Subscriber MGMT Vlan Interface
Subscriber MGMT Vlan Interface
Junos OS
Published
2019-12-20
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in
the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks
are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
®
Junos OS Broadband Subscriber VLANs and Interfaces User Guide
Copyright © 2019 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with)
Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement
(“EULA”) posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you
agree to the terms and conditions of that EULA.
iii
Table of Contents
About the Documentation | xxi
Customer VLANs | 3
Service VLANs | 4
Hybrid VLANs | 4
Configuring an Access Pseudowire That Terminates into VRF on the Service Node | 11
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring a VLAN Dynamic Profile That Associates VLANs with Separate Routing Instances | 29
Using DHCP Option 18 and Option 37 in Authentication Usernames for DHCPv6 Autosense
VLANs | 43
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
v
Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information | 55
Verifying and Managing Configurations for Dynamic VLANs Based on Access-Line Identifiers | 74
Configuring Ethernet OAM Support for Service VLANs with Double-Tagged Customer VLANs | 82
vi
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Example: Dynamic IP Demux Subscriber Interfaces over Dynamic VLAN Demux Interfaces | 106
Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview | 115
Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet Overview | 117
Options for Aggregated Ethernet Logical Interfaces That Support Demux Subscriber
Interfaces | 117
Hardware Requirements with Static or Dynamic Demux Subscriber Interfaces over Aggregated
Ethernet | 118
Features Supported with Static or Dynamic Demux Subscriber Interfaces over Aggregated
Ethernet | 118
Configuring a Static or Dynamic VLAN Subscriber Interface over Aggregated Ethernet | 120
Configuring a Static or Dynamic IP Demux Subscriber Interface over Aggregated Ethernet | 121
vii
Configuring a Static or Dynamic VLAN Demux Subscriber Interface over Aggregated Ethernet | 123
Example: Configuring IPv4 Static VLAN Demux Interfaces over an Aggregated Ethernet Underlying
Interface with DHCP Local Server | 131
Example: Configuring IPv4 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet
Underlying Interface with DHCP Local Server | 134
Example: Configuring IPv6 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet
Underlying Interface with DHCP Local Server | 138
Example: Configuring IPv4 Dynamic Stacked VLAN Demux Interfaces over an Aggregated Ethernet
Underlying Interface with DHCP Local Server | 142
Multiple DHCP Subscribers Sharing the Same VLAN Logical Interface | 147
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
Attaching a Dynamic Profile to All DHCP Subscriber or All DHCP Client Interfaces | 149
Configuring DHCP IP Demux and PPPoE Demux Interfaces Over the Same VLAN | 153
Example: Concurrent Configuration of Dynamic DHCP IP Demux and PPPoE Demux Interfaces
over the Same VLAN Demux Interface | 153
Providing Security for DHCP Interfaces Using MAC Address Validation | 169
RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 175
Using RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 177
Verifying Configuration and Status of Dynamic Subscribers and Associated Sessions, Services, and
Firewall Filters | 179
Dynamic PPPoE Subscriber Interfaces over Static Underlying Interfaces Overview | 188
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Static Gigabit Ethernet VLAN
Interface | 200
Example: Configuring a Static PPPoE Subscriber Interface on a Static Underlying VLAN Demux
Interface over Aggregated Ethernet | 203
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Static Underlying VLAN Demux
Interface over Aggregated Ethernet | 211
ix
Per-Interface Configuration for PPPoE Maximum Session Limit Using the CLI | 230
Per-Subscriber Configuration for PPPoE Maximum Session Limit Using RADIUS | 230
Guidelines for Using PPPoE Maximum Session Limit from RADIUS | 231
Limiting the Maximum Number of PPPoE Sessions on the Underlying Interface | 233
Use of Encapsulation Type Identifiers to Clear or Display the Lockout Condition | 239
Understanding the Lockout Period for PPPoE Subscriber Session Lockout | 240
How the Router Determines the PPPoE Subscriber Session Lockout Period | 241
Interaction Among PPPoE Clients and Routers During the Discovery Stage | 254
Dynamic Profiles and Routing Instances in PPPoE Service Name Tables | 257
Limiting the subscriber sessions per AE or PFE Bundle in PPPoE Service Name Tables | 258
Evaluation Order for Matching Client Information in PPPoE Service Name Tables | 259
Configuring the Action Taken When the Client Request Includes an Empty Service Name Tag | 264
Assigning a Service to a Service Name Table and Configuring the Action Taken When the Client
Request Includes a Non-zero Service Name Tag | 266
Assigning an ACI/ARI Pair to a Service Name and Configuring the Action Taken When the Client
Request Includes ACI/ARI Information | 268
Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic
PPPoE Interface Creation | 270
Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name | 271
Reserving a Static PPPoE Interface for Exclusive Use by a PPPoE Client | 272
Example: Configuring a PPPoE Service Name Table for Dynamic Subscriber Interface Creation | 276
Disabling the Sending of PPPoE Access Concentrator Tags in PADS Packets | 284
Supported Features for MLPPP LNS and PPPoE Subscribers on the MX Series | 299
Mixed Mode Support for MLPPP and PPP Subscribers Overview | 300
Configuring Inline Service Interfaces for LNS and PPPoE Subscribers | 315
Enabling Inline Service Interfaces for PPPoE and LNS Subscribers | 317
Configuring Inline Service Interface for PPPoE and LNS Subscribers | 319
Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers | 320
Configuring L2TP Client Access to Support MLPPP for Static Subscribers | 323
Configuring L2TP Client Access to Support MLPPP for Dynamic Subscribers | 326
Dynamic PPP Subscriber Services for Static MLPPP Interfaces Overview | 401
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 430
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 461
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 461
Example: Configuring a Static Subscriber Interface for IP Access over ATM | 467
Example: Configuring a Static Subscriber Interface for IP Access over Ethernet over ATM | 475
6 Troubleshooting
Contacting Juniper Networks Technical Support | 501
Collecting Subscriber Access Logs Before Contacting Juniper Networks Technical Support | 501
accept | 512
access-concentrator | 515
access-profile | 517
address | 520
agent-specifier | 524
atm-options | 528
authentication | 530
auto-configure | 532
chap | 536
circuit-type | 539
delimiter | 544
direct-connect | 551
domain-name | 552
xv
dynamic-profiles | 563
enhanced-mode | 582
family | 585
flexible-vlan-tagging | 602
fragmentation-maps | 606
host-prefix-only | 614
interface-name | 623
interfaces | 628
xvi
keepalives | 637
local-name | 642
mac | 643
mac-validate | 645
mtu | 653
nas-port-extended-format | 658
nd-override-preferred-src | 662
no-gratuitous-arp-request | 663
option-82 | 668
override | 673
ppp-options | 682
ppp-subscriber-services | 686
pppoe-options | 687
precedence | 692
radius-realm | 704
remove-when-no-subscribers | 707
routing-options | 710
rpf-check | 712
server | 715
service-name-table | 724
service-name-tables | 726
stacked-vlan-ranges | 732
stacked-vlan-tagging | 733
traffic-control-profiles | 739
underlying-interface | 744
unit | 749
user-prefix | 779
vci | 780
vlan-ranges | 783
vlan-tagging | 785
vlan-tags | 789
weight | 793
IN THIS SECTION
Use this guide to learn how to configure the logical portion of subscriber management networks to provision
services using virtual local area networks (VLANs) with DHCP, PPPoE, MLPPP, and ATM interfaces.
®
To obtain the most current version of all Juniper Networks technical documentation, see the product
documentation page on the Juniper Networks website at https://www.juniper.net/documentation/.
If the information in the latest release notes differs from the information in the documentation, follow the
product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject matter experts.
These books go beyond the technical documentation to explore the nuances of network architecture,
deployment, and administration. The current list can be viewed at https://www.juniper.net/books.
If you want to use the examples in this manual, you can use the load merge or the load merge relative
command. These commands cause the software to merge the incoming configuration into the current
candidate configuration. The example does not become active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple hierarchies), the example
is a full example. In this case, use the load merge command.
xxii
If the example configuration does not start at the top level of the hierarchy, the example is a snippet. In
this case, use the load merge relative command. These procedures are described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a text file, save the
file with a name, and copy the file to a directory on your routing platform.
For example, copy the following configuration to a file and name the file ex-script.conf. Copy the
ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the load merge
configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
xxiii
Merging a Snippet
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text file, save the
file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file ex-script-snippet.conf. Copy the
ex-script-snippet.conf file to the /var/tmp directory on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following configuration mode
command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the load merge
relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xxiv defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type
the configure command:
user@host> configure
Fixed-width text like this Represents output that appears on user@host> show chassis alarms
the terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
Italic text like this Represents variables (options for Configure the machine’s domain
which you substitute a value) in name:
commands or configuration
[edit]
statements.
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include
statements, commands, files, and the stub statement at the [edit
directories; configuration hierarchy protocols ospf area area-id]
levels; or labels on routing platform hierarchy level.
components. • The console port is labeled
CONSOLE.
< > (angle brackets) Encloses optional keywords or stub <default-metric metric>;
variables.
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS
same line as the configuration only
statement to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
xxvi
Bold text like this Represents graphical user interface • In the Logical Interfaces box, select
(GUI) items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of In the configuration editor hierarchy,
menu selections. select Protocols>Ospf.
Documentation Feedback
We encourage you to provide feedback so that we can improve our documentation. You can use either
of the following methods:
• Online feedback system—Click TechLibrary Feedback, on the lower right of any page on the Juniper
Networks TechLibrary site, and do one of the following:
• Click the thumbs-up icon if the information on the page was helpful to you.
• Click the thumbs-down icon if the information on the page was not helpful to you or if you have
suggestions for improvement, and use the pop-up form to provide feedback.
Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC).
If you are a customer with an active Juniper Care or Partner Support Services support contract, or are
xxvii
covered under warranty, and need post-sales technical support, you can access our tools and resources
online or open a case with JTAC.
• JTAC policies—For a complete understanding of our JTAC procedures and policies, review the JTAC User
Guide located at https://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day, 7 days a week,
365 days a year.
For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called
the Customer Support Center (CSC) that provides you with the following features:
• Find solutions and answer questions using our Knowledge Base: https://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool:
https://entitlementsearch.juniper.net/entitlementsearch/
You can create a service request with JTAC on the Web or by telephone.
• Visit https://myjuniper.juniper.net.
CHAPTER 1
IN THIS CHAPTER
Configuring an Access Pseudowire That Terminates into VRF on the Service Node | 11
The subscriber management logical network architecture is as important as the physical network architecture.
You configure the logical portion of the subscriber management network using virtual local area networks
(VLANs).
Customer VLANs
Customer VLANs (C-VLANs) provide one-to-one (1:1) subscriber-to-service connectivity: One VLAN carries
all traffic to each subscriber on the network. Having a single VLAN per subscriber simplifies operations by
providing a 1:1 mapping of technology (VLANs) to subscribers. You can also understand what applications
any subscriber is using at any given time. Because you use only one VLAN to carry traffic to each subscriber,
this approach is not affected when adding new services. However, using a pure C-VLAN model consumes
more bandwidth because a single television channel being viewed by multiple subscribers is carried across
the network several times—once on each C-VLAN. This approach requires a more scalable, robust edge
router that can support several thousand VLANs.
Configurations that use C-VLANs uniquely identify subscribers by using the VLAN ID and stacked VLAN
(S-VLAN) ID. Subscriber packets received from the access node that are either single-tagged with a VLAN
ID or double-tagged with both an S-VLAN ID and a VLAN ID are examples of C-VLAN configurations
because they provide a one-to-one correspondence between an individual subscriber and the VLAN
encapsulation.
4
In the C-VLAN architecture, each customer premises equipment (CPE) or subscriber network has its own
dedicated Layer 2 path to the router. Each subscriber network is separated by a customer VLAN (C-VLAN)
that is dedicated to a particular customer. The services for each customer are transmitted from the router
to the access node by means of that customer’s C-VLAN.
The ability to uniquely identify subscribers by means of VLAN encapsulation facilitates delivery of services
such as authentication, authorization, and accounting (AAA); class of service (CoS); and filters (policers) to
subscribers in a C-VLAN configuration.
We recommend using C-VLANs for data and voice traffic to simplify configuration and management when
expanding services. However, some MSANs are limited to the number of VLANs they can support, limiting
the ability to use C-VLANs.
Service VLANs
Service VLANs (S-VLANs) provide many-to-one (N:1) subscriber-to-service connectivity: The service VLAN
carries a service (for example, data, video, or voice) to all subscribers instead of having different services
share a VLAN. Adding a new service requires adding a new VLAN and allocating bandwidth to the new
service. The service VLAN model enables different groups that are using the broadband network (for
example, external application providers) to manage a service. One limitation of service VLANs is the absence
of any logical isolation between user sessions at the VLAN level. This lack of isolation requires that the
multiservice access node (MSAN) and broadband network gateway (BNG) provide the necessary security
filtering.
Service VLANs enable service providers to route different services to different routers to functionally
separate network services and reduce network complexity.
Typically, you would use S-VLANs for video and IPTV traffic.
Hybrid VLANs
Hybrid C-VLAN—The hybrid VLAN combines the best of both previous VLANs by using one VLAN per
subscriber to carry unicast traffic and one shared multicast VLAN (M-VLAN) for carrying broadcast (multicast)
television traffic. You can use both the pure and hybrid C-VLAN models in different portions of the network,
depending upon available bandwidth and MSAN capabilities.
NOTE: The term C-VLAN, when used casually, often refers to a hybrid C-VLAN implementation.
5
You configure VLANs to operate between the MSAN and the edge router (broadband services router or
video services router). However, the MSAN might modify VLAN identifiers before forwarding information
to the subscriber in the following ways:
• The VLAN identifiers can be carried within the ATM VCs or they can be removed. The value of keeping
the VLAN header is that it carries the IEEE 802.1p Ethernet priority bits. These priority bits can be added
to upstream traffic by the residential gateway, allowing the DSLAM to easily identify and prioritize more
important traffic (for example, control and VoIP traffic). Typically, a VLAN identifier of zero (0) is used
for this purpose.
• In a C-VLAN model, the MSAN might modify the VLAN identifier so that the same VLAN is sent to each
subscriber. This enables the use of the same digital subscriber line (DSL) modem and residential gateway
configuration for all subscribers without the need to define a different VLAN for each device.
The 12-bit VLAN identifier (VLAN ID) can support up to 4095 subscribers. When using an aggregation
switch with a C-VLAN topology, and fewer than 4095 subscribers are connected to a single edge router
port, the aggregation switch can transparently pass all VLANs. However, if the VLAN can exceed 4095
subscribers per broadband services router port, you must use VLAN stacking (IEEE 802.1ad, also known
as Q-in-Q). VLAN stacking includes two VLAN tags—an outer tag to identify the destination MSAN and
an inner tag to identify the subscriber. For downstream traffic (that is, from the broadband services router
or Ethernet switch to the MSAN), the outer tag determines which port to forward traffic. The forwarding
device then uses the VLAN pop function on this tag before forwarding the traffic with a single tag. The
reverse process occurs for upstream traffic.
VLAN stacking is not necessary for S-VLANs or M-VLANs. However, for the hybrid (C-VLAN and M-VLAN)
model, the Ethernet switch or services router must be able to pop or push tags onto C-VLAN traffic while
not modifying M-VLAN packets.
RELATED DOCUMENTATION
You can identify VLANs statically or dynamically. You can also configure a mix of static and dynamic VLANs
on the same underlying interface.
For Ethernet, Fast Ethernet, Tri-Rate Ethernet copper, Gigabit Ethernet, 10-Gigabit Ethernet, and aggregated
Ethernet interfaces supporting VPLS, Junos OS supports a subset of the IEEE 802.1Q standard for
channelizing an Ethernet interface into multiple logical interfaces. Many hosts can be connected to the
same Gigabit Ethernet switch, but they cannot be in the same routing or bridging domain.
To identify VLANs statically, you can reference a static VLAN interface in a dynamic profile. To identify
subscribers dynamically, you use a variable to specify an 802.1Q VLAN that is dynamically created when
a subscriber accesses the network.
You can configure the router to dynamically create VLANs when a client accesses an interface and requests
a VLAN ID that does not yet exist. When a client accesses a particular interface, the router instantiates a
VLAN dynamic profile that you have associated with the interface. Using the settings in the dynamic profile,
the router extracts information about the client from the incoming packet (for example, the interface and
unit values), saves this information in the routing table, and creates a VLAN or stacked VLAN ID for the
client from a range of VLAN IDs that you configure for the interface.
Dynamic VLAN configuration supports the creation of IPv4 (inet), DHCPv4, IPv6 (inet6), and DHCPv6
VLANs.
Dynamic VLAN and dynamic stacked VLAN configuration supports mixed (or flexible) VLAN ranges. When
you configure dynamic mixed VLAN ranges, you must create separate dynamic profiles for VLANs and
stacked VLANs. Table 3 on page 6 lists all valid combinations for the maximum number of dynamic profiles
and VLAN and stacked VLAN ranges on a single underlying interface.
Table 3: Maximum Dynamic Profiles and Ranges for Dynamic Mixed VLAN Configurations
1 128 1 128
16 32 16 32
7
Table 3: Maximum Dynamic Profiles and Ranges for Dynamic Mixed VLAN Configurations (continued)
1 128 16 32
16 32 1 128
Table 3 on page 6 shows the valid maximums for the following dynamic mixed VLAN range configuration
scenarios, in this order:
• Configurations that require up to 128 VLAN ranges and up to 128 stacked VLAN ranges on a single
underlying interface. You must create one VLAN dynamic profile and one stacked VLAN dynamic profile,
each with a maximum of 128 ranges per profile.
• Configurations that require up to 32 VLAN ranges and up to 32 stacked VLAN ranges on a single
underlying interface. You can configure up to 16 VLAN dynamic profiles and up to 16 stacked VLAN
dynamic profiles, each with a maximum of 32 ranges per profile.
• Configurations that consist of one VLAN dynamic profile with a maximum of 128 ranges, and up to
16 stacked VLAN dynamic profiles with 32 ranges each.
• Configurations that consist of up to 16 VLAN dynamic profiles with 32 ranges each, and one stacked
VLAN dynamic profile with a maximum of 128 ranges.
The following guidelines apply to the limits in Table 3 on page 6 when you configure VLAN ranges and
S-VLAN ranges for use with dynamic profiles:
• These limits apply to both single-tagged and double-tagged dynamic VLAN ranges.
• These limits apply only to MX Series routers with MPCs. For MX Series routers with Enhanced Queuing
IP Services DPCs (DPCE-R-Q model numbers) or Enhanced Queuing Ethernet Services DPCs (DPCE-X-Q
model numbers), the maximum number of VLAN ranges for a dynamic profile on an underlying interface
remains unchanged at 32 VLAN ranges and 32 S-VLAN ranges.
• These limits have no effect on the maximum number of VLAN IDs on a given underlying interface. The
valid range of ID values for a dynamic VLAN range or dynamic S-VLAN range remains unchanged at 1
through 4094.
RELATED DOCUMENTATION
This topic describes the topology for configuring subscriber interfaces over static VLAN interfaces.
In a dynamic profile, you can configure VLAN subscriber interfaces over the following statically created
logical interface types:
• GE—Gigabit Ethernet
• XE—10-Gigabit Ethernet
• AE—Aggregated Ethernet
You can further separate VLANs on subscriber interfaces by configuring a VLAN interface as the underlying
interface for a set of IP demux interfaces.
RELATED DOCUMENTATION
As the demand for MPLS-based Layer 2 services grows, new challenges arise for service providers to be
able to interoperate Layer 2 with Layer 3 and give their customers value-added services. MPLS in the
access networks is already used by applications like mobile or DSL backhaul to achieve a more cost-efficient
solution, better service reliability, and quality of service. Most of the traditional access network infrastructure
is built over TDM circuits such as DS3 for higher speeds, ATM, or Frame Relay as access trails in a Layer
3 service. For higher bandwidth requirements and more flexibility, service providers use Ethernet as access
technology for a wide range of network services. Although Ethernet provides a convenient link topology
for access networks, it is not well suited for Layer 2 switching and for aggregating traffic from the access
network to the core. MPLS is already used in the core and now its presence in the access network enables
use of a single technology across the network. When MPLS is deployed in the access network, Ethernet
is used as a link-layer encapsulation technology only, and MPLS switches perform traffic forwarding and
provide other Layer 2 services. There is an increase in demand for using pseudowires as access circuits in
the service delivery points in the network. These pseudowires terminate on a service node on which the
service provider applies Layer 3 or Layer 2 services to the customer data.
The following is a generic topology for understanding termination for pseudowire into a Layer 2 or Layer
3 instance and the notifications for both cases.
• Access node (AN): An access node is typically a customer edge device that processes the packets entering
or exiting the network at Layer 2. This includes devices such as DSLAMs and MSANs.
• Transport node(TN): A transport node acts like a P router as it does not have any customer or service
state. It is either used for connecting the access node to the service node or to two service nodes.
• Service node (SN): A service node is a PE router that applies services to the customer packets. It includes
Layer 2 PE, Layer 3 PE, peering routers, video servers, base station controllers, and media gateways.
The following example shows a linear L2-L3 interconnection set up with the absence of pseudowire
redundancy. Here, the access circuit pseudowire is configured between the access PE (SN1) and service
node (SN2), which defines the boundary of the L2 domain. The Layer 3 VPN is configured between SN2
and SN3, which constitute the L3 domain. Layer 2 circuit pseudowire terminates in the VRF of the device
interconnecting the L2-L3 domains (SN2); that is, the service node performs stitching between the Layer
2 circuit and the Layer 3 VPN.
10
RELATED DOCUMENTATION
Configuring an Access Pseudowire That Terminates into VRF on the Service Node | 11
Configuring an Access Pseudowire That Terminates into a VPLS Routing Instance | 14
11
Each VPN has its own VPN-specific routing table per VPN site. When an ingress PE router (SN2) receives
routes advertised from a directly connected access node (CE2), it checks the received route against the
VRF export policy for that VPN. If it matches, the route is converted to VPN-IPv4 format; that is, the route
distinguisher is added to the route. This VPN-IPv4 route is advertised to the remote PE routers. It also
attaches a route target to each route learned from the directly connected sites, which is based on the
value of the configured export target policy of the VRF tables. When an egress PE router receives this
route, it checks it against the import policy between the PE routers. If accepted, the route is placed into
its bgp.l3vpn.0 table. At the same time, the router checks the route against the VRF import policy for the
VPN. If it matches, the route distinguisher is removed from the route, and the route is placed into the VRF
table in IPv4 format.
On SN2 and SN1, routes are installed in the VRF based on the import and export VRF policies. OSPF and
direct routes from CE2 are installed in the VRF of SN2, which is then converted into IPv4-VPN routes.
The routes to be learned over the CE-PE link is defined under protocols in the routing instance. Now, from
the other end, the access pseudowire terminates in the VRF of the SN1 device, and the static routing is
configured between the access node (CE1) and the service node(SN1). Traffic at this point is handled at
the IP level, before it enters the Layer 3 domain. The translation from IP route to IPv4-VPN route happens
at SN2.
[edit interfaces]
lt-0/0/10 {
unit 0 {
encapsulation vlan-ccc;
vlan-id number;
peer-unit 1;
}
unit 1 {
12
encapsulation vlan;
vlan-id number;
peer-unit 0;
family inet {
address IPv4 address;
}
}
}
Each VPN has its own VPN-specific routing table per VPN site. When an ingress PE router (CE2) receives
routes advertised from a directly connected access node, it checks the received route against the VRF
export policy for that VPN. If it matches, the route is converted to VPN-IPv4 format; that is, the route
distinguisher is added to the route.
[edit policy-options]
policy-statement policy-name {
term 1 {
from protocol [ direct ospf ];
then {
community add l3vpn;
accept;
}
}
}
When an egress router receives this route, it checks it against the import policy between the CE routers.
If it is accepted, then the route is placed into its bgp.l3vpn.0 table. At the same time, the router checks
the route against the VRF import policy for the VPN.
[edit policy-options]
policy-statement policy-name {
term 1 {
from community l3vpn;
then accept;
}
}
[edit protocols]
13
l2circuit {
neighbor address {
interface lt-0/0/10.0 {
virtual-circuit-id number;
}
}
}
In Layer 2 domains where service node SN1 interconnects the L2 to L3 domain, you need to activate
the vrf-table-label feature to be able to advertise the direct-subnet prefix that corresponds to the lt-ifl
toward the Layer 3 domain.
[edit routing-instances]
l3vpn routing instance {
instance-type vrf;
interface lt-0/0/10.1;
route-distinguisher 100:2;
vrf-import l3vpn-import;
vrf-export l3vpn-export;
vrf-table-label;
protocols {
ospf {
export ospf_export;
area 0.0.0.0 {
interface all {
priority 0;
}
}
}
}
}
Use the following operational mode commands to verify termination of an access pseudowire into VRF:
RELATED DOCUMENTATION
14
Terminating the access pseudowire into a VPLS instance is supported for both LDP-VPLS and BGP-VPLS.
To configure an access pseudowire that terminates into VPLS on the service node using LT-IFLS and
mesh-groups:
Logical tunnel interface pairs are used for stitching Layer 2 network elements to VPLS when an access
pseudowire terminates into a VPLS routing instance.
[edit interfaces]
interface name {
unit 0 {
encapsulation vlan-ccc;
vlan-id number;
peer-unit 1;
}
unit 1 {
encapsulation vlan-vpls;
vlan-id number;
peer-unit 0;
family vpls;
}
}
To terminate the access pseudowire into a VPLS routing instance, use mesh groups as follows:
[edit routing-instances]
routing-instance name {
instance-type vpls;
interface interface name;
route-distinguisher 192.0.2.255:1;
vrf-target target:64577:1;
protocols {
15
site vpls {
site-identifier 4;
interface interface name;
}
mesh-group pe-mid {
vpls-id number;
local-switching;
neighbor 192.0.2.1;
}
}
}
In LDP-VPLS and BGP-VPLS, the Layer 2 circuit only needs to be configured on the access PE (SN1) with
a virtual circuit ID, and the corresponding VPLS ID is configured on the service node for terminating the
pseudowire. Local switching can be used on the service node to switch the traffic from multiple pseudowires
into the desired VPLS routing instance.
Use the show vpls connections operational mode command to verify termination of an access pseudowire
into a VPLS routing instance.
RELATED DOCUMENTATION
CHAPTER 2
IN THIS CHAPTER
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring a VLAN Dynamic Profile That Associates VLANs with Separate Routing Instances | 29
Starting in Junos OS Release 14.1, you can configure a dynamic profile for creating single-tagged VLANs.
1. Ensure that the VLAN dynamic profile uses the $junos-interface-ifd-name variable for the dynamic
interface and the $junos-interface-unit variable for the interface unit.
2. (Optional) To support dynamic demux interfaces, enable them for IPv4 or IPv6.
3. (Optional) To configure the router to respond to any ARP request, specify the proxy-arp (Dynamic
Profiles) statement.
4. Specify that you want to use dynamic VLAN IDs in the dynamic profile. You can configure the dynamic
profile to create a single-tag VLAN using only standard tag protocol identifier (TPID) values (0x8100)
or to create a VLAN using any TPID value.
• To configure the dynamic profile to create single-tag VLANs that accept only standard TPID values
(a TPID value of 0x8100):
When the dynamic profile is instantiated, the variable is dynamically replaced with a VLAN ID within
the VLAN range specified at the [interfaces] hierarchy level.
• To configure the dynamic profile to create single-tag VLANs that accept any TPID value:
The variable is dynamically replaced with both the TPID value and a VLAN ID within the VLAN range
specified at the [interfaces] hierarchy level.
6. (Optional) Enable IP and MAC address validation for dynamic demux interfaces in a dynamic profile.
Release Description
14.1 Starting in Junos OS Release 14.1, you can configure a dynamic profile for creating
single-tagged VLANs.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Dynamic 802.1Q VLAN Overview | 6
Dynamic Variables Overview
Starting in Junos OS Release 14.1, you configure an interface to use a dynamic profile when the dynamic
VLANs are created. The dynamic profile uses the VLAN ranges configured for the interface.
1. Access the interface over which you want to create dynamic VLANs.
20
4. Specify the VLAN Ethernet packet type the VLAN dynamic profile accepts.
inet and dhcp-v4 for IPv4 packets, inet6 and dhcp-v6 for IPv6 packets, and pppoe for PPP packets are
supported.
5. Specify the VLAN ranges that you want the dynamic profile to use. The following example specifies a
lower VLAN ID limit of 3000 and any upper VLAN ID limit (a range from 1 through 4094).
NOTE: You can configure multiple VLAN range groups (up to 32 total) on the same physical
interface that use different VLAN dynamic profiles.
6. (Optional) Access another VLAN dynamic profile for which you want to configure VLAN ranges. Specify
the VLAN ranges that you want the dynamic profile to use. The following example specifies a lower
VLAN ID limit of 2000 and any upper VLAN ID limit (a range from 1 through 4094).
Release Description
14.1 Starting in Junos OS Release 14.1, you configure an interface to use a dynamic profile when
the dynamic VLANs are created. The dynamic profile uses the VLAN ranges configured for
the interface.
RELATED DOCUMENTATION
Starting in Junos OS Release 14.1, you can configure a dynamic profile for creating stacked 802.1Q VLANs.
1. Ensure that the VLAN dynamic profile uses the $junos-interface-ifd-name variable for the dynamic
interface and the $junos-interface-unit variable for the interface unit.
2. (Optional) To support dynamic demux interfaces, enable them for IPv4 or IPv6.
3. (Optional) To configure the router to respond to any ARP request, specify the proxy-arp statement.
The variable is dynamically replaced with an outer VLAN ID within the VLAN range specified at the
[interfaces] hierarchy level.
The variable is dynamically replaced with an inner VLAN ID within the VLAN range specified at the
[interfaces] hierarchy level.
7. (Optional) Enable IP and MAC address validation for dynamic demux interfaces in a dynamic profile.
23
Release Description
14.1 Starting in Junos OS Release 14.1, you can configure a dynamic profile for creating
stacked 802.1Q VLANs.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring a Basic Dynamic Profile
Dynamic 802.1Q VLAN Overview | 6
Dynamic Variables Overview
Junos OS Predefined Variables
Starting in Junos OS Release 14.1, you configure an interface to use a dynamic profile when the dynamic
VLANs are created. The dynamic profile uses the VLAN ranges configured for the interface.
1. Access the interface over which you want to create dynamic VLANs.
2. Specify that this interface is for use with stacked VLAN ranges.
5. Specify the VLAN Ethernet packet type the VLAN dynamic profile accepts.
inet and dhcp-v4 for IPv4 packets, inet6 and dhcp-v6 for IPv6 packets, and pppoe for PPP packets are
supported.
6. Specify the outer and inner stacked VLAN ranges that you want the dynamic profile to use. The following
example specifies an outer stacked VLAN ID range from 2000 through 4000 and an inner stacked
VLAN ID range of any (enabling a range from 1 through 4094 for the inner stacked VLAN ID).
NOTE: You can configure multiple dynamic profile associations (up to 32) with different
VLAN range groups on each physical interface.
7. (Optional) Access another VLAN dynamic profile for which you want to configure VLAN ranges.
8. (Optional) Specify the outer and inner stacked VLAN ranges that you want the dynamic profile to use.
The following example specifies an outer stacked VLAN ID range from 3001 through 4000 and an inner
stacked VLAN ID range of any (enabling a range from 1 through 4094 for the inner stacked VLAN ID).
Release Description
14.1 Starting in Junos OS Release 14.1, you configure an interface to use a dynamic profile when
the dynamic VLANs are created. The dynamic profile uses the VLAN ranges configured for
the interface.
RELATED DOCUMENTATION
Starting in Junos OS Release 14.1, you can configure VLANs to support simultaneous transmission of
802.1Q VLAN single-tag and stacked frames on logical interfaces on the same Ethernet port, and on
pseudowire logical interfaces.
Junos VLAN IDs for single-tag VLANs are equivalent to the outer tags used for stacked (dual-tag) VLANs.
When configuring mixed (flexible) VLANs, any overlap on single-tag VLAN IDs and stacked VLAN outer
tag values is supported only for dynamic VLANs on MPC line cards. When configuring mixed (flexible)
VLANS on DPCE line cards, overlapping single-tag VLAN IDs and stacked VLAN outer tag values is not
supported. This means that a dynamically created single-tagged VLAN interface prevents any overlapping
stacked VLAN interfaces from being created or a dynamically created stacked VLAN interface prevents
any overlapping single-tagged VLAN interfaces from being created.
NOTE: For information about the maximum number of dynamic profiles, VLAN ranges, and
stacked VLAN ranges for dynamic mixed VLAN configurations, see “Dynamic 802.1Q VLAN
Overview” on page 6.
1. Access the interface over which you want to create dynamic VLANs.
2. Indicate that this interface is for use with both VLAN and stacked VLAN ranges.
5. Access the VLAN dynamic profile for which you want to configure VLAN ranges.
6. Specify the VLAN ranges that you want the dynamic profile to use. The following example specifies a
lower VLAN ID limit of 2000 and an upper VLAN ID limit of 3000.
NOTE: You can configure multiple dynamic profile associations (up to 32) with different
VLAN range groups on each physical interface.
8. Access the VLAN dynamic profile for which you want to configure VLAN ranges.
9. Specify the outer and inner stacked VLAN ranges that you want the dynamic profile to use. The following
example specifies an outer stacked VLAN ID range from 3001 through 4000 (to avoid overlapping
VLAN IDs with single-tag VLANs) and an inner stacked VLAN ID range of any (enabling a range from
1 through 4094 for the inner stacked VLAN ID).
NOTE: You can configure multiple dynamic profile associations (up to 32) with different
VLAN range groups on each physical interface.
28
Release Description
14.1 Starting in Junos OS Release 14.1, you can configure VLANs to support simultaneous
transmission of 802.1Q VLAN single-tag and stacked frames on logical interfaces on the same
Ethernet port, and on pseudowire logical interfaces.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Dynamic 802.1Q VLAN Overview | 6
You can override dynamic profile assignment to individual VLANs that are already part of a previously
defined VLAN range. This functionality provides a type of exception to an assigned VLAN range. It enables
you to configure individual VLAN IDs to use a different dynamic profile from the one assigned to the VLAN
range that includes the individual VLAN ID.
1. Access the interface on which you want to create a dynamic profile override.
3. Access either the single-tagged or dual-tagged (stacked) VLAN ranges that you want to modify.
or
29
4. Define the override statement along with the VLAN tag that you want to override and the dynamic
profile that you want to use when overriding the specified VLAN tag.
or
You can configure a VLAN dynamic profile that dynamically creates underlying VLAN interfaces and
associates these interfaces with statically created routing instances. The VLAN interface is created for a
specific routing instance as defined by VSA 26–1 (Virtual-Router) on the AAA server (for example, RADIUS
server).
To configure a dynamic VLAN profile to use routing instances when creating VLANs, add the routing
instance configuration to your dynamic profile:
[edit]
user@host# edit dynamic-profiles VLAN_PROFILE_RI
2. Specify that you want to dynamically associate the profile with routing instances.
3. Define the routing instance interface statement with the internal $junos-interface-name variable used
by the router to match the interface name of the receiving interface.
30
4. Define the dynamic profile interfaces statement with the internal $junos-interface-ifd-name variable.
5. Define the unit statement with the internal $junos-interface-unit variable used by the router to generate
a unit value for the interface.
RELATED DOCUMENTATION
You can always clear or delete subscriber VLANs manually. However, you can also configure the interface
to automatically remove dynamic subscriber VLANs when no client sessions (for example, DHCP or PPPoE)
exist on the VLAN.
When configuring automatic removal of dynamic subscriber VLANs, keep the following in mind:
• You can configure automatic VLAN removal only on individual physical interfaces. You cannot configure
the feature globally.
• Automatic VLAN removal is not supported for use on Layer 2 Wholesale interfaces. See Layer 2 and
Layer 3 Wholesale Overview.
31
• PPPoE subscriber interfaces require the use of a dynamic profiles when configured over dynamic VLANS.
However, dynamic profiles are not required for use with DHCP subscriber interfaces that use underlying
dynamic VLANs. Because the remove-when-no-subscribers functionality triggers when no dynamic
client sessions exist on a dynamic VLAN, automatic removal of underlying dynamic VLANs is not supported
when DHCP subscriber interfaces are not created using dynamic profiles.
• If PPPoE subscriber session lockout is also configured, the router does not remove the unused subscriber
VLAN until the lockout time has expired for each client undergoing lockout on the underlying interface.
To configure automatic removal of subscriber VLANs when no client sessions exist on the VLAN:
1. Access the interface for which you want to enable automatic removal of subscriber VLANs.
RELATED DOCUMENTATION
Action
• To display subscriber dynamic VLAN information:
RELATED DOCUMENTATION
CLI Explorer
33
CHAPTER 3
IN THIS CHAPTER
Using DHCP Option 18 and Option 37 in Authentication Usernames for DHCPv6 Autosense VLANs | 43
You can specify an authentication password for dynamically created VLAN or stacked VLAN interfaces at
the [edit interfaces interface-name auto-configure vlan-ranges authentication] or [edit interfaces
interface-name auto-configure stacked-vlan-ranges authentication] hierarchy level. This password is sent
to the external AAA authentication server for subscriber authentication.
NOTE: You must configure the username-include (Interfaces) statement to enable the use of
authentication. The password (Interfaces) statement is not required and does not cause the
interface to use authentication if the username-include (Interfaces) statement is not included.
1. Access the interface over which you want to create dynamic VLANs.
or
5. Specify a password that is sent to the external AAA authentication server for subscriber authentication.
RELATED DOCUMENTATION
You can use dynamic profiles, in conjunction with RADIUS, to dynamically create logical VLAN interfaces
in the default logical system and in a specified routing instance. As DHCP clients in the same VLAN become
active, corresponding interfaces are assigned to any specified routing instances. You can also dynamically
create an underlying VLAN interface for incoming subscribers, associate interfaces created on this VLAN
with the default logical system and a specified routing instance, and define RADIUS authentication values
for the dynamically created interfaces.
35
Before you configure dynamic VLAN authentication, configure DHCP Local Server or DHCP Relay over
which you want the dynamic VLAN interfaces to function.
NOTE: You can also configure dynamically created VLAN interfaces over PPP or PPPoE interfaces.
For information about how to configure PPP or PPPoE, see Dynamic Profiles for PPP Subscriber
Interfaces Overview or “Subscriber Interfaces and PPPoE Overview” on page 185.
1. Configure an access profile that contains the appropriate accounting order, authentication order, and
server access values.
For information about how to configure an access profile, RADIUS accounting, RADIUS statistics, and
how to define RADIUS server access, see:
2. Configure a dynamic profile that uses the default logical system and creates specific routing instances
to contain dynamically created VLAN interfaces.
See “Configuring a VLAN Dynamic Profile That Associates VLANs with Separate Routing Instances”
on page 29.
• Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs on page 23
• Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs on
page 19
RELATED DOCUMENTATION
By default, VLAN authentication is triggered by any of the packet types specified with the accept statement
in the dynamic profile that instantiates the VLAN and subscriber interfaces. For certain business cases,
you may want a more generic dynamic profile that includes several packet types, but in some situations
want the VLAN to be authenticated for only a subset of your customers. You can use the packet-types
statement to specify the desired subset.
The following two use cases describe circumstances when you might want to authenticate a VLAN for
only certain subscribers and not others.
• Conserving resources in a mixed access model—A mixed access model might employ dynamic VLANs
to provide services for PPPoE subscribers, IPoE subscribers, IPv6oE subscribers, or other subscriber
types. Typically, the PPPoE subscribers are residential customers, and the IP subscribers are business
customers. An understanding of dynamic VLAN authentication and profile instantiation for these
subscribers can help you conserve system resources and avoid some impacts to scaling limits.
By default, authentication is configured for the interface based on the configured VLAN range or stacked
VLAN range. Consequently, every dynamic VLAN created in the range must be authenticated, regardless
of the packet type that triggers VLAN creation. This works well for the IPoE and IPv6oE subscribers,
because dynamic VLAN authentication enables RADIUS-sourced services, such as CoS and filters, to be
provisioned. However, the PPPoE subscribers are authenticated by PPP, making the dynamic VLAN
authentication unnecessary and a waste of system resources.
You can avoid this waste by restricting dynamic VLAN authentication to only the VLANs that need it.
The packet-types statement enables you to specify that only a subset of the packet types accepted on
the VLAN interface can trigger authentication. For example, in this heterogeneous access model, the
VLAN dynamic profiles accept PPPoE, IPoE, and IPv6oE packets. When you use the packet-types
statement to specify that only IPoE or IPv6oE packets can initiate VLAN authentication, the PPPoE
VLANs are not submitted to RADIUS for authentication.
37
• Overriding dynamic profiles in a mixed access model—Another use for packet-type triggering is to
override the configured dynamic profile for certain subscribers. To accomplish this, create one dynamic
profile to match the needs of the PPPoE subscribers and create another dynamic profile for the IPoE
subscribers. PPPoE subscribers make up the majority of subscribers in this model, so the PPPoE-tuned
dynamic profile is applied to the VLAN interface. Include the IP profile in the Juniper Networks
Client-Profile-Name VSA [26-174]. Configure the packet-types statement to specify that only IP packets
trigger VLAN authentication.
When an IPoE packet is received, RADIUS authenticates the VLAN. RADIUS returns the override profile
contained in the Client-Profile-Name VSA and any other session attributes in the Access-Accept message.
The VLAN autoconfiguration process overrides the PPPoE profile by instantiating the IP profile for the
IPoE subscriber.
Table 4 on page 37 lists the packet types that you can configure for VLAN authentication depending on
the packet types configured for VLAN creation.
Table 4: Relationship Between Packet Types for VLAN Creation and Authentication
Packet Types for VLAN Creation Packet Types for VLAN Authentication
any Any combination of any, dhcp-v4 or inet, dhcp-v6 or inet6, and pppoe.
pppoe pppoe
NOTE: You cannot simultaneously configure both dhcp-v4 and inet or dhcp-v6 and inet6 as
packet types for VLAN creation or authentication.
• You configure the any option for both VLAN creation and authentication.
38
In general, VLAN authentication is performed when any packet of the type configured to trigger VLAN
creation matches one of the packet types configured to trigger VLAN authentication. However, for certain
combinations of configured packets, a specific packet is required to trigger authentication.
Table 5 on page 38 lists these special cases.
Table 5: Packet Types Required to Trigger Authentication for Special Configuration Combinations
RELATED DOCUMENTATION
By default, VLAN authentication is triggered by any of the packet types specified with the accept statement
in the dynamic profile that instantiates the VLAN and subscriber interfaces. For certain business cases,
you may want a more generic dynamic profile that includes several packet types, but in some situations
want the VLAN to be authenticated for only a subset of your customers. You can use the packet-types
statement to specify the desired subset.
• Specify one or more packet types that you want to trigger VLAN authentication.
39
For example, the following partial configuration shows how to specify that IP, IPv6, and PPPoE packet
types trigger the creation of autoconfigured, single-tagged VLANs, but only IP and IPv6 packets trigger
authentication:
1. Access the VLAN dynamic profile for which you want to configure VLAN ranges.
3. Specify the VLAN packet types accepted by the VLAN dynamic profile.
4. Specify the subset of those packet types that you want to trigger VLAN authentication.
RELATED DOCUMENTATION
You can define interface information that is included in the username that is subsequently passed to the
external AAA authentication service (for example, RADIUS) when creating dynamic VLANs or stacked
40
VLANs. The AAA authentication service uses this information to authenticate the VLAN or stacked VLAN
physical interface. After the interface is authenticated, the AAA service can send the required routing
instance values to the system for use in dynamically creating VLAN or stacked VLAN interfaces.
NOTE: The following example configures username information on VLANs. However, you can
also configure dynamic authentication on stacked VLANs by configuring the same statements
at the [edit interfaces interface-name auto-configure stacked-vlan-ranges authentication]
hierarchy level.
1. Access the authentication stanza for the interface over which you want to configure username
information.
2. Specify the username components that you want the AAA authentication service to use to authenticate
the username.
• Include the agent circuit identifier (ACI). The ACI is conveyed by the Access-Loop-Circuit-ID TLV in
an out-of-band ANCP Port Up message.
• Specify the character used as the delimiter between the concatenated components of the username.
• Include the client hardware address (chaddr) from the incoming DHCP discover packet.
• Include the option 18 (Interface-ID) information that was received in the innermost DHCPv6
Relay-Forward message header.
• Include the option 37 (DHCPv6 Relay Agent Remote-ID) information that was received in the
innermost DHCPv6 Relay-Forward message header.
• Include the option 82 information from the client PDU. For DHCPv4, optionally include suboption
1 (Agent Circuit ID) or suboption 2 (Agent Remote ID).
• Include the user-defined RADIUS realm string to direct the authentication request to a profile that
does not allocates addresses.
• Include the agent remote identifier (ARI). The ARI is conveyed by the Access-Loop-Remote-ID TLV
in an out-of-band ANCP Port Up message
• Include the subscriber VLAN tags. You can use this option instead of the interface-name option when
the outer VLAN tag is unique across the system and you do not need the underlying physical interface
name to be part of the format.
RELATED DOCUMENTATION
You can specify the Option 82 suboptions that are concatenated with the username during the
authentication process for autosense VLANs. The option 82 value used in creating the username is based
on the option 82 value that is encoded in the incoming DHCP discover packet.
You can specify either, both, or neither of the Agent Circuit ID (suboption 1) and the Agent Remote ID
(suboption 2). If you specify both, the Agent Circuit ID is supplied first, followed by a delimiter, and then
the Agent Remote ID. If you specify that neither suboption is supplied, the raw payload of Option 82 from
the PDU is concatenated to the username. The use of Option 82 suboptions is supported for DHCPv4
discover packets only.
RELATED DOCUMENTATION
For DHCPv4, Option 82 has suboptions containing the ACI and ARI that are concatenated with the
username during the authentication process for autosense (dynamic) VLANs. For DHCPv6, the relay agent
uses Options 18 and Option 37 to convey the ACI and ARI, respectively. You can include these options
in the username to generate unique usernames that identify subscribers for authentication in DHCPv6
dynamic VLANs.
A DHCPv6 Solicit message encapsulated with a Relay-Forward message header and one without the
Relay-Forward message header are eligible for dynamic VLAN creation when you configure the DHCPv6
packet type for autosensing. Options 18 and Option 37 are provided in the Relay-Forward message header
and are extracted only from this header and not from the options within the DHCPv6 Solicit message. In
addition, if the DHCPv6 Solicit message is encapsulated in multiple Relay-Forward message headers, only
the option values from the innermost Relay-Forward message header are used for username authentication.
If these options are sent by the client or DHCPv6 relay agent, and if dynamic VLAN authentication is
configured to use these options in the username, then the options are included in the username for
authentication. If either of these options is not sent by the client or DHCPv6 relay agent, or if the dynamic
VLAN authentication is not configured to use the option in the username, the username is constructed
without the option.
To include Option 18 or Option 37 in the username for DHCPv6 dynamic VLANs, include the option-37
and option-18 statements at the [edit interfaces interface-name auto-configure vlan-ranges authentication
username-include] hierarchy level. To include Options 18 or Option 37 in the username for stacked VLANs,
include option-18 and option-37 statements at the [edit interfaces interface-name auto-configure
stacked-vlan-ranges authentication username-include] hierarchy level.
RELATED DOCUMENTATION
CHAPTER 4
IN THIS CHAPTER
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information | 55
Dynamic VLAN subscriber interfaces that are created based on the agent circuit identifier (ACI) value are
useful in configurations with a mix of DHCP and PPPoE subscriber sessions at the same household.
When you use service VLANs (S-VLANs) to carry one service to many subscribers (1:N), each subscriber
or household can have different types of traffic on multiple VLANs. To identify all subscriber sessions for
an individual subscriber or a household, you can use the value of the ACI string. The ability to uniquely
identify subscribers simplifies the application of services, such as CoS and filters, to individual subscribers
or households.
Because an S-VLAN corresponds to a service rather than an individual subscriber, the router uses ACI
information in DHCP and PPPoE control packets instead of VLAN encapsulation to uniquely identify
subscribers and facilitate application of subscriber-based services.
The legacy ACI method for configuring the creation of dynamic VLANs is based on the receipt of only the
ACI. When the ACI is not received, no VLAN is created. An alternative method provides greater flexibility
46
than the legacy method. The access-line-identifier (ALI) method enables dynamic VLANs to be created
based on receipt of the ACI, the agent remote identifier (ARI), both the ACI and the ARI, or the absence
of both of ACI and ARI.
Although the agent circuit identifier is also an access-line identifier, we use specific terminology to distinguish
between the two configuration methods:
• The documentation continues to use the terms agent circuit identifier, ACI, and ACI-based to refer only
to VLANs and interface sets configured with the legacy method, using the agent-circuit-identifier stanza
for autoconfiguration.
• The documentation uses the terms access-line identifier, ALI, and ALI-based to refer to VLANs and interface
sets configured with the access-line-identifier method, using the line-identity stanza for autoconfiguration.
You must configure only one of these methods. A CLI check prevents you from configuring both of these
methods. You can use the ALI method to achieve the same results as the legacy ACI method. Apart from
the fact that the ALI method uses the line-identity stanza instead of the agent-circuit-identifier stanza
for autoconfiguration, the configuration is the same for both methods. The legacy ACI method might be
deprecated in the future in favor of the more generic ALI method. For information about ALI VLANs, see
“Access-Line-Identifier-Based Dynamic VLANs Overview” on page 61.
1. The residential gateway at a household sends a connection request to the access node.
2. The access node identifies the household and inserts an ACI value into the header of a DHCP or PPPoE
control packet. The access node can insert the ACI value into one of the following DHCP options or
PPPoE control packets:
• The DSL Forum Agent-Circuit-ID VSA [26-1] (option 0x105) of PPPoE Active Discovery Initiation
(PADI) and PPPoE Active Discovery Request (PADR) control packets
The access node inserts the same ACI value to all subsequent sessions that originate from the same
household.
4. When the BNG receives the control packets, it extracts the ACI value in the header and uses it to build
a unique dynamic VLAN subscriber interface.
47
Subsequent control traffic sent from the same household will contain the same ACI value. The BNG
groups subscriber interfaces that have the same ACI value into an ACI interface set, also called an ACI
set.
The BNG can then apply CoS and policies to the ACI set to dynamically provision traffic for a household.
The following describes the components of an ACI-based dynamic VLAN configuration, from bottom to
top of the interface stack:
ACI-based dynamic VLAN configurations support the following physical interface types:
• Gigabit Ethernet
• Aggregated Ethernet
You can configure ACI-based dynamic VLAN subscriber interfaces on Modular Port Concentrators/Modular
Interface Cards (MPCs/MICs) that face the access side of the network in an MX Series router.
After you define the ACI interface set, you must configure the underlying VLAN interface to enable creation
of dynamic VLAN subscriber interfaces based on ACI information. You can configure the underlying VLAN
interface either dynamically (with a dynamic profile) or statically.
ACI-based dynamic VLAN configurations support the following underlying VLAN interface types:
• Gigabit Ethernet
NOTE: When you configure an underlying VLAN interface to support creation of ACI-based
dynamic VLANs, we recommend that you use this underlying interface only for subscriber
interfaces that contain agent-circuit-identifier information in their DHCP or PPPoE control
packets. If the router receives DHCP or PPPoE control packets without agent-circuit-identifier
information on an underlying VLAN interface configured for ACI-based dynamic VLANs, the
associated subscriber interfaces might not instantiate successfully.
48
The dynamic ACI interface set groups the DHCP and PPPoE subscriber sessions that belong to a particular
household and share a common unique ACI value. The router creates one ACI interface set per household.
You must create a dynamic profile to define the ACI interface set, which is represented in the profile by
the Junos OS predefined dynamic variable $junos-interface-set-name. When a DHCP or PPPoE subscriber
accesses the router on a particular interface, the router obtains the agent-circuit-identifier information
from the DHCP or PPPoE control packets transmitted on that interface and dynamically creates the ACI
interface set when the first subscriber from that household logs in.
You must create a dynamic profile to define either a dynamic PPPoE subscriber interface for PPPoE
subscriber sessions, or a dynamic IP demultiplexer (IP demux) subscriber interface for DHCP subscriber
sessions. The router creates the subscriber interface when a subscriber logs in on the associated underlying
VLAN interface associated with the dynamic profile that defines the ACI interface set.
RELATED DOCUMENTATION
You can configure dynamic VLAN subscriber interfaces based on agent circuit identifier (ACI) information,
also known as ACI-based dynamic VLANs, for DHCP and PPPoE subscribers. To do so, you create an ACI
interface set, which is a logical collection of subscriber interfaces that originate at the same household or
on the same access-loop port, and then reference the ACI interface set in the dynamic profile for a PPPoE
or IP demultiplexing (IP demux) logical subscriber interface.
1. Configure the underlying physical interface for single-tag VLANs or stacked (dual-tag) VLANs.
49
• Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs on
page 19
• Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs on page 23
• Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles on page 101
1. Configure a dynamic profile that defines the dynamic ACI interface set.
2. (Optional) In the dynamic profile for the ACI interface set, configure the router to use the
Actual-Data-Rate-Downstream VSA [26-130] or Access-Loop-Encapsulation VSA [26-144] value in
PPPoE control packets to adjust CoS shaping-rate and overhead-accounting attributes at a per-household
level.
See Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Agent Circuit Identifier-Based
Dynamic VLANs.
3. Dynamically or statically configure the underlying VLAN logical interface to enable dynamic subscriber
interface creation based on ACI information.
• For dynamic underlying VLAN interfaces, see “Configuring Dynamic Underlying VLAN Interfaces to
Use Agent Circuit Identifier Information” on page 52.
• For static underlying VLAN interfaces, see “Configuring Static Underlying VLAN Interfaces to Use
Agent Circuit Identifier Information” on page 54.
4. Associate the dynamic ACI interface set with the dynamic PPPoE or dynamic IP demux logical subscriber
interface.
50
See “Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information”
on page 55.
5. (Optional) In the dynamic profile for the PPPoE (pp0) subscriber interface, configure the router to use
the Actual-Data-Rate-Downstream VSA [26-130] or Access-Loop-Encapsulation VSA [26-144] value
in PPPoE control packets to adjust CoS shaping-rate and overhead-accounting attributes at a
per-subscriber level.
See Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Agent Circuit Identifier-Based
Dynamic VLANs.
RELATED DOCUMENTATION
To configure the router to create dynamic VLAN subscriber interfaces for DHCP and PPPoE subscribers
based on ACI information, you must create a dynamic ACI interface set.
1. Access the dynamic profile that defines the ACI interface set.
[edit]
user@host# edit dynamic-profiles profile-name
Use the $junos-interface-set-name predefined variable to represent the name of the ACI interface set.
It is replaced with the actual ACI interface set name generated by the router when the first subscriber
from that household logs in.
51
3. Include the underlying interfaces for the dynamic ACI interface set.
Use the $junos-interface-ifd-name predefined variable to represent the name of the interface. The
variable is replaced with the name of the interface on which the subscriber accesses the BNG.
The unit statement is not required in the dynamic profile when you configure an ACI interface set.
4. (Optional) For dynamic PPPoE subscriber interfaces, configure the maximum number of dynamic PPPoE
sessions that the router can activate for the ACI interface set; that is, for the same household.
5. (Optional) Apply attributes for CoS and interface filters to all subscriber interfaces belonging to the
ACI interface set.
The following example shows the minimum dynamic profile required to define an ACI interface set named
aci-vlan-set-profile. It uses predefined variables to represent the interface set and the underlying physical
interface.
RELATED DOCUMENTATION
After you define the agent circuit identifier (ACI) interface set, you must configure the underlying VLAN
interface to enable creation of dynamic VLAN subscriber interfaces based on ACI information. You can
configure the underlying VLAN interface statically or dynamically.
This topic describes how to configure the underlying VLAN interface dynamically.
• In the dynamic profile for the underlying VLAN interface, associate the dynamic profile that defines the
ACI interface set with the underlying VLAN interface.
The following example shows the dynamic configuration that uses this statement. This configuration
enables the underlying dynamic IP demultiplexing (IP demux) VLAN interface to create dynamic subscriber
53
interfaces based on ACI information by applying a single default ACI interface set dynamic profile
(aci-vlan-set-profile2) to all households on the VLAN interface.
RELATED DOCUMENTATION
After you define the agent circuit identifier (ACI) interface set, you must configure the underlying VLAN
interface to enable creation of dynamic VLAN subscriber interfaces based on ACI information. You can
configure the underlying VLAN interface statically or dynamically.
This topic describes how to configure the underlying VLAN interface statically.
• Associate the dynamic profile that defines the ACI interface set with the static underlying VLAN interface.
[edit]
user@host# set interfaces interface-name unit logical-unit-number auto-configure agent-circuit-identifier
dynamic-profile aci-interface-set-profile-name
For example, the following statement associates static Gigabit Ethernet VLAN interface ge-1/0/0.0 with
the dynamic profile aci-vlan-set-profile that defines the ACI interface set.
[edit]
user@host# set interfaces ge-1/0/0 unit 0 auto-configure agent-circuit-identifier dynamic-profile
aci-vlan-set-profile
The following example shows the static configuration that uses this statement. This configuration enables
the underlying VLAN interface ge-1/0/0.0 to create dynamic subscriber interfaces based on ACI information
by applying a single default ACI interface set dynamic profile (aci-vlan-set-profile) to all households on the
VLAN interface.
[edit]
interfaces {
ge-1/0/0 {
flexible-vlan-tagging;
unit 0 {
vlan-id 100;
auto-configure {
agent-circuit-identifier {
dynamic-profile aci-vlan-set-profile;
}
}
}
}
}
55
RELATED DOCUMENTATION
After you define the dynamic agent circuit identifier (ACI) interface set and enable creation of ACI-based
dynamic VLAN subscriber interfaces on the underlying VLAN interface, you must complete the configuration
by associating the ACI interface set with the PPPoE or IP demultiplexing (IP demux) subscriber interface
in the dynamic profile for the subscriber interface.
• Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles on page 101
• In the dynamic profile for the PPPoE or IP demux subscriber interface, associate the dynamic ACI interface
set with the dynamic VLAN subscriber interface name (pp0 or demux0) and logical unit number.
For example, the following statement in a dynamic profile named aci-vlan-pppoe-profile associates the
dynamic ACI interface set with the dynamic pp0 (PPPoE) logical subscriber interface. You must use the
predefined dynamic variable $junos-interface-set-name to represent the name of the dynamic ACI
interface set, and $junos-interface-unit to represent the logical unit number of the subscriber interface.
Similarly, the following statement in a dynamic profile named aci-vlan-demux-profile associates the
dynamic ACI interface set (represented by $junos-interface-set-name) with the demux0 (IP demux)
logical subscriber interface.
The following examples show the dynamic configurations that use each of these statements. The following
sample configuration shows a dynamic profile named aci-vlan-pppoe-profile for an ACI-based dynamic
PPPoE (pp0) subscriber interface for use by PPPoE subscribers.
The following sample configuration shows a dynamic profile named aci-vlan-demux-profile for an ACI-based
dynamic IP demux(demux0) subscriber interface for use by DHCP subscribers.
unit "$junos-interface-unit";
}
}
demux0 {
unit "$junos-interface-unit" {
demux-options {
underlying-interface "$junos-underlying-interface";
}
family inet {
demux-source {
$junos-subscriber-ip-address;
}
unnumbered-address lo0.0 preferred-source-address 198.51.100.202;
}
}
}
}
RELATED DOCUMENTATION
Action
• To display the logical and physical interface associations for the classifier, rewrite rules, scheduler map
objects, and CoS adjustment settings:
• To display the CoS associations for the specified dynamic ACI interface set:
58
• To display information about the specified CoS traffic shaping and scheduling profile:
• To display address bindings and ACI interface set information in the client table on the extended DHCP
local server:
• To display information about all dynamic ACI interface sets configured on the router:
• To display information about PPPoE underlying interfaces, including whether creation of ACI-based
dynamic VLAN subscriber interfaces is enabled on the underlying interface:
• To display information about active subscriber sessions associated with ACI interface sets:
• To display information about active subscriber sessions associated with a specified ACI interface set:
• To display information about active subscriber sessions that have an agent circuit identifier value
containing a matching substring:
RELATED DOCUMENTATION
Action
• To clear a specified ACI interface set that has no active members:
For example, the following command clears the ACI interface set named aci-1003-ge-1/0/0.4001:
Meaning
The router dynamically creates an ACI interface set, if configured, when the first DHCP or PPPoE subscriber
from a particular household logs in. However, the router does not automatically delete the ACI interface
set when the last subscriber from that household logs out. As a result, you must use the clear
auto-configuration interfaces interface-set command to explicitly clear the ACI interface set when it no
longer has any active subscriber interface members. If you attempt to clear an ACI interface that still has
active member interfaces, the router displays an error message and rejects the command.
When you specify the name of the ACI interface set to be cleared, you must use the ACI interface set
name internally generated by the router, and not the actual ACI string carried in DHCP and PPPoE control
packets. The router uses the following format to name ACI interface sets, as shown in the ACI interface
set named aci-1003-ge-1/0/0.4001:
aci-nnnn-interface-name.logical-unit-number
where:
• interface-name is the name of the dynamic subscriber interface (ge-1/0/0 in the example)
60
• logical-unit-number is the logical unit number of the dynamic subscriber interface (4001 in the example)
To view the names of the ACI interface sets configured on the router, use the show subscribers command.
RELATED DOCUMENTATION
CHAPTER 5
IN THIS CHAPTER
Verifying and Managing Configurations for Dynamic VLANs Based on Access-Line Identifiers | 74
Dynamic VLAN subscriber interfaces that are created based on the access-line identifier (ALI) are useful
in configurations with a mix of DHCP and PPPoE subscriber sessions at the same household.
When you use service VLANs (S-VLANs) to carry one service to many subscribers (1:N), each subscriber
or household can have different types of traffic on multiple VLANs. The access node embeds the ALI in
DHCP and PPPoE control packets. To identify all subscriber sessions for an individual subscriber or a
household, you can use the ALI. The ability to uniquely identify subscribers simplifies the application of
services, such as CoS and filters, to individual subscribers or households.
Because an S-VLAN corresponds to a service rather than an individual subscriber, the router uses the ALI
in DHCP and PPPoE control packets instead of VLAN encapsulation to uniquely identify subscribers and
facilitate application of subscriber-based services. ALIs include the agent circuit identifier (ACI) and the
agent remote identifier (ARI).
62
The ALI method for configuring the creation of dynamic VLANs is based on the receipt of a configured
trusted option, which can be the ACI, the ARI, both the ACI and the ARI, or the absence of both of ACI
and ARI. Another method, called the legacy ACI method, enables dynamic VLANs to be created based only
on the ACI. When the legacy method is used and the ACI is not received, no VLAN is created. The ALI
method provides greater flexibility than the legacy method; for example, it can be used when the access
node embeds only the ARI instead of the ACI.
Although the agent circuit identifier is also an access-line identifier, we use specific terminology to distinguish
between the two configuration methods:
• The documentation continues to use the terms agent circuit identifier, ACI, and ACI-based to refer only
to VLANs and interface sets configured with the legacy method, using the agent-circuit-identifier stanza
for autoconfiguration.
• The documentation uses the terms access-line identifier, ALI, and ALI-based to refer to VLANs and interface
sets configured with the access-line-identifier method, using the line-identity stanza for autoconfiguration.
You must configure only one of these methods. A CLI check prevents you from configuring both of these
methods. You can use the ALI method to achieve the same results as the legacy ACI method. Apart from
the fact that the ALI method uses the line-identity stanza instead of the agent-circuit-identifier stanza
for autoconfiguration, the configuration is the same for both methods. The legacy ACI method might be
deprecated in the future in favor of the more generic ALI method. For information about ACI VLANs, see
“Agent Circuit Identifier-Based Dynamic VLANs Overview” on page 45.
1. The residential gateway at a household sends a connection request to the access node.
2. The access node identifies the household and inserts an access-line-identifier value into the header of
a DHCP or PPPoE control packet. The access-line identifier can be the ACI value, the ARI value, or
both.Table 6 on page 62 lists where the access node can insert the ALI value for DHCP, DHCPv6, and
PPPoE control packets.
Table 6: Location of the Access-Line Identifier in DHCP, DHCPv6, and PPPoE Control Packets
ACI Option 82, suboption 1 Option 18 DSL Forum Agent-Circuit-ID VSA [26-1]
ARI Option 82, suboption 2 Option 37 DSL Forum Agent-Remote-ID VSA [26-2]
63
The access node inserts the same ALI value into the control packets for all subsequent sessions that
originate from the same household.
When neither the ACI nor the ARI is received and accept-no-ids is configured as the line identity trusted
option, then the router creates the interface set using an internally generated default string as the
identifier value. It creates one such interface set for each underlying logical interface.
3. The access node forwards the control packets to the broadband network gateway (BNG).
4. When the BNG receives the control packets, it extracts the ALI value in the header and uses this value
to build a unique dynamic VLAN subscriber interface.
Subsequent control traffic sent from the same household contains the same ALI value. The BNG groups
subscriber interfaces that have the same ALI value into an ALI interface set, also called an ALI set.
The BNG can then apply CoS and policies to the ALI set to dynamically provision traffic for a household.
The following sections describe the components of an ALI-based dynamic VLAN configuration, from
bottom to top of the interface stack.
• Gigabit Ethernet
• Aggregated Ethernet
You can configure ALI-based dynamic VLAN subscriber interfaces on Modular Port Concentrators/Modular
Interface Cards (MPCs/MICs) that face the access side of the network in an MX Series router.
ALI-based dynamic VLAN configurations support the following underlying VLAN interface types:
• Gigabit Ethernet
NOTE: If you configure an underlying VLAN interface to support creation of ALI-based dynamic
VLANs, we recommend that you use this underlying interface only for subscriber interfaces that
contain ALI information in their DHCP or PPPoE control packets. If the router receives DHCP
or PPPoE control packets without this information on an underlying VLAN interface configured
for ALI-based dynamic VLANs, the associated subscriber interfaces might not instantiate
successfully. The exception to this behavior is when you have configured accept-no-ids as the
trusted option.
You must create a dynamic profile that defines the ALI interface set. The interface set is represented in
the profile by the predefined dynamic variable $junos-interface-set-name. When a DHCP or PPPoE
subscriber accesses the router on a particular interface, the router obtains the ALI from the DHCP or
PPPoE control packets transmitted on that interface. If the ALI matches the configured trusted option,
the router dynamically creates the ALI interface set when the first subscriber from that household logs in.
RELATED DOCUMENTATION
You can configure dynamic VLAN subscriber interfaces for DHCP and PPPoE subscribers based on the
access-line identifier (ALI). These subscriber interfaces are also known as access-line identifier VLANs,
ALI-based dynamic VLANs, or ALI dynamic VLANs. To configure these VLANs, you create an ALI interface
set, which is a logical collection of subscriber interfaces that originate at the same household or on the
same access-loop port, and then you reference the ALI interface set in the dynamic profile for a PPPoE or
IP demultiplexing (IP demux) logical subscriber interface.
1. Configure the underlying physical interface for single-tag VLANs or stacked (dual-tag) VLANs.
• Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs on
page 19
• Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs on page 23
• Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles on page 101
1. Configure a dynamic profile that defines the dynamic ALI interface set.
2. (Optional) In the dynamic profile for the ALI interface set, configure the router to use the
Actual-Data-Rate-Downstream VSA [26-130] or Access-Loop-Encapsulation VSA [26-144] value in
PPPoE control packets to adjust CoS shaping-rate and overhead-accounting attributes at a per-household
level.
See Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Dynamic VLANs Based on
Access-Line Identifiers.
66
3. Dynamically or statically configure the underlying VLAN logical interface to enable dynamic subscriber
interface creation based on the ALI.
• For dynamic underlying VLAN interfaces, see “Configuring Dynamic Underlying VLAN Interfaces to
Use Access-Line Identifiers” on page 68.
• For static underlying VLAN interfaces, see “Configuring Static Underlying VLAN Interfaces to Use
Access-Line Identifiers” on page 70.
4. Associate the dynamic ALI interface set with the dynamic PPPoE or dynamic IP demux logical subscriber
interface.
See “Configuring Dynamic VLAN Subscriber Interfaces Based on Access-Line Identifiers” on page 72.
5. (Optional) In the dynamic profile for the PPPoE (pp0) subscriber interface, configure the router to use
the Actual-Data-Rate-Downstream VSA [26-130] or Access-Loop-Encapsulation VSA [26-144] value
in PPPoE control packets to adjust CoS shaping-rate and overhead-accounting attributes at a
per-subscriber level.
See Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Dynamic VLANs Based on
Access-Line Identifiers.
RELATED DOCUMENTATION
Verifying and Managing Configurations for Dynamic VLANs Based on Access-Line Identifiers | 74
Clearing Access-Line-Identifier Interface Sets | 76
Access-Line-Identifier-Based Dynamic VLANs Overview | 61
Bandwidth Management Overview for Dynamic VLANs Based on Access-Line Identifiers
To configure the router to create dynamic VLAN subscriber interfaces for DHCP and PPPoE subscribers
based on an access-line identifier (ALI), you must create a dynamic ALI interface set.
1. Access the dynamic profile that defines the ALI interface set.
[edit]
user@host# edit dynamic-profiles profile-name
67
Use the predefined variable $junos-interface-set-name to represent the name of the ALI interface set.
It is replaced with the actual ALI interface set name generated by the router when the first subscriber
from that household logs in.
3. Include the underlying interfaces for the dynamic ALI interface set.
Use the predefined variable $junos-interface-ifd-name to represent the name of the interface. The
variable is replaced with the name of the interface on which the subscriber accesses the BNG.
The unit statement is not required in the dynamic profile when you configure an ALI interface set.
4. (Optional) For dynamic PPPoE subscriber interfaces, configure the maximum number of dynamic PPPoE
sessions that the router can activate for the ALI interface set; that is, for the same household.
5. (Optional) Apply attributes for CoS and interface filters to all subscriber interfaces belonging to the ALI
interface set.
The following example shows the minimum dynamic profile required to define an ALI interface set named
ali-vlan-set-profile. It uses predefined variables to represent the interface set and the underlying physical
interface.
RELATED DOCUMENTATION
After you define the access-line-identifier (ALI) interface set, you must configure the underlying VLAN
interface to enable creation of dynamic VLAN subscriber interfaces based on the ALI. You can configure
the underlying VLAN interface statically or dynamically.
This topic describes how to configure the underlying VLAN interface dynamically.
1. In the dynamic profile for the underlying VLAN interface, associate the underlying VLAN interface with
the line identity dynamic profile that defines the ALI interface set.
For example, the following statement specifies that only the ARI is accepted to trigger creation of the
VLAN. When the ARI is not received, no VLAN is created.
The following example shows the dynamic configuration that uses these statements. This configuration
enables the underlying dynamic IP demultiplexing (IP demux) VLAN interface to create dynamic subscriber
interfaces based on the ARI by applying a single default ALI interface set dynamic profile
(ali-vlan-set-profile2) to all households on the VLAN interface.
}
}
}
}
RELATED DOCUMENTATION
After you define the access-line-identifier (ALI) interface set, you must configure the underlying VLAN
interface to enable creation of dynamic VLAN subscriber interfaces based on the ALI. You can configure
the underlying VLAN interface statically or dynamically.
This topic describes how to configure the underlying VLAN interface statically.
1. Associate the static underlying VLAN interface with the line identity dynamic profile that defines the
ALI interface set.
[edit]
user@host# set interfaces interface-name unit logical-unit-number auto-configure line-identity dynamic-profile
ali-interface-set-profile-name
For example, the following statement associates static Gigabit Ethernet VLAN interface ge-1/0/0.0
with the dynamic profile ali-vlan-set-profile that defines the ALI interface set.
[edit]
user@host# set interfaces ge-1/0/0 unit 0 auto-configure line-identity dynamic-profile ali-vlan-set-profile
[edit]
71
For example, the following statement specifies that only the ARI is accepted to trigger creation of the
VLAN. When the ARI is not received, no VLAN is created.
[edit]
user@host# set interfaces ge-1/0/0 unit 0 auto-configure line-identity include remote-id
The following example shows the static configuration that uses this statement. This configuration enables
the underlying VLAN interface ge-1/0/0.0 to create dynamic subscriber interfaces based on the ARI by
applying a single default ALI interface set dynamic profile (ali-vlan-set-profile) to all households on the
VLAN interface.
[edit]
interfaces {
ge-1/0/0 {
flexible-vlan-tagging;
unit 0 {
vlan-id 100;
auto-configure {
line-identity {
dynamic-profile ali-vlan-set-profile;
include {
remote-id;
}
}
}
}
}
}
RELATED DOCUMENTATION
After you define the dynamic access-line-identifier (ALI) interface set and enable creation of ALI-based
dynamic VLAN subscriber interfaces on the underlying VLAN interface, you must complete the configuration
by associating the ALI interface set with the PPPoE or IP demultiplexing (IP demux) subscriber interface
in the dynamic profile for the subscriber interface.
• Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles on page 101
• In the dynamic profile for the PPPoE or IP demux subscriber interface, associate the dynamic ALI interface
set with the dynamic VLAN subscriber interface name (pp0 or demux0) and logical unit number.
For example, the following statement in a dynamic profile named ali-vlan-pppoe-profile associates the
dynamic ALI interface set with the dynamic pp0 (PPPoE) logical subscriber interface. You must use the
predefined dynamic variable $junos-interface-set-name to represent the name of the dynamic ALI
interface set, and $junos-interface-unit to represent the logical unit number of the subscriber interface.
Similarly, the following statement in a dynamic profile named ali-vlan-demux-profile associates the
dynamic ALI interface set (represented by $junos-interface-set-name) with the demux0 (IP demux) logical
subscriber interface.
The following examples show the dynamic configurations that use each of these statements. The following
sample configuration shows a dynamic profile named ali-vlan-pppoe-profile for an ALI-based dynamic
PPPoE (pp0) subscriber interface for use by PPPoE subscribers.
The following sample configuration shows a dynamic profile named ali-vlan-demux-profile for an ALI-based
dynamic IP demux (demux0) subscriber interface for use by DHCP subscribers.
family inet {
demux-source {
$junos-subscriber-ip-address;
}
unnumbered-address lo0.0 preferred-source-address 198.51.100.202;
}
}
}
}
RELATED DOCUMENTATION
Action
• To display the logical and physical interface associations for the classifier, rewrite rules, scheduler map
objects, and CoS adjustment settings:
• To display the CoS associations for the specified dynamic ALI interface set:
• To display information about the specified CoS traffic shaping and scheduling profile:
• To display address bindings and ALI interface set information in the client table on the extended DHCP
local server:
• To display information about all dynamic ALI interface sets configured on the router:
• To display information about PPPoE underlying interfaces, including whether creation of ALI-based
dynamic VLAN subscriber interfaces is enabled on the underlying interface:
• To display information about active subscriber sessions associated with ALI interface sets:
• To display information about active subscriber sessions associated with a specified ALI interface set:
• To display information about active subscriber sessions that have an access-line-identifier value containing
a matching substring:
RELATED DOCUMENTATION
Action
• To clear a specified ALI interface set that has no active members:
For example, the following command clears the ALI interface set named ari-1003-ge-1/0/0.4001:
Meaning
When configured to do so, the router dynamically creates an ALI interface set when the first DHCP or
PPPoE subscriber from a particular household logs in. However, the router does not automatically delete
the ALI interface set when the last subscriber from that household logs out. As a result, you must use the
clear auto-configuration interfaces interface-set command to explicitly clear the ALI interface set when
it no longer has any active subscriber interface members. If you attempt to clear an ALI interface that still
has active member interfaces, the router displays an error message and rejects the command.
When you specify the name of the ALI interface set to be cleared, you must use the ALI interface set name
internally generated by the router, and not the actual ALI string carried in DHCP and PPPoE control packets.
The router uses the following format to name ALI interface sets:
trusted-option-nnnn-interface-name.logical-unit-number
where:
• trusted-option is a prefix identifying the access-line identifier that was configured to be accepted and
which triggered creation of the interface set:
• aci+ari—Both the ACI and the ARI are trusted options and both were received.
• noids—Neither the ACI nor the ARI is configured as the trusted option and neither ACI nor ARI is
received.
• interface-name is the name of the dynamic subscriber interface; for example, ge-1/0/0 or demux0.
• logical-unit-number is the logical unit number of the dynamic subscriber interface; for example, 4001.
aci-1003-ge-1/0/0.4001
ari-4297-demux0.3221225524
aci+ari-8115-demux0.4255221223
noids-3232-ge-2/1/0.1234
To view the names of the ALI interface sets configured on the router, use the show subscribers command.
RELATED DOCUMENTATION
CHAPTER 6
IN THIS CHAPTER
Configuring Ethernet OAM Support for Service VLANs with Double-Tagged Customer VLANs | 82
IN THIS SECTION
You can enable propagation of the Ethernet IEEE 802.1ag Operation, Administration, and Maintenance
(OAM) state of a static single-tagged service VLAN (S-VLAN) to a dynamic or static double-tagged customer
VLAN (C-VLAN) and, by extension, to the subscriber interfaces configured on the C-VLAN. The static
S-VLAN logical interface must be configured on a Gigabit Ethernet, 10-Gigabit Ethernet, or aggregated
Ethernet physical interface.
Propagation of the S-VLAN OAM state to associated C-VLANs ensures that when the OAM state of the
S-VLAN link is down, the associated C-VLANs and all subscriber interfaces configured on the C-VLANs
are brought down as well.
Table 7 on page 80 defines the basic terms and acronyms used in this discussion of Ethernet OAM support
for service VLANs.
80
Table 7: Ethernet OAM Support for Service VLANs Terms and Acronyms
Term Definition
Continuity check A feature of Ethernet IEEE 802.1ag CFM that provides fault detection within a
protocol maintenance association.
C-VLAN Customer VLAN. A dynamic or static double-tagged logical interface that has both an
outer VLAN tag (corresponding to the S-VLAN) and an inner VLAN tag (corresponding
to the C-VLAN). In a 1:1 subscriber network access model, dedicated C-VLANs provide
a one-to-one correspondence between an individual subscriber and the VLAN
encapsulation.
S-VLAN Service VLAN. A static single-tagged logical interface that has only one outer VLAN tag
(corresponding to the S-VLAN). In an N:1 subscriber network access model, S-VLANs
are dedicated to a particular service, such as video, voice, or data, instead of to a particular
subscriber. Because an S-VLAN is typically shared by many subscribers within the same
household or in different households, it provides a many-to-one correspondence between
individual subscribers and the VLAN encapsulation.
VLAN Virtual local area network. A logical group of network devices that appear to be on the
same local area network, regardless of their physical location.
• Physical interface—On MX Series routers with Modular Port Concentrator/Modular Interface Card
(MPC/MIC) interfaces, you can enable propagation of the S-VLAN OAM state to a C-VLAN on Gigabit
Ethernet, 10-Gigabit Ethernet, or aggregated Ethernet physical interfaces.
• S-VLAN—To enable propagation of the S-VLAN Ethernet OAM state to associated C-VLANs and
subscriber interfaces, configure the static single-tagged S-VLAN logical interface to run the Ethernet
IEEE 802.1ag CFM continuity check protocol.
• C-VLAN—The C-VLAN is a dynamic or static double-tagged logical interface that has the same S-VLAN
(outer) tag as the static single-tagged S-VLAN logical interface. If propagation of the S-VLAN OAM state
81
to the C-VLAN is enabled on the physical interface, the router brings down the C-VLAN and its associated
subscriber interfaces when the CFM continuity check protocol detects that the OAM state of the
underlying S-VLAN is down.
• Subscriber interfaces—Propagation of the S-VLAN Ethernet OAM state to associated C-VLANs and
subscriber interfaces applies to all dynamic or static DHCP, IP demultiplexing (IP demux), and PPPoE
subscriber interfaces configured on the C-VLAN.
To enable propagation of the Ethernet OAM state of the S-VLAN to associated C-VLANs and subscriber
interfaces, use the oam-on-svlan statement when you configure a Gigabit Ethernet (ge), 10-Gigabit Ethernet
(xe), or aggregated Ethernet (ae) physical interface.
If Ethernet IEEE 802.1ag CFM is properly configured on the S-VLAN logical interface, including the
oam-on-svlan statement for these Ethernet interfaces causes the router to bring down both of the following
when the CFM continuity check protocol detects that the OAM state of the S-VLAN logical interface is
down:
• All dynamic or static double-tagged C-VLAN logical interfaces that have the same S-VLAN (outer) tag
as the S-VLAN logical interface on which they are configured.
• All dynamic or static DHCP, IP demux, and PPPoE logical subscriber interfaces configured on the
associated C-VLANs.
To illustrate how Ethernet OAM support for S-VLANs works, consider the following sample configuration
on a Gigabit Ethernet physical interface:
• Gigabit Ethernet physical interface ge-1/0/3 configured with the svlan-on-oam statement.
• Static single-tagged S-VLAN logical interface ge-1/0/3.0, which has a single S-VLAN outer tag,
VLAN ID 600.
• Ethernet OAM CFM protocol configured on the static S-VLAN logical interface. The CFM configuration
includes an action profile with the interface-down default action to bring down the C-VLAN and dynamic
subscriber interfaces when the continuity check protocol detects that the Ethernet OAM state of S-VLAN
interface ge-1/0/3.0 is down.
• Static double-tagged C-VLAN logical interface ge-1/0/3.100, which has an S-VLAN outer tag,
VLAN ID 600, and a C-VLAN inner tag, VLAN ID 1.
Because the S-VLAN and C-VLAN logical interfaces in this example have the same S-VLAN outer tag
(VLAN ID 600), the router brings down the C-VLAN interface and the PPPoE logical subscriber interfaces
when the CFM continuity check detects that the OAM status of S-VLAN interface ge-1/0/3.0 is down.
82
Ethernet OAM support for S-VLANs is not currently supported for use with any of the following:
RELATED DOCUMENTATION
Configuring Ethernet OAM Support for Service VLANs with Double-Tagged Customer VLANs | 82
IEEE 802.1ag OAM Connectivity Fault Management Overview
You can enable propagation of the Ethernet IEEE 802.1ag Operation, Administration, and Maintenance
(OAM) state of a static single-tagged service VLAN (S-VLAN) to the dynamic or static double-tagged
customer VLAN (C-VLAN) that has the same S-VLAN (outer) tag as the S-VLAN, and, by extension, to
subscriber interfaces configured on the C-VLAN. The static S-VLAN logical interface must be configured
on a Gigabit Ethernet, 10-Gigabit Ethernet, or aggregated Ethernet physical interface.
• Make sure the static single-tagged S-VLAN logical interface is configured with the Ethernet 802.1ag
OAM connectivity fault management (CFM) continuity check protocol.
To enable propagation of the Ethernet OAM state of a static single-tagged S-VLAN to dynamic or static
double-tagged C-VLAN logical interfaces:
• Configure a Gigabit Ethernet (ge), 10-Gigabit Ethernet (xe), or aggregated Ethernet (ae) physical interface
to propagate the S-VLAN Ethernet OAM state to C-VLAN logical interfaces that have the same S-VLAN
(outer) tag as the S-VLAN interface.
[edit]
user@host# set interfaces interface-name-fpc/pic/port oam-on-svlan
83
For example, the following statement enables propagation of the Ethernet OAM state of a static
single-tagged S-VLAN on Gigabit Ethernet interface ge-1/0/5 to a dynamic or static double-tagged
C-VLAN logical interface with the same S-VLAN (outer) tag as the S-VLAN interface.
[edit]
user@host# set interfaces ge-1/0/5 oam-on-svlan
Including the oam-on-svlan statement when you configure a Gigabit Ethernet, 10-Gigabit Ethernet, or
aggregated Ethernet physical interface causes the router to bring down both of the following when the
CFM continuity check protocol detects that the OAM state of the S-VLAN logical interface is down:
• All dynamic or static double-tagged C-VLANs on the S-VLAN interface that have the same S-VLAN
(outer) tag as the S-VLAN interface.
• All DHCP, IP demultiplexing (IP demux), and PPPoE logical subscriber interfaces configured on the
associated C-VLANs.
Example: Gigabit Ethernet Interface with Static S-VLAN, Dynamic C-VLAN, and Dynamic PPPoE Subscriber
Interfaces
The following example shows a dynamic subscriber access configuration that uses the oam-on-svlan
statement on a Gigabit Ethernet interface. This example configures Gigabit Ethernet physical interface
ge-1/0/5 with a static single-tagged S-VLAN logical interface (ge-1/0/5.1) that runs the Ethernet 802.1ag
OAM CFM continuity check protocol. A dynamic profile named double-vlans creates a dynamic
double-tagged C-VLAN interface, and a dynamic profile named pppoe-profile creates dynamic PPPoE
subscriber interfaces on the C-VLAN interface. The oam-on-svlan statement for ge-1/0/5 propagates the
Ethernet OAM state of S-VLAN interface ge-1/0/5.1 to the C-VLAN interface and the dynamic PPPoE
subscriber interfaces.
1. Configure a dynamic profile named double-vlans that defines a dynamic double-tagged C-VLAN logical
interface.
[edit]
dynamic-profiles {
double-vlans {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
vlan-tags outer "$junos-stacked-vlan-id" inner "$junos-vlan-id";
84
encapsulation ppp-over-ether;
pppoe-underlying-options {
dynamic-profile pppoe-profile;
}
}
}
}
}
}
2. Configure a dynamic profile named pppoe-profile that defines dynamic PPPoE subscriber interfaces
on the C-VLAN.
[edit]
dynamic-profiles {
pppoe-profile {
interfaces {
pp0 {
unit "$junos-interface-unit" {
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
family inet {
unnumbered-address lo0.0;
}
}
}
}
}
}
[edit]
interfaces {
ge-1/0/5 {
description "connect to remote router";
flexible-vlan-tagging;
oam-on-svlan;
unit 1 {
vlan-id 1;
85
}
auto-configure {
stacked-vlan-ranges {
dynamic-profile double-vlans {
accept any;
ranges {
any,any;
}
}
}
}
}
lo0 {
unit 0 {
family inet {
address 198.51.1.1/32 {
primary;
}
}
}
}
}
The preceding example in Step 3 configures a static, single-tagged S-VLAN logical interface (ge-1/0/5.1)
with VLAN ID 1, and references the double-vlans dynamic profile to create a dynamic double-tagged
C-VLAN logical interface with S-VLAN (outer) tag any and C-VLAN (inner) tag any. The tag value any
represents the entire range of VLAN IDs or S-VLAN IDs, including VLAN ID 1.
Because the C-VLAN outer tag (any) matches the S-VLAN tag VLAN ID 1, the oam-on-svlan statement
in the configuration causes the router to propagate the Ethernet OAM state of S-VLAN ge-1/0/5.1 to
the dynamic double-tagged C-VLAN logical interface (created by the double-vlans dynamic profile)
and, by extension, to the dynamic PPPoE subscriber interfaces on the C-VLAN (created by the
pppoe-profile dynamic profile).
4. Configure the Ethernet 802.1ag OAM CFM continuity check protocol on the static S-VLAN interface
(ge-1/0/5.1).
[edit]
protocols {
oam {
ethernet {
connectivity-fault-management {
action-profile myDefault {
default-actions {
86
interface-down;
}
}
maintenance-domain md1 {
level 1;
maintenance-association ma1 {
continuity-check {
interval 1s;
}
mep 100 {
interface ge-1/0/5.1;
direction down;
remote-mep 101 {
action-profile myDefault;
}
}
}
}
}
}
}
}
If the CFM continuity check protocol detects that the Ethernet OAM state of S-VLAN interface
ge-1/0/5.1 is down, the interface-down action in the myDefault action profile causes the router to
bring down both of the following:
• The dynamic double-tagged C-VLAN logical interface that has the same S-VLAN (outer) tag as S-VLAN
interface ge-1/0/5.1
• The dynamic PPPoE subscriber interfaces configured on the dynamic C-VLAN interface
For brevity, this configuration is only partially shown. The missing portions of the configuration are
replaced with ellipses (...).
[edit]
access {
...
profile ppp-authenticator {
...
}
}
87
RELATED DOCUMENTATION
Configuring DHCP IP Demux and PPPoE Demux Interfaces Over the Same VLAN | 153
Providing Security for DHCP Interfaces Using MAC Address Validation | 169
CHAPTER 7
IN THIS CHAPTER
To identify subscribers statically, you can reference a static VLAN interface in a dynamic profile. To identify
subscribers dynamically, you create variables for demux interfaces that are dynamically created by DHCP
when subscribers log in.
Before you can configure static subscriber interfaces in a dynamic profile, you must first configure the
logical interfaces on the router to which you expect clients to connect. After you have created the static
interfaces, you can modify them by using dynamic profiles to apply configuration parameters.
You can also configure subscribers by creating sets of static IP demux interfaces that are not referenced
in a dynamic profile.
When configuring the interfaces stanza within a dynamic profile, you use variables to specify the interface
name and the logical unit value. When a DHCP subscriber sends a DHCP request to the interface, the
dynamic profile replaces the interface-name and unit variables with the actual interface name and logical
unit number of the interface that received the DHCP request. After this association is made, the router
configures the interface with any CoS or protocol (that is, IGMP) configuration within the dynamic profile,
or applies any input or output filter configuration that you have associated with that dynamic profile.
[edit dynamic-profiles]
interfaces interface-name {
unit logical-unit-number {
92
family family {
address address;
filter {
input filter-name;
output filter-name;
}
unnumbered-address interface-name <preferred-source-address address>;
vlan-id;
}
vlan-tagging;
}
You can configure demux interfaces to represent a subscriber interface in a dynamic profile. When a
subscriber logs in using a DHCP access method, the demux interface is dynamically created.
You specify variables for the unit number, the name of the underlying interface, and the IP address in the
dynamic profile. These variables are replaced with the values that are supplied by DHCP when the subscriber
logs in.
RELATED DOCUMENTATION
You can create logical subscriber interfaces using static or dynamic demultiplexing interfaces. In addition,
you can use either IP demultiplexing interfaces or VLAN demultiplexing interfaces when creating logical
subscriber interfaces.
Demultiplexing (demux) interfaces are logical interfaces that share a common, underlying logical interface
(in the case of IP demux) or underlying physical interface (in the case of VLAN demux). You can use these
interfaces to identify specific subscribers or to separate individual circuits by IP address (IP demux) or
VLAN ID (VLAN demux).
The subscriber interfaces can provide different levels of services for individual subscribers in an access
network. For example, you can apply CoS parameters for each subscriber.
93
From Junos OS Release 18.1 onwards, packet triggered subscribers feature creates IP demultiplexing
interfaces (IP demux IFL) on receiving a data packet from clients with pre-assigned IP address. The IP
demultiplexing interfaces are created for both IPv4 or IPv6 data packets. On receiving the packets, the
forwarding plane checks the source IP address. If the source IP address matches any one of the configured
IP address or prefix ranges, the subscriber is sent to the Routing engine. The Routing Engine authenticates
the subscriber with authenticating server. The authenticating server requests for volume accounting and
may also request for advanced services such as firewall filter or CoS. The IP demux IFL is created with the
services requested by the authenticating server. The IP demux IFL employs subscriber services in networks
with statically assigned IP clients or subscribers with pre-assigned IP address.
NOTE: If the source IP address does not fall within any of the IP address or prefix ranges on the
interface, the IP demux IFL does not get created
You can group static demux interfaces to create individual subscriber interfaces using interface sets.
Interface sets enable you to provide the same level of service for a group of subscribers; for example, all
residential subscribers who receive the basic data service.
Figure 4 on page 93 shows a subscriber interface configured using a set of IP demux interfaces with an
underlying VLAN interface.
You can configure demux interfaces to represent a dynamic subscriber interface in a dynamic profile.
Demux interfaces are dynamically created by a DHCP access method when the underlying interface for
the demux interface is configured for the access method. The DHCP access model creates the demux
interface with the subscriber's assigned IP address (for IP demux interfaces) or VLAN ID (for VLAN demux
interfaces).
To configure an IP demux interface in the dynamic profile, you specify variables for the unit number, the
name of the underlying interface, and the IP address. To configure a VLAN demux interface in the dynamic
profile, you specify variables for the unit number, the name of the underlying interface, and the VLAN ID.
These variables are replaced with the values that are supplied by DHCP when the subscriber logs in.
94
When you configure static or dynamic demux interfaces for subscriber access, consider the following
guidelines:
• Only demux0 is supported. If you configure another demux interface, such as demux1, the configuration
commit fails.
• For IP demux interfaces, you can define logical demux interfaces on top of the demux0 interface (for
example, demux0.1, demux0.2, and so on).
• Hierarchical and per-unit scheduling is supported for dynamically created demux interfaces on the EQ
DPC.
• IP demux interfaces support IPv4 (family inet) and IPv6 (family inet6)).
• IP demux subscriber interfaces over aggregated Ethernet physical interfaces are supported only for MX
Series routers that have only MPCs installed. If the router has other cards in addition to MPCs, the CLI
accepts the configuration but errors are reported when the subscriber interfaces are brought up.
• You can configure IPv4 and IPv6 addressing for static and dynamic demux interfaces.
• Demux interfaces currently support only Gigabit Ethernet, Fast Ethernet, 10-Gigabit Ethernet, and
aggregated Ethernet underlying interfaces.
• You must associate VLAN demux interfaces with an underlying device (physical interface).
• You cannot use a dynamic demux interface to represent multiple subscribers in a dynamic profile attached
to an interface. One dynamic demux interface represents one subscriber. Do not configure the
aggregate-clients option when attaching a dynamic profile to a demux interface for DHCP.
CAUTION: Before you make any changes to the underlying interface for a demux0
interface, you must ensure that no subscribers are currently present on that underlying
interface. If any subscribers are present, you must remove them before you make
changes.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Demultiplexing Interface Overview
You can configure a router with IP demux interfaces over VLAN demux interfaces. Just as IP demux
interfaces demultiplex their underlying VLAN demux interfaces based on IP address, VLAN demux interfaces
demultiplex their underlying aggregate Ethernet or Ethernet interfaces based on VLAN ID.
When configuring IP demux interfaces over VLAN demux interfaces, keep the following in mind:
• Only single and dual VLAN tag options are supported as VLAN selectors.
RELATED DOCUMENTATION
CHAPTER 8
IN THIS CHAPTER
You can create logical subscriber interfaces from IP demux interfaces. IP demultiplexing (demux) interfaces
are logical interfaces that share a common, underlying logical interface. IP demux interfaces can be used
to identify specific subscribers or to separate individual circuits.
You can group individual subscriber interfaces using interface sets to provide the same level of service for
a group of subscribers; for example, all residential subscribers who receive the basic data service. Interface
sets can be defined as a list of logical interfaces (unit 0, unit 1, and so on).
NOTE: Only demux0 is supported. If you configure another demux interface, such as demux1,
the configuration commit fails.
interfaces {
interface-set demux-set {
interface demux0 {
unit 0;
unit 1;
}
}
}
98
demux0 {
unit 0 {
demux-options {
underlying-interface ge-2/0/1.1;
}
family inet {
demux-source {
203.0.113.0/24;
}
address 203.0.113.25/24;
}
}
unit 1 {
demux-options {
underlying-interface ge-2/0/1.1;
}
family inet {
demux-source {
203.0.133.110/24;
}
address 203.0.113.12/24;
}
}
}
RELATED DOCUMENTATION
You can create logical subscriber interfaces from VLAN demux interfaces. VLAN demultiplexing (demux)
interfaces are logical interfaces that share a common, underlying physical interface. VLAN demux interfaces
can be used to identify specific subscribers or to separate individual circuits.
You can group individual subscriber interfaces using interface sets to provide the same level of service for
a group of subscribers; for example, all residential subscribers who receive the basic data service. Interface
sets can be defined as a list of logical interfaces (unit 0, unit 1, and so on).
NOTE: Only demux0 is supported. If you configure another demux interface, such as demux1,
the configuration commit fails.
interfaces {
interface-set demux-set {
interface demux0 {
unit 0;
unit 1;
}
}
}
demux0 {
unit 0 {
vlan-id 10;
demux-options {
underlying-interface ge-2/0/1;
}
family inet {
address 203.0.113.201/24;
}
}
unit 1 {
vlan-id 20;
100
demux-options {
underlying-interface ge-2/0/1;
}
family inet {
address 203.0.113.202/24;
}
}
}
RELATED DOCUMENTATION
CHAPTER 9
IN THIS CHAPTER
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Example: Dynamic IP Demux Subscriber Interfaces over Dynamic VLAN Demux Interfaces | 106
To enable the dynamic demux interface to be created by DHCP, you configure the demux options in a
dynamic profile. Dynamic profiles enable you to dynamically apply configured values (including CoS, IGMP,
or filter configuration) to the dynamic interfaces, making them easier to manage.
NOTE: Only demux0 is supported. If you configure another demux interface, such as demux1,
the configuration commit fails.
1. Specify that you want to configure the demux0 interface in the dynamic profile.
a. Configure the variable for the unit number of the demux0 interface.
The variable is dynamically replaced with the unit number that DHCP supplies when the subscriber
logs in.
b. Configure the variable for the underlying interface of the demux interfaces and specify the
$junos-underlying-interface variable.
The variable is dynamically replaced with the underlying interface that DHCP supplies when the
subscriber logs in.
c. (Optional) To improve data path performance for DHCPv4 subscribers, specify that only subscribers
with 32-bit prefixes are allowed to come up on the interface.
NOTE: This step requires that you specify the demux-source as inet.
For IPv4:
For IPv6:
103
The variable is dynamically replaced with the IP address that DHCP supplies when the subscriber
logs in. For IPv4, use $junos-subscriber-ip-address, For IPv6, use $junos-subscriber-ipv6-address.
For IPv6 multiple address support, use $junos-subscriber-ipv6-multi-address.
RELATED DOCUMENTATION
You can configure dynamic subscriber interfaces using VLAN demux interfaces.
To enable the dynamic demux interface to be created by DHCP, you configure the demux options in a
dynamic profile. Dynamic profiles enable you to dynamically apply configured values (including CoS, IGMP,
or filter configuration) to the dynamic interfaces, making them easier to manage.
NOTE: Only demux0 is supported. If you configure another demux interface, such as demux1,
the configuration commit fails.
1. Specify that you want to configure the demux0 interface in the dynamic profile.
a. Configure the variable for the unit number of the demux0 interface.
The variable is dynamically replaced with the unit number that DHCP supplies when the subscriber
logs in.
b. Configure the variable for the underlying interface of the demux interfaces by specifying the
$junos-interface-ifd-name variable.
The variable is dynamically replaced with the underlying device name that DHCP supplies when the
subscriber logs in.
For IPv4:
For IPv6:
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 106
Overview | 106
Configuration | 106
Verification | 113
This example describes how to configure dynamic IP demux interfaces over dynamic VLAN demux interfaces.
Requirements
Before you begin, make sure to configure either DHCP Relay or DHCP Local Server. For information about
configuring either of these components, see Extended DHCP Relay Agent Overview or Extended DHCP Local
Server Overview.
Also, before you begin, see the conceptual information about VLAN demux interfaces in:
• Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces on page 149
• Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles on page 104
Overview
You can create a subscriber interface using an IP demux interface stacked on a static or dynamic VLAN
demux interface. IP demux interfaces are used to uniquely identify subscribers in an access network based
on their IP address.
Configuration
IN THIS SECTION
[edit]
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-5/0/9 gigether-options 802.3ad ae0
set interfaces ge-5/1/9 gigether-options 802.3ad ae0
set interfaces ae0 flexible-vlan-tagging
set interfaces ae0 auto-configure vlan-ranges dynamic-profile Auto-VLAN-Demux accept inet
set interfaces ae0 auto-configure vlan-ranges dynamic-profile Auto-VLAN-Demux ranges 500-1000
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae0 aggregated-ether-options lacp link-protection
Step-by-Step Procedure
You must configure an interface over which clients initially access the router. We recommend that you
specify the same VLAN tagging for the interface that you expect from incoming clients. This example uses
flexible VLAN tagging to simultaneously support transmission of 802.1Q VLAN single-tag and dual-tag
frames on logical interfaces on the same Ethernet port.
If you want it to automatically create dynamic VLANs, the interface must include the VLAN range type
(single or stacked) and contain any specific ranges you want the VLANs to use.
[edit]
user@host# set chassis aggregated-devices ethernet device-count 1
2. Access the physical interface over which you want subscribers to initially access the router.
[edit]
user@host# edit interfaces ge-5/0/9
108
3. Specify the aggregated Ethernet interface to which the physical interface belongs.
4. Repeat Step 2 and Step 3 for each interface you want to assign to the aggregated Ethernet bundle.
[edit]
user@host# set interfaces ge-5/1/9 gigether-options 802.3ad ae0
[edit]
user@host# edit interfaces ae0
6. Specify the VLAN tagging that you want the aggregated Ethernet interfaces to use.
9. Specify the dynamic VLAN profile that you want the interface to use for dynamically creating
single-tagged VLANs.
10. Specify what VLAN Ethernet packet type the VLAN profile accepts.
109
11. Specify the VLAN ranges that you want the dynamic profile to use. The following example specifies a
lower VLAN ID limit of 500 and an upper VLAN ID limit of 1000.
12. (Optional) Activate the transmission of LACP packets on the aggregated Ethernet interfaces.
13. Specify that the aggregated Ethernet interfaces use link protection.
[edit]
set interfaces lo0.0 unit 0 family inet address 198.51.100.100/32
Step-by-Step Procedure
You must configure a loopback interface for use as the unnumbered address and preferred source address
for dynamically created interfaces.
[edit]
user@host# edit interfaces lo0.0
[edit]
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux-source inet
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit proxy-arp
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit vlan-id $junos-vlan-id
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux options
underlying-interface $junos-interface-ifd-name
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit family inet
unnumbered-address lo0.0 preferred source-address 198.51.100.100
Step-by-Step Procedure
For dynamic IP demux interfaces to reside on a dynamic VLAN demux interface, the VLAN interface must
first exist.
A dynamic profile that configures a VLAN demux interface must specify variables for unit, underlying
interface name, and VLAN ID. A dynamic VLAN demux interface associates specific subscribers to separate
individual circuits by VLAN ID.
To configure a dynamic profile and attach it to a dynamic VLAN demux interface so that it automatically
creates VLAN interfaces:
[edit]
user@host# edit dynamic-profiles Auto-VLAN-Demux
2. Specify that the dynamic VLAN profile use the demux interface.
3. Specify that the dynamic profile apply the demux interface unit value to the dynamic VLANs.
4. (Optional) Specify that the demux source accepts only IPv4 (inet) packets.
5. (Optional) Specify that each dynamically created interface respond to any ARP request, as long as an
active route exists to the target address of the ARP request.
8. Specify that the VLAN demux interface can accept inet family packets for IPoE/DHCP subscribers.
9. Specify the loopback address as the unnumbered address and preferred source address for the inet
family.
112
[edit]
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit proxy-arp
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit demux-options
underlying-interface $junos-underlying-interface
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit family inet demux-source
$junos-subscriber-ip-address
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit family inet
unnumbered-address lo0.0 preferred-source-address 198.51.100.100
Step-by-Step Procedure
A dynamic profile that configures an IP demux interface must specify variables for unit, underlying interface
name, and IP address. A dynamic IP demux interface associates specific subscribers to separate individual
circuits by IP address.
To configure a dynamic profile and attach it to an interface so that it automatically creates IP demux
interfaces:
[edit]
user@host# edit dynamic-profiles DHCP-IP-Demux
3. Specify that the dynamic profile apply the interface unit value to the dynamic IP demux interfaces.
4. (Optional) Configure the router to respond to any ARP request, as long as the router has an active route
to the target address of the ARP request.
5. Specify the logical underlying interface for the dynamic IP demux interfaces.
6. Specify the protocol family information for the dynamic IP demux interfaces.
7. Specify the demux source address is obtained from the incoming subscriber IP address.
8. Specify the loopback interface as the unnumbered address and the demux interface IP address as the
preferred source address for the dynamic IP demux interfaces.
Verification
IN THIS SECTION
Subscriber Verification
Purpose
View subscriber information on the router.
Action
• To display dynamic subscriber information:
Interface Verification
Purpose
View interface-specific information on the router.
Action
• To display interface-specific output:
RELATED DOCUMENTATION
CHAPTER 10
IN THIS CHAPTER
Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview | 115
Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet Overview | 117
Configuring a Static or Dynamic VLAN Subscriber Interface over Aggregated Ethernet | 120
Configuring a Static or Dynamic IP Demux Subscriber Interface over Aggregated Ethernet | 121
Configuring a Static or Dynamic VLAN Demux Subscriber Interface over Aggregated Ethernet | 123
Example: Configuring a Static Subscriber Interface on a VLAN Interface over Aggregated Ethernet | 124
Example: Configuring a Static Subscriber Interface on an IP Demux Interface over Aggregated Ethernet | 128
Example: Configuring IPv4 Static VLAN Demux Interfaces over an Aggregated Ethernet Underlying Interface
with DHCP Local Server | 131
Example: Configuring IPv4 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet Underlying
Interface with DHCP Local Server | 134
Example: Configuring IPv6 Dynamic VLAN Demux Interfaces over an Aggregated Ethernet Underlying
Interface with DHCP Local Server | 138
Example: Configuring IPv4 Dynamic Stacked VLAN Demux Interfaces over an Aggregated Ethernet Underlying
Interface with DHCP Local Server | 142
IN THIS SECTION
Guidelines for Configuring an Aggregated Ethernet Logical Interface to Support a Static or Dynamic VLAN
Subscriber Interface | 116
116
You can configure a subscriber interface represented by a static virtual LAN (VLAN) stacked on a two-link
aggregated Ethernet logical interface. You must configure the aggregated Ethernet logical interface on
Enhanced Queuing Dense Port Concentrators (EQ DPCs) or MPC/MIC interfaces in MX Series 5G Universal
Routing Platforms.
A static or dynamic VLAN subscriber interface over aggregated Ethernet can also support one-to-one
active/backup link redundancy, depending on how you configure the underlying aggregated Ethernet
interface.
To configure a static or dynamic VLAN subscriber interface over aggregated Ethernet, make sure you
understand the following concepts.
The following guidelines for configuring an aggregated Ethernet logical interface also apply to configuring
a static or dynamic VLAN subscriber interface stacked on a two-link aggregated Ethernet logical interface:
• If you need to support one-to-one active/backup link redundancy, configure the aggregated Ethernet
interface in link protection mode, which requires that the two underlying physical interfaces be designated
as primary and backup links.
• In addition, if you need to support one-to-one active/backup link redundancy at the DPC or MPC level,
configure the aggregated Ethernet interface on physical interfaces that reside on different EQ DPCs or
MPCs.
NOTE: One-to-one active/backup DPC redundancy is also supported with firewall filters and
policy filters for static non-VLAN interfaces configured on an aggregated Ethernet logical
interfaces, provided LACP is not active.
RELATED DOCUMENTATION
IN THIS SECTION
Options for Aggregated Ethernet Logical Interfaces That Support Demux Subscriber Interfaces | 117
Hardware Requirements with Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet | 118
Features Supported with Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet | 118
You can configure a subscriber interface using a static or dynamic demux interface stacked on an aggregated
Ethernet logical interface. Subscriber interfaces on static or dynamic demux interfaces can be used to
identify specific subscribers (authenticated users) in an access network or to separate individual circuits.
A subscriber interface on a static or dynamic demux interface over aggregated Ethernet can support
one-to-one active/backup link redundancy or traffic load balancing, depending on how you configure the
underlying aggregated Ethernet interface.
To configure a static or dynamic demux subscriber interface over aggregated Ethernet, make sure you
understand the following concepts:
Options for Aggregated Ethernet Logical Interfaces That Support Demux Subscriber Interfaces
Traffic forwarding through a demux logical interface is dependent on the configuration of the underlying
interface. Using an aggregated Ethernet interface as the underlying interface for a static or dynamic demux
subscriber interface provides you with the following options:
• 1:1 Active/Backup Link Redundancy—If you need to support one-to-one active/backup link redundancy,
configure the aggregated Ethernet interface in link protection mode, which requires that two underlying
physical interfaces be designated as primary and backup links. In addition, if you need to support
one-to-one active/backup link redundancy at the line card level, configure the aggregated Ethernet
interface on physical interfaces that reside either on different EQ DPCs or on different MPCs. When
using LACP link protection, you can configure only two member links to an aggregated Ethernet interface:
one active and one standby.
• Load Balancing—You can configure load balancing instead of 1:1 active/backup link redundancy. The
Junos OS implementation of the IEEE 802.3ad standard balances traffic across the member links within
an aggregated Ethernet bundle based on the Layer 3 information carried in the packet.
By default, the system supports hash-based distribution in load balancing scenarios. In this model, traffic
for a logical interface can be distributed over multiple links in the aggregated Ethernet interface. If
118
distribution flows are not even, egress CoS scheduling can be inaccurate. In addition, scheduler resources
are required on every link of the aggregated Ethernet interface.
Targeted distribution enables you to target the egress traffic for IP and VLAN demux subscribers on a
single member link, using a single scheduler resource. The system distributes the subscriber interfaces
equally among the member links.
Hardware Requirements with Static or Dynamic Demux Subscriber Interfaces over Aggregated
Ethernet
IP demux subscriber interfaces over aggregated Ethernet interfaces are supported on EQ DPCs.
VLAN demux subscriber interfaces over aggregated Ethernet interfaces are supported on MX Series routers
that only have MPCs installed. If the router has other line cards in addition to MPCs, the CLI accepts the
configuration but errors are reported when the subscriber interfaces are brought up.
Features Supported with Static or Dynamic Demux Subscriber Interfaces over Aggregated
Ethernet
Table 8 on page 118 lists key subscriber access features supported with static or dynamic demux subscriber
interfaces, organized by type of underlying interface:
• Aggregated Ethernet
There are no feature limitations specific to demultiplexing. Instead, demux interfaces over aggregated
Ethernet are subject to the same scaling and configuration limitations inherent to aggregated Ethernet
logical interfaces.
Non-aggregated
Aggregated Ethernet Underlying Logical
Feature Underlying Interface Interface
Protocol family support IPv4, IPv6, and PPPoE IPv4, IPv6, and PPPoE
Table 8: Features Supported with Static or Dynamic Demux Subscriber Interfaces (continued)
Non-aggregated
Aggregated Ethernet Underlying Logical
Feature Underlying Interface Interface
RELATED DOCUMENTATION
You can configure a subscriber link represented by a static virtual LAN (VLAN) stacked on an aggregated
Ethernet logical interface.
You can configure subscriber management services such as firewall filters and CoS for this subscriber
interface.
To configure a subscriber interface using a static VLAN interface over an aggregated Ethernet logical
interface:
f. (Optional) Configure the aggregated Ethernet logical interface to support one-to-one active/backup
link redundancy or traffic load balancing.
NOTE: Link protection is required if you want to configure hierarchical CoS on the
aggregated Ethernet interface. For more information, see Configuring Hierarchical
CoS for a Subscriber Interface of Aggregated Ethernet Links.
• For firewall filters, see Dynamically Attaching Statically Created Filters for Any Interface Type or
Dynamically Attaching Statically Created Filters for a Specific Interface Family Type.
• For hierarchical CoS, see Configuring Hierarchical CoS for a Subscriber Interface of Aggregated Ethernet
Links.
RELATED DOCUMENTATION
Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview | 115
Example: Configuring a Static Subscriber Interface on a VLAN Interface over Aggregated Ethernet | 124
Guidelines for Configuring Dynamic CoS for Subscriber Access
CoS for Subscriber Access Overview
You can configure a subscriber interface using a static or dynamic IP demultiplexing (demux) logical interface
stacked on an aggregated Ethernet logical interface. Optionally, you can configure the aggregated Ethernet
logical interface to support one-to-one active/backup link redundancy or traffic load balancing.
f. (Optional) Configure the aggregated Ethernet logical interface to support one-to-one active/backup
link redundancy or traffic load balancing.
NOTE: Link protection is required if you want to configure hierarchical CoS on the
aggregated Ethernet interface. For more information, see Configuring Hierarchical
CoS for a Subscriber Interface of Aggregated Ethernet Links.
2. Configure the aggregated Ethernet logical interface as the underlying interface to support the static
or dynamic IP demux subscriber interface.
The aggregated Ethernet interface needs to support demultiplexing of incoming traffic to the Ethernet
links based on IPv4 destination or source addresses in the incoming packets. In addition, you must
configure the IP address of each link.
NOTE: IP demux interfaces currently support only the Internet Protocol version 4 (IPv4)
suite (family inet).
• For firewall filters, see Dynamically Attaching Statically Created Filters for Any Interface Type or
Dynamically Attaching Statically Created Filters for a Specific Interface Family Type.
• For hierarchical CoS, see Configuring Hierarchical CoS for a Subscriber Interface of Aggregated Ethernet
Links.
RELATED DOCUMENTATION
Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet Interfaces
You can configure a subscriber interface using a static or dynamic VLAN demultiplexing (demux) logical
interface stacked on an aggregated Ethernet physical interface.
f. (Optional) Configure the aggregated Ethernet logical interface to support one-to-one active/backup
link redundancy or traffic load balancing.
2. Configure the aggregated Ethernet physical interface as the underlying interface to support the static
or dynamic VLAN demux subscriber interface.
The aggregated Ethernet interface needs to support demultiplexing of incoming traffic to the Ethernet
links based on the VLAN ID in the incoming packets.
NOTE: VLAN demux interfaces support the Internet Protocol version 4 (IPv4) suite (family
inet) and the Internet Protocol version 6 (IPv6) suite (family inet6).
VLAN demux subscriber interfaces over aggregated Ethernet physical interfaces are
supported only for MX Series routers that have only MPCs installed. If the router has
other cards in addition to MPCs, the CLI accepts the configuration but errors are reported
when the subscriber interfaces are brought up.
• For firewall filters, see Dynamically Attaching Statically Created Filters for Any Interface Type or
Dynamically Attaching Statically Created Filters for a Specific Interface Family Type.
• For hierarchical CoS, see Configuring Hierarchical CoS for a Subscriber Interface of Aggregated Ethernet
Links.
RELATED DOCUMENTATION
This example shows how you can configure a subscriber interface using a static virtual LAN (VLAN) stacked
on a two-link aggregated Ethernet logical interface. In this example, the underlying aggregated Ethernet
logical interface is configured for one-to-one active/backup redundancy at the DPC level, and per-subscriber
static hierarchical class-of-service (CoS) is configured by applying CoS parameters at the aggregated
Ethernet logical interface.
In this example, only one aggregated Ethernet logical interface is configured on the router.
[edit]
chassis {
aggregated-devices {
ethernet {
device-count 1;
}
}
}
2. Configure ae0, a two-link aggregated Ethernet logical interface to serve as the underlying interface for
the static VLAN subscriber interface. In order to support hierarchical CoS, the physical ports must be
on EQ DPCs in MX Series routers.
In this example, the LAG bundle is configured for one-to-one active/backup link redundancy. To support
link redundancy at the DPC level, the LAG bundle attaches ports from two different EQ DPCs.
[edit]
interfaces {
ge-5/0/3 {
gigether-options {
802.3ad {
ae0;
primary;
}
}
ge-5/1/2 {
gigether-options {
802.3ad {
ae0;
backup;
}
}
}
}
}
3. Configure ae0 to serve as the underlying interface for the static VLAN interface.
[edit]
interfaces {
126
ae0 {
hierarchical-scheduler;
aggregated-ether-options {
link-protection;
minimum-links 1;
link-speed 1g;
lacp {
active;
}
}
}
}
[edit]
class-of-service {
forwarding-classes { # Associate queue numbers with class names
queue 0 be;
queue 1 e;
queue 2 af;
queue 3 nc;
}
schedulers { # Define output queue properties
scheduler_be {
transmit-rate percent 30;
buffer-size percent 30;
}
scheduler_ef {
transmit-rate percent 40;
buffer-size percent 40;
}
scheduler_af {
transmit-rate percent 25;
buffer-size percent 25;
}
scheduler_nc {
transmit-rate percent 5;
buffer-size percent 5;
}
}
scheduler-maps { # Associate queues with schedulers
smap_2 {
127
forwarding-class be scheduler_be;
forwarding-class ef scheduler_ef;
forwarding-class-af scheduler_af;
forwarding-class-nc scheduler_nc;
}
}
}
5. Attach static CoS to the physical and logical interfaces of the aggregated Ethernet interface.
In this example, three traffic control profiles are defined, but only two profiles are applied to the static
VLAN subscriber interface over aggregated Ethernet:
• The tcp_for_ae_device_pir_500m profile defines a shaping rate, and it is applied to both of the
underlying physical interfaces (ge-5/0/3 and ge-5/1/2).
[edit]
class-of-service {
traffic-control-profiles { # Configure traffic shaping and scheduling profiles
tcp_for_ae_device_pir_500m {
shaping-rate 20m;
}
tcp_for_ae_smap_video_pir_20m_delay_30m {
scheduler-map smap_video;
shaping-rate 20m;
delay-buffer-rate 30m;
}
tcp_for_ae_smap_video_cir_50m_delay_75m {
scheduler-map smap_video;
guaranteed-rate 50m;
delay-buffer-rate 75m;
}
}
interfaces { # Apply two traffic-control profiles to the LAG
ae0 { # Two underlying physical interfaces on separate EQ DPCs
output-traffic-control-profile tcp-for-ae_device_pir_500m;
unit 0 { # One of the two logical interfaces on ’ae0’
output-traffic-control-profile tcp-for-ae_smap_video_pir_20m_delay_30m;
}
}
128
}
}
RELATED DOCUMENTATION
Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview | 115
Configuring a Static or Dynamic VLAN Subscriber Interface over Aggregated Ethernet | 120
Guidelines for Configuring Dynamic CoS for Subscriber Access
CoS for Subscriber Access Overview
This example shows how you can configure a subscriber interface using a static IP demultiplexing (demux)
interface stacked on a two-link aggregated Ethernet logical interface. In this example, the underlying
aggregated Ethernet logical interface is configured for one-to-one active/backup redundancy at the DPC
level.
In this example, only one aggregated Ethernet logical interface is configured on the router:
[edit]
chassis {
aggregated-devices {
ethernet {
device-count 1;
}
}
}
2. Configure ae0, a two-link aggregated Ethernet logical interface to serve as the underlying interface for
the static IP demux subscriber interface.
129
In this example, the LAG bundle is configured for one-to-one active/backup link redundancy. To support
link redundancy at the DPC level, the LAG bundle attaches ports from two different EQ DPCs.
[edit]
interfaces {
ge-5/0/3 {
gigether-options {
802.3ad {
ae0;
primary;
}
}
}
ge-5/1/2 {
gigether-options {
802.3ad {
ae0;
backup;
}
}
}
}
3. Configure the aggregated Ethernet logical interface with link protection enabled, and specify the logical
demultiplexing source family type for both the active and backup links.
[edit]
interfaces {
ae0 {
aggregated-ether-options {
link-protection;
minimum-links 1;
link-speed 1g;
}
unit 0 {
demux-source inet {
family inet {
address 203.0.113.110/24;
}
}
unit 1 {
demux-source inet {
family inet {
130
address 203.0.113.111/24;
}
}
}
}
4. Configure the IP demux interface over the aggregated Ethernet logical interface.
[edit]
interfaces {
demux0 {
unit 101 {
demux-options {
underlying-interface ae0.0;
}
family inet {
demux-source 203.0.113.100/16;
address 203.0.113.0/24;
}
}
unit 101 {
demux-options {
underlying-interface ae0.1;
}
family inet {
demux-source 203.0.113.221/16;
address 203.0.113.0/24;
}
}
}
}
RELATED DOCUMENTATION
This example shows how to configure a static IPv4 VLAN demux interface with aggregated Ethernet as
the underlying interface. DHCP Local Server configuration enables the association of subscribers to the
VLAN demux interface by listing the aggregated Ethernet interface in the DHCP local server configuration.
1. Enable hierarchical scheduling and VLAN tagging on the underlying interface that you plan to use for
any VLAN demux interfaces.
interfaces {
ae1 {
hierarchical-scheduler;
vlan-tagging;
aggregated-ether-options {
minimum-links 1;
lacp {
active;
periodic slow;
link-protection {
non-revertive;
}
}
}
}
}
2. Define the gigabit Ethernet interfaces that are part of the aggregated Ethernet interface.
interfaces {
ge-5/0/0 {
gigether-options {
802.3ad ae1;
}
}
ge-5/2/0 {
gigether-options {
802.3ad ae1;
}
}
}
132
interfaces {
demux0 {
unit 102 {
proxy-arp;
vlan-id 103;
demux-options {
underlying-interface ae1;
}
family inet {
unnumbered-address lo0.0 preferred-source-address 173.16.1.1;
}
}
}
}
interfaces {
lo0 {
unit 0 {
family inet {
address 127.16.1.1/32;
}
}
}
}
dynamic-profiles {
user-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
protocols {
igmp {
interface "$junos-interface-name" {
133
version 3;
immediate-leave;
promiscuous-mode;
}
}
}
}
}
6. Configure the access method used to dynamically create the subscriber interfaces.
The following stanza specifies the aggregated Ethernet interface (ae1.0) for use with the dynamically
created subscriber interfaces.
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface ae1.0;
}
}
}
}
Instead of using the aggregated Ethernet interface, you can alternatively specify the specific demux
interface (demux0.102) as the device to use with the subscriber interfaces as follows:
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
134
}
dynamic-profile user-profile;
interface demux0.102;
}
}
}
}
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
This example shows how to configure the dynamic creation of IPv4 VLAN demux interfaces with aggregated
Ethernet as the underlying interface. DHCP Local Server configuration enables the association of subscribers
to the VLAN demux interface by listing the aggregated Ethernet interface in the DHCP local server
configuration.
NOTE: VLAN demux subscriber interfaces over aggregated Ethernet physical interfaces are
supported only for MX Series routers that have only MPCs installed. If the router has other cards
in addition to MPCs, the CLI accepts the configuration but errors are reported when the subscriber
interfaces are brought up.
1. Enable VLAN tagging and VLAN auto-configuration on the underlying aggregated Ethernet interface
that you plan to use for dynamically created VLAN demux interfaces.
interfaces {
ae1 {
vlan-tagging;
auto-configure {
vlan-ranges {
135
dynamic-profile auto-vlanDemux-profile {
accept inet;
ranges {
any;
}
}
}
}
aggregated-ether-options {
minimum-links 1;
lacp {
active;
periodic slow;
link-protection {
non-revertive;
}
}
}
}
}
2. Define the gigabit Ethernet interfaces that are part of the aggregated Ethernet interface.
interfaces {
ge-5/0/0 {
gigether-options {
802.3ad ae1;
}
}
ge-5/2/0 {
gigether-options {
802.3ad ae1;
}
}
}
interfaces {
lo0 {
unit 0 {
family inet {
136
address 127.16.1.1/32;
}
}
}
}
dynamic-profiles {
user-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
}
}
dynamic-profiles {
auto-vlanDemux-profile {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family inet {
filter {
input rate_limit;
output rate_limit;
}
unnumbered-address lo0.0 preferred-source-address 127.16.1.1;
}
}
}
}
}
137
6. Configure the access method used to dynamically create the subscriber interfaces. The following stanza
specifies the aggregated Ethernet interface (ae1.0) for use with the dynamically created subscriber
interfaces.
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface ae1.0;
}
}
}
}
Instead of using the aggregated Ethernet interface, you can alternatively specify demux0 as the device
to use with the subscriber interfaces as follows:
NOTE: Because the demux interfaces and unit values are created dynamically, the unit
number is not specified for the demux0 interface.
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
138
interface demux0;
}
}
}
}
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
This example shows how to configure the dynamic creation of IPv6 VLAN demux interfaces with aggregated
Ethernet as the underlying interface. DHCP Local Server configuration enables the association of subscribers
to the VLAN demux interface by listing the aggregated Ethernet interface in the DHCP local server
configuration.
NOTE: VLAN demux subscriber interfaces over aggregated Ethernet physical interfaces are
supported only for MX Series routers that have only MPCs installed. If the router has other cards
in addition to MPCs, the CLI accepts the configuration but errors are reported when the subscriber
interfaces are brought up.
1. Enable VLAN tagging and VLAN auto-configuration on the underlying aggregated Ethernet interface
that you plan to use for dynamically created VLAN demux interfaces.
interfaces {
ae1 {
vlan-tagging;
auto-configure {
vlan-ranges {
dynamic-profile auto-vlanDemux-profile {
accept inet6;
139
ranges {
any;
}
}
}
}
aggregated-ether-options {
minimum-links 1;
lacp {
active;
periodic slow;
link-protection {
non-revertive;
}
}
}
}
}
2. Define the gigabit Ethernet interfaces that are part of the aggregated Ethernet interface.
interfaces {
ge-5/0/0 {
gigether-options {
802.3ad ae1;
}
}
ge-5/2/0 {
gigether-options {
802.3ad ae1;
}
}
}
interfaces {
lo0 {
unit 0 {
family inet6 {
address 2001:db8:174:1:1::1/128;
}
140
}
}
}
dynamic-profiles {
user-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet6;
}
}
}
}
}
dynamic-profiles {
auto-vlanDemux-profile {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family inet6 {
filter {
input v6_rate_limit;
output v6_rate_limit;
}
unnumbered-address lo0.0 preferred-source-address 2001:db8:174:1:1::1;
}
}
}
}
}
}
141
6. Configure the access method used to dynamically create the subscriber interfaces. The following stanza
specifies the aggregated Ethernet interface (ae1.0) for use with the dynamically created subscriber
interfaces.
system {
services {
dhcp-local-server {
dhcpv6 {
group myV6DhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface ae1.0;
}
}
}
}
}
Instead of using the aggregated Ethernet interface, you can alternatively specify demux0 as the device
to use with the subscriber interfaces as follows:
NOTE: Because the demux interfaces and unit values are created dynamically, the unit
number is not specified for the demux0 interface.
system {
services {
dhcp-local-server {
dhcpv6 {
group myV6DhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface demux0;
142
}
}
}
}
}
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
This example shows how to configure the dynamic creation of IPv4 stacked VLAN demux interfaces with
aggregated Ethernet as the underlying interface. DHCP Local Server configuration enables the association
of subscribers to the VLAN demux interface by listing the aggregated Ethernet interface in the DHCP local
server configuration.
NOTE: VLAN demux subscriber interfaces over aggregated Ethernet physical interfaces are
supported only for MX Series routers that have only MPCs installed. If the router has other cards
in addition to MPCs, the CLI accepts the configuration but errors are reported when the subscriber
interfaces are brought up.
1. Enable VLAN tagging and VLAN auto-configuration on the underlying aggregated Ethernet interface
that you plan to use for dynamically created VLAN demux interfaces.
interfaces {
ae1 {
flexible-vlan-tagging;
auto-configure {
stacked-vlan-ranges {
dynamic-profile auto-vlanDemux-profile {
accept inet;
143
ranges {
any;
}
}
}
}
aggregated-ether-options {
minimum-links 1;
lacp {
active;
periodic slow;
link-protection {
non-revertive;
}
}
}
}
}
2. Define the gigabit Ethernet interfaces that are part of the aggregated Ethernet interface.
interfaces {
ge-5/0/0 {
gigether-options {
802.3ad ae1;
}
}
ge-5/2/0 {
gigether-options {
802.3ad ae1;
}
}
}
interfaces {
lo0 {
unit 0 {
family inet {
address 127.16.1.1/32;
}
144
}
}
}
dynamic-profiles {
user-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
}
}
dynamic-profiles {
auto-vlanDemux-profile {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-tags outer "$junos-stacked-vlan-id" inner "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family inet {
filter {
input rate_limit;
output rate_limit;
}
unnumbered-address lo0.0 preferred-source-address 127.16.1.1;
}
}
}
}
}
}
145
6. Configure the access method used to dynamically create the subscriber interfaces. The following stanza
specifies the aggregated Ethernet interface (ae1.0) for use with the dynamically created subscriber
interfaces.
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface ae1.0;
}
}
}
}
Instead of using the aggregated Ethernet interface, you can alternatively specify demux0 as the device
to use with the subscriber interfaces as follows:
NOTE: Because the demux interfaces and unit values are created dynamically, the unit
number is not specified for the demux0 interface.
system {
services {
dhcp-local-server {
group myDhcpGroup {
authentication {
password test;
username-include {
user-prefix igmp-user1;
}
}
dynamic-profile user-profile;
interface demux0;
}
}
}
146
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
147
CHAPTER 11
IN THIS CHAPTER
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
The router's DHCP support enables you to attach a dynamic profile to a DHCP subscriber interface. When
a DHCP subscriber logs in, the router instantiates the specified dynamic profile and then applies the services
defined in the profile to the interface.
You can attach dynamic profiles to all interfaces or you can specify a particular group of interfaces to
which the profile is attached. Both the DHCP local server and the DHCP relay agent support the attachment
of dynamic profiles to interfaces.
You can enable the following optional features when the dynamic profile is attached. The two options
cannot be used together.
• Enable multiple DHCP subscribers to share the same VLAN logical interface. The firewall filters, CoS
schedulers, and IGMP configuration of the clients are merged.
• Specify the primary dynamic profile that is instantiated when the first subscriber logs in.
The aggregate-clients statement specifies that the router merge the firewall filters, CoS schedulers, and
IGMP configuration of multiple DHCP clients that are on the same VLAN logical interface (for example,
multiple clients belonging to the same household). You can configure the aggregate-clients support for all
interfaces or for a group of interfaces. The aggregate-clients statement provides the option of either
merging (chaining) or replacing software components for each client.
148
By default, the feature is disabled and a single DHCP client is allowed per VLAN when a dynamic profile
is associated with the VLAN logical interface.
When you specify the merge option, the router aggregates the software components for multiple subscribers
as follows:
• Firewall filters—The filters are chained together using the precedence as the order of execution. If the
same firewall filter is attached multiple times, the filter is executed only once.
• CoS schedulers—The different CoS schedulers are merged as if the scheduler map has multiple schedulers.
The merge operation for the individual traffic-control-profiles parameters (shaping-rate, delay-buffer-rate,
guaranteed-rate) preserves the maximum value for each parameter.
• IGMP configuration—The current IGMP configuration is replaced with the configuration of the newest
DHCP client.
When you specify the replace option, the entire logical interface is replaced whenever a new client logs
in to the network using the same VLAN logical interface. For example, if a customer subscribes to voice,
video, and data services on the network, when a voice client logs in, instead of applying a specific voice
filter for only that service, the entire voice, video, and data filter chain is applied.
NOTE: You cannot use a dynamic demux interface to represent multiple subscribers in a dynamic
profile attached to an interface. One dynamic demux interface represents one subscriber. Do
not configure the aggregate-clients option when attaching a dynamic profile to a demux interface
for DHCP.
The use-primary option enables you to specify the primary dynamic profile that is instantiated when the
first subscriber logs in. Subsequent subscribers are not assigned the primary dynamic profile; instead, they
are assigned the dynamic profile specified for the interface. When the first subscriber logs out, the next
subscriber that logs in is assigned the primary dynamic profile.
This feature can conserve logical interfaces in a network where dynamic IP demux interfaces are used to
represent subscribers. To conserve interfaces, make sure the primary profile that you specify does not
create a demux interface, but provides the initial policies for the primary interface subscriber.
RELATED DOCUMENTATION
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
149
IN THIS SECTION
Attaching a Dynamic Profile to All DHCP Subscriber or All DHCP Client Interfaces | 149
Attaching a Dynamic Profile to a Group of DHCP Subscriber Interfaces or a Group of DHCP Client
Interfaces | 150
This topic describes how to attach a dynamic profile to a DHCP subscriber interface or a DHCP client
interface. When a DHCP subscriber or DHCP client logs in, the specified dynamic profile is instantiated
and the services defined in the profile are applied to the interface.
Attaching a Dynamic Profile to All DHCP Subscriber or All DHCP Client Interfaces
To attach a dynamic profile to all DHCP subscriber or all DHCP client interfaces:
1. At the DHCP configuration hierarchy, use the dynamic-profile statement to specify the name of the
dynamic profile to attach to all interfaces.
2. (Routers only) Optionally, you can configure the attribute to use when attaching the specified profile.
You can include either the aggregate-clients option to enable multiple DHCP subscribers to share the
same VLAN logical interface, or the use-primary option to specify that the primary dynamic profile is
used. The aggregate-clients option does not apply to demux subscriber interfaces. The two options
are mutually exclusive.
1. At the DHCP configuration hierarchy, specify the name of the interface group and the dynamic profile
to attach to the group.
2. (Routers only) Optionally, you can configure the attribute to use when attaching the specified profile.
You can include either the aggregate-clients option to enable multiple DHCP subscribers to share the
same VLAN logical interface, or the use-primary option to specify that the primary dynamic profile is
used. The aggregate-clients option does not apply to demux subscriber interfaces. The two options
are mutually exclusive.
RELATED DOCUMENTATION
CHAPTER 12
IN THIS CHAPTER
Example: Concurrent Configuration of Dynamic DHCP IP Demux and PPPoE Demux Interfaces over the
Same VLAN Demux Interface | 153
IN THIS SECTION
Requirements | 153
Overview | 154
Configuration | 154
Verification | 166
This example shows how to configure both dynamic DHCP IP demux and PPPoE demux interfaces over
the same dynamic VLAN demux interface. The example provides an IPv4 configuration. However, you can
also configure concurrent IP over Ethernet/DHCP and PPPoE interfaces over the same VLAN interface
using IPv6 addressing.
Requirements
Before you begin, make sure to configure either DHCP Relay or DHCP Local Server. For information about
configuring either of these components, see Extended DHCP Relay Agent Overview or Extended DHCP Local
Server Overview.
154
Overview
With the introduction of the family pppoe statement, PPPoE is no longer treated as an exclusive
encapsulation configuration and you can configure VLAN interfaces with multiple protocol interface stacks.
For example, you can configure IP over Ethernet/DHCP and PPPoE interfaces concurrently over a single
VLAN interface.
Configuration
IN THIS SECTION
[edit]
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-5/0/9 gigether-options 802.3ad ae0
set interfaces ge-5/1/9 gigether-options 802.3ad ae0
set interfaces ae0 flexible-vlan-tagging
set interfaces ae0 auto-configure vlan-ranges dynamic-profile Auto-VLAN-Demux accept any
set interfaces ae0 auto-configure vlan-ranges dynamic-profile Auto-VLAN-Demux ranges ranges 1000-1500
set interfaces ae0 auto-configure stacked-vlan-ranges dynamic-profile Auto-Stacked-VLAN-Demux accept any
set interfaces ae0 auto-configure stacked-vlan-ranges dynamic-profile Auto-Stacked-VLAN-Demux ranges
1501-2000,any
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae0 aggregated-ether-options lacp link-protection
Step-by-Step Procedure
155
When configuring multiple protocol interface stacks concurrently over the same VLAN interface, you must
configure physical interfaces over which DHCP or PPPoE clients initially access the router. We recommend
that you specify the same VLAN tagging for the interface that you expect from incoming clients. This
example uses flexible VLAN tagging to simultaneously support transmission of 802.1Q VLAN single-tag
and dual-tag frames on logical interfaces on the same Ethernet port.
To automatically create dynamic VLANs, the interface must also include the VLAN range type (single or
stacked), dynamic profile reference, and any specific ranges you want the VLANs to use.
1. Access the physical interface over which you want subscribers to initially access the router.
[edit]
user@host# edit interfaces ge-5/0/9
2. Specify the aggregated Ethernet interface to which the physical interface belongs.
3. Repeat Step 1 and Step 2for each interface you want to assign to the aggregated Ethernet bundle.
[edit]
user@host# set interfaces ge-5/1/9 gigether-options 802.3ad ae0
[edit]
user@host# edit interfaces ae0
5. Specify the VLAN tagging that you want the aggregated Ethernet interfaces to use.
8. Specify the dynamic VLAN profile that you want the interface to use for dynamically creating
single-tagged VLANs.
9. Specify what VLAN Ethernet packet type the VLAN profile accepts.
10. Specify the VLAN ranges that you want the dynamic profile to use. The following example specifies a
lower VLAN ID limit of 1000 and an upper VLAN ID limit of 1500.
12. Specify the dynamic VLAN profile that you want the interface to use for dynamically creating dual-tagged
VLANs.
13. Specify what VLAN Ethernet packet type the stacked VLAN profile accepts.
14. Specify the outer and inner stacked VLAN ranges that you want the dynamic profile to use. The following
example specifies an outer stacked VLAN ID range from 1501 through 2000 (to avoid overlapping
VLAN IDs with single-tag VLANs) and an inner stacked VLAN ID range of any (enabling a range from
1 through 4094 for the inner stacked VLAN ID).
15. (Optional) Activate the transmission of LACP packets on the aggregated Ethernet interfaces.
16. Specify that the aggregated Ethernet interfaces use link protection.
[edit]
set interfaces lo0.0 unit 0 family inet address 100.100.100.1/32
Step-by-Step Procedure
You must configure a loopback interface for use as the unnumbered address and preferred source address
for dynamically created interfaces.
[edit]
user@host# edit interfaces lo0.0
[edit]
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux-source inet
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit proxy-arp
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit vlan-id $junos-vlan-id
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux options
underlying-interface $junos-interface-ifd-name
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit family inet
unnumbered-address lo0.0 preferred source-address 100.100.100.1
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit family pppoe
duplicate-protection
set dynamic-profiles Auto-VLAN-Demux interfaces demux0 unit $junos-interface-unit family pppoe
dynamic-profile PPP-Base-PAP
Step-by-Step Procedure
For both dynamic DHCP IP demux and dynamic PPPoE interfaces to reside concurrently on a single-tagged
VLAN interface, the VLAN interface must first exist.
[edit]
user@host# edit dynamic-profiles Auto-VLAN-Demux
2. Specify that the dynamic VLAN profile use the demux interface.
3. Specify that the dynamic profile apply the demux interface unit value to the dynamic VLANs.
5. (Optional) Specify that each dynamically created interface respond to any ARP request, as long as an
active route exists to the target address of the ARP request.
8. Specify that the VLAN demux interface can accept inet family packets for IP over Ethernet/DHCP
subscribers.
9. Specify the loopback address as the unnumbered address and preferred source address for the inet
family.
10. Specify that the VLAN demux interface can accept pppoe family packets for PPPoE subscribers.
11. Prevent multiple PPPoE sessions from being created for the same PPPoE subscriber on the same VLAN
interface.
12. Apply the dynamic PPP interface profile to any dynamic PPP interfaces.
[edit]
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux-source
inet
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit proxy-arp
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit vlan-tags outer
$junos-stacked-vlan-id
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit vlan-tags inner
$junos-vlan-id
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit demux options
underlying-interface $junos-interface-ifd-name
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit family inet
unnumbered-address lo0.0 preferred source-address 100.100.100.1
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit family pppoe
duplicate-protection
set dynamic-profiles Auto-Stacked-VLAN-Demux interfaces demux0 unit $junos-interface-unit family pppoe
dynamic-profile PPP-Base-PAP
Step-by-Step Procedure
161
For both dynamic DHCP IP demux and dynamic PPPoE interfaces to reside concurrently on a VLAN
interface, the VLAN interface must first exist.
[edit]
user@host# edit dynamic-profiles Auto-Stacked-VLAN-Demux
2. Specify that the dynamic VLAN profile use the demux interface.
3. Specify that the dynamic profile apply the demux interface unit value to the dynamic VLANs.
5. (Optional) Specify that each dynamically created interface respond to any ARP request, as long as an
active route exists to the target address of the ARP request.
9. Specify that the VLAN demux interface can accept inet family packets for IP over Ethernet/DHCP
subscribers.
10. Specify the loopback address as the unnumbered address and preferred source address for the inet
family.
11. Specify that the VLAN demux interface can accept pppoe family packets for PPPoE subscribers.
12. Prevent the activation of another dynamic PPPoE logical interface on the same demux underlying
interface.
13. Apply the dynamic PPP interface profile to any dynamic PPP interfaces.
[edit]
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit proxy-arp
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit demux-options
underlying-interface $junos-underlying-interface
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit family inet demux-source
$junos-subscriber-ip-address
set dynamic-profiles DHCP-IP-Demux interfaces demux0 unit $junos-interface-unit family inet
unnumbered-address lo0.0 preferred-source-address 100.100.100.1
Step-by-Step Procedure
To configure a dynamic profile that automatically creates IP demux interfaces:
[edit]
user@host# edit dynamic-profiles DHCP-IP-Demux
3. Specify that the dynamic profile apply the interface unit value to the dynamic PPPoE interfaces.
4. (Optional) Configure the router to respond to any ARP request, as long as the router has an active route
to the target address of the ARP request.
5. Specify the logical underlying interface for the dynamic IP demux interfaces.
6. Specify the protocol family information for the dynamic IP demux interfaces.
7. Specify the demux source address is obtained from the incoming subscriber IP address.
8. Specify the loopback interface as the unnumbered address and the demux interface IP address as the
preferred source address for the dynamic IP demux interfaces.
[edit]
set dynamic-profiles PPP-Base-PAP interfaces pp0 unit $junos-interface-unit ppp-options pap
set dynamic-profiles PPP-Base-PAP interfaces pp0 unit $junos-interface-unit pppoe-options underlying-interface
$junos-underlying-interface server
set dynamic-profiles PPP-Base-PAP interfaces pp0 unit $junos-interface-unit no-keepalives
set dynamic-profiles PPP-Base-PAP interfaces pp0 unit $junos-interface-unit family inet unnumbered-address
lo0.0
Step-by-Step Procedure
1. Create a dynamic profile for automatically creating PPPoE interfaces.
165
[edit]
user@host# edit dynamic-profiles PPP-Base-PAP
2. Specify that the dynamic PPPoE profile use the pp0 interface.
3. Specify that the dynamic profile apply the interface unit value to the dynamic PPPoE interfaces.
5. Specify the logical underlying interface for the dynamic PPPoE interfaces.
7. (Optional) Disable the sending of keepalive messages on the dynamic PPPoE interfaces.
8. Specify the protocol family information for the dynamic PPPoE interfaces.
9. Specify the loopback interface as the unnumbered address for the dynamic PPPoE interfaces.
Verification
IN THIS SECTION
Subscriber Verification
Purpose
View subscriber information on the router.
Action
• To display dynamic subscriber information:
Interface Verification
Purpose
View interface-specific information on the router.
Action
• To display interface-specific output:
RELATED DOCUMENTATION
167
CHAPTER 13
IN THIS CHAPTER
MAC address validation enables the router to validate that received packets contain a trusted IP source
and an Ethernet MAC source address.
Configuring MAC address validation can provide additional validation when subscribers access billable
services. MAC address validation provides additional security by enabling the router to drop packets that
do not match, such as packets with spoofed addresses.
When subscribers log in, they are automatically assigned IP addresses by DHCP. With MAC address
validation enabled, the router compares the IP source and MAC source addresses against trusted addresses,
and forwards or drops the packets according to the match and the validation mode.
MAC address validation is supported on statically or dynamically created Ethernet interfaces and demux
interfaces as follows:
• When the router is configured for a normal (non-enhanced) network services mode, MAC address
validation is supported on both DPCs and MPCs. The router can be populated completely with one or
the other type of line card, or have a mix of both types. Normal network services mode is the default.
• When the router is configured for Enhanced IP Network Services mode or Enhanced Ethernet Network
Services mode, MAC address validation is supported only on MPCs. If the router has both DPCs and
MPCs, or only DPCs, you cannot configure the chassis to be in enhanced mode.
MAC address validation is optimized for scaling when the router is in enhanced network services modes.
Enhanced network services modes affect other features, such as multicast and firewall filters, so you must
170
take that in to consideration when deciding whether to configure enhanced mode. For more information
about the enhanced network service modes, see Network Services Mode Overview.
In normal network services mode, you can use the show interfaces statistics interface-name command to
display a per-interface count of the packets that failed validation and were dropped. In enhanced network
services mode, this command does not count the dropped packets; you must contact Juniper Networks
Customer Support for assistance in collecting this data.
Trusted Addresses
A trusted address tuple is a 32–bit IP address and a 48–bit MAC address. Prefixes and ranges are not
supported.
The IP source address and the MAC source address used for validation must be from a trusted source.
All static ARP addresses configured through the CLI are trusted addresses; dynamic ARP addresses are
not considered trusted addresses.
Addresses dynamically created through an extended DHCP local server or extended DHCP relay are also
trusted addresses. When a DHCP server and client negotiate an IP address, the resulting IP address and
MAC address tuple is trusted. Each DHCP subscriber can generate more than one address tuple.
Each MAC address can have more than one IP address, which can result in more than one valid tuple. Each
IP address must map to one MAC address.
You can configure either of two types or modes of MAC address validation, loose or strict. The behavior
of the two modes varies depending on how well the incoming packets match the trusted address tuples.
The modes differ only when the IP source address alone does not match any trusted IP address.
Table 9 on page 170 compares the behavior of the two modes. Dropped packets are considered to be
spoofed.
Configuring strict mode is a more conservative strategy because it requires both received source addresses
to match trusted addresses.
When you configure MAC address validation for IP demux interfaces in a dynamic profile and specify
either loose or strict validation, the resulting behavior is always loose validation. To enable strict behavior
for a dynamic IP demux interface, you must configure strict validation for both the IP demux interface and
the underlying interface.
RELATED DOCUMENTATION
IN THIS SECTION
This topic describes how to configure MAC address validation for subscriber interfaces in dynamic profiles.
The subscriber interfaces can be statically created and associated with a dynamic profile (for example,
VLAN interfaces) or dynamically created in the dynamic profile (such as demux interfaces).
This topic describes how to configure MAC address validation for static subscriber interfaces in dynamic
profiles.
See Configuring Junos OS to Run a Specific Network Services Mode in MX Series Routers.
[edit interfaces]
user@host# set interface-name unit logical-unit-number family inet
For example, to configure loose validation on interface fe-0/0/0.0, configure the following:
After you configure MAC address validation, associate the static VLAN interface with the dynamic profile.
173
This topic describes how to configure MAC address validation for subscriber interfaces created on demux
interfaces in dynamic profiles.
When you configure MAC address validation for demux interfaces in a dynamic profile and specify either
loose or strict validation, the resulting behavior is always loose validation. To enable strict behavior for a
dynamic IP demux interface, besides configuring either loose or strict mode on the IP demux interface,
you must also configure strict validation on the underlying interface.
See Configuring Junos OS to Run a Specific Network Services Mode in MX Series Routers.
For loose validation, you do not need to configure MAC address validation on the underlying interface.
NOTE: Remember, although you must configure validation on the IP demux interface, it
does not matter which mode you specify because the behavior is always loose.
The underlying interface in this case is statically configured—for example, ge-1/0/0.1—and assigned
to a DHCP configuration group that is associated with the dynamic profile. In a more complicated
configuration, the underlying interface itself can be configured by a dynamic profile; in that case the
validation is configured in the profile that creates the underlying interface.
SEE ALSO
RELATED DOCUMENTATION
CHAPTER 14
IN THIS CHAPTER
RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 175
Using RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 177
Targeted distribution is a way to load balance traffic between the member links of an aggregated Ethernet
bundle by distributing the logical interfaces or interface sets across the links. Egress traffic for a subscriber
is targeted for a single member link, making it possible to use a single CoS scheduler for the subscriber to
optimize resource use.
Interfaces and interface sets are assigned to primary and backup member links to yield an even distribution
of subscribers across all member links.
• A link is selected as primary when it is up and has the lightest subscriber load. If no links are up then the
available link with the lightest subscriber load is selected.
• A link is selected as backup when it is the available link with the lightest subscriber load. The redundancy
mode configured for the aggregated Ethernet bundle affects the pool of available links. For example,
module redundancy excludes all links on the same module from being assigned as backup.
The subscriber load is also known as the link weight. You can configure an explicit weight for targeted
subscribers based on factors important to you, such as CoS or bandwidth requirement. The member links
are assigned based on the value of the weight. The weight is configured per dynamic profile for an interface
or interface set. Starting in Junos OS Release 18.4R1, you can have RADIUS supply the weight value per
subscriber. To do so, specify either of the following predefined variables that corresponds to the relevant
RADIUS VSA conveyed in the Access-Accept message when a subscriber is authenticated.
Diameter AVPs 213 and 214 can be used for the same purpose during NASREQ processing.
176
When you use a dynamic interface set with targeted distribution, the interface set and its member interfaces
are assigned to the same aggregated Ethernet member link. This means that you have to configure targeted
distribution for both the interface set and its member interfaces. The dynamic interface set is created
when the first member interface is instantiated. The weight that is used to associate the interface set and
its members to the aggregated Ethernet member link is either of the following:
• The weight assigned to the interface set. The interface set weight is either explicitly configured or sourced
from RADIUS VSA 26-214 when the first member interface is authorized.
• The weight assigned to the first member interface. The interface weight is used when the interface set
has no assigned weight. The weight for the first member interface is either explicitly configured or
sourced from RADIUS VSA 26-213 when the first member interface is authorized.
BEST PRACTICE: Always ensure that a weight is assigned to the interface set by the CLI
configuration or by RADIUS.
Because the weight of the first instantiated member interface can provide the weight for the interface
set, the weights of subsequent member interfaces have no effect on the assignment of the interface set
and its members to a given aggregated Ethernet member link.
BEST PRACTICE: We recommend that the weight assigned to the interface set be representative
of the member interfaces to ensure optimal distribution among the aggregated Ethernet member
links. Consequently, there is no advantage to sourcing weights from RADIUS for both the interface
set and its member interfaces, because sourcing the weight for only the interface set is sufficient.
The RADIUS-sourced weight for an interface set cannot change after the set is created when the first
member interface is authorized. Consequently, only interfaces having the same weight as the first interface
can become members of the interface set. Consider the following example:
1. Suppose that when the first dynamic subscriber interface is authorized, the authorization from RADIUS
includes VSA 26-214 with a value of 100.
2. The interface set is then assigned a weight of 100 based on the first interface weight.
3. When the second dynamic subscriber interface is authorized, the authorization includes VSA 26-214
with a value of 200.
4. Because the weight for the interface set cannot change; it remains at 100 and the instantiation of the
subscriber session on the second interface fails.
177
• Enables per-subscriber weighting based on RADIUS user record, rather than per dynamic profile.
Release Description
18.4R1 Starting in Junos OS Release 18.4R1, you can have RADIUS supply the weight value
per subscriber.
RELATED DOCUMENTATION
Using RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 177
Understanding Support for Targeted Distribution of Logical Interface Sets of Static VLANs over Aggregated
Ethernet Logical Interfaces
Instead of explicitly configuring a subscriber weight for targeted distribution of interfaces and interface
sets across aggregated Ethernet member links, you can use predefined variables to extract the weight
value provided by RADIUS in one of two VSAs conveyed in the Access-Accept message when the subscriber
is authenticated.
When you use a dynamic interface set with targeted distribution, the interface set and its member interfaces
are assigned to the same aggregated Ethernet member link. This means that you have to configure targeted
distribution for both the interface set and its member interfaces. The dynamic interface set is created
when the first member interface is instantiated.
1. Configure your RADIUS server to provide the desired value for VSA 26-214. Consult your RADIUS
server documentation for more information.
4. (Optional) Configure a default value in case VSA 26-214 is not received in the Access-Accept message.
1. Configure your RADIUS server to provide the desired value for VSA 26-213. Consult your RADIUS
server documentation for more information.
4. (Optional) Configure a default value in case VSA 26-213 is not received in the Access-Accept message.
RELATED DOCUMENTATION
RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 175
179
CHAPTER 15
IN THIS CHAPTER
Verifying Configuration and Status of Dynamic Subscribers and Associated Sessions, Services, and Firewall
Filters | 179
You can display information about subscribers in different ways, depending on the options you use with
the show subscriber command. You can use details from one set of output with another command to
display more detailed information of interest.
Action
• To display basic information for all subscribers:
Type: VLAN
User Name: [email protected]
Logical System: default
Routing Instance: testnet
Interface: demux0.1073741826
Interface type: Dynamic
Dynamic Profile Name: profile-vdemux-relay-23qos
MAC Address: 00:00:5e:00:53:04
State: Active
Radius Accounting ID: 12
Session ID: 12
Stacked VLAN Id: 0x8100.1500
VLAN Id: 0x8100.2902
Login Time: 2011-10-20 16:21:59 EST
Type: DHCP
User Name: [email protected]
IP Address: 172.16.200.6
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: testnet
Interface: demux0.1073741826
Interface type: Static
MAC Address: 00:00:5e:00:53:04
State: Active
Radius Accounting ID: 21
Session ID: 21
Login Time: 2011-10-20 16:24:33 EST
Service Sessions: 2
...
Filter: content-cb-in-demux0.1073741826-in
Counters:
Name Bytes Packets
__junos-dyn-service-counter 84336 1004
Filter: content-cb-out-demux0.1073741826-out
Counters:
Name Bytes Packets
__junos-dyn-service-counter 0 0
...
Instead of issuing successive commands to track the details for one subscriber interface, you can choose
to display detailed information for all subscribers. However, the more subscribers you have, the more
tedious it becomes to look through all the results for particular items of interest.
Meaning
The output examples in this section show increasingly detailed information about dynamically created
subscriber interfaces, including how many there are, what they are, and their characteristics; how many
service sessions are active and what they are; whether firewall filters are attached to the sessions and
what those filters are; and how much, if any, traffic is being filtered.
In the sample output shown here, the show subscriber command lists all the subscriber logical interfaces,
including demux0.1073741826. You then display details about that interface and its associated subscribers
with the show subscribers interface demux0.1073741826 extensive command. The Service Session Name
fields for service sessions 25 and 26 in that output show two services are active on the interface, SUB-QOS
and service-cb-content. The IPv4 Input Filter Name and the IPv4 Output Filter Name fields show that two
filters have been applied to the service-cb-content session: content-cb-in-demux0.1073741826-in and
content-cb-out-demux0.1073741826-out. You then use the show firewalls command to list the filters
and see how much, if any, traffic is being filtered.
RELATED DOCUMENTATION
182
CLI Explorer
3 PART
CHAPTER 16
IN THIS CHAPTER
Dynamic PPPoE Subscriber Interfaces over Static Underlying Interfaces Overview | 188
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Static Gigabit Ethernet VLAN Interface | 200
IN THIS SECTION
You can configure the router to dynamically create Point-to-Point Protocol over Ethernet (PPPoE) logical
interfaces on statically created underlying Ethernet interfaces. The router creates the dynamic interface
in response to the receipt of a PPPoE Active Discovery Request (PADR) control packet on the underlying
interface. Because the router creates a dynamic PPPoE logical interface on demand when a subscriber
logs in to the network, dynamic PPPoE logical interfaces are also referred to as dynamic PPPoE subscriber
interfaces.
Configuring and using dynamic PPPoE subscriber interfaces offers the following benefits:
Dynamic PPPoE subscriber interfaces provides the flexibility of dynamically creating the PPPoE subscriber
interface only when needed; that is, when a subscriber logs in on the associated underlying Ethernet
interface. By contrast, statically created interfaces allocate and consume system resources when the
interface is created. Configuring and using dynamically created interfaces helps you effectively and
conveniently manage edge or access networks in which large numbers of subscribers are constantly
logging in to and logging out from the network on a transient basis.
When the PPPoE subscriber logs out or the PPPoE session is terminated, the router dynamically deletes
the associated PPPoE subscriber interface without your intervention, thereby restoring any consumed
resources to the router.
By using a profile, you reduce the management of a large number of interfaces by applying a set of
common characteristics to multiple interfaces. When you configure a dynamic profile for PPPoE, you
use predefined dynamic variables in the profile to represent information that varies from subscriber to
subscriber, such as the logical unit number and underlying interface name. These variables are dynamically
replaced with the values supplied by the network when the subscriber logs in.
You can configure the underlying Ethernet interface with certain PPPoE-specific attributes that can
reduce the potential for DoS attacks. Duplicate protection, which is disabled by default, prevents activation
of another dynamic PPPoE logical interface on the underlying interface when a PPPoE logical interface
for the same client is already active on the underlying interface. You can also specify the maximum
number of PPPoE sessions that the router can activate on the underlying interface. By enabling duplicate
protection and restricting the maximum number of PPPoE sessions on the underlying interface, you can
ensure that a single toxic PPPoE client cannot monopolize allocation of the PPPoE session.
• Support for dynamic PPPoE subscriber interface creation from PPPoE service name tables
You can assign a previously configured PPPoE dynamic profile to a named, empty, or any service entry
in a PPPoE service name table, or to an agent circuit identifier/agent remote identifier (ACI/ARI) pair
defined for these services. The router uses the attributes defined in the profile to instantiate a dynamic
PPPoE subscriber interface based on the service name, ACI, and ARI information provided by the PPPoE
client during PPPoE negotiation. To specify the routing instance in which to instantiate the dynamic
PPPoE subscriber interface, you can assign a previously configured routing instance to a named, empty,
or any service, or to an ACI/ARI pair defined for these services. The dynamic profile and routing instance
configured for the PPPoE service name table overrides the dynamic profile and routing instance assigned
to the PPPoE underlying interface on which the dynamic subscriber interface is created.
187
Configuration of dynamic PPPoE subscriber interfaces over static underlying Ethernet interfaces is supported
on MPC/MIC interfaces on MX Series 5G Universal Routing Platforms.
When a PPPoE subscriber logs in the PPPoE protocol defines the sequence of operations by which a
connection is established and traffic flow is enabled on the dynamic PPPoE subscriber interface. Similarly,
when the PPPoE subscriber logs out from the network, PPPoE defines the sequence that occurs to terminate
the connection and remove the dynamic PPPoE subscriber interface from the router.
The router creates a dynamic PPPoE subscriber interface for each new PPPoE session, and removes the
dynamic PPPoE subscriber interface when the session is terminated due to subscriber logout, PPP
negotiation failure, or down status of the underlying Ethernet interface. Dynamic PPPoE subscriber
interfaces are never reused for multiple PPPoE sessions.
The following sequence occurs when a PPPoE subscriber logs in to the network. Steps 1 through 5 in this
sequence are part of the PPPoE Discovery process.
1. The PPPoE client broadcasts a PPPoE Active Discovery Initiation (PADI) packet to all remote access
concentrators in the network.
2. One or more remote access concentrators respond to the PADI packet by sending a PPPoE Active
Discovery Offer (PADO) packet, indicating that they can service the client request. The PADO packet
includes the name of the access concentrator from which it was sent.
3. The client sends a unicast PPPoE Active Discovery Request (PADR) packet to the access concentrator
it selects.
4. On receipt of the PADR packet on the underlying interface associated with a PPPoE dynamic profile,
the router uses the attributes configured in the dynamic profile to create the dynamic PPPoE logical
interface.
5. The router sends a PPPoE Active Discovery Session (PADS) packet to confirm establishment of the
PPPoE connection.
6. The PPP Link Control Protocol (LCP) negotiates the PPP link between the client and the PPPoE server.
188
7. The subscriber is authenticated using the PPP authentication protocol (CHAP or PAP) configured in
the PPPoE dynamic profile.
8. The PPP Network Control Protocol (NCP) negotiates the IP routing protocol and network family.
9. The PPP server issues an IP access address for the client, and the router adds the client access route
to its routing table.
10.The router instantiates the dynamic profile and applies the attributes configured in the profile to the
dynamic PPPoE subscriber interface.
11.PPP NCP negotiation completes, enabling traffic flow between the PPPoE client and the PPPoE server.
1. The client terminates the PPP connection and the router receives an LCP termination request.
2. The router removes the client access router from its routing table.
3. The router sends or receives a PPPoE Active Discovery Termination (PADT) packet to end the PPPoE
connection.
4. The router deactivates the subscriber, gathers final statistics for the PPPoE session, and sends the
RADIUS server an Acct-Stop accounting message.
5. The router de-instantiates the PPPoE dynamic profile and removes the PPPoE logical interface. The
router does not reuse the PPPoE logical interface for future dynamic PPPoE sessions.
RELATED DOCUMENTATION
Dynamic PPPoE Subscriber Interfaces over Static Underlying Interfaces Overview | 188
Configuring Dynamic PPPoE Subscriber Interfaces | 192
Configuring PPPoE Service Name Tables | 262
IN THIS SECTION
Creating a dynamic PPPoE subscriber interface over a static underlying Ethernet interface consists of two
basic steps:
1. Configure a dynamic profile to define the attributes of the PPPoE logical interface.
2. Attach the dynamic profile to a statically created underlying Ethernet interface configured with PPPoE
encapsulation.
This overview describes the concepts you need to understand to configure a dynamic PPPoE subscriber
interface, and covers the following topics:
You use predefined dynamic variables in the PPPoE dynamic profile to represent information that varies
from subscriber to subscriber, such as the logical unit number and underlying interface name. These
variables are dynamically replaced with the values supplied by the network when the subscriber logs in.
On receipt of traffic on an underlying Ethernet interface to which a dynamic profile is attached, the router
creates the dynamic PPPoE logical interface, also referred to as a dynamic PPPoE subscriber interface, on
the underlying interface and applies the properties configured in the dynamic profile.
To provide basic access for PPPoE subscribers, the dynamic profile must provide a minimal configuration
for a pp0 (PPPoE) logical interface that includes at least the following attributes:
• The logical unit number, represented by the $junos-interface-unit predefined dynamic variable
• The name of the underlying Ethernet interface, represented by the $junos-underlying-interface predefined
dynamic variable
• The unnumbered address for the inet (IPv4) or inet6 (IPv6) protocol family
You can also optionally configure additional options for PPPoE subscriber access in the dynamic profile,
including:
• The service sets and filters, input filters, and output filters to be applied to the dynamic PPPoE logical
interface
After you configure a dynamic profile to define the attributes of a dynamic PPPoE subscriber interface,
you must attach the dynamic profile to the underlying Ethernet interface on which you want the router
to dynamically create the PPPoE logical interface. The underlying interface for a dynamic PPPoE logical
interface must be statically created and configured with PPPoE (ppp-over-ether) encapsulation. When a
PPPoE subscriber logs in on the underlying interface, the router dynamically creates the PPPoE logical
interface and applies the attributes defined in the profile to the interface.
In addition to attaching the dynamic profile to the interface, you can also configure the underlying interface
with one or more of the following optional PPPoE-specific attributes:
• Prevention of another dynamic PPPoE logical interface from being activated on the underlying interface
when a PPPoE logical interface for a client with the same MAC address is already active on that interface
• Maximum number of dynamic PPPoE logical interfaces (sessions) that the router can activate on the
underlying interface
• An alternative access concentrator name in the AC-NAME tag in a PPPoE control packet
If the subscriber address for a dynamic PPPoE interface is not specified by means of the Framed-IP-Address
(8) or Framed-Pool (88) RADIUS IETF attributes during authentication, the router allocates an IP address
from the first IPv4 local address-assignment pool defined in the routing instance. For this reason, make
sure that the local address assigned for the inet (IPv4) address family is in the same subnet as the addresses
obtained from the first IPv4 local address-assignment pool.
The router allocates the IP address from the first IPv4 local address-assignment pool under either of the
following conditions:
• RADIUS authentication does not take place because only address allocation is requested.
If the first IPv4 local address-assignment pool has no available addresses, or if no IPv4 local
address-assignment pools are configured, the router does not allocate an IP address to the dynamic PPPoE
subscriber interface, and denies access to the associated subscriber. To avoid depletion of IP addresses,
you can configure linked address-assignment pools on the first IPv4 local address-assignment pool to
create one or more backup pools.
Observe the following guidelines when you configure dynamic PPPoE subscriber interfaces:
• You can configure dynamic PPPoE subscriber interfaces for the inet (IPv4) and inet6 (IPv6) protocol
families.
• When you configure the pp0 (PPPoE) logical interface in a PPPoE dynamic profile, you must include the
pppoe-options subhierarchy at the [edit dynamic-profiles profile-name interfaces pp0 unit
“$junos-interface-unit”] hierarchy level. At a minimum, the pppoe-options subhierarchy must include
the name of the underlying Ethernet interface, represented by the $junos-underlying-interface predefined
dynamic variable, and the server statement, which configures the router to act as a PPPoE server. If you
omit the pppoe-options subhierarchy from the configuration, the commit operation fails.
• When you configure CHAP or PAP authentication in a PPPoE dynamic profile, you cannot configure
additional options for the chap or pap statements. This is because the router supports only unidirectional
authentication for dynamic interfaces; that is, the router always functions as the authenticator.
• When you attach the PPPoE dynamic profile to an underlying Ethernet interface, ensure that both of
the following conditions are met:
• The PPPoE dynamic profile has already been configured on the router.
• The underlying Ethernet interface has already been statically configured on the router with PPPoE
(ppp-over-ether) encapsulation.
• You cannot attach a PPPoE dynamic profile to an underlying Ethernet interface that is already associated
with static PPPoE logical interfaces. Conversely, you cannot associate static PPPoE logical interfaces
with an underlying Ethernet interface that already has a PPPoE dynamic profile attached.
RELATED DOCUMENTATION
To enable the router to create a dynamic PPPoE subscriber interface on a PPPoE underlying interface, you
define the attributes of the PPPoE logical interface in a dynamic profile, and then configure the underlying
interface to use the dynamic profile.
1. Configure a dynamic profile to define the attributes of the PPPoE logical interface.
2. Configure the underlying Ethernet interface to use the dynamic profile for PPPoE.
See “Configuring an Underlying Interface for Dynamic PPPoE Subscriber Interfaces” on page 196.
3. (Optional) Assign a dynamic profile and routing instance to a service name or ACI/ARI pair in a PPPoE
service name table to instantiate a dynamic PPPoE subscriber interface based on the information
provided by the PPPoE client.
See “Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic
PPPoE Interface Creation” on page 270.
4. (Optional) Verify the dynamic PPPoE configuration by displaying or clearing PPPoE session statistics,
and displaying information about the underlying Ethernet interface and PPPoE logical interface.
RELATED DOCUMENTATION
You can configure a basic dynamic profile for PPPoE subscribers that defines the attributes of the dynamic
PPPoE logical subscriber interface (pp0).
[edit]
user@host# edit dynamic-profiles basic-pppoe-profile
2. Specify that you want to configure the pp0 logical interface in the dynamic profile.
3. Specify $junos-interface-unit as the predefined variable to represent the logical unit number for the
pp0 interface.
The $junos-interface-unit variable is replaced with the actual unit number supplied by the network
when the subscriber logs in.
a. Specify the $junos-underlying-interface predefined variable to represent the name of the underlying
Ethernet interface on which the router creates the dynamic PPPoE logical interface.
The $junos-underlying-interface variable is replaced with the actual name of the underlying interface
supplied by the network when the subscriber logs in.
b. Configure the router to act as a PPPoE server, also known as a remote access concentrator.
For dynamic interfaces, the router supports only unidirectional authentication; that is, the router always
functions as the authenticator. When you configure PPP authentication in a dynamic profile, the chap
and pap statements do not support any additional configuration options.
6. Modify the keepalive interval, or configure the router to disable sending keepalive messages.
a. Specify that you want to configure the inet (IPv4) or inet6 (IPv6) protocol family.
b. Specify the IPv4 or IPv6 address of the dynamic PPPoE logical interface.
d. Specify the input and output service sets that you want to apply to the dynamic PPPoE logical
interface.
e. Specify the input and output filters that you want to apply to the dynamic PPPoE logical interface.
To control the order in which filters are processed, you can optionally specify a precedence value
for the input filter, output filter, or both.
RELATED DOCUMENTATION
After you configure a dynamic profile to define the attributes of a dynamic PPPoE subscriber interface,
you must attach the dynamic profile to a statically created underlying Ethernet interface.
1. Configure the static underlying Ethernet interface on which you want the router to dynamically create
the PPPoE logical interface.
For information about configuring static Ethernet interfaces, see Configuring Ethernet Physical Interface
Properties.
1. Specify the name and logical unit number of the static underlying Ethernet interface to which you want
to attach the PPPoE dynamic profile.
[edit]
user@host# edit interfaces ge-1/0/1 unit 0
3. Specify that you want to configure PPPoE-specific options on the underlying interface.
You cannot attach a PPPoE dynamic profile to an underlying Ethernet interface that is already associated
with static PPPoE logical interfaces. Conversely, you cannot associate static PPPoE logical interfaces
with an underlying Ethernet interface that already has a PPPoE dynamic profile attached.
5. (Optional) Enable duplicate protection to prevent another dynamic PPPoE logical interface from being
activated on the underlying interface when a PPPoE logical interface for a client with the same MAC
address is already active on that interface.
6. (Optional) Specify the alternative name for the access concentrator, also known as the PPPoE server,
in the AC-NAME tag in a PPPoE control packet
RELATED DOCUMENTATION
You can configure the PPPoE family on an underlying interface as an alternative to configuring PPPoE
encapsulation on that interface. You cannot configure both on the same interface. You can configure the
same attributes for the PPPoE family as you can for an interface configured with pppoe-underlying-options.
198
Before you begin, configure the underlying interface. When you want to configure PPPoE on an aggregated
Ethernet bundle, you must configure the PPPoE family over a VLAN demux interface as an intermediate
underlying option. The VLAN demux interface can be static or dynamic.
2. (Optional) Configure an alternative access concentrator name to be used instead of the system name
in PPPoE control packets for the dynamic PPPoE subscriber interface.
3. (Optional) Attach a dynamic profile to determine the properties of the dynamic PPPoE logical interface
when it is created.
RELATED DOCUMENTATION
Static or Dynamic Demux Subscriber Interfaces over Aggregated Ethernet Overview | 117
Configuring an Underlying Interface for Dynamic PPPoE Subscriber Interfaces | 196
Configuring Lockout of PPPoE Subscriber Sessions | 242
Example: Configuring a Static PPPoE Subscriber Interface on a Static Underlying VLAN Demux Interface
over Aggregated Ethernet | 203
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Static Underlying VLAN Demux
Interface over Aggregated Ethernet | 211
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Dynamic Underlying VLAN Demux
Interface over Aggregated Ethernet | 218
199
When CPE devices are directly connected to a BNG, you may want the router to ignore any DSL Forum
VSAs that it receives in PPPoE control packets because the VSAs can be spoofed by malicious subscribers.
Spoofing is particularly serious when the targeted VSAs are used to authenticate the subscriber, such as
Agent-Circuit-Id [26-1] and Agent-Remote-ID [26-2]. You can include the direct-connect statement to
ignore DSL Forum VSAs on static or dynamic PPPoE interfaces or PPPoE underlying interfaces.
To configure the router to ignore DSL Forum VSAs on specific PPPoE interfaces:
• For a PPPoE family in a dynamic profile for a VLAN demultiplexing (demux) logical interface:
2. Specify that the router ignores DSL forum VSAs received on a specific interface.
or
200
RELATED DOCUMENTATION
This example shows how to configure a dynamic PPPoE subscriber interface on a statically configured
Gigabit Ethernet VLAN underlying interface. When a PPPoE subscriber logs in on the underlying interface,
the router creates the dynamic PPPoE subscriber interface with the attributes specified in the dynamic
profile.
In this example, the dynamic PPPoE profile, pppoe-profile-east, defines options for PPPoE subscribers
accessing the network, and includes the predefined dynamic variables $junos-interface-unit, which
represents the logical unit number of the dynamic PPPoE logical interface, and $junos-underlying-interface,
which represents the name of the underlying Ethernet interface. The pppoe-profile-east dynamic profile
is assigned to the underlying Ethernet VLAN interface ge-2/0/3.1 that is configured with PPPoE
(ppp-over-ether) encapsulation.
When the router dynamically creates the PPPoE subscriber interface on ge-2/0/3.1 in response to a
subscriber login, the values of $junos-interface-unit and $junos-underlying-interface are dynamically
replaced with the actual logical unit number and interface name, respectively, that are supplied by the
network when the PPPoE subscriber logs in.
1. Configure a dynamic profile to define the attributes of the dynamic PPPoE subscriber interface.
[edit]
dynamic-profiles {
pppoe-profile-east {
interfaces {
pp0 {
unit "$junos-interface-unit" {
ppp-options {
201
chap;
}
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
keepalives interval 30;
family inet {
filter {
input pppoe-input-filter-east;
output pppoe-output-filter-east precedence 20;
}
service {
input {
service-set inputService-east;
post-service-filter postService-east;
}
output {
service-set outputService-east;
}
}
address 127.0.1.2/32;
unnumbered-address lo0.0;
}
}
}
}
}
}
2. Assign the dynamic PPPoE profile to the static underlying Ethernet interface, and define PPPoE-specific
attributes for the underlying interface.
[edit]
interfaces {
ge-2/0/3 {
vlan-tagging;
unit 1 {
encapsulation ppp-over-ether;
vlan-id 100;
pppoe-underlying-options {
access-concentrator server-east;
duplicate-protection;
202
dynamic-profile pppoe-profile-east;
max-sessions 10;
}
}
}
}
RELATED DOCUMENTATION
CHAPTER 17
IN THIS CHAPTER
Example: Configuring a Static PPPoE Subscriber Interface on a Static Underlying VLAN Demux Interface
over Aggregated Ethernet | 203
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Static Underlying VLAN Demux Interface
over Aggregated Ethernet | 211
Example: Configuring a Dynamic PPPoE Subscriber Interface on a Dynamic Underlying VLAN Demux
Interface over Aggregated Ethernet | 218
IN THIS SECTION
Requirements | 204
Overview | 204
Configuration | 204
Verification | 208
This example shows how you can configure static PPPoE subscriber interfaces over aggregated Ethernet
bundles to provide subscriber link redundancy.
204
Requirements
PPPoE over VLAN demux interfaces over aggregated Ethernet requires the following hardware and
software:
• MPCs
No special configuration beyond device initialization is required before you can configure this feature.
Overview
Aggregated Ethernet bundles enable link redundancy between the router and networking devices connected
by Ethernet links. This example describes how to configure link redundancy for static PPPoE subscribers
over aggregated Ethernet interface with an intermediate static VLAN demux interface. Sample tasks include
configuring a two-member aggregated Ethernet bundle on ae0, configuring a static VLAN demux interface,
demux0.100, that underlies the PPPoE subscriber interface, pp0.100, and configuring the PPPoE subscriber
interface including characteristics of the PPPoE family.
Configuration
[edit]
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-5/0/3 gigether-options 802.3ad ae0
set interfaces ge-5/0/3 gigether-options 802.3ad primary
set interfaces ge-5/1/2 gigether-options 802.3ad ae0
set interfaces ge-5/1/2 gigether-options 802.3ad backup
set interfaces ae0 flexible-vlan-tagging
set interfaces ae0 aggregated-ether-options link-protection
edit interfaces demux0 unit 100
set vlan-id 100
set demux-options underlying-interface ae0
set family pppoe access-concentrator pppoe-server-1
set family pppoe duplicate-protection
set family pppoe max-sessions 16000
205
top
edit interfaces pp0 unit 100
set pppoe-options underlying-interface demux0.100
set pppoe-options server
set family inet unnumbered-address lo0.0
top
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For instructions
on how to do that, see Using the CLI Editor in Configuration Mode.
To configure link redundancy for static PPPoE subscribers over a static VLAN demux interface over
aggregated Ethernet:
[edit chassis]
user@host# set aggregated-devices ethernet device-count 1
2. Configure a two-link aggregated Ethernet logical interface to serve as the underlying interface for the
static VLAN demux subscriber interface. In this example, the LAG bundle is configured for one-to-one
active/backup link redundancy. To support link redundancy at the MPC level, the LAG bundle attaches
to ports from two different MPCs.
[edit interfaces]
user@host# set ge-5/0/3 gigether-options 802.3ad ae0
user@host# set ge-5/0/3 gigether-options 802.3ad primary
user@host# set ge-5/1/2 gigether-options 802.3ad ae0
user@host# set ge-5/1/2 gigether-options 802.3ad backup
3. Enable link protection on the aggregated Ethernet logical interface and configure support for single
and dual (stacked) VLAN tags.
[edit interfaces]
user@host# set ae0 aggregated-ether-options link-protection
user@host# set ae0 flexible-vlan-tagging
4. Configure the VLAN demux interface over the aggregated Ethernet logical interface.
[edit interfaces]
206
[edit interfaces]
user@host# set demxu0 unit 100 family pppoe access-concentrator pppoe-server-1
user@host# set demux0 unit 100 family pppoe duplicate-protection
user@host# set demux0 unit 100 family pppoe max-sessions 16000
6. Configure the VLAN demux interface as the underlying interface on which the PPPoE logical interface
is created.
[edit interfaces]
user@host# set pp0 unit 100 pppoe-options underlying-interface demux0.100
user@host# set pp0 unit 100 pppoe-options server
user@host# set pp0 unit 100 family inet unnumbered-address lo0.0
Results
From configuration mode, confirm the aggregated device configuration by entering the show chassis
command. Confirm the interface configuration by entering the show interfaces command. If the output
does not display the intended configuration, repeat the configuration instructions in this example to correct
it.
[edit]
user@host# show chassis
aggregated-devices {
ethernet {
device-count 1;
}
}
[edit]
user@host# show interfaces
ge-5/0/3 {
gigether-options {
802.3ad {
ae0;
primary;
207
}
}
}
ge-5/1/2 {
gigether-options {
802.3ad {
ae0;
backup;
}
}
}
ae0 {
flexible-vlan-tagging;
aggregated-ether-options {
link-protection;
}
}
demux0 {
unit 100 {
vlan-id 100;
demux-options {
underlying-interface ae0;
}
family pppoe {
access-concentrator pppoe-server-1;
duplicate-protection;
max-sessions 16000;
}
}
}
pp0 {
unit 100 {
pppoe-options {
underlying-interface demux0.100;
server;
}
family inet {
unnumbered-address lo0.0;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
208
Verification
IN THIS SECTION
Purpose
Verify that the interface values match your configuration, the link is up, and traffic is flowing.
Action
From operational mode, enter the show interfaces redundancy command.
Meaning
The show interfaces redundancy output shows the redundant link configuration and that both link interfaces
are up. The show interfaces ae0 output shows that the aggregated Ethernet interface is up and that traffic
is being received on the logical interface.
Purpose
Verify that the VLAN demux interface displays the configured PPPoE family attributes and the member
links in the aggregated Ethernet bundle.
Action
From operational mode, enter the show interfaces demux0 command.
Alternatively, you can enter show pppoe underlying-interfaces detail to display the state and PPPoE family
configuration for all configured underlying interfaces.
Meaning
The output shows the name of the underlying interface, the member links of the aggregated bundle, and
the PPPoE family configuration. The output shows packet counts when traffic is present on the logical
interface.
Purpose
Verify that the interface values match your configuration.
Action
From operational mode, enter the show interfaces pp0 command.
Meaning
211
This output shows information about the PPPoE logical interface created on the underlying VLAN demux
interface. The output includes the PPPoE family and aggregated Ethernet redundant link information, and
shows input and output traffic for the PPPoE interface.
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 211
Overview | 212
Configuration | 212
Verification | 216
This example shows how you can configure dynamic PPPoE subscriber interfaces over aggregated Ethernet
bundles to provide subscriber link redundancy.
Requirements
PPPoE over VLAN demux interfaces over aggregated Ethernet requires the following hardware and
software:
• MPCs
No special configuration beyond device initialization is required before you can configure this feature.
212
Overview
Aggregated Ethernet bundles enable link redundancy between the router and networking devices connected
by Ethernet links. This example describes how to configure link redundancy for dynamic PPPoE subscribers
over aggregated Ethernet interface, ae0, with an intermediate static VLAN demux interface, demux0.100.
Sample tasks include configuring a two-member aggregated Ethernet bundle, configuring a static VLAN
demux interface that underlies the PPPoE subscriber interface, and configuring the dynamic profile that
establishes the dynamic PPPoE subscriber interfaces.
The dynamic PPPoE profile (pppoe-profile) creates the PPPoE subscriber interface. It also configures the
router to act as a PPPoE server and enables the local address to be derived from the specified address
without assigning an explicit IP address to the interface. The pppoe-profile dynamic profile is assigned to
the static, intermediate VLAN demux interface (demux0.100), which is configured with the PPPoE family
(family pppoe) attributes. This dynamic profile includes the following predefined variables:
• $junos-interface-unit—Represents the logical unit number of the dynamic PPPoE logical interface. This
predefined variable is dynamically replaced with the unit number supplied by the router when the
subscriber logs in.
Configuration
[edit]
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-5/0/3 gigether-options 802.3ad ae0
set interfaces ge-5/0/3 gigether-options 802.3ad primary
set interfaces ge-5/1/2 gigether-options 802.3ad ae0
set interfaces ge-5/1/2 gigether-options 802.3ad backup
set interfaces ae0 flexible-vlan-tagging
set interfaces ae0 aggregated-ether-options link-protection
set interfaces demux0 unit 100 vlan-id 100
set interfaces demux0 unit 100 demux-options underlying-interface ae0
set interfaces demux0 unit 100 family pppoe access-concentrator pppoe-server-1
set interfaces demux0 unit 100 family pppoe duplicate-protection
213
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For instructions
on how to do that, see Using the CLI Editor in Configuration Mode.
To configure link redundancy for dynamic PPPoE subscribers over a static VLAN demux interface over
aggregated Ethernet:
[edit chassis]
user@host# set aggregated-devices ethernet device-count 1
2. Configure a two-link aggregated Ethernet logical interface to serve as the underlying interface for the
static VLAN demux subscriber interface. In this example, the LAG bundle is configured for one-to-one
active/backup link redundancy. To support link redundancy at the MPC level, the LAG bundle attaches
to ports from two different MPCs.
[edit interfaces]
user@host# set ge-5/0/3 gigether-options 802.3ad ae0
user@host# set ge-5/0/3 gigether-options 802.3ad primary
user@host# set ge-5/1/2 gigether-options 802.3ad ae0
user@host# set ge-5/1/2 gigether-options 802.3ad backup
3. Enable link protection on the aggregated Ethernet logical interface and configure support for single
and dual (stacked) VLAN tags.
[edit interfaces]
user@host# set ae0 aggregated-ether-options link-protection
user@host# set ae0 flexible-vlan-tagging
4. Configure the VLAN demux interface over the aggregated Ethernet logical interface.
214
[edit interfaces]
user@host# set demux0 unit 100 vlan-id 100
user@host# set demux0 unit 100 demux-options underlying-interface ae0
5. Configure the PPPoE family attributes on the VLAN demux interface, including the dynamic profile.
[edit interfaces]
user@host# set demux0 unit 100 family pppoe access-concentrator pppoe-server-1
user@host# set demux0 unit 100 family pppoe duplicate-protection
user@host# set demux0 unit 100 family pppoe dynamic-profile pppoe-profile
6. Configure the dynamic profile that creates the PPPoE subscriber interfaces.
Results
From configuration mode, confirm the aggregated device configuration by entering the show chassis
command. Confirm the interface configuration by entering the show interfaces command. Confirm the
dynamic profile configuration by entering the show dynamic-profiles command. If the output does not
display the intended configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show chassis
aggregated-devices {
ethernet {
device-count 1;
}
}
[edit]
user@host# show interfaces
ge-5/0/3 {
gigether-options {
802.3ad {
215
ae0;
primary;
}
}
}
ge-5/1/2 {
gigether-options {
802.3ad {
ae0;
backup;
}
}
}
ae0 {
flexible-vlan-tagging;
aggregated-ether-options {
link-protection;
}
}
demux0 {
unit 100 {
vlan-id 100;
demux-options {
underlying-interface ae0;
}
family pppoe {
access-concentrator pppoe-server-1
duplicate-protection;
dynamic-profile pppoe-profile;
}
}
}
[edit]
user@host# show dynamic-profiles
pppoe-profile {
interfaces {
pp0 {
unit $junos-interface-unit {
pppoe-options {
underlying-interface $junos-underlying-interface;
server;
}
family inet {
216
unnumbered-address lo0.0;
}
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
IN THIS SECTION
Purpose
Verify that the interface values match your configuration, the link is up, and traffic is flowing.
Action
From operational mode, enter the show interfaces redundancy command.
Meaning
The show interfaces redundancy output shows the redundant link configuration and that both link interfaces
are up. The show interfaces ae0 output shows that the aggregated Ethernet interface is up and that traffic
is being received on the logical interface.
Purpose
Verify that the VLAN demux interface displays the configured PPPoE family attributes and the member
links in the aggregated Ethernet bundle.
Action
From operational mode, enter the show interfaces demux0 command.
Alternatively, you can enter show pppoe underlying-interfaces detail to display the state and PPPoE family
configuration for all configured underlying interfaces. The output also provides information about PPPoE
negotiation on a per-VLAN basis.
Meaning
The output shows the name of the underlying interface, the member links of the aggregated bundle, and
the PPPoE family configuration. The output shows packet counts when traffic is present on the logical
interface.
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 219
Overview | 219
Configuration | 220
Verification | 225
219
This example shows how you can configure dynamic PPPoE subscriber interfaces over aggregated Ethernet
bundles to provide subscriber link redundancy.
Requirements
PPPoE over VLAN demux interfaces over aggregated Ethernet requires the following hardware and
software:
• MPCs
No special configuration beyond device initialization is required before you can configure this feature.
Overview
Aggregated Ethernet bundles enable link redundancy between the router and networking devices connected
by Ethernet links. This example describes how to configure link redundancy for dynamic PPPoE subscribers
over aggregated Ethernet with an intermediate dynamic VLAN demux interface. Sample tasks include
configuring a two-member aggregated Ethernet bundle, configuring dynamic profiles that establish the
dynamic VLAN demux interface that underlies the PPPoE subscriber interface, and configuring the dynamic
profile that establishes the dynamic PPPoE subscriber interfaces.
In this example, two different dynamic profiles are configured to instantiate either VLAN (vlan-profile) or
S-VLAN (svlan-profile) demux interfaces. These profiles define PPPoE family options and include the
dynamic PPPoE profile (pppoe-profile) that creates the PPPoE subscriber interface. Junos OS predefined
variables are used in each profile to represent the interfaces and VLAN identifiers that are dynamically
created. These dynamic profiles include the following predefined variables:
• $junos-interface-unit—Represents the logical unit number of the dynamic VLAN demux interface. This
predefined variable is dynamically replaced with the unit number supplied by the router when the
subscriber logs in.
• $junos-vlan-id—Represents the VLAN identifier. This predefined variable is dynamically replaced with
a VLAN ID when the subscriber logs in. The VLAN ID is allocated within the VLAN range specified in
the aggregated Ethernet configuration. In the case of the S-VLAN demux, $junos-vlan-id represents the
inner VLAN identifier.
• $junos-stacked-vlan-id—Represents the outer VLAN identifier for the stacked VLAN. This predefined
variable is dynamically replaced with a VLAN ID when the subscriber logs in. The VLAN ID is allocated
220
within the VLAN range specified in the aggregated Ethernet configuration. This variable is not used for
the VLAN demux configuration.
The dynamic PPPoE profile (pppoe-profile) creates the PPPoE subscriber interface. It also configures the
router to act as a PPPoE server and enables the local address to be derived from the specified address
without assigning an explicit IP address to the interface. The pppoe-profile dynamic profile is assigned to
the dynamic, intermediate VLAN and S-VLAN demux interfaces. This dynamic profile includes the following
predefined variables:
• $junos-interface-unit—Represents the logical unit number of the dynamic PPPoE logical interface. This
predefined variable is dynamically replaced with the unit number supplied by the router when the
subscriber logs in.
Configuration
[edit]
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-5/0/3 gigether-options 802.3ad ae0
set interfaces ge-5/0/3 gigether-options 802.3ad primary
set interfaces ge-5/1/2 gigether-options 802.3ad ae0
set interfaces ge-5/1/2 gigether-options 802.3ad backup
edit interfaces ae0
set flexible-vlan-tagging
set aggregated-ether-options link-protection
edit auto-configure
set vlan-ranges dynamic-profile vlan-profile accept pppoe
set vlan-ranges dynamic-profile vlan-profile ranges 1-4094
set stacked-vlan-ranges dynamic-profile svlan-profile accept pppoe
set stacked-vlan-ranges dynamic-profile svlan-profile ranges 1-4094,1-4094
top
edit dynamic-profiles pppoe-profile
edit interfaces pp0 unit $junos-interface-unit
set pppoe-options underlying-interface $junos-underlying-interface
set pppoe-options server
221
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For instructions
on how to do that, see Using the CLI Editor in Configuration Mode.
To configure link redundancy for dynamic PPPoE subscribers over a dynamic VLAN demux interface over
aggregated Ethernet:
[edit chassis]
user@host# set aggregated-devices ethernet device-count 1
2. Configure a two-link aggregated Ethernet logical interface to serve as the underlying interface for the
dynamic VLAN demux subscriber interface. In this example, the LAG bundle is configured for one-to-one
active/backup link redundancy. To support link redundancy at the MPC level, the LAG bundle attaches
to ports from two different MPCs.
[edit interfaces]
user@host# set ge-5/0/3 gigether-options 802.3ad ae0
user@host# set ge-5/0/3 gigether-options 802.3ad primary
user@host# set ge-5/1/2 gigether-options 802.3ad ae0
user@host# set ge-5/1/2 gigether-options 802.3ad backup
222
3. Enable link protection on the aggregated Ethernet logical interface and configure support for single
and dual (stacked) VLAN tags.
[edit interfaces]
user@host# set ae0 aggregated-ether-options link-protection
user@host# set ae0 flexible-vlan-tagging
4. Configure the parameters for automatically configuring VLANs and S-VLANs, including the VLAN ranges
and dynamic profiles.
[edit interfaces]
user@host# set ae0 auto-configure vlan-ranges dynamic-profile vlan-profile accept pppoe
user@host# set ae0 auto-configure vlan-ranges dynamic-profile vlan-profile ranges 1-4094
user@host# set ae0 auto-configure stacked-vlan-ranges dynamic-profile svlan-profile accept pppoe
user@host# set ae0 auto-configure stacked-vlan-ranges dynamic-profile svlan-profile ranges 1-4094,1-4094
5. Configure the dynamic profile that creates the PPPoE subscriber interface.
6. Configure the dynamic profile that creates VLAN demux underlying interfaces, including the PPPoE
family attributes.
7. Configure the dynamic profile that creates S-VLAN demux underlying interfaces, including the PPPoE
family attributes.
223
Results
From configuration mode, confirm the aggregated device configuration by entering the show chassis
command. Confirm the interface configuration by entering the show interfaces command. Confirm the
dynamic profile configuration by entering the show dynamic-profiles command. If the output does not
display the intended configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show chassis
aggregated-devices {
ethernet {
device-count 1;
}
}
[edit]
user@host# show interfaces
ge-5/0/3 {
gigether-options {
802.3ad {
ae0;
primary;
}
}
}
ge-5/1/2 {
gigether-options {
802.3ad {
ae0;
backup;
}
}
}
224
ae0 {
flexible-vlan-tagging;
aggregated-ether-options {
link-protection;
}
auto-configure {
vlan-ranges {
dynamic-profile {
vlan-profile {
accept pppoe;
vlan-ranges 1–4094};
}
}
}
stacked-vlan-ranges {
dynamic-profile {
svlan-profile {
accept pppoe;
vlan-ranges 1–4094,1–4094;
}
}
}
}
}
[edit]
user@host# show dynamic-profiles
pppoe-profile {
interfaces {
pp0 {
unit $junos-interface-unit {
pppoe-options {
underlying-interface $junos-underlying-interface;
server;
}
family inet {
unnumbered-address lo0.0;
}
}
}
}
}
vlan-profile {
interfaces {
225
demux0 {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family pppoe {
access-concentrator pppoe-server-1;
duplicate-protection;
dynamic-profile pppoe-profile;
}
}
}
}
}
svlan-profile {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-tags outer "$junos-stacked-vlan-id" inner "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family pppoe {
access-concentrator pppoe-server-1;
duplicate-protection;
dynamic-profile pppoe-profile;
}
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
IN THIS SECTION
Purpose
Verify that the interface values match your configuration, the link is up, and traffic is flowing.
Action
From operational mode, enter the show interfaces redundancy command.
Meaning
227
The show interfaces redundancy output shows the redundant link configuration and that both link interfaces
are up. The show interfaces ae0 output shows that the aggregated Ethernet interface is up and that traffic
is being received on the logical interface.
RELATED DOCUMENTATION
CHAPTER 18
IN THIS CHAPTER
Guidelines for Using PPPoE Maximum Session Limit from RADIUS | 231
Limiting the Maximum Number of PPPoE Sessions on the Underlying Interface | 233
IN THIS SECTION
Per-Interface Configuration for PPPoE Maximum Session Limit Using the CLI | 230
Per-Subscriber Configuration for PPPoE Maximum Session Limit Using RADIUS | 230
The maximum session limit for PPPoE subscriber interfaces specifies the maximum number of concurrent
static or dynamic PPPoE logical interfaces (sessions) that the router can activate on the PPPoE underlying
interface, or the maximum number of active static or dynamic PPPoE sessions that the router can establish
with a particular service entry in a PPPoE service name table.
You can configure the PPPoE maximum session limit in one of two ways:
• On a per-interface basis.
This overview describes the concepts you need to understand to configure the PPPoE maximum session
limit, and covers the following topics:
230
Per-Interface Configuration for PPPoE Maximum Session Limit Using the CLI
When you configure the PPPoE maximum session limit for a particular interface, you can use the
max-sessions statement to specify either or both of the following:
• The maximum number of concurrent PPPoE sessions that the router can activate on the PPPoE underlying
interface
• The maximum number of active PPPoE sessions using either static or dynamic PPPoE interfaces that
the router can establish with a particular named service entry, empty service entry, or any service entry
in a PPPoE service name table
You can configure the PPPoE maximum session value from 1 through the platform-specific default for
your router. The default value is equal to the maximum number of PPPoE sessions supported on your
routing platform. If the number of active PPPoE sessions exceeds the value configured, the router prohibits
creation of any new PPPoE sessions, and the PPPoE application on the router returns a PPPoE Active
Discovery Session (PADS) packet with an error to the PPPoE client.
Changing the PPPoE maximum session value has no effect on dynamic PPPoE subscriber interfaces that
are already active.
To configure the PPPoE maximum session limit for a particular subscriber, you can use the value returned
by the RADIUS server in the Max-Clients-Per-Interface Juniper Networks VSA [26-143] during the
subscriber authentication process. For PPPoE clients, the Max-Clients-Per-Interface VSA returns the
maximum number of sessions (PPPoE subinterfaces) per PPPoE major interface.
By default, the PPPoE maximum session value returned by RADIUS in the Max-Clients-Per-Interface VSA
takes precedence over the PPPoE maximum session value configured with the max-sessions statement.
If you configure multiple subscribers on the same PPPoE underlying VLAN interface and RADIUS returns
a different PPPoE maximum session value for each subscriber, the router uses the most recent PPPoE
maximum session value returned by RADIUS to determine whether to override the current PPPoE maximum
session value and create the new PPPoE session.
The following sequence describes how the router obtains the PPPoE maximum session value from RADIUS
when a PPPoE subscriber logs in to initiate a session with the router. (In a PPPoE subscriber network, the
router functions as a remote access concentrator, also known as a PPPoE server.)
1. The PPPoE client and the router participate in the PPPoE Discovery process to establish the PPPoE
connection.
2. The PPP Link Control Protocol (LCP) negotiates the PPP link between the client and the router.
3. The PPP application sends the subscriber authentication request to the AAA application.
5. The RADIUS server returns the PPPoE maximum session value for that subscriber to AAA in the
Max-Clients-Per-Interface VSA as part of an Access-Accept message.
NOTE: The RADIUS server does not return the Max-Clients-Per-Interface VSA in Change
of Authorization Request (CoA-Request) messages.
7. PPP validates the subscriber parameters and, if authentication succeeds, passes the PPPoE maximum
session value returned by RADIUS to the PPPoE application.
8. PPPoE uses the maximum session value returned by RADIUS to determine whether to override the
current PPPoE maximum session value and create or tear down the new PPPoE session.
You can configure the router to ignore (clear) the PPPoE maximum session value returned by the RADIUS
server in the Max-Clients-Per-Interface VSA. Configuring the router to ignore the VSA restores the PPPoE
maximum session value on the underlying interface to the value configured in the CLI.
RELATED DOCUMENTATION
Guidelines for Using PPPoE Maximum Session Limit from RADIUS | 231
Juniper Networks VSAs Supported by the AAA Service Framework
Limiting the Maximum Number of PPPoE Sessions on the Underlying Interface | 233
Dynamic PPPoE Subscriber Interfaces over Static Underlying Interfaces Overview | 188
Consider the following guidelines when you use the PPPoE maximum session value returned by RADIUS
in the Max-Clients-Per-Interface vendor-specific attribute (VSA) [26-143]:
• If the current number of sessions (including newly created sessions) is less than the new PPPoE maximum
session value returned by RADIUS, the PPPoE application overrides the current value and enables
interface creation to proceed.
• If the current number of sessions (including newly created sessions) is equal to the new PPPoE maximum
session value returned by RADIUS, the PPPoE application overrides the current value and enables
interface creation to proceed.
232
• If the current number of sessions (including newly created sessions) is greater than the new PPPoE
maximum session value returned by RADIUS, the PPPoE application overrides the current value and
brings down the new interface.
To illustrate these guidelines, Table 10 on page 232 shows examples of how the router handles the PPPoE
session when the current number of sessions is less than (first row), equal to (second row), and greater
than (third row) the new PPPoE maximum session value returned by RADIUS when a new subscriber logs
in.
Table 10: Sample PPPoE Maximum Session Values During Subscriber Login
10 5 4 10 5 PPPoE session
up
5 5 4 5 5 PPPoE session
up
3 5 4 3 4 PPPoE session
down
RELATED DOCUMENTATION
You can limit the number of concurrent static or dynamic PPPoE logical interfaces (sessions) that the router
can activate on the PPPoE underlying interface, or the number of active static or dynamic PPPoE sessions
that the router can establish with a particular service entry in a PPPoE service name table.
1. Specify that you want to configure PPPoE-specific options on the underlying interface:
• For a PPPoE family in a dynamic profile for a VLAN demultiplexing (demux) logical interface:
• For an underlying interface established with a particular service entry in a PPPoE service name table:
2. Configure the maximum number of concurrent PPPoE sessions that the router can activate on the
underlying interface in either of the following ways:
234
• To configure the maximum number of concurrent PPPoE sessions on a per-interface basis, from 1
to the platform-specific default for your router, use the max-sessions statement:
• To configure the maximum number of concurrent PPPoE sessions on a per-subscriber basis, use the
value returned by RADIUS in the Max-Clients-Per-Interface Juniper Networks vendor-specific attribute
(VSA) [26-143]. By default, the PPPoE maximum session value returned by RADIUS in the
Max-Clients-Per-Interface VSA takes precedence over the PPPoE maximum session value configured
with the max-sessions statement.
3. (Optional) To restore the PPPoE maximum session value on the underlying interface to the value
configured in the CLI with the max-sessions statement, configure the router to ignore the value returned
by RADIUS in the Max-Clients-Per-Interface VSA.
NOTE: You can issue the max-sessions-vsa-ignore statement at the same hierarchy levels
as the max-sessions statement, with the exception of the [edit protocols pppoe
service-name-tables table-name service service-name] hierarchy level.
RELATED DOCUMENTATION
CHAPTER 19
IN THIS CHAPTER
Understanding the Lockout Period for PPPoE Subscriber Session Lockout | 240
IN THIS SECTION
Persistence of the Lockout Condition After Automatic Removal of Dynamic Subscriber VLANs | 238
Use of Encapsulation Type Identifiers to Clear or Display the Lockout Condition | 239
PPPoE subscriber session lockout, also called PPPoE encapsulation type lockout, temporarily prevents (locks
out) a failed or short-lived static or dynamic PPPoE subscriber session from reconnecting for a certain
period of time. This time period, known as the lockout period, is derived from a formula and increases
exponentially based on the number of successive reconnection failures.
You can configure PPPoE subscriber session lockout, also known as short-cycle protection, for VLAN, VLAN
demultiplexing (demux), and PPP-over-Ethernet-over-ATM (PPPoE-over-ATM) dynamic subscriber interfaces.
This overview describes the concepts you need to understand to configure PPPoE subscriber session
lockout, and covers the following topics:
• Reducing the resources required to process PPPoE control packets to negotiate and terminate
short-lived connections
• Reducing the resources required to allocate and deallocate services, such as class of service (CoS) and
firewall filters, for failed or short-lived subscriber sessions
• Temporarily deferring failed or short-lived subscriber sessions in favor of sessions that can complete
successfully.
• Reduces excessive loading on external authentication, authorization, and accounting (AAA) servers, such
as RADIUS or Diameter:
• As a result of failed or short-lived PPPoE subscriber sessions that occur repeatedly for the same
subscriber
• Enables lockout of a single failed or short-lived PPP session without disrupting other PPP sessions on
the same PPPoE underlying interface
Because PPPoE subscriber session lockout identifies each subscriber session by either its unique media
access control (MAC) source address on the underlying interface or by its agent circuit identifier (ACI)
value, the router can lock out only the offending PPP session while enabling other PPP sessions on the
same underlying interface to successfully negotiate the connection.
237
• Authentication denials from external AAA servers, such as RADIUS, due to the absence of a corresponding
entry in the RADIUS database or due to improper login attempts
• Client logout shortly after a successful login; this action creates a complete dynamic PPPoE subscriber
interface before the interface is torn down
PPPoE subscriber session lockout is disabled on the router by default. When you enable PPPoE subscriber
session lockout, the router does the following:
A short-lived subscriber session is detected, partially or completely created, and terminated by the
router within 150 seconds. The router identifies each PPPoE subscriber session by its unique MAC
source address on the PPPoE underlying interface or by its ACI value.
2. Tracks the time between repeated short-cycle events to determine whether to increase the lockout
time for a subsequent short-cycle event.
3. Applies a time penalty for each short-cycle event based on a default or configured lockout period and
the number of consecutive short-cycle events that occur repeatedly for the same subscriber.
4. Temporarily locks out the specified PPPoE subscriber by preventing connection to the router.
During lockout, the router drops negotiation packets for the PPPoE subscriber session until the lockout
period expires. When the lockout period expires, the PPPoE subscriber session and its associated MAC
source address or ACI value resume normal negotiation of the connection.
By default, the router identifies a subscriber session using the unique MAC source address on the PPPoE
underlying interface. You can configure subscriber session lockout based on the ACI string of the underlying
interface, which allows you to lock out all PPPoE subscriber sessions from the same household.
The ACI string is contained in the DSL Forum Agent-Circuit-ID VSA [26-1] (option 0x105) of PPPoE Active
Discovery Initiation (PADI) and PPPoE Active Discovery Request (PADR) control packets. This option locks
238
out all PPPoE subscriber sessions on the underlying interface that share the same ACI string in their PPPoE
PADI and PADR control packets.
PPPoE subscriber session lockout based on the ACI value is useful when MAC source addresses are not
unique on the PPPoE underlying interface. For example:
• PPPoE interworking function sessions in which the MAC addresses of all PPPoE inter-working function
sessions contain the MAC address of the DSLAM device
• Configurations in which the access node (usually a DSLAM device) overwrites the MAC source address
in PPPoE packets received from the customer premises equipment (CPE) with its own MAC address for
security purposes
• Duplicate MAC source addresses across disparate households in an N:1 (service VLAN) configuration,
which requires the router to use a combination of the MAC source address and the ACI value to uniquely
identify a subscriber
Duplicate protection, which is disabled on the router by default, prevents the activation of another PPPoE
subscriber session on the same PPPoE underlying interface when a PPPoE subscriber session with the
same media access control (MAC) address is already active on that interface. When you configure PPPoE
subscriber session lockout, we recommend that you enable duplicate protection to ensure that the MAC
source address for each active PPPoE session is unique on the underlying interface.
With PPPoE subscriber session lockout configured, the router identifies subscriber sessions by their unique
MAC source address. If the router detects a short-lived (short-cycle) subscriber session, it applies the
default or configured lockout period to that MAC source address to temporarily prevent reconnection. If
the MAC source address is not unique on the underlying interface, multiple PPPoE subscriber sessions
with the same MAC source address might also be affected by the lockout.
Persistence of the Lockout Condition After Automatic Removal of Dynamic Subscriber VLANs
You can configure automatic removal of subscriber VLANs that have no PPPoE client sessions by issuing
the remove-when-no-subscribers statement at the [edit interfaces interface-name auto-configure] hierarchy
level. If PPPoE subscriber session lockout is also configured on the interface, the lockout condition persists
even after the router has removed the dynamic VLAN or VLAN demux subscriber interface.
When you configure both PPPoE subscriber session lockout and automatic removal of subscriber VLANs
with no client sessions, the lockout condition for the affected subscriber sessions persists until the lockout
timer expires for each PPPoE client undergoing lockout on the underlying interface. If you create the VLAN
or VLAN demux subscriber interface again before all timers expire, the lockout condition persists for the
newly created subscriber interface.
239
You can clear the lockout condition for a specific MAC source address or ACI value, all MAC source
addresses or ACI values, or for an ACI value that matches a UNIX-based regular expression by specifying
VLAN or ATM encapsulation type identifier options in the clear pppoe lockout vlan-identifier or clear
pppoe lockout atm-identifier command, respectively. Similarly, you can display information about the
lockout condition and the status of affected subscriber sessions by including encapsulation type identifier
options in the show pppoe lockout vlan-identifier or show pppoe lockout atm-identifier command.
Specifying encapsulation type lockout identifiers enables you to clear or display the lockout condition
when no underlying interface exists for the subscriber session.
For the VLAN encapsulation type on VLAN and VLAN demux subscriber interfaces, the identifier options
include:
For the ATM encapsulation type on PPPoE-over-ATM subscriber interfaces, the identifier options include:
When a PPPoE subscriber session identified by either an ACI value or a unique MAC source address is
undergoing lockout, the lockout condition persists until all lockout timers have expired, except when either
of the following occurs:
• You administratively clear the lockout condition by issuing the clear pppoe lockout operational command.
• You reset the interface module on which the subscriber session undergoing lockout is configured.
When you clear the lockout condition or reset the interface module, the router terminates lockout for all
PPPoE subscriber sessions on the underlying interface, and clears the lockout history for all affected
subscriber sessions.
RELATED DOCUMENTATION
Understanding the Lockout Period for PPPoE Subscriber Session Lockout | 240
Configuring Lockout of PPPoE Subscriber Sessions | 242
240
IN THIS SECTION
How the Router Determines the PPPoE Subscriber Session Lockout Period | 241
When you configure PPPoE subscriber session lockout, the router applies a time penalty called the lockout
period for each failed or short-lived subscriber session.
This overview describes how the router determines and applies the PPPoE subscriber session lockout
period, and covers the following topics:
The duration of the lockout period is based on a default or configured lockout time and the number of
consecutive short-cycle (short-lived) events that occur repeatedly for the same subscriber. When you
include the short-cycle-protection statement to configure PPPoE subscriber session lockout on a PPPoE
underlying interface, you can use the default lockout time range of 1 through 300 seconds (5 minutes), or
you can override the default lockout period by configuring a nondefault lockout time in the range 1 through
86,400 seconds (24 hours).
The lockout time penalty applied by the router for each short-cycle event differs depending on the event.
For example, some short-cycle events represent normal subscriber behavior, such as a PPPoE subscriber
logging in once per hour to check e-mail and logging out shortly thereafter. The router does not noticeably
penalize a subscriber for these types of events.
By contrast, other short-cycle events are the result of repeated attempts to log in to the router for reasons
such as an incorrectly typed password, customer premises equipment (CPE) that performs repeated
auto-retries, or malicious attempts to access the Internet illegally. For these types of short-cycle events,
the router applies a lockout time penalty that starts with a short time interval and increases exponentially.
In these instances, the initial lockout time is short enough to avoid noticeably penalizing a subscriber who,
for example, types a password incorrectly several times before entering the correct one.
241
For example, using the default lockout time range of 1 through 300 seconds, the increasing lockout period
on the router is: 1 second, 2 seconds, 4 seconds, 8 seconds, 16 seconds, 32 seconds, 64 seconds,
128 seconds, 256 seconds, and finally, 300 seconds (5 minutes).
How the Router Determines the PPPoE Subscriber Session Lockout Period
The router uses the following rules to determine the PPPoE subscriber session lockout period for short-lived
PPPoE subscriber sessions:
where n represents the number of consecutive short-cycle events for the same subscriber. The router
identifies a PPPoE subscriber session by its MAC source address, which should be unique on the underlying
PPPoE interface, or ACI value.
• The router increments the value of n when the time between short-cycle events is either within 15 minutes
or the maximum lockout time, whichever is greater.
• When the time between short-cycle events is greater than either 15 minutes or the maximum lockout
time, the value of n reverts to 1. This condition is referred to as a lockout grace period.
• The lockout period never exceeds the maximum configured lockout time.
For example, for a configured (nondefault) lockout time in the range 20 through 120 seconds, the
increasing lockout period on the router is: 20 seconds, 40 seconds, 80 seconds, and finally, 120 seconds
(2 minutes).
• A short-cycle event is detected, partially or completely created, and terminated by the router within
150 seconds. The router tracks the time between short-cycle events to determine whether to increase
the lockout time for a subsequent short-cycle event for the same subscriber.
NOTE: When the calculated lockout time is equal to or exceeds the maximum lockout time,
the router uses the maximum lockout time value until the time to the next short-cycle event
exceeds the greater of 15 minutes or the maximum lockout time value. At that point, the
lockout time reverts to the minimum lockout time value.
• The minimum lockout time value cannot exceed the maximum lockout time value.
When the minimum and maximum lockout time values are equal, the lockout time becomes fixed at that
value.
RELATED DOCUMENTATION
242
You can configure the router to temporarily lock out a failed or short-lived PPPoE subscriber session from
reconnecting for a period of time. The PPPoE subscriber session can reside on a VLAN, VLAN demux, or
PPPoE-over-ATM underlying interface.
To configure the underlying interface for use with a PPPoE dynamic profile, see “Configuring an Underlying
Interface for Dynamic PPPoE Subscriber Interfaces” on page 196.
To configure the PPPoE family for an underlying interface, see “Configuring the PPPoE Family for an
Underlying Interface” on page 197.
1. Specify that you want to configure PPPoE-specific options on the underlying interface:
• For a PPPoE family in a dynamic profile for a VLAN demultiplexing (demux) logical interface:
2. Enable duplicate protection to prevent negotiation of a dynamic or static PPPoE client session on the
same underlying interface when a PPPoE client session with the same media access control (MAC)
source address is already active on that interface.
BEST PRACTICE: When you configure PPPoE subscriber session lockout, we recommend
that you enable duplicate protection to ensure that the MAC source address for each
PPPoE session is unique on the underlying interface.
3. Enable PPPoE subscriber session lockout using one of the following filtering mechanisms to identify
the subscriber sessions for lockout:
• To configure MAC-based subscriber session lockout with the default lockout period of 1 through
300 seconds:
• To configure ACI-based subscriber session lockout with the default lockout period:
For example, the following statement configures temporary lockout based on ACI information for
subscriber sessions on a dynamic VLAN demux underlying interface. It uses the default lockout
time range 1 through 300 seconds.
For example, the following statement configures temporary lockout based on ACI information for
subscriber sessions on a dynamic VLAN underlying interface. It specifies a nondefault lockout time
in the range 20 through 120 seconds.
NOTE: If the ACI value is not present in the PPPoE attributes when you configure
ACI-based subscriber session lockout, the router uses MAC-based lockout by default.
With ACI-based encapsulation type lockout, PPPoE clients without an ACI attribute
are also locked out.
245
RELATED DOCUMENTATION
Action
• To clear the lockout condition for PPPoE subscriber sessions associated with all MAC source addresses
on all underlying interfaces:
• To clear the lockout condition for the PPPoE subscriber session associated with the specified MAC
source address:
• To clear the lockout condition for all PPPoE subscriber sessions on the specified underlying interface:
• To clear the lockout condition for the PPPoE subscriber session associated with the specified MAC
source address on the specified underlying interface:
• To clear the ACI-based lockout condition for PPPoE subscriber sessions on all underlying interfaces:
• To clear the ACI-based lockout condition for PPPoE subscriber sessions associated with the specified
ACI value on the specified underlying interface:
246
• To clear the ACI-based lockout for a PPPoE subscriber session with the specified ATM encapsulation
type identifiers where the ACI value matches a regular expression:
user@host> clear pppoe lockout atm-identifier device-name device-name vpi vpi-identifier vci vci-identifier aci
“Relay-identifier atm 1/0:100\.*”
• To clear the MAC-based lockout condition for a PPPoE subscriber session with the specified ATM
encapsulation type identifiers:
user@host> clear pppoe lockout atm-identifier device-name device-name vpi vpi-identifier vci vci-identifier
mac-address mac-address
• To clear the ACI-based lockout for a PPPoE subscriber session with the specified VLAN encapsulation
type identifiers where the ACI value matches a regular expression:
user@host> clear pppoe lockout vlan-identifier device-name device-name svlan-id svlan-identifier vlan-id
vlan-identifier aci “Relay-identifier atm 3/0:200\.*”
• To clear the MAC-based lockout condition for a PPPoE subscriber session with the specified VLAN
encapsulation type identifiers:
user@host> clear pppoe lockout vlan-identifier device-name device-name vlan-id vlan-identifier mac-address
mac-address
RELATED DOCUMENTATION
CHAPTER 20
IN THIS CHAPTER
The maximum payload allowed on an Ethernet frame is 1500 bytes. For a PPPoE interface, the PPPoE
header uses 6 bytes and the PPP protocol ID uses 2 bytes. This restricts the maximum receive unit (MRU)
size on a PPPoE interface to 1492 bytes, which can cause frequent fragmentation and reassembly of larger
PPP packets received over the PPPoE interface. To prevent frequent fragmentation and reassembly for
PPP packets over Ethernet, you can configure the maximum transmission unit (MTU) and MRU sizes for
PPP subscribers.
NOTE: For PPPoE subscribers, the PPP MRU or PPP MTU size can be greater than 1492 bytes
if the PPP-Max-Payload tag is received in the PPPoE Active Discovery Request (PADR) packets.
The configuration of MRU and MTU is supported for subscribers of the following PPP connections:
PPP essentially negotiates between two independent half-duplex links. While establishing a PPP connection,
PPP end-points negotiate the MRU to determine the PPP payload MTU on a negotiated PPP connection.
The terms used in this section are described here:
Peer MRU—MRU proposed by the peer to indicate the PPP payload size that it can accept.
248
PPP MRU—MRU proposed by the router to indicate the PPP payload size that it can accept
PPP MTU—PPP payload MTU (IP header + data) excluding any Layer 2 overhead.
By default, if the PPP MTU value is lower than 1492 bytes, the operational PPP MRU value is also set to
the PPP MTU value. However, if the PPP MTU value is greater than 1492 bytes, Junos OS calculates the
PPP MRU value based on the presence and value of the PPP-Max-Payload tag received in the PPPoE
Active Discovery Request (PADR) packet. This default behavior can be changed by configuring the mtu
(size| use-lower-layer) and mru size statements at the following hierarchy levels:
• Configured MTU is the MTU value configured using the mtu size statement.
Junos OS determines the PPP MTU value for a terminated PPPoE interface based on the configured MTU,
PPP lower-layer MTU, and the presence and value of the PPP-Max-Payload tag in the PADR packet.
1. If the PPP lower-layer MTU falls below 1492 bytes, then the PPP MTU value is the lesser of the PPP
lower-layer MTU and the configured MTU value. The PPP-Max-Payload tag is ignored even if it is
present in the PADR packet.
• If the PPP-Max-Payload tag is not present in the PADR packet, then the PPP MTU value is the lesser
of the configured MTU and the PPP lower-layer MTU value.
• If the PPP-Max-Payload tag is present and its value is less than 1492 bytes, then the PPP MTU is the
lesser of the configured MTU and the PPP lower-layer MTU value. Junos OS does not send out the
PPP-Max-Payload tag in the PPPoE Active Discovery Session (PADS) packet to indicate that the
router is not capable of supporting an MRU size greater than 1492 bytes.
• If the PPP-Max-Payload tag is present and its value is greater than 1492 bytes but less than the
configured MTU, the PPP MTU is the value received in the PPP-Max-Payload tag.
• If the PPP-Max-Payload tag is present and its value is greater than 1492 bytes and also greater than
the configured MTU, the PPP MTU is the lesser of the configured MTU and PPP lower-layer MTU
249
value. Junos OS also returns the PPP-Max-Payload tag in the PADS packet to indicate that the router
is capable of supporting an MRU greater than 1492 bytes.
By default, a router uses the PPT MTU value for the PPP MRU value during link control protocol (LCP)
negotiation on point-to-point connections. When you configure the MRU for a PPP subscriber for PPPoE
by using the mru size statement, Junos OS determines the PPP MRU value based on the following:
• If the MRU is configured using the ppp-options option, the PPP MRU is the lesser of the configured
MRU value and the PPP MTU value for that subscriber (PPP MTU value derived based on the configured
MTU, PPP lower-layer MTU, and the PPP-Max-Payload value in the PADR packet).
• If the MRU is not configured, the PPP MRU remains the same as the PPP MTU and is sent during LCP
negotiation. During LCP negotiation, the server receives the peer MRU value and offers the PPP MRU
derived from the configuration and the PPP MTU.
• For a negotiated PPP connection, the INET MTU i.e PPP payload MTU ( IP header + data) excluding any
Layer 2 overhead, is set to the lesser of the PPP MTU and the received Peer MRU value.
For PPP subscribers on L2TP network server (LNS), the configured MTU can be either the explicit MTU
size specified using the mtu size statement or the derived MTU using the mtu use-lower-layer statement.
• If the PPP MTU is configured as use-lower-layer, the PPP MTU is determined as:
interface MTU – 58 bytes.
NOTE: 58 bytes is the PPP overhead payload, which is calculated as the sum of the IP, UDP,
L2TP, HDLC, and PPP header payloads.
• If the PPP MTU is configured using the mtu size statement, the PPP MTU is the lesser of the configured
MTU and the (interface MTU – 58 bytes) value.
When you configure an explicit MRU value by using the mru size statement, Junos OS determines the PPP
MRU value for PPP subscribers on LNS interfaces based on the following scenarios:
• If the MRU value is not configured for PPP subscribers on the LNS and if the proxy LCP options are
received from the L2TP access concentrator (LAC), the PPP MRU value offered in the LCP negotiation
is the lesser of the PPP MTU and the proxy MRU value. If the LCP options are not received, PPP MTU
is offered as MRU during LCP negotiation.
• If, however, the MRU value is configured for the PPP subscribers on the LNS, the PPP MRU is the lesser
of the configured MRU and the PPP MTU value. Further, if the proxy LCP options are received from the
LAC, the PPP MRU value sent during LCP negotiation is the lesser of the configured MRU or PPP MTU
and the proxy MRU value.
250
• For a negotiated INET MTU on a PPP link i.e PPP payload MTU ( IP header + data) excluding any Layer
2 overhead, the PPP MTU is set to the lesser of the PPP MTU and the received peer MRU value.
RELATED DOCUMENTATION
You can configure the maximum transmission unit (MTU) and maximum receive unit for Point-to-Point
Protocol (PPP) subscribers. This configuration is supported for the following PPP subscribers:
The MTU configuration specifies the maximum allowable data unit size (in bytes) that can be transmitted
over a PPP connection without fragmentation. This size excludes the lower-layer header size. With this
configuration, you can choose to either configure an explicit MTU value or use the MTU value configured
for the interface excluding the lower-layer header size.
The MRU configuration specifies the size of maximum receive unit (MRU) that the router uses during link
control protocol (LCP) negotiation for dynamic and static PPP subscribers and L2TP tunneled subscribers.
• (Optional) Configure the MTU and the MRU for dynamic PPP subscribers (includes dynamic PPPoE
and PPPoE over ATM subscribers).
• (Optional) Configure the MTU and the MRU for static PPP subscribers (includes PPP over ATM
subscribers).
251
• (Optional) Configure the MTU and the MRU for dynamic tunneled PPP subscribers for L2TP LNS.
• (Optional) Configure the MTU and the MRU for static tunneled PPP subscribers for L2TP LNS.
• Configure the MTU and the MRU for static and dynamic PPP subscribers associated with a group
profile.
RELATED DOCUMENTATION
CHAPTER 21
IN THIS CHAPTER
Evaluation Order for Matching Client Information in PPPoE Service Name Tables | 259
Configuring the Action Taken When the Client Request Includes an Empty Service Name Tag | 264
Assigning a Service to a Service Name Table and Configuring the Action Taken When the Client Request
Includes a Non-zero Service Name Tag | 266
Assigning an ACI/ARI Pair to a Service Name and Configuring the Action Taken When the Client Request
Includes ACI/ARI Information | 268
Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic PPPoE
Interface Creation | 270
Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name | 271
Reserving a Static PPPoE Interface for Exclusive Use by a PPPoE Client | 272
Example: Configuring a PPPoE Service Name Table for Dynamic Subscriber Interface Creation | 276
IN THIS SECTION
Interaction Among PPPoE Clients and Routers During the Discovery Stage | 254
Dynamic Profiles and Routing Instances in PPPoE Service Name Tables | 257
Limiting the subscriber sessions per AE or PFE Bundle in PPPoE Service Name Tables | 258
On an MX Series router acting as a remote access concentrator (AC), also referred to as a PPPoE server,
you can configure up to 32 PPPoE service name tables and assign the service name tables to PPPoE
underlying interfaces. A PPPoE service name table defines the set of services that the router can provide to
a PPPoE client. Service entries configured in a PPPoE service name table represent the service name tags
transmitted between the client and the router in a PPPoE control packet.
This overview covers the following topics to help you understand and configure PPPoE service name
tables:
Interaction Among PPPoE Clients and Routers During the Discovery Stage
In networks with mesh topologies, PPPoE clients are often connected to multiple PPPoE servers (remote
ACs). During the PPPoE discovery stage, a PPPoE client identifies the Ethernet MAC address of the remote
AC that can service its request, and establishes a unique PPPoE session identifier for a connection to that
AC.
The following steps describe, at a high level, how the PPPoE client and the remote AC (router) use the
PPPoE service name table to interact during the PPPoE discovery stage:
1. The PPPoE client broadcasts a PPPoE Active Discovery Initiation (PADI) control packet to all remote
ACs in the network to request that an AC support certain services.
The PADI packet must contain either, but not both, of the following:
• One and only one nonzero-length service name tag that represents a specific client service
• One and only one empty (zero-length) service name tag that represents an unspecified service
2. One or more remote ACs respond to the PADI packet by sending a PPPoE Active Discovery Offer
(PADO) packet to the client, indicating that the AC can service the client request.
To determine whether it can service a particular client request, the router matches the service name
tag received in the PADI packet against the service name tags configured in its service name table. If
a matching service name tag is found in the PPPoE service name table, the router sends the client a
PADO packet that includes the name of the AC from which it was sent. If no matching service name
255
tag is found in the PPPoE service name table, the router drops the PADI request and does not send a
PADO response to the client.
3. The PPPoE client sends a unicast PPPoE Active Discovery Request (PADR) packet to the AC to which
it wants to connect, based on the responses received in the PADO packets.
4. The selected AC sends a PPPoE Active Discovery Session (PADS) packet to establish the PPPoE
connection with the client.
A PPPoE service name table can include three types of service entries: named services, an empty service,
and an any service. For each service entry, you specify the action to be taken by the underlying interface
when the router receives a PADI packet containing the specified service name tag.
You can configure the following services and actions in a PPPoE service name table:
• Named service—Specifies a PPPoE client service that an AC can support. For example, you might configure
named services associated with different subscribers who log in to the PPPoE server, such as user1-service
or user2-service, or that correspond to different ISP service level agreements, such as premium and
standard. Each PPPoE service name table can include a maximum of 512 named service entries, excluding
empty and any service entries. A named service is associated with the terminate action by default.
• empty service—A service tag of zero length that represents an unspecified service. Each PPPoE service
name table includes one empty service. The empty service is associated with the terminate action by
default.
• any service—Acts as a default service for non-empty service entries that do not match the named service
entries or empty service entry configured in the PPPoE service name table. Each PPPoE service name
table includes one any service. The any service is useful when you want to match the agent circuit
identifier and agent remote identifier information for a PPPoE client, but do not care about the contents
of the service name tag transmitted in the control packet. The any service is associated with the drop
action by default.
• Action—Specifies the action taken by the underlying PPPoE interface assigned to the PPPoE service
name table on receipt of a PADI packet from the client containing a particular service request. You can
configure one of the following actions for the associated named service, empty service, any service, or
agent circuit identifier/agent remote identifier (ACI/ARI) pair in the PPPoE service name table on the
router:
• terminate—(Default) Directs the router to immediately respond to the PADI packet by sending the
client a PADO packet containing the name of the AC that can service the request. Named services,
empty services, and ACI/ARI pairs are associated with the terminate action by default. Configuring
the terminate action for a service enables you to more tightly control which PPPoE clients can access
and receive services from a particular PPPoE server.
256
• delay—Number of seconds that the PPPoE underlying interface waits after receiving a PADI packet
from the client before sending a PADO packet in response. In networks with mesh topologies, you
might want to designate a primary PPPoE server and a backup PPPoE server for handling a particular
service request. In such a scenario, you can configure a delay for the associated service entry on the
backup PPPoE server to allow sufficient time for the primary PPPoE server to respond to the client
with a PADO packet. If the primary server does not send the PADO packet within the delay period
configured on the backup server, then the backup server sends the PADO packet after the delay period
expires.
• drop—Directs the router to drop (ignore) a PADI packet containing the specified service name tag
when received from a PPPoE client, which effectively denies the client’s request to provide the
associated service. The any service is associated with the drop action by default. To prohibit the router
from responding to PADI packets that contain empty or any service name tags, you can configure the
drop action for the empty or any service. You can also use the drop action in combination with ACI/ARI
pairs to accept specific service name tags only from specific subscribers, as described in the following
information about ACI/ARI pairs.
To specify agent circuit identifier (ACI) and agent remote identifier (ARI) information for a named service,
empty service, or any service in a PPPoE service name table, you can configure an ACI/ARI pair. An ACI/ARI
pair contains an agent circuit ID string that identifies the DSLAM interface that initiated the service request,
and an agent remote ID string that identifies the subscriber on the DSLAM interface that initiated the
service request. You can think of an ACI/ARI pair as the representation of one or more PPPoE clients
accessing the router by means of the PPPoE service name table.
ACI/ARI specifications support the use of wildcard characters in certain formats. You can configure a
combined maximum of 8000 ACI/ARI pairs, both with and without wildcards, per PPPoE service name
table. You can distribute the ACI/ARI pairs in any combination among the service entries in the service
name table.
You must specify the action—terminate, delay, or drop—taken by the underlying PPPoE interface when
it receives a client request containing vendor-specific ACI/ARI information that matches the ACI/ARI
information configured in the PPPoE service name table on the router. An ACI/ARI pair is associated with
the terminate action by default.
For example, assume that for the user1-service named service, you configure the drop action for the
service and the terminate action for the associated ACI/ARI pairs. In this case, the ACI/ARI pairs identify
the DSLAM interfaces and associated subscribers authorized to access the PPPoE server. Using this
configuration causes the router to drop PADI packets containing the user1-service tag unless the PADI
packet also contains vendor-specific ACI/ARI information that matches the subscribers identified in one
or more of the ACI/ARI pairs. For PADI packets containing matching ACI/ARI information, the router sends
an immediate PADO response to the client indicating that it can provide the requested service for the
specified subscribers.
257
You can also associate a PPPoE dynamic profile, routing instance, and static PPPoE interface with an
ACI/ARI pair.
You can associate a previously configured PPPoE dynamic profile with a named service, empty service, or
any service in the PPPoE service name table, or with an ACI/ARI pair defined for these services. The router
uses the attributes defined in the profile to instantiate a dynamic PPPoE subscriber interface based on the
service name, ACI, and ARI information provided by the PPPoE client during PPPoE negotiation. The
dynamic profile configured for a service entry or ACI/ARI pair in a PPPoE service name table overrides
the dynamic profile assigned to the PPPoE underlying interface on which the dynamic PPPoE interface is
created.
To specify the routing instance in which to instantiate the dynamic PPPoE interface, you can associate a
previously configured routing instance with a named service, empty service, or any service in the PPPoE
service name table, or with an ACI/ARI pair defined for these services. Like dynamic profiles configured
for service entries or ACI/ARI pairs, the routing instance configured for the PPPoE service name table
overrides the routing instance assigned to the PPPoE underlying interface.
For information about configuring the PPPoE service name table to create a dynamic PPPoE subscriber
interface, see “Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for
Dynamic PPPoE Interface Creation” on page 270.
To limit the number of PPPoE client sessions that can use a particular service entry in the PPPoE service
name table, you can configure the maximum number of active PPPoE sessions using either
dynamically-created or statically-created PPPoE interfaces that the router can establish with a particular
named service, empty service, or any service. (You cannot configure the maximum sessions limit for an
ACI/ARI pair.) The maximum sessions limit must be in the range 1 through the platform-specific maximum
PPPoE sessions supported for your routing platform. The router maintains a count of active PPPoE sessions
for each service entry to determine when the maximum sessions limit has been reached.
The router uses the maximum sessions value for a service entry in the PPPoE service name table in
conjunction with both of the following:
• The maximum sessions (max-sessions) value configured for the PPPoE underlying interface
If your configuration exceeds either of these maximum session limits, the router cannot establish the
PPPoE session.
258
To reserve a previously configured static PPPoE interface for use only by the PPPoE client with matching
ACI/ARI information, you can specify a single static PPPoE interface for each ACI/ARI pair defined for a
named service entry, empty service entry, or any service entry in a PPPoE service name table. (You cannot
configure a static interface for a service entry that does not have an ACI/ARI pair defined.) The static
PPPoE interface associated with an ACI/ARI pair takes precedence over the general pool of static PPPoE
interfaces associated with the PPPoE underlying interface configured on the router.
When you configure a static interface in the PPPoE service name table, make sure there is a one-to-one
correspondence between the PPPoE client and the static interface. For example, if two clients have identical
ACI/ARI information that matches the information in the PPPoE service name table, the router reserves
the static interface for exclusive use by the first client that logs in to the router. As a result, the router
prevents the second client from logging in.
NOTE: You cannot configure a static interface for an ACI/ARI pair already configured with a
dynamic profile and routing instance. Conversely, you cannot configure a dynamic profile and
routing instance for an ACI/ARI pair already configured with a static interface.
By default, the advertisement of named services in PADO control packets sent by the router to the PPPoE
client is disabled. You can enable advertisement of named services in the PADO packet as a global option
when you configure the PPPoE protocol on the router. Configuring PADO advertisement notifies PPPoE
clients of the services that the router (AC) can offer.
If you enable advertisement of named services in PADO packets, make sure the number and length of all
advertised service entries does not exceed the maximum transmission unit (MTU) size supported by the
PPPoE underlying interface.
Limiting the subscriber sessions per AE or PFE Bundle in PPPoE Service Name Tables
The PPPoE Service-Name table functionality may be used to limit the number of PPPoE subscriber sessions
per PFE or AE bundle. This is accomplished by configuring all PPPoE underlying VLAN interfaces over a
specific PFE or AE bundle with a single Service-Name table. This Service-Name table should contain only
the service “any” with a max-sessions value equal to the PPPoE subscriber session limit for the PFE or AE
bundle. The each PFE or AE bundle must have its own unique Service-Name table to ensure that PPPoE
subscribers from other PFE or AE bundles are not incorrectly counted against a PFE or AE-specific session
limit.
259
To configure a service-name table for PPPoE sessions on underlying VLAN interfaces to limit the number
of subscriber sessions per PFE or AFE bundle, include the set service-name-table <PFE/AE-table-name>
service any max-sessions <PPPoE-subscriber-limit> statement at the [edit protocols pppoe] hierarchy
level.
RELATED DOCUMENTATION
Evaluation Order for Matching Client Information in PPPoE Service Name Tables | 259
Benefits of Configuring PPPoE Service Name Tables | 260
Configuring PPPoE Service Name Tables | 262
Example: Configuring a PPPoE Service Name Table | 273
Configuring Dynamic PPPoE Subscriber Interfaces | 192
PPPoE Overview
When the router receives a service request from a PPPoE client, it evaluates the entries configured in the
PPPoE service name table to find a match for the client’s ACI/ARI information so it can take the appropriate
action.
1. The router evaluates the ACI/ARI information configured for the any service entry, and ignores the
contents of the service name tag transmitted by the client.
2. If no match is found for the client information, the router evaluates the ACI/ARI information for the
empty service entry and the named service entries. If an ACI/ARI pair is not configured for these service
entries, the router evaluates the other attributes configured for the empty service and named services.
3. If there is still no match for the client information, the router evaluates the other attributes configured
for the any service entry, and ignores both the ACI/ARI information for the any service and the contents
of the service name tag transmitted by the client. If the any service is configured for the default action,
drop, the router drops the PADR packet. If the any service is configured for a nondefault action
(terminate or delay), the router evaluates the other attributes configured for the any service.
RELATED DOCUMENTATION
260
This topic describes the benefits of configuring PPPoE service name tables.
• Enables support for multiple services requested by PPPoE clients, and configuration of an action for the
underlying PPPoE interface to take (delay, drop, or terminate) upon receipt of a PPPoE Active Discovery
Initiation (PADI) packet requesting that service.
• Provides tighter control over which PPPoE clients can log in to and receive services from a particular
PPPoE server.
• Provides load balancing across a set of remote access concentrators (ACs) in a mesh topology by enabling
you to configure agent circuit identifier/agent remote identifier (ACI/ARI) pairs for named, empty, and
any service entries to specify the appropriate AC to receive and service a particular PPPoE client request.
• Offers a more targeted approach to configuration of PPPoE sessions based on the service name and
ACI/ARI information provided by the PPPoE client during PPPoE negotiation.
• Supports creation of dynamic PPPoE subscriber interfaces in a specified routing instance based on
configuration of a service entry or ACI/ARI pair in the PPPoE service name table.
• Enables you to reserve a specified static PPPoE interface for use only by the PPPoE client with matching
ACI/ARI information.
• Enables you to specify the maximum number of PPPoE client sessions that can use a particular service
entry in the PPPoE service name table.
• Provides redundancy across a set of remote ACs in a mesh topology by enabling you to configure a
primary AC and a backup AC for handling a specific service request from a PPPoE client.
For example, on the primary AC for handling a client service, you might configure the terminate action
for the associated service to direct the primary AC to immediately send a PPPoE Active Discovery Offer
(PADO) packet in response to a PADI packet containing that service name tag. On the backup AC for
the client service, you might configure the delay action for the associated service to specify the number
of seconds the backup AC waits after receiving a PADI packet from the client before sending a PADO
261
packet in response. If the primary AC does not send a PADO packet to the client within the delay period
configured on the backup AC, then the backup AC sends the PADO packet after the delay period expires.
RELATED DOCUMENTATION
You can create up to 32 PPPoE service name tables on the router. You can optionally create named services
and add them to a service name table. By default, the empty service and the any service are present in
each service name table.
A named service specifies a PPPoE client service that the router, functioning as an access concentrator or
PPPoE server, can support. The empty service is a service tag of zero length that represents an unspecified
service. The any service acts as a default service for non-empty service entries that do not match the
named or empty service entries configured in the PPPoE service name table. Named services and the
empty service are associated with the terminate action by default, and the any service is associated with
the drop action by default.
RELATED DOCUMENTATION
See “Configuring the Action Taken When the Client Request Includes an Empty Service Name Tag” on
page 264.
See “Configuring the Action Taken for the Any Service” on page 265.
4. Assign a named service to the service name table and optionally configure the action taken for the
specified service name.
See “Assigning a Service to a Service Name Table and Configuring the Action Taken When the Client
Request Includes a Non-zero Service Name Tag” on page 266.
5. (Optional) Configure the action taken for an ACI/ARI pair associated with a service.
See “Assigning an ACI/ARI Pair to a Service Name and Configuring the Action Taken When the Client
Request Includes ACI/ARI Information” on page 268.
6. (Optional) Assign a dynamic profile and routing instance to a service name or ACI/ARI pair to instantiate
a dynamic PPPoE subscriber interface.
See “Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic
PPPoE Interface Creation” on page 270.
7. (Optional) Limit the number of active PPPoE sessions that the router can establish with the specified
service.
See “Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name” on
page 271.
8. (Optional) Assign a static PPPoE interface to an ACI/ARI pair to reserve the interface for exclusive use
by the PPPoE client with matching ACI/ARI information.
See “Reserving a Static PPPoE Interface for Exclusive Use by a PPPoE Client” on page 272.
263
9. (Optional) Enable advertisement of named services in the PADO control packet sent by the router to
the client.
See “Enabling Advertisement of Named Services in PADO Control Packets” on page 283.
See “Assigning a Service Name Table to a PPPoE Underlying Interface” on page 263.
RELATED DOCUMENTATION
You must assign the PPPoE service name table to a PPPoE underlying interface.
See Setting the Appropriate Encapsulation on the PPPoE Interface in Configuring PPPoE.
RELATED DOCUMENTATION
Configuring the Action Taken When the Client Request Includes an Empty
Service Name Tag
You can configure the action taken by the PPPoE underlying interface when it receives a PADI packet that
includes a zero-length (empty) service name tag. The empty service is present by default in every PPPoE
service name table.
To indicate that it can service the client request, the interface returns a PADO packet in response to the
PADI packet. By default, the interface immediately responds to the request; this is the terminate action.
Alternatively, you can configure the drop action to ignore (drop) the PADI packet, or the delay action to
set a delay between receipt of the PADI packet and transmission of the PADO packet.
(Optional) To configure the action taken for the empty service in response to a PADI packet from a PPPoE
client:
You can also accomplish the following optional tasks when you configure the empty service:
• Specify the agent circuit identifier (ACI) and agent remote identifier (ARI) information to determines the
action taken by the PPPoE underlying interface when it receives a PADI packet with matching ACI/ARI
information.
• Specify a dynamic profile and routing instance with which the router instantiates a dynamic PPPoE
subscriber interface.
• Limit the number of active PPPoE sessions that the router can establish with the empty service.
RELATED DOCUMENTATION
Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic
PPPoE Interface Creation | 270
Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name | 271
PPPoE Overview
The any service acts as a default service for service name tags transmitted by the client that do not match
any of the service entries configured in the PPPoE service name table on the router. By configuring an
action for the any service, you specify the action taken by the PPPoE underlying interface when it receives
a PADI control packet from a client that includes a non-empty service name tag that does not match any
of the named service entries or empty service entry in the PPPoE service name table.
Each PPPoE service name table includes one any service entry associated by default with the drop action.
The drop action ignores a PADI packet containing a nonmatching service name tag. Alternatively, you can
configure the terminate action to immediately respond to the PADI packet with a PADO packet, or the
delay action to specify a delay between receipt of the PADI packet and transmission of the PADO packet.
To configure the action taken for the any service in response to a PADI packet from a PPPoE client:
You can also accomplish the following optional tasks when you configure the any service:
• Specify the agent circuit identifier (ACI) and agent remote identifier (ARI) information to determine the
action taken by the PPPoE underlying interface when it receives a PADI packet with matching ACI/ARI
information.
• Specify a dynamic profile and routing instance with which the router instantiates a dynamic PPPoE
subscriber interface.
• Limit the number of active PPPoE sessions that the router can establish with the any service.
RELATED DOCUMENTATION
Assigning an ACI/ARI Pair to a Service Name and Configuring the Action Taken When the Client
Request Includes ACI/ARI Information | 268
Assigning a Dynamic Profile and Routing Instance to a Service Name or ACI/ARI Pair for Dynamic
PPPoE Interface Creation | 270
Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name | 271
PPPoE Overview
You can configure a maximum of 512 named service entries, excluding empty and any service entries,
across all PPPoE service name tables on the router. A named service specifies a PPPoE client service that
the router, functioning as an access concentrator or PPPoE server, can support. You can optionally configure
the action taken by the PPPoE underlying interface when it receives a PADI packet that includes a matching
named service (service name tag).
To indicate that it can service the client request, the interface returns a PADO packet in response to the
PADI packet. By default, the interface immediately responds to the request; this is the terminate action.
Alternatively, you can configure the drop action to ignore (drop) the PADI packet, or the delay action to
set a delay between receipt of the PADI packet and transmission of the PADO packet.
(Optional) To configure a named service for a PPPoE service name table, do one of the following:
• Assign a service name to the table. The terminate action is applied to the service by default.
• Specify the action taken for a service in response to a PADI packet from a PPPoE client.
You can also accomplish the following optional tasks when you configure a named service:
• Specify the agent circuit identifier (ACI) and agent remote identifier (ARI) information to determines the
action taken by the PPPoE underlying interface when it receives a PADI packet with matching ACI/ARI
information.
• Specify a dynamic profile and routing instance with which the router instantiates a dynamic PPPoE
subscriber interface.
267
• Limit the number of active PPPoE sessions that the router can establish with the specified named service.
RELATED DOCUMENTATION
You can configure up to 8000 agent circuit identifier/agent remote identifier (ACI/ARI) pairs per PPPoE
service name table, distributed in any combination among the named, empty, and any service entries in
the service name table. You can optionally configure the action taken by the PPPoE underlying interface
when it receives a PADI packet that includes a service name tag and the vendor-specific tag with ACI/ARI
information that matches the ACI/ARI pair that you specify.
You can use an asterisk (*) as a wildcard character to match ACI/ARI pairs, the ACI alone, or the ARI alone.
The asterisk can be placed only at the beginning, the end, or both the beginning and end of the identifier
string. You can also specify an asterisk alone for either the ACI or the ARI. You cannot specify only an
asterisk for both the ACI and the ARI. When you specify a single asterisk as the identifier, that identifier
is ignored in the PADI packet.
For example, suppose you care about matching only the ACI and do not care what value the ARI has in
the PADI packet, or even whether the packet contains an ARI value. In this case you can set the
remote-id-string to a single asterisk. Then the interface ignores the ARI received in the packet and the
interface takes action based only on matching the specified ACI.
To indicate that it can service the client request, the interface returns a PADO packet in response to the
PADI packet. By default, the interface immediately responds to the request; this is the terminate action.
Alternatively, you can configure the drop action to ignore (drop) the PADI packet, or the delay action to
set a delay between receipt of the PADI packet and transmission of the PADO packet.
To configure an ACI/ARI pair for a named, empty, or any service, do one of the following:
• Assign an ACI/ARI pair to the service name. The terminate action is applied to the pair by default.
• Specify the action taken for the ACI/ARI pair in response to a PADI packet from a PPPoE client.
In this example, an ACI/ARI pair and the delay action are configured for the any service. Configuring an
ACI/ARI pair for the any service is useful when you want to match the agent circuit identifier and agent
remote identifier information for a specific PPPoE client, but do not care about the contents of the
service name tag transmitted by the client in the PADI packet.
269
You can also accomplish the following optional tasks when you configure an ACI/ARI pair:
• Specify a dynamic profile and routing instance with which the router instantiates a dynamic PPPoE
subscriber interface.
• Reserve a specified static PPPoE interface for exclusive use by the PPPoE client with match ACI/ARI
information.
RELATED DOCUMENTATION
You can create a dynamic PPPoE subscriber interface based on the service name, agent circuit identifier
(ACI), and agent remote identifier (ARI) information provided by the PPPoE client during PPPoE negotiation.
To do so, you assign a PPPoE dynamic profile to a named service, empty service, or any service entry in
a PPPoE service name table, or to an ACI/ARI pair defined for these services.
Similarly, to specify the routing instance in which to instantiate the dynamic PPPoE subscriber interface,
you can assign a routing instance to a named service, empty service, or any service in a PPPoE service
name table, or to an ACI/ARI pair defined for these services.
Observe the following configuration guidelines when you assign a dynamic profile and routing instance
to a PPPoE service name table to create a dynamic PPPoE subscriber interface:
• The dynamic profile or routing instance assigned to the PPPoE service name table overrides the dynamic
profile or routing instance assigned to the PPPoE underlying interface on which the dynamic subscriber
interface is created.
• You cannot configure a dynamic profile or routing instance for an ACI/ARI pair already configured with
a static interface (by using the static-interface statement). Conversely, you cannot configure a static
interface for an ACI/ARI pair already configured with a dynamic profile or routing instance.
To configure a basic PPPoE dynamic profile, see “Configuring a PPPoE Dynamic Profile” on page 193.
2. Configure the routing instance in which you want the router to instantiate the dynamic profile.
For information about configuring routing instances, see Routing Instances Overview.
To create a dynamic PPPoE subscriber interface based on the service name and, optionally, associated
ACI/ARI pair configured in a PPPoE service name table, do one of the following:
• Assign a previously configured dynamic profile and routing instance to a named, empty, or any service.
• Assign a previously configured dynamic profile and routing instance to the ACI/ARI pair defined for a
named, empty, or any service.
271
RELATED DOCUMENTATION
Example: Configuring a PPPoE Service Name Table for Dynamic Subscriber Interface Creation | 276
Subscriber Interfaces and PPPoE Overview | 185
Configuring Dynamic PPPoE Subscriber Interfaces | 192
Configuring PPPoE Service Name Tables | 262
To limit the number of PPPoE client sessions that can use a particular service entry in the PPPoE service
name table, you can configure the maximum number of PPPoE sessions using static or dynamic PPPoE
interfaces that the router can establish with the specified named service, empty service, or any service.
You cannot configure a maximum sessions limit for an ACI/ARI pair in the service name table.
The maximum sessions limit must be in the range 1 through the platform-specific maximum PPPoE sessions
supported for your routing platform. The router maintains a count of active PPPoE sessions for each service
entry to determine when the maximum sessions limit has been reached.
To limit the number of PPPoE client sessions for a particular named, empty, or any service:
RELATED DOCUMENTATION
To reserve a static PPPoE interface for exclusive use by the PPPoE client with matching agent circuit
identifier/agent remote identifier (ACI/ARI) information, you can assign a static PPPoE interface to an
ACI/ARI pair defined for a named service entry, empty service entry, or any service entry in a PPPoE
service name table. You cannot assign a static PPPoE interface directly to a service entry that does not
have an ACI/ARI pair defined.
Observe the following guidelines when you configure a static PPPoE interface for an ACI/ARI pair:
• You can specify only one static PPPoE interface per ACI/ARI pair.
• If the ACI/ARI pair represents an individual PPPoE client, make sure there is a one-to-one correspondence
between the client and the static PPPoE interface.
• The static interface associated with the ACI/ARI pair takes precedence over the general pool of static
interfaces associated with the PPPoE underlying interface.
• You cannot configure a static interface for an ACI/ARI pair already configured with a dynamic profile
and routing instance. Conversely, you cannot configure a dynamic profile and routing instance for an
ACI/ARI pair already configured with a static interface.
To reserve a static PPPoE interface for exclusive use by the PPPoE client with matching ACI/ARI information:
• Assign a previously configured static PPPoE interface to the ACI/ARI pair defined for a named, empty,
or any service entry:
RELATED DOCUMENTATION
This example shows how you can configure a PPPoE service name table on an MX Series router with
service entries that correspond to different client services. By configuring the appropriate actions (delay,
terminate, or drop) and agent circuit identifier/agent remote identifier (ACI/ARI) pairs for the service
entries, you can provide load balancing and redundancy across a set of remote access concentrators (ACs)
in a mesh topology, and determine how best to allocate service requests from PPPoE clients to the servers
in your network.
In this example, the PPPoE service name table, Table1, contains the following service entries:
To configure a PPPoE service name table with service entries that correspond to different subscriber
services:
1. Create the PPPoE service name table and define the services and associated actions.
This example creates a PPPoE service name table named Table1 with three service entries, as follows:
• The empty service is configured with the drop action. This action prohibits the router (AC) from
responding to PADI packets from the client that contain empty service name tags.
• The user1-service named service is configured with both the terminate action, and two ACI/ARI
(agent-specifier) pairs:
274
• The terminate action directs the router to immediately respond to PADI packets from the client
that contain the user1-service tag, and is the default action for named services.
• The 10-second delay configured for each ACI/ARI pair applies only to PADI packets from the client
that contains a vendor-specific tag with matching ACI and ARI information. In this example,
configuring the delay action indicates that the east or west server is considered the backup AC for
handling these client requests, and that you expect an AC other than east or west to handle the
request as the primary server. If the primary AC does not respond to the client with a PADO packet
within 10 seconds, then the east or west backup AC sends the PADO packet after the 10-second
delay expires.
• The user2-service named service is configured with a 20-second delay, indicating that you expect
an AC other than the one on which this PPPoE service name table is configured to be the primary
AC for handling this client request. If the primary AC does not respond to the client with a PADO
packet within 20 seconds, then the backup AC (that is, the router on which you are configuring the
service name table) sends the PADO packet after the 20-second delay expires.
2. Assign the PPPoE service name table to a PPPoE underlying interface configured with PPPoE
encapsulation.
[edit interfaces]
ge-2/0/3 {
vlan-tagging;
unit 0 {
vlan-id 100;
encapsulation ppp-over-ethernet;
pppoe-underlying-options {
service-name-table Table1;
}
}
}
ACI: west*
ARI: svl*
ACI/ARI Action: Delay 10 seconds
4. (Optional) Verify whether the PPPoE service name table has been properly assigned to the underlying
PPPoE interface, and whether packet transfer between the router (AC) and PPPoE client is working
correctly.
ge-2/0/3.0 Index 72
State: Static, Dynamic Profile: None,
Max Sessions: 4000, Active Sessions: 2,
Service Name Table: Table1, Duplicate Protection: Off,
AC Name: east
PacketType Sent Received
PADI 0 2
PADO 2 0
PADR 0 2
PADS 2 0
PADT 0 1
Service name error 0 0
AC system error 0 0
Generic error 0 0
Malformed packets 0 0
Unknown packets 0 0
• The Service Name Table field displays the name of the correct PPPoE service name table. This field
displays none if no service name table has been associated with the specified interface.
• The Sent and Received values for the Service name error field are 0 (zero). For example, a nonzero
value in the Received field for Service name error indicates that there are errors in the control packets
received from PPPoE clients, such as a PADI packet that does not contain a service name tag.
RELATED DOCUMENTATION
This example shows how to configure a PPPoE service name table to create a dynamic PPPoE subscriber
interface based on the service name, agent circuit identifier (ACI), and agent remote identifier (ARI)
information provided by PPPoE clients during PPPoE negotiation.
In this example, PPPoE service name table TableDynamicPPPoE includes an any service entry, empty
service entry, and two named service entries: Premium and Standard. The PPPoE underlying interfaces
configured for TableDynamicPPPoE are ge-2/0/0.1 and ge-2/0/0.2. Only ge-2/0/0.1 is configured for
dynamic profile assignment and creation of dynamic PPPoE subscriber interfaces.
Following the configuration example, Table 11 on page 278 explains how the router evaluates the entries
in TableDynamicPPPoE to create a dynamic PPPoE subscriber interface in a specified routing instance for
each of several sample clients.
To configure a PPPoE service name table to create dynamic PPPoE subscriber interfaces:
protocols {
pppoe {
service-name-tables TableDynamicPPPoE {
service any {
terminate;
max-sessions 100;
dynamic-profile AnyProfile;
agent-specifier {
aci "broadway-ge-1/0/1.0" ari "london" {
terminate;
dynamic-profile LondonProfile;
routing-instance LondonRI;
}
aci "groton-ge-4/0/3.32" ari "paris" {
delay 5;
dynamic-profile ParisProfile;
routing-instance ParisRI;
}
277
}
}
service empty {
drop;
agent-specifier {
aci "dunstable-ge-1/0/0.1" ari "kanata" {
dynamic-profile BasicPppoeProfile;
delay 10;
}
}
}
service Premium {
terminate;
dynamic-profile PremiumProfile;
}
service Standard {
terminate;
max-sessions 10;
dynamic-profile StandardProfile;
agent-specifier {
aci "dunstable-ge-1/0/0.1" ari "kanata" {
dynamic-profile BasicPppoeProfile;
delay 10;
}
}
}
}
}
}
2. Configure the PPPoE underlying interface for the service name table.
interfaces {
ge-2/0/0 {
vlan-tagging;
unit 1 {
vlan-id 1;
pppoe-underlying-options {
dynamic-profile BasicPppoeProfile;
service-name-table TableDynamicPPPoE;
}
}
unit 2 {
278
vlan-id 2;
pppoe-underlying-options {
service-name-table TableDynamicPPPoE;
}
}
}
}
Table 11 on page 278 lists the service name, ACI value, and ARI value provided in several sample PPPoE
client requests, and the name of the PPPoE underlying interface on which the router received each client
request. The Results column describes the dynamic PPPoE subscriber interface created by the router based
on both of the following:
• The values received from each PPPoE client during PPPoE negotiation
• The sequence in which the router evaluates the entries configured in the PPPoE service name table to
find a match for the client’s service name and ACI/ARI information, as described in “Evaluation Order
for Matching Client Information in PPPoE Service Name Tables” on page 259
Table 11: Dynamic PPPoE Subscriber Interface Creation Based on PPPoE Client Request Values
Receiving
PPPoE Service Underlying
Client Name ACI Value ARI Value Interface Results
Table 11: Dynamic PPPoE Subscriber Interface Creation Based on PPPoE Client Request Values (continued)
Receiving
PPPoE Service Underlying
Client Name ACI Value ARI Value Interface Results
RELATED DOCUMENTATION
Evaluation Order for Matching Client Information in PPPoE Service Name Tables | 259
Subscriber Interfaces and PPPoE Overview | 185
Understanding PPPoE Service Name Tables | 253
Configuring PPPoE Service Name Tables | 262
280
Symptoms: The symptom of a service name table misconfiguration is that the client connection process
stops at the negotiation stage and the PADI packets are ignored. You can use the show pppoe statistics
command to examine the PPPoE packet counts for a problem.
When the service name table is properly configured, packets sent and received increment symmetrically.
The following sample output shows a PADO sent count equal to the PADI received count, and PADS sent
count equal to the PADR received count. This output indicates that the PPPoE negotiation is proceeding
successfully and that the service name table is not misconfigured.
When the service name table is misconfigured, the output of the show pppoe statistics command indicates
that the number of PADI packets received on the underlying interface is increasing, but the number of
PADO packets sent remains at zero. The following sample output shows a PADI count of 100 and a PADO
count of 0.
PADI 0 100
PADO 0 0
PADR 0 0
PADS 0 0
PADT 0 0
Service name error 0 0
AC system error 0 0
Generic error 0 0
Malformed packets 0 0
Unknown packets 0 0
When you believe a misconfiguration exists, use the monitor traffic command on the underlying interface
to determine which service name is being requested by the PPPoE client. The following sample output
shows that the client is requesting Service1 in the service name tag.
You can then use the show pppoe service-name-tables command to determine whether you have misspelled
the name of the service or perhaps not configured the service at all.
Cause
Typical misconfigurations appear in the service name table configurations.
Solution
Use the appropriate statements to correct the misconfiguration.
RELATED DOCUMENTATION
CHAPTER 22
IN THIS CHAPTER
Disabling the Sending of PPPoE Access Concentrator Tags in PADS Packets | 284
You can enable advertisement of named services in PADO control packets sent by the router to the PPPoE
client to indicate the services that the router can offer. By default, advertisement of named services in
PADO packets is disabled. You can enable PADO advertisement as a global option on the router when
you configure the PPPoE protocol.
NOTE: Make sure the combined number and length of all named services advertised in the
PADO packet does not exceed the MTU size of the PPPoE underlying interface.
RELATED DOCUMENTATION
By default, a router that functions as an access concentrator (AC) sends the AC-Name and AC-Cookie
tags, along with the Service-Name, Host-Uniq, Relay-Session-Id, and PPP-Max-Payload tags, in the PPPoE
Active Discovery Session (PADS) packet when it confirms a session with a PPPoE client. The AC-Name
and AC-Cookie tags are defined as follows:
If it is necessary for compatibility with your network equipment, you can prevent the router from sending
the AC-Name and AC-Cookie tags in the PADS packet.
To prevent the router from transmitting the AC-Name and AC-Cookie tags in the PADS messages:
• Specify that PADS messages with AC-Name and AC-Cookie tags are not sent.
The no-send-pads-ac-info statement affects PADS packets sent only on PPPoE interfaces configured
on the router after you configure this statement. It has no effect on PADS packets sent on previously
created PPPoE interfaces.
RELATED DOCUMENTATION
PPPoE Overview
This topic describes how to avoid a situation where certain CPEs respond inappropriately to normal router
behavior.
During PPPoE session negotiation, the router returns PADS messages in response to PADR messages
when it accepts or rejects the PPPoE session. The router adds an error tag to the PADS message when it
detects a problem.
AC-System-Error is one such tag. This tag is inserted when the router imposes automatic throttling in
response to excessive CPU consumption, excessive subscriber connections, or physical interfaces cycling
up and down.
285
When the CPE receives a PADS message with this tag, the typical behavior is to retry sending PADR
messages to the router or to restart session negotiation by sending PADI messages. However, some CPEs
may respond inappropriately with the result that their subscribers are never connected until the CPE is
rebooted.
To avoid this situation when such CPEs have access to your network, you can configure the router to
silently discard PADR messages in situations where the PADS would include the AC-System-Error tag.
The consequence is that the CPE resends PADR messages. When the conditions that result in the
AC-System-Error tag are no longer present, the router once again evaluates PADR packets to determine
whether to accept or reject the session.
• Specify that PADS messages with AC-System-Error tags are not sent.
RELATED DOCUMENTATION
PPPoE Overview
287
CHAPTER 23
IN THIS CHAPTER
Action
• To display information about the properties of all PPPoE underlying interfaces associated with a dynamic
PPPoE profile:
• To display information about the PPPoE properties of a specified underlying interface associated with
a dynamic PPPoE profile:
• To display session-specific information about PPPoE interfaces, including whether the interface was
dynamically created or statically created:
• To display information for a specified PPPoE service name table, including the assigned dynamic profile
and routing instance, if configured:
• To display information for all active PPPoE sessions established for a specified service name:
• To display information for all active PPPoE sessions established for a specified agent circuit identifier
(ACI) or agent remote identifier (ARI) string:
• To display PPPoE control packet statistics for a specified PPPoE underlying interface:
• To clear (reset) PPPoE control packet statistics for all PPPoE sessions:
• To clear (reset) PPPoE control packet statistics for a specified underlying Ethernet interface:
• To display summary information about PPPoE subscriber sessions currently undergoing lockout or
currently in a lockout grace period on all PPPoE underlying interfaces:
• To display summary information about PPPoE subscriber sessions currently undergoing lockout or
currently in a lockout grace period on the specified PPPoE underlying interface:
• To display information about the lockout condition or lockout grace period for all PPPoE subscriber
sessions associated with the specified ATM encapsulation type identifiers:
289
user@host> show pppoe lockout atm-identifier device-name device-name vpi vpi-identifier vci vci-identifier
• To display information about the lockout condition or lockout grace period for all PPPoE subscriber
sessions associated with the specified VLAN encapsulation type identifiers:
user@host> show pppoe lockout vlan-identifier device-name device-name svlan-id svlan-identifier vlan-id
vlan-identifier
RELATED DOCUMENTATION
CLI Explorer
4 PART
Configuring Inline Service Interfaces for LNS and PPPoE Subscribers | 315
CHAPTER 24
IN THIS CHAPTER
Supported Features for MLPPP LNS and PPPoE Subscribers on the MX Series | 299
Mixed Mode Support for MLPPP and PPP Subscribers Overview | 300
MLPPP Overview
IN THIS SECTION
Multilink Point-to-Point Protocol (MLPPP) aggregates multiple PPP physical links into a single virtual
connection, or logical bundle. More specifically, MLPPP bundles multiple link-layer channels into a single
network-layer channel. Peers negotiate MLPPP during the initial phase of Link Control Protocol (LCP)
option negotiation. Each router indicates that it is multilink capable by sending the multilink option as part
of its initial LCP configuration request.
An MLPPP bundle can consist of multiple physical links of the same type—such as multiple asynchronous
lines—or can consist of physical links of different types—such as leased synchronous lines and dial-up
asynchronous lines.
Packets received with an MLPPP header are subject to fragmentation, reassembly, and sequencing. Packets
received without the MLPPP header cannot be sequenced and can be delivered only on a first-come,
first-served basis.
294
MLPPP is used to bundle multiple low speed links to create a higher bandwidth pipe such that the combined
bandwidth is available to traffics from all links, and to support link fragmentation and interleaving (LFI)
support on the bundle to reduce the transmission delay of high priority packets. LFI interleaves voice
packets with fragmented data packets to ensure timely delivery of voice packets. Figure 5 on page 294
shows how incoming packets are distributed and aggregated into an MLPPP bundle.
Because MLPPP aggregates multiple link-layer channels onto a single network-layer IP interface, protocol
layering within the router is different than for non-multilink PPP.
Multilink PPP adds the multilink maximum received reconstructed unit (MRRU) option for LCP negotiation.
The MRRU option has two functions:
• It informs the other end of the link the maximum reassembled size of the PPP packet payload that the
router can receive.
295
When you enable multilink on your router, the router includes the MRRU option in LCP negotiation with
the default value set to 1500 bytes (user-configurable option) for PPP. If the remote system rejects this
option, the local system determines that the remote system does not support multilink PPP and it terminates
the link without negotiation.
NOTE: The router does not bring up a link if the MRU value received from a peer device differs
from the MRRU value received from the peer.
Release Description
14.1 MLPPP for subscriber access is supported starting in Junos OS Release 14.1.
RELATED DOCUMENTATION
IN THIS SECTION
Starting in Junos OS Release 14.1, multilink PPP (MLPPP) support is provided to LNS (L2TP network server)
and PPPoE (Point-to-Point Protocol over Ethernet) terminated and tunneled subscribers running on MX
Series with access-facing MPC2s.
For customers with both MLPPP and single link PPP clients, the router needs to determine client capability
during link control protocol (LCP) negotiation and support either multilink or single link access modules
accordingly (mixed mode support).
MLPPP running on the MX Series provides link fragmentation and interleaving (LFI) support for a single-link
bundle. Each bundle contains a single member link only; configuration of multiple member links belonging
to the same bundle are rejected. However, LFI enables the single subscriber session to send small, high
priority packets interleaving with large packets without introducing unacceptable transmission delay for
high priority small packets. LFI interleaves voice packets with fragmented data packets to ensure timely
delivery of voice packets and to guarantee voice quality.
Customers with lower bandwidth subscribers benefit from the MLPPP LFI support. With the traditional
non-MLPPP application, the CPE (customer premises equipment) device performs the fragmentation prior
to the PPP encapsulation and then relies on the application at the far end to perform the reassembly. With
the MLPPP solution, the burden to reassemble the packets on the customer servers and the far-end
application is removed, and control is given to the service provider for fragmentation and reassembly.
An MLPPP subscriber consists of two IFLs (logical interfaces), a member link, and a bundle. For MLPPP
subscribers, you can configure the member link and bundle statically, or dynamically using dynamic profiles.
• Static MLPPP Subscribers—You must configure both member link and bundle IFLs manually before the
member link IFL can start LCP (link control protocol) negotiation either for an LNS session or for a PPPoE
session.
• Dynamic MLPPP Subscribers—You configure dynamic member IFLs using dynamic profiles. The member
link dynamic profile includes the family mlppp statement containing the bundle dynamic profile and the
service interface (si), or a pool of service interfaces. This information is then used to create the dynamic
bundle IFL.
Each bundle accepts only one member link. If more than one member link attempts to join the same bundle,
the system fails the new member session.
297
Figure 7 on page 297 shows a network diagram with the MX Series functioning as the LNS. Both PPP and
MLPPP bundles are terminated at the LNS.
The following three domains are shown passing traffic through the LNS network:
Figure 8 on page 298 shows a network diagram with the MX Series terminating PPPoE sessions that include
both the PPP and MLPPP bundles.
298
The following two domains are shown passing traffic through the network:
Release Description
14.1 Starting in Junos OS Release 14.1, multilink PPP (MLPPP) support is provided to LNS (L2TP
network server) and PPPoE (Point-to-Point Protocol over Ethernet) terminated and tunneled
subscribers running on MX Series with access-facing MPC2s.
RELATED DOCUMENTATION
Starting in Junos OS Release 14.1, subscribers on MX Series router to multilink PPP (MLPPP) for L2TP
network server (LNS) or to Point-to-Point Protocol over Ethernet (PPPoE, terminated and tunneled) can
access a variety of new features.
• Supports MLPPP for static and dynamic LNS subscribers and PPPoE subscribers.
• Anchors the bundle logical interface (IFL) on the inline services si interface.
• Runs the bundle IFL on an MX Series that enables shaping and queuing at the bundle to minimize fragment
reordering.
• Supports the co-existence for member link IFL and the bundle IFL on different lookup engines.
• Supports fragmentation maps for both static and dynamic si interfaces, and supports multiple forwarding
classes pointing to a single queue for si interface attachments.
• Provides fragmentation of low-priority packets towards the subscriber, and reassembly of low-priority
packets towards the core, and availability of per-bundle fragmentation and reassembly statistics.
• Supports bundle family inet and family inet6, including DHCPv6 prefix delegation over MLPPP bundle
for both LNS and PPPoE MLPPP subscribers.
Release Description
14.1 Starting in Junos OS Release 14.1, subscribers on MX Series router to multilink PPP (MLPPP)
for L2TP network server (LNS) or to Point-to-Point Protocol over Ethernet (PPPoE, terminated
and tunneled) can access a variety of new features.
RELATED DOCUMENTATION
Mixed Mode Support for MLPPP and PPP Subscribers Overview | 300
MLPPP Bundles and Inline Service Logical Interfaces Overview | 315
IN THIS SECTION
Existing customer edge subscriber services separate MLPPP and PPP support for subscribers. However,
if a subscriber interface is configured for MLPPP and the customer premises equipment (CPE) does not
support MLPPP, then the subscriber login fails.
In an environment where MLPPP and PPP subscribers are mixed and you cannot easily manage the
subscriber types by classifying them into separate groups using dynamic profiles, the MX Series needs the
capability to renegotiate Link Control Protocol (LCP) in PPP if the CPE rejects LCP negotiation in MLPPP.
This capability is known as mixed mode support.
Mixed mode uses common configuration and flexibility to support PPP and MLPPP. If you configure a
subscriber interface using the family mlppp and family inet/inet6 statements for PPP-only CPE, mixed
mode support enables additional LCP negotiation exchanges to successfully negotiate LCP in PPP. Mixed
mode supports static and dynamic PPPoE (terminated and tunneled) and LNS (L2TP network server)
subscribers.
If you do not configure the family mlppp statement for a subscriber interface, the MX Series negotiates
LCP in PPP as it currently does, and any LCP request that contains MLPPP options is rejected.
However for PPPoE subscribers, if you configure the family mlppp statement for a subscