.
Destination Lockout Timeout period for which all future destinations are locked out,
Timeout meaning that they are not considered for selection when a new tunnel
is created.
Access Line Information State of LAC global configuration for forwarding subscriber line
information to the LNS, Enabled or Disabled.
IPv6 Services for LAC State of LAC IPv6 service configuration for creating the IPv6 (inet6)
Sessions address family for LAC subscribers, allowing the application of IPv6
firewall filters, Enabled or Disabled.
Speed Updates State of LAC global configuration for including connection speed
updates when it forwards subscriber line information to the LNS,
Enabled or Disabled.
Destinations Number of L2TP destinations for the LAC. Not displayed for LNS on M
Series routers.
Control Count of L2TP control packets and bytes sent and received.
Data Count of L2TP data packets and bytes sent and received.
Errors Count of L2TP error packets and bytes sent and received.
Sample Output
Control 6k 9k 688k
Data 70k 70k 3054
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1095
Description | 1096
Options | 1096
Syntax
Description
(M10i and M7i routers only) Display information about active Layer 2 Tunneling Protocol (L2TP) tunnels
for LNS.
(MX Series routers only) Display information about L2TP tunnels for LAC and LNS; the tunnels may or
may not have active sessions.
Options
local-gateway (Optional) Display L2TP tunnel information for only the specified local gateway
gateway-address address.
local-gateway-name (Optional) Display L2TP tunnel information for only the specified local gateway
gateway-name name.
local-tunnel-id (Optional) Display L2TP tunnel information for only the specified local tunnel
tunnel-id identifier.
peer-gateway (Optional) Display L2TP tunnel information for only the specified peer gateway
gateway-address address.
peer-gateway-name (Optional) Display L2TP tunnel information for only the specified peer gateway
gateway-name name.
statistics (Optional) Display the number of control packets and bytes transmitted and
received for the tunnel. The statistics for a tunnel are retained until the tunnel is
disconnected, rather than until the last session in the tunnel is cleared.
Retaining the statistics enables them to increment in the event a new session
subsequently uses the tunnel. You cannot include this option with any of the
level options, brief, detail, or extensive.
tunnel-group group- (Optional) Display L2TP tunnel information for only the specified tunnel group.
name
1097
view
Output Fields
Table 46 on page 1097 lists the output fields for the show services l2tp tunnel command. Output fields
are listed in the approximate order in which they appear.
Local ID On the LNS, number assigned by the LNS that identifies the local endpoint of the
tunnel relative to the LNS: the LNS.
On the LAC, number assigned by the LAC that identifies the local endpoint of the
tunnel relative to the LAC: the LAC.
Remote ID On the LNS, number assigned by the LAC that identifies the remote endpoint of the
tunnel relative to the LNS: the LAC.
On the LAC, number assigned by the LNS that identifies the remote endpoint of the
tunnel relative to the LAC: the LNS.
• Established—The tunnel is operating. This is the only state supported for the LAC.
Tunnel Name (LAC only) Name of the created tunnel. This value includes the destination name
followed by the value of the RADIUS Tunnel-Assignment-ID VSA [82].
Local name Name used for local tunnel endpoint during tunnel negotiation.
Remote name Name used for remote tunnel endpoint during tunnel negotiation.
1099
Effective Peer (LAC only) Peer resynchronization mechanism (PRM) in effect for the tunnel:
Resync
• Failover protocol
Mechanism
• Silent failover—Recovery takes place in the failed endpoint only using the
proprietary silent failover protocol.
Nas Port NAS port method (type), which indicates whether the LAC sends Cisco NAS Port Info
Method AVP (100) in ICRQs to the LNS:
Tunnel Logical Logical system in which the L2TP tunnel is brought up.
System
Tunnel Routing Routing instance in which the L2TP tunnel is brought up.
Instance
Max sessions Maximum number of sessions that can be established on this tunnel.
The displayed limit for configured sessions is set to the lowest of the following
configured session values for either LAC or LNS:
Window size Number of control messages that can be sent without receipt of an acknowledgment.
Create time Date and time when the tunnel was created. While the LNS and LAC are connected,
this value should correspond to the when the call was created. If connection to the
LAC is severed, the State changes to Unknown and the Create time value resets.
Up time Amount of time elapsed since the tunnel became active, in hours, minutes, and
seconds.
Idle time Amount of time elapsed since the tunnel became idle, in hours, minutes, and seconds.
Statistics since Date and time when collection of the following statistics began:
Sample Output
17185 1 203.0.113.101:1701 1
Established
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1105
Description | 1105
Options | 1105
Syntax
Description
Display information about all L2TP tunnel groups or a specific L2TP tunnel group.
Options
view
Output Fields
Table 47 on page 1106 lists the output fields for the show services l2tp tunnel-group command. Output
fields are listed in the approximate order in which they appear.
1106
Sessions Number of L2TP sessions established for tunnels in the tunnel group.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1107
Description | 1107
Options | 1108
Syntax
Description
Options
none Display standard information for all L2TP switched tunnel destinations.
statistics (Optional) Display the number of control packets and bytes transmitted and received
for the destination. You cannot include this option with either of the level options,
detail or extensive.
view
Output Fields
Table 48 on page 1108 lists the output fields for the show services l2tp tunnel-switch destination
command. Output fields are listed in the approximate order in which they appear.
Tunnels Number of tunnel connections for the destination All levels for total
in the following categories:
extensive for active and
• total failed
• active
• failed
1109
Table 48: show services l2tp tunnel-switch destination Output Fields (Continued)
Sessions Number of session connections for the destination All levels for total
in the following categories:
extensive for active and
• total failed
• active
• failed
Table 48: show services l2tp tunnel-switch destination Output Fields (Continued)
Sample Output
Packets Bytes
Control Tx 4 184
Control Rx 4 243
Data Tx 5 71
Data Rx 0 0
Errors Tx 0
Errors Rx 0
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1114
Description | 1114
Options | 1114
Syntax
Description
Options
none Display standard information about all active L2TP switched tunnel sessions.
statistics (Optional) Display the number of control packets and bytes transmitted and received
for the session. You cannot include this option with either of the level options, detail
or extensive.
Additional Information
view
1115
Output Fields
Table 49 on page 1115 lists the output fields for the show services l2tp tunnel-switch session
command. Output fields are listed in the approximate order in which they appear.
Tunnel local ID Identifier of the local endpoint of the tunnel, as assigned by the All levels
L2TP network server (LNS).
Local ID Identifier of the local endpoint of the L2TP session, as assigned none
by the LNS.
Table 49: show services l2tp tunnel-switch session Output Fields (Continued)
Session local Identifier of the local endpoint of the L2TP session, as assigned detailextensive
ID by the LNS.
Session remote Identifier of the remote endpoint of the L2TP session, as detailextensive
ID assigned by the L2TP access concentrator (LAC).
Mode (LNS) Mode of the interface representing the session: shared or detailextensive
exclusive.
Local name For LNS, name of the LNS instance in which the session was detailextensive
created. For LAC, name of the LAC.
Remote name For LNS, name of the LAC from which the session was created. detailextensive
For LAC, name of the LAC instance.
1117
Table 49: show services l2tp tunnel-switch session Output Fields (Continued)
• 1—Synchronous framing
• 2—Asynchronous framing
LCP (LNS only) Whether Link Control Protocol (LCP) renegotiation is extensive
renegotiation configured: On or Off.
Interface ID (LNS only) Identifier used to look up the logical interface for this extensive
session.
Tx speed Transmit speed of the session conveyed from the LAC to the extensive
LNS, in bits per second (bps).
1118
Table 49: show services l2tp tunnel-switch session Output Fields (Continued)
Rx speed Receive speed of the session conveyed from the LAC to the LNS, extensive
in bits per second (bps).
Create time Day, date, and time when the call was created. extensive
Up time Length of time elapsed since the call became active, in hours, extensive
minutes, and seconds.
Idle time Length of time elapsed since the call became idle, in hours, extensive
minutes, and seconds.
Statistics since Date and time when collection of the following statistics began: extensive
Sample Output
ID ID unit Name
58296 1 Established 1073741843 si-2/1/0
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1121
Description | 1121
Options | 1121
Syntax
Description
Options
statistics (Optional) Display the number of control packets and bytes transmitted and received for all
switched tunnels and sessions.
1122
Additional Information
view
Output Fields
Table 50 on page 1122 lists the output fields for the show services l2tp tunnel-switch summary
command. Output fields are listed in the approximate order in which they appear.
LNS local session id Identifier assigned by the LNS function on the LTS to the local
endpoint of the L2TP session originating on a remote LAC (the first
session)
LAC local session id Identifier assigned by the LAC function on the LTS to the local
endpoint of the L2TP session originating on the LTS (the second
session).
LNS state State of the L2TP session (the first session) between a remote LAC
and the LNS function on the LTS.
LAC state State of the L2TP session (the second session) between the LAC
function on the LTS and a remote LNS.
1123
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1124
Description | 1124
Options | 1124
Syntax
Description
Options
statistics (Optional) Display the number of control packets and bytes transmitted and received
for the tunnel. You cannot include this option with either of the level options, detail
or extensive.
Additional Information
1125
view
Output Fields
Table 51 on page 1125 lists the output fields for the show services l2tp tunnel-switch tunnel command.
Output fields are listed in the approximate order in which they appear.
Local ID On the LNS, number assigned by the LNS that identifies the local none
endpoint of the tunnel relative to the LNS: the LNS.
On the LAC, number assigned by the LAC that identifies the local
endpoint of the tunnel relative to the LAC: the LAC.
Remote ID On the LNS, number assigned by the LAC that identifies the none
remote endpoint of the tunnel relative to the LNS: the LAC.
Sessions Number of L2TP sessions established through the tunnel. All levels
Table 51: show services l2tp tunnel-switch tunnel Output Fields (Continued)
Tunnel local ID On the LNS, number assigned by the LNS that identifies the local detailextensive
endpoint of the tunnel relative to the LNS: the LNS.
On the LAC, number assigned by the LAC that identifies the local
endpoint of the tunnel relative to the LAC: the LAC.
Tunnel remote On the LNS, number assigned by the LAC that identifies the detailextensive
ID remote endpoint of the tunnel relative to the LNS: the LAC.
Table 51: show services l2tp tunnel-switch tunnel Output Fields (Continued)
Tunnel Name (LAC only) Name of the created tunnel. This value includes the detailextensive
destination name followed by the value of the RADIUS Tunnel-
Assignment-ID VSA [82].
Local name Name used for local tunnel endpoint during tunnel negotiation. detailextensive
Remote name Name used for remote tunnel endpoint during tunnel detailextensive
negotiation.
Effective Peer (LAC only) Peer resynchronization mechanism (PRM) in effect for detailextensive
Resync the tunnel:
Mechanism
• Failover protocol
Tunnel Logical Logical system in which the L2TP tunnel is brought up. detailextensive
System
Tunnel Routing Routing instance in which the L2TP tunnel is brought up. detailextensive
Instance
Max sessions Maximum number of sessions that can be established on this extensive
tunnel.
1128
Table 51: show services l2tp tunnel-switch tunnel Output Fields (Continued)
Window size Number of control messages that can be sent without receipt of extensive
an acknowledgment.
Hello interval Interval between the transmission of hello messages, in seconds. extensive
Create time Date and time when the tunnel was created. While the LNS and extensive
LAC are connected, this value should correspond to the router's
uptime. If connection to the LAC is severed, the State changes to
Unknown and the Create time value resets.
Up time Amount of time elapsed since the tunnel became active, in extensive
hours, minutes, and seconds.
Idle time Amount of time elapsed since the tunnel became idle, in hours, extensive
minutes, and seconds.
Table 51: show services l2tp tunnel-switch tunnel Output Fields (Continued)
Statistics since Date and time when collection of the following statistics began: extensive
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1132
Description | 1132
Options | 1133
Syntax
Description
Display information about dynamic generic routing encapsulation (GRE) tunnels and pseudowire
subscriber (psn) interface devices.
1133
Options
none Display standard information about all active dynamic GRE tunnels.
interface interface-name (Optional) Display information for a specific pseudowire subscriber (psn)
interface.
local-ip local-ip-address (Optional) Display information for a specific local or source IP address of
the GRE tunnel endpoint (Wi-Fi access gateway side).
remote-ip remote-ip- (Optional) Display information for a specific remote IP address of the GRE
address tunnel endpoint.
tunnel-group group-name (Optional) Display information for a specific dynamic GRE tunnel group.
view
Output Fields
Table 52 on page 1133 describes the output fields for the show services soft-gre tunnel command.
Output fields are listed in the approximate order in which they appear.
Interface or Name of the pseudowire subscriber (ps0) interface configured for the All levels
Interface GRE tunnel
Name
1134
Local IP Local or source IP address of the GRE tunnel endpoint (Wi-Fi access All levels
gateway side)
extensive
Routing Type of routing instance used for the GRE tunnel detail
Instance
extensive
Create time Date and time when the GRE tunnel was created: yyyy-mm-dd detail
hh:mm:ss timezone
extensive
Statistics since Day of the week, date, time, and year when statistics for packets extensive
received and transmitted were recorded: Dayofweek Month date
hh:mm:ss yyyy
Statistic Type of data through the GRE tunnel: Data Rx (data received) and Data extensive
Tx (transmitted)
Packets Number of data packets received (Data Rx) and transmitted (Data Tx) extensive
through the GRE tunnel
Bytes Number of data bytes received (Data Rx) and transmitted (Data Tx) extensive
through the GRE tunnel
1135
Sample Output
Release Information
RELATED DOCUMENTATION
show subscribers
IN THIS SECTION
Syntax | 1136
Description | 1137
Options | 1137
Syntax
show subscribers
<detail | extensive | terse>
<aci-interface-set-name aci-interface-set-name>
<address address>
<agent-circuit-identifier agent-circuit-identifier>
<agent-remote-identifier agent-remote-identifier>
<aggregation-interface-set-name interface-set-name>
<client-type client-type>
<count>
<id session-id <accounting-statistics>>
<interface interface <accounting-statistics>>
<logical-system logical-system>
1137
<mac-address mac-address>
<physical-interface physical-interface-name>
<profile-name profile-name>
<routing-instance routing-instance>
<stacked-vlan-id stacked-vlan-id>
<subscriber-state subscriber-state>
<user-name user-name>
<vci vci-identifier>
<vpi vpi-identifier>
<vlan-id vlan-id>
Description
Options
address (Optional) Display subscribers whose IP address matches the specified address. You
must specify the IPv4 or IPv6 address prefix without a netmask (for example,
192.0.2.0). If you specify the IP address as a prefix with a netmask (for example,
192.0.2.0/32), the router displays a message that the IP address is invalid, and
rejects the command.
agent-circuit- (Optional) Display all dynamic subscriber sessions whose ACI value matches the
identifier specified string. You can specify either the complete ACI string or a substring. To
specify a substring, you must enter characters that form the beginning of the string,
1138
followed by an asterisk (*) as a wildcard to substitute for the remainder of the string.
The wildcard can be used only at the end of the specified substring; for example:
Starting in Junos OS Release You must specify the complete ACI string; you
14.1R1 cannot specify a wildcard.
Starting in Junos OS Release You can specify a substring, but you must
15.1R7, 16.1R7, 16.2R3, 17.1R3, include the wildcard character at the end of
17.2R3, 17.3R3, 17.4R2, 18.1R2, the substring.
18.2R1
agent-remote- (Optional) Display all dynamic subscriber sessions whose ARI value matches the
identifier specified string. You must specify the complete ACI string; you cannot specify a
wildcard.
aggregation- (Optional) Display summary information for the specified aggregation node interface
interface-set- set, including interface, VLAN ID, username and LS:RI.
name interface-
set-name
client-type (Optional) Display subscribers whose client type matches one of the following client
types:
count (Optional) Display the count of total subscribers and active subscribers for any
specified option. You can use the count option alone or with the address, client-
type, interface, logical-system, mac-address, profile-name, routing-instance,
stacked-vlan-id, subscriber-state, or vlan-id options.
id session-id (Optional) Display a specific subscriber session whose session ID matches the
specified subscriber ID. You can display subscriber IDs by using the show
subscribers extensive or the show subscribers interface extensive commands.
id session-id (Optional) Display accurate subscriber accounting statistics for a subscriber session
accounting- with the specified ID. Requires the actual-transmit-statistics statement to be
statistics
configured in the dynamic profile for the dynamic logical interface. If the statement
is not configured, a value of 0 is displayed for accounting statistics.
interface (Optional) Display subscribers whose interface matches the specified interface.
interface (Optional) Display subscriber accounting statistics for the specified interface.
accounting- Requires the actual-transmit-statistics statement to be configured in the dynamic
statistics
profile for the dynamic logical interface.
logical-system (Optional) Display subscribers whose logical system matches the specified logical
system.
mac-address (Optional) Display subscribers whose MAC address matches the specified MAC
address.
physical- (M120, M320, and MX Series routers only) (Optional) Display subscribers whose
interface-name physical interface matches the specified physical interface.
1140
profile-name (Optional) Display subscribers whose dynamic profile matches the specified profile
name.
routing-instance (Optional) Display subscribers whose routing instance matches the specified routing
instance.
stacked-vlan-id (Optional) Display subscribers whose stacked VLAN ID matches the specified
stacked VLAN ID.
subscriber-state (Optional) Display subscribers whose subscriber state matches the specified
subscriber state (ACTIVE, CONFIGURED, INIT, TERMINATED, or TERMINATING).
user-name (M120, M320, and MX Series routers only) (Optional) Display subscribers whose
username matches the specified subscriber name.
vci-identifier (MX Series routers with MPCs and ATM MICs with SFP only) (Optional) Display
active ATM subscribers whose ATM virtual circuit identifier (VCI) matches the
specified VCI identifier. The range of values is 0 through 255.
vpi-identifier (MX Series routers with MPCs and ATM MICs with SFP only) (Optional) Display
active ATM subscribers whose ATM virtual path identifier (VPI) matches the
specified VPI identifier. The range of values is 0 through 65,535.
vlan-id (Optional) Display subscribers whose VLAN ID matches the specified VLAN ID,
regardless of whether the subscriber uses a single-tagged or double-tagged VLAN.
For subscribers using a double-tagged VLAN, this option displays subscribers where
the inner VLAN tag matches the specified VLAN ID. To display only subscribers
where the specified value matches only double-tagged VLANs, use the stacked-
vlan-id stacked-vlan-id option to match the outer VLAN tag.
NOTE: Because of display limitations, logical system and routing instance output values are
truncated when necessary.
view
1141
Output Fields
Table 53 on page 1141 lists the output fields for the show subscribers command. Output fields are listed
in the approximate order in which they appear.
Interface Interface associated with the subscriber. The router or switch displays
subscribers whose interface matches or begins with the specified interface.
IP Address/VLAN Subscriber IP address or VLAN ID associated with the subscriber in the form
ID tpid.vlan-id
LS:RI Logical system and routing instance associated with the subscriber.
Type Subscriber client type (DHCP, FWA, GRE, L2TP, PPP, PPPoE, STATIC-
INTERFACE, VLAN).
Domain name IP addresses for the DNS server, displayed in order of configuration.
server inet
This field is displayed with the extensive option only when the addresses are
derived from the access profile or the global access configuration.
Domain name IPv6 addresses for the DNS server, displayed in order of configuration.
server inet6
This field is displayed with the extensive option only when the addresses are
derived from the access profile or the global access configuration.
IPv6 Prefix Subscriber IPv6 prefix. If you are using DHCPv6 prefix delegation, this is the
delegated prefix.
IPv6 Address Pool Subscriber IPv6 address pool. The IPv6 address pool is used to allocate IPv6
prefixes to the DHCPv6 clients.
Interface (Enhanced subscriber management for MX Series routers) Name of the enhanced
subscriber management logical interface, in the form demux0.nnnn (for example,
demux0.3221225472), to which access-internal and framed subscriber routes
are mapped.
Interface Set Internally generated name of the dynamic ACI or ALI interface set used by the
subscriber session. The prefix of the name indicates the string received in DHCP
or PPPoE control packets on which the interface set is based. For ALI interface
sets, the prefix indicates that the value is configured as a trusted option to
identify the subscriber line.
The name of the interface set uses one of the following prefixes:
• noids—Neither the ACI nor the ARI were received; for example, noids-1033-
demux0.3221225524.
Besides dynamic ACI and ALI interface sets, this field can be an interface set
based on a substring of the ARI string. This occurs when the dynamic profile
includes the predefined variable $junos-pon-id-interface-set-name, and the
profile is applied for a passive optical network (PON). The ARI string is inserted
by the optical line terminal (OLT). The final substring in the string, unique for the
PON, identifies individual subscriber circuits, and is used as the name of the
interface set.
Interface Set Type Interface type of the ACI interface set: Dynamic. This is the only ACI interface
set type currently supported.
Interface Set Identifier of the dynamic ACI interface set entry in the session database.
Session ID
1145
Dynamic Profile Version number of the dynamic profile used for the subscriber.
Version
State Current state of the subscriber session (Init, Configured, Active, Terminating,
Tunneled).
L2TP State Current state of the L2TP session, Tunneled or Tunnel-switched. When the
value is Tunnel-switched, two entries are displayed for the subscriber; the first
entry is at the LNS interface on the LTS and the second entry is at the LAC
interface on the LTS.
Tunnel switch Name of the L2TP tunnel switch profile that initiates tunnel switching.
Profile Name
Stacked VLAN Id Stacked VLAN ID associated with the subscriber in the form tpid.vlan-id.
Agent Circuit ID For the dhcp client type, option 82 agent circuit ID associated with the
subscriber. The ID is displayed as an ASCII string unless the value has
nonprintable characters, in which case it is displayed in hexadecimal format.
For the vlan-oob client type, the agent circuit ID or access-loop circuit identifier
that identifies the subscriber line based on the subscriber-facing DSLAM
interface on which the subscriber request originates.
Agent Remote ID For the dhcp client type, option 82 agent remote ID associated with the
subscriber. The ID is displayed as an ASCII string unless the value has
nonprintable characters, in which case it is displayed in hexadecimal format.
For the vlan-oob client type, the agent remote ID or access-loop remote
identifier that identifies the subscriber line based on the NAS-facing DSLAM
interface on which the subscriber request originates.
ATM VPI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual path
identifier (VPI) on the subscriber’s physical interface.
ATM VCI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual circuit
identifier (VCI) for each VPI configured on the subscriber interface.
Login Time Date and time at which the subscriber logged in.
DHCPV6 Options len = number of hex values in the message. The hex values specify the type,
length, value (TLV) for DHCPv6 options.
Server DHCP len = number of hex values in the message. The hex values specify the type,
Options length, value (TLV) for DHCP options.
Server DHCPV6 len = number of hex values in the message. The hex values specify the type,
Options length, value (TLV) for DHCPv6 options.
DHCPV6 Header len = number of hex values in the message. The hex values specify the type,
length, value (TLV) for DHCPv6 options.
Effective shaping- Actual downstream traffic shaping rate for the subscriber, in kilobits per second.
rate
1148
Dynamic Values for variables that are passed into the dynamic profile from RADIUS.
configuration
Service activation Time at which the first family in this service became active.
time
IPv4 rpf-check Name of the filter applied by the dynamic profile to IPv4 packets that fail the
Fail Filter Name RPF check.
IPv6 rpf-check Name of the filter applied by the dynamic profile to IPv6 packets that fail the
Fail Filter Name RPF check.
DHCP Options len = number of hex values in the message. The hex values specify the type,
length, value (TLV) for DHCP options, as defined in RFC 2132.
Underlying For DHCPv6 subscribers on a PPPoE network, displays the session ID of the
Session ID underlying PPPoE interface.
1149
Service Sessions Number of service sessions (that is, a service activated using RADIUS CoA)
associated with the subscribers.
Session Timeout Number of seconds of access provided to the subscriber before the session is
(seconds) automatically terminated.
Idle Timeout Number of seconds subscriber can be idle before the session is automatically
(seconds) terminated.
IPv6 Delegated Name of the pool used for DHCPv6 prefix delegation.
Address Pool
IPv6 Delegated Length of the prefix configured for the IPv6 delegated address pool.
Network Prefix
Length
IPv6 Interface Address assigned by the Framed-Ipv6-Prefix AAA attribute. This field is displayed
Address only when the predefined variable $junos-ipv6-address is used in the dynamic
profile.
ADF IPv4 Input Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 input filter (client
Filter Name or service session). The filter name is followed by the rules (in hexadecimal
format) associated with the ADF filter and the decoded rule in Junos OS filter
style.
1150
ADF IPv4 Output Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 output filter
Filter Name (client or service session). The filter name is followed by the rules (in hexadecimal
format) associated with the ADF filter and the decoded rule in Junos OS filter
style.
ADF IPv6 Input Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 input filter (client
Filter Name or service session). The filter name is followed by the rules (in hexadecimal
format) associated with the ADF filter and the decoded rule in Junos OS filter
style.
ADF IPv6 Output Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 output filter
Filter Name (client or service session). The filter name is followed by the rules (in hexadecimal
format) associated with the ADF filter and the decoded rule in Junos OS filter
style.
IPv4 Input Filter Name assigned to the IPv4 input filter (client or service session).
Name
IPv4 Output Filter Name assigned to the IPv4 output filter (client or service session).
Name
IPv6 Input Filter Name assigned to the IPv6 input filter (client or service session).
Name
IPv6 Output Filter Name assigned to the IPv6 output filter (client or service session).
Name
IFL Input Filter Name assigned to the logical interface input filter (client or service session).
Name
IFL Output Filter Name assigned to the logical interface output filter (client or service session).
Name
1151
DSL type PPPoE subscriber’s access line type reported by the PPPoE intermediate agent in
a PADI or PADO packet in the Vendor-Specific-Tags TLV in subattribute DSL-
Type (0x0091). The DSL type is one of the following types: ADSL, ADSL2,
ADSL2+, OTHER, SDSL, VDSL, or VDSL2.
Frame/Cell Mode Mode type of the PPPoE subscriber’s access line determined by the PPPoE
daemon based on the received subattribute DSL-Type (0x0091):
• Cell—When the DSL line type is one of the following: ADSL, ADSL2, or
ADSL2+.
• Frame—When the DSL line type is one of the following: OTHER, SDSL, VDSL,
or VDSL2.
Overhead Number of bytes added to or subtracted from the actual downstream cell or
accounting bytes frame overhead to account for the technology overhead of the DSL line type.
The value is determined by the PPPoE daemon based on the received
subattribute DSL-Type (0x0091). The value is stored in the subscriber session
database.
Actual upstream Unadjusted upstream data rate for the PPPoE subscriber’s access line reported
data rate by the PPPoE intermediate agent in a PADI or PADO packet in the Vendor-
Specific-Tags TLV in subattribute Actual-Net-Data-Rate-Upstream (0x0081).
Actual Unadjusted downstream data rate for the PPPoE subscriber’s access line
downstream data reported by the PPPoE intermediate agent in a PADI or PADO packet in the
rate Vendor-Specific-Tags TLV in subattribute Actual-Net-Data-Rate-Downstream
(0x0082).
Adjusted Adjusted downstream data rate for the PPPoE subscriber’s access line, calculated
downstream data by the PPPoE daemon and stored in the subscriber session database.
rate
1152
Adjusted Adjusted upstream data rate for the PPPoE subscriber’s access line, calculated by
upstream data the PPPoE daemon and stored in the subscriber session database.
rate
Local TEID-U Tunnel endpoint identifier on the BNG for the GTP-U user plane tunnel to the
eNodeB. The identifier is allocated by the BNG.
A fully qualified local TEID-C consists of this identifier and the GTPU Tunnel
Local IP address value.
Local TEID-C Tunnel endpoint identifier on the BNG for the GTP-C control plane tunnel to the
MME. The identifier is allocated by the BNG.
A fully qualified local TEID-C consists of this identifier and the GTPC Local IP
address value.
Remote TEID-U Tunnel endpoint identifier on the eNodeB for the GTP-U user plane tunnel to the
BNG. The identifier is allocated by the eNodeB.
A fully qualified remote TEID-U consists of this identifier and the GTPU Tunnel
Remote IP address value.
Remote TEID-C Tunnel endpoint identifier on the MME for the GTP-C control plane tunnel to the
BNG. The identifier is allocated by the MME.
A fully qualified remote TEID-C consists of this identifier and the GTPC Remote
IP address value.
GTPU Tunnel IP address of the S1-U interface on the eNodeB for the GTP-U tunnel endpoint.
Remote IP
A fully qualified remote TEID-U consists of this address and the Remote TEID-U
address
value.
GTPU Tunnel IP address of the S1-U interface on the BNG for the GTP-U tunnel endpoint.
Local IP address
A fully qualified local TEID-U consists of this address and the Local TEID-U value
1153
GTPC Remote IP IP address of the S11 interface on the MME for the GTP-C tunnel endpoint.
address
A fully qualified remote TEID-C consists of this address and the Remote TEID-C
value.
GTPC Local IP IP address of the S11 interface on the BNG for the GTP-C tunnel endpoint.
address
A fully qualified local TEID-C consists of this address and the Local TEID-C value.
Access Point Access point name (APN) for the user equipment. The APN corresponds to the
Name connection and service parameters that the subscriber’s mobile device can use
for connecting to the carrier’s gateway to the Internet.
Tenant Name of the tenant system. You can create multiple tenant system
administrators for a tenant system with different permission levels based on your
requirements.
Routing instance Name of the routing instance. When a custom routing instance is created for a
tenant system, all the interfaces defined in that tenant system are added to that
routing instance.
Dynamic Profile Configured name for a specific variation of a base dynamic profile. IT’s presence
Version Alias indicates that the profile configuration is different from that of the base profile.
The value is conveyed to the RADIUS server during authentication in the Client-
Profile-Name VSA (26–4874–174).
Sample Output
ge-1/3/0.1073741824 10 default:default
demux0.1073741824 203.0.113.10 WHOLESALER-CLIENT default:default
demux0.1073741825 203.0.113.3 RETAILER1-CLIENT test1:retailer1
demux0.1073741826 203.0.113.3 RETAILER2-CLIENT test1:retailer2
default:default
2001:db8:3ffe:0:4::/64
Type: DHCP
IP Address: 203.0.113.27
IP Netmask: 255.255.0.0
Logical System: default
1157
State: Active
L2TP State: Tunnel-switched
Tunnel switch Profile Name: ce-lts-profile
Local IP Address: 203.0.113.51
Remote IP Address: 192.0.2.0
Radius Accounting ID: 21
Session ID: 21
Login Time: 2013-01-18 03:01:11 PST
Type: L2TP
User Name: [email protected]
Logical System: default
Routing Instance: default
Interface: si-2/1/0.1073741843
Interface type: Dynamic
Dynamic Profile Name: dyn-lts-profile
State: Active
L2TP State: Tunnel-switched
Tunnel switch Profile Name: ce-lts-profile
Local IP Address: 203.0.113.31
Remote IP Address: 192.0.2.1
Session ID: 22
Login Time: 2013-01-18 03:01:14 PST
Type: PPPoE
User Name: [email protected]
IP Address: 203.0.113.13
IPv6 Prefix: 2001:db8:1::/32
IPv6 User Prefix: 2001:db8:1:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
Dynamic Profile Name: dualStack-Profile1
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 2
Session ID: 2
Login Time: 2011-11-30 00:18:05 PST
Type: DHCP
IPv6 Prefix: 2001:db8:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: test :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
1166
00 00
show subscribers detail (PPPoE Subscriber Session with ACI Interface Set)
Session ID: 3
Agent Circuit ID: aci-ppp-dhcp-dvlan-50
Login Time: 2012-03-07 13:46:53 PST
Type: PPPoE
User Name: DEFAULTUSER
IP Address: 192.0.2.21
IP Netmask: 255.255.255.255
IPv6 Address: 2001:db8::17
Logical System: default
Routing Instance: default
Interface: pp0.3221225720
Interface type: Dynamic
Underlying Interface: demux0.3221225719
Dynamic Profile Name: pppoe-client-profile
Dynamic Profile Version Alias: profile-version1a
MAC Address: 00:00:5E:00:53:38
State: Active
Radius Accounting ID: 288
Session ID: 288
PFE Flow ID: 344
VLAN Id: 1
Login Time: 2019-09-23 10:40:56 IST
State: Active
Radius Accounting ID: 1
Session ID: 1
Login Time: 2011-08-25 12:12:26 PDT
DHCP Options: len 42
00 08 00 02 00 00 00 01 00 0a 00 03 00 01 00 51 ff ff 00 03
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
IPv6 Address Pool: pd_pool
IPv6 Network Prefix Length: 48
show subscribers extensive (Aggregation Node Interface Set and DSL Forum Attributes)
Type: PPPoE
IP Address: 192.85.128.1
IP Netmask: 255.255.255.255
Logical System: default
Routing Instance: default
Interface: pp0.3221225474
Interface type: Dynamic
Interface Set: ge-1/0/0
Underlying Interface: demux0.3221225473
Dynamic Profile Name: pppoe-client-profile-with-cos
MAC Address: 00:10:94:00:00:03
State: Active
Radius Accounting ID: 3
Session ID: 3
PFE Flow ID: 16
Stacked VLAN Id: 50
VLAN Id: 7
Agent Circuit ID: circuit 201
Agent Remote ID: remote-id
Aggregation Interface-set Name: FRA-DPU-C-100
Login Time: 2018-05-29 08:43:45 EDT
IP Address Pool: pool-1
Accounting interval: 72000
DSL type: G.fast
Frame/cell mode: Frame
Overhead accounting bytes: 10
Actual upstream data rate: 100000 kbps
Actual downstream data rate: 200000 kbps
Calculated downstream data rate: 180000 kbps
Calculated upstream data rate: 90000 kbps
Adjusted upstream data rate: 80000 kbps
Adjusted downstream data rate: 160000 kbps
DSL Line Attributes
Agent Circuit ID: circuit 201
Agent Remote ID: remote-id
Actual upstream data rate: 100000
Actual downstream data rate: 200000
DSL type: G.fast
Access Aggregation Circuit ID: #FRA-DPU-C-100
Attribute type: 0xAA, Attribute length: 4
198 51 100 78
1170
show subscribers extensive (DNS Addresses from Access Profile or Global Configuration)
31 32 2d 30 2d 30 37 05 01 06 0f 21 2c
IP Address Pool: v4-pool
show subscribers extensive (IPv4 DNS Addresses from RADIUS, IPv6 from Access Profile or
Global Configuration)
State: Active
Session ID: 1
Stacked VLAN Id: 0x8100.1001
VLAN Id: 0x8100.1
Login Time: 2011-11-30 00:18:04 PST
Type: PPPoE
User Name: [email protected]
IP Address: 203.0.113.13
IPv6 Prefix: 2001:db8:1::/32
IPv6 User Prefix: 2001:db8:1:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
Dynamic Profile Name: dualStack-Profile1
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 2
Session ID: 2
Login Time: 2011-11-30 00:18:05 PST
IPv6 Delegated Network Prefix Length: 48
IPv6 Interface Address: 2001:db8:2016:1:1::1/64
IPv6 Framed Interface Id: 1:1:2:2
IPv4 Input Filter Name: FILTER-IN-pp0.1073741825-in
IPv4 Output Filter Name: FILTER-OUT-pp0.1073741825-out
IPv6 Input Filter Name: FILTER-IN6-pp0.1073741825-in
IPv6 Output Filter Name: FILTER-OUT6-pp0.1073741825-out
Type: DHCP
IPv6 Prefix: 2001:db8:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: test :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
1175
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
IPv6 Delegated Network Prefix Length: 48
State: Active
Session ID: 59
PFE Flow ID: 71
Stacked VLAN Id: 0x8100.1
VLAN Id: 0x8100.2
Login Time: 2017-03-28 08:23:08 PDT
Type: DHCP
User Name: pcefuser
IP Address: 192.0.2.26
IP Netmask: 255.0.0.0
Logical System: default
Routing Instance: default
Interface: demux0.3221225518
Interface type: Dynamic
Underlying Interface: demux0.3221225517
Dynamic Profile Name: dhcp-client-prof
MAC Address: 00:00:5e:00:53:01
State: Active
Radius Accounting ID: 60
Session ID: 60
PFE Flow ID: 73
Stacked VLAN Id: 1
VLAN Id: 2
Login Time: 2017-03-28 08:23:08 PDT
Service Sessions: 1
DHCP Options: len 9
35 01 01 37 04 01 03 3a 3b
IP Address Pool: pool-ipv4
IPv4 Input Service Set: tdf-service-set
IPv4 Output Service Set: tdf-service-set
PCEF Profile: pcef-prof-1
PCEF Rule/Rulebase: default
Dynamic configuration:
junos-input-service-filter: svc-filt-1
junos-input-service-set: tdf-service-set
junos-output-service-filter: svc-filt-1
junos-output-service-set: tdf-service-set
junos-pcef-profile: pcef-prof-1
junos-pcef-rule: default
State: Active
Family: inet
IPv4 Input Service Set: tdf-service-set
IPv4 Output Service Set: tdf-service-set
PCEF Profile: pcef-prof-1
PCEF Rule/Rulebase: limit-fb
Service Activation time: 2017-03-28 08:31:19 PDT
Dynamic configuration:
pcef-prof: pcef-prof-1
pcef-rule1: limit-fb
svc-filt: svc-filt-1
svc-set: tdf-service-set
Type: PPPoE
User Name: ppphint2
IP Address: 203.0.113.17
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
Interface type: Dynamic
Interface Set: aci-1003-ge-1/0/0.4001
Interface Set Type: Dynamic
Interface Set Session ID: 13
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-pppoe-profile
1180
Type: PPPoE
User Name: ppphint2
IP Address: 203.0.113.17
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
Interface type: Dynamic
Interface Set: aci-1003-ge-1/0/0.4001
Interface Set Type: Dynamic
Interface Set Session ID: 13
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-pppoe-profile
Dynamic Profile Version: 1
MAC Address: 00:00:5e:00:53:52
State: Active
Radius Accounting ID: 14
Session ID: 14
1181
IPv6:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Type: DHCP
User Name: [email protected]
IP Address: 192.0.2.0
IP Netmask: 255.255.255.0
Logical System: default
1183
show subscribers stacked-vlan-id vlan-id interface detail (Combined Output for a Specific
Interface)
user@host> show subscribers stacked-vlan-id 101 vlan-id 100 interface ge-1/2/0.* detail
Type: VLAN
Interface: ge-1/2/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlan-prof
State: Active
Stacked VLAN Id: 0x8100.101
VLAN Id: 0x8100.100
Login Time: 2009-03-27 11:57:19 PDT
1185
Type: VLAN
Interface: ge-1/2/0.1073741825
Interface type: Dynamic
Dynamic Profile Name: vlan-prof-tpid
State: Active
VLAN Id: 100
Login Time: 2009-03-11 06:48:54 PDT
Interface: demux0.3221225482
Interface type: Dynamic
Underlying Interface: demux0.3221225472
Dynamic Profile Name: dhcp-demux-prof
MAC Address: 00:00:5e:00:53:0f
State: Active
Radius Accounting ID: 11
Session ID: 11
PFE Flow ID: 15
Stacked VLAN Id: 210
VLAN Id: 209
Login Time: 2014-03-24 12:53:48 PDT
Service Sessions: 1
DHCP Options: len 3
35 01 01
Release Information
client-type, mac-address, subscriber-state, and extensive options introduced in Junos OS Release 10.2.
count option usage with other options introduced in Junos OS Release 10.2.
1188
Options vci and vpi introduced in Junos OS Release 12.3R3 and supported in later 12.3Rx releases.
Options vci and vpi supported in Junos OS Release 13.2 and later releases. (Not supported in Junos OS
Release 13.1.)
accounting-statistics option added in Junos OS Release 15.1R3 and 17.4R1 on MX Series routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1189
Description | 1189
Options | 1189
Syntax
Description
Options
none Display summary information by state and client type for all subscribers.
all (Optional) Display summary information by state, client type, and LS:RI.
detail | extensive | (Not supported on MX Series routers) (Optional) Display the specified level of
terse output.
count (Not supported on MX Series routers) (Optional) Display the count of total
subscribers and active subscribers for any specified option.
logical-system (Optional) Display subscribers whose logical system matches the specified logical
logical-system system.
physical-interface (M120, M320, and MX Series routers only) (Optional) Display a count of
physical-interface- subscribers whose physical interface matches the specified physical interface, by
name
subscriber state, client type, and LS:RI.
pic (M120, M320, and MX Series routers only) (Optional) Display a count of
subscribers by PIC number and the total number of subscribers.
1190
port (M120, M320, and MX Series routers only) (Optional) Display a count of
subscribers by port number and the total number of subscribers.
routing-instance (Optional) Display subscribers whose routing instance matches the specified
routing-instance routing instance.
slot (M120, M320, and MX Series routers only) (Optional) Display a count of
subscribers by FPC slot number and the total number of subscribers.
NOTE: Due to display limitations, logical system and routing instance output values are
truncated when necessary.
Starting from Junos OS 20.4R1 release, you need license to use the ESSM feature.
view
Output Fields
Table 54 on page 1191 lists the output fields for the show subscribers summary command. Output
fields are listed in the approximate order in which they appear.
1191
Interface Interface associated with the subscriber. The router or All levels
switch displays subscribers whose interface matches or
begins with the specified interface.
ps0: lt-2/1/0
ps1: rlt0: lt-4/0/0
Count Count of subscribers displayed for each PIC, port, or slot detailextensive none
when those options are specified with the summary option.
For an aggregated Ethernet configuration, the total
subscriber count does not equal the sum of the individual
PIC, port, or slot counts, because each subscriber can be in
more than one aggregated Ethernet link.
Total Subscribers Total number of subscribers for all physical interfaces, all detailextensive none
PICs, all ports, or all LS:RI slots.
1193
LS:RI Logical system and routing instance associated with the terse
subscriber.
Sample Output
Subscribers by State
Active: 52194
Total: 52194
Configured 2
Active 183
Terminating 2
Terminated 1
TOTAL 191
TOTAL 191
Subscribers by LS:RI
default:default 1
default:ri1 28
default:ri2 16
ls1:default 22
ls1:riA 38
ls1:riB 44
logsysX:routinstY 42
TOTAL 191
Subscribers by LS:RI
default:default: 3998
Total: 3998
1195
Subscribers by LS:RI
default:default: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Total Subscribers: 30
Interface: xe-3/1/3
Port Count: 3100
Detail:
Subscribers by Client Type
PPPoE: 1600
ESSM: 1100
VLAN-OOB: 400
Subscribers by Connection Type
Tunneled: 500
Terminated: 1100
Cross-connected: 400
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1199
Description | 1199
Options | 1199
1199
Syntax
Description
Display statistics for the specified option. You can customize the output by including one or more
optional filters in the command. With the exception of the extensive option, all filter options can be
combined in a single command.
Options
view
Output Fields
Table 55 on page 1200 lists the output fields for the show system subscriber-management statistics
command. Output fields are listed in the approximate order in which they appear.
Enhanced I/O Statistics Statistics for visibility into packet drops from the queue.
Error Statistics Includes connection packets, flow control, and messages and packets sent to and
received from the daemon.
ERA discards Event Rate Analyzer discards. For DHCP and PPPoE in advanced subscriber
management, ERA packet discard counts are included for Discover, Solicit, and PADI
packets .
Router solicitations are sent to prompt all on-link routers to send it router
advertisements.
route solicit response packet Number of router solicitation responses sent or received.
Sample Output
The following examples displays packet statistics accumulated for DHCP, hybrid access, and PPPoE since
the last time the session manager was cleared.
--------------------------------------------------------------
Rx Statistics
packets : 784711
Tx Statistics
packets : 7013122
Layer 3 Statistics
Rx Statistics
packets : 356218
Tx Statistics
packets : 6604660
DHCP Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 320008
ERA discards : 6274
Tx Statistics
transmit request packets : 320482
sent packets : 320482
Error Statistics
Connection Statistics
no connection packets : 0
PPPoE Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 486165
padis : 36768
padrs : 35421
ppp packets : 341787
ERA discards : 8249
Tx Statistics
packets : 70842
send failures : 6240
Packet Statistics
--------------------------------------------------------------
I/O Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 784711
Tx Statistics
packets : 7013122
Layer 3 Statistics
Rx Statistics
packets : 356218
Tx Statistics
packets : 6604660
DHCP Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 320008
ERA discards : 6274
Tx Statistics
transmit request packets : 320482
sent packets : 320482
Error Statistics
Connection Statistics
no connection packets : 0
allocations : 7032618
frees : 7032624
allocation failures : 0
Layer 3 Statistics
Rx Statistics
packets : 356218
Tx Statistics
packets : 6604660
PFE Event Statistics
packets : 0
--------------------------------------------------------------
DHCP Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 320008
ERA discards : 6274
Tx Statistics
transmit request packets : 320482
sent packets : 320482
DHCPv4 Rx Statistics
total packets : 0
DHCPv4 Tx Statistics
total packets : 0
DHCPv6 Rx Statistics
total packets : 320008
solicit : 36250
request : 36382
renew : 247376
ERA discards : 6274
DHCPv6 Tx Statistics
total packets : 320482
advertise : 36382
reply : 284100
Error Statistics
Connection Statistics
no connection packets : 0
connection down events : 0
connection up events : 0
flow control invoked : 0
flow control released : 0
packets sent to daemon : 320008
packets received from daemon : 320482
1205
NET Statistics:
--------------------------------------------------------------
ICMP6 Statistics
Rx Statistics
packets: : 36271
router solicitations : 36271
Tx Statistics
packets: : 6284178
router advertisements : 6284178
route solicit response packet : 36271
Management Statistics:
--------------------------------------------------------------
dvlan : 33912
dvlan adds : 33912
pppoe : 143651
pppoe add : 35750
pppoe changes : 107901
ip flow : 143633
ip flow add : 107883
PPPoE Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 486165
padis : 36768
padrs : 35421
ppp packets : 341787
ERA discards : 8249
Tx Statistics
packets : 70842
send failures : 6240
I/O Statistics:
--------------------------------------------------------------
Rx Statistics
packets : 784711
Tx Statistics
packets : 7013122
Buffer Statistics
allocations : 7032618
frees : 7032624
allocation failures : 0
Layer 3 Statistics
Rx Statistics
packets : 356218
Tx Statistics
packets : 6604660
PFE Event Statistics
packets : 0
--------------------------------------------------------------
Enhanced I/O Statistics:
--------------------------------------------------------------
bbe_io_rcv l2 : 0
bbe_io_rcv l3 : 0
bbe_io_rcv l3 v4 : 0
packets : 486783
Tx Statistics
packets : 144
Layer 3 Statistics
Rx Statistics
packets : 8
Tx Statistics
packets : 0
PPP Statistics:
--------------------------------------------------------------
Rx Statistics
network packets : 123
plugin packets : 123
lcp config requests : 18
lcp config acks : 18
lcp conf nacks : 8
lcp conf rejects : 6
lcp termination requests : 4
lcp termination acks : 13
lcp code rejects : 2
lcp vendor-specific acks : 10
pap requests : 8
ipcp requests : 27
ipcp acks : 9
ipv6cp requests : 11
ipv6cp acks : 1
Tx Statistics
packets : 101
lcp config requests : 32
lcp config acks : 18
lcp termination requests : 13
lcp termination acks : 4
lcp vendor-specific requests : 10
pap acks : 8
ipcp requests : 9
ipcp acks : 5
ipcp nacks : 9
ipv6cp requests : 1
ipv6cp acks : 1
ipv6cp nacks : 1
NET Statistics:
--------------------------------------------------------------
ICMP6 Statistics
1209
Rx Statistics
packets: : 8
router solicitations : 8
Tx Statistics
packets: : 0
Release Information
Enhanced I/O Statistics introduced as part of Extensive output in Junos OS Release 15.1R4 on MX
Series routers for enhanced subscriber management.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1210
Description | 1210
Options | 1210
Syntax
Description
Options
view
Output Fields
Table 56 on page 1211 lists the output fields for the show system subscriber-management summary
command. Output fields are listed in the approximate order in which they appear.
1211
• Enabled
• Disabled
• Master
• Standby
• Available
• Init
• Not-available
• Disconnected—Not connected
Disconnection Reason Reason why both Routing Engines are disconnected when there is a
DRAM mismatch.
• ABORT
• DAEMON_ISSU_PREPARE
• DAEMON_ISSU_PREPARE_DONE
• DAEMON_SWITCHOVER_PREPARE
• DAEMON_SWITCHOVER_PREPARE_DONE
• FRU_ISSU
• FRU_ISSU_DONE
• IDLE
• UNKNOWN
1213
• ABORT
• IDLE
• PREPARE
• READY
• SWITCHOVER_PREPARE
• SWITCHOVER_READY
• UNKNOWN
Sample Output
Release Information
IN THIS SECTION
Syntax | 1215
Description | 1215
Options | 1215
Syntax
Description
(MX Series routers only) Test and verify Layer 2 Tunneling Protocol (L2TP) tunnel configurations from
the L2TP access concentrator (LAC). The test determines whether the user can be authenticated and
tunneled according to the L2TP configuration. The establishment of all tunnels associated with the user
is tested. You can optionally specify a particular tunnel to test for the user.
Options
user user-name Name of the user under test. You must use an existing configured username,
although it can be created solely for testing a tunnel configuration.
1216
password user- (Optional) Authentication password for the specified user. If you omit this option,
password the test generates a dummy password—testpass—for the user.
view
Output Fields
Table 57 on page 1216 lists the output fields for the test services l2tp tunnel command. Output fields
are listed in the approximate order in which they appear.
Tunnel-peer IP address of the tunnel’s remote peer (the L2TP network server [LNS]).
Sample Output
Release Information
RELATED DOCUMENTATION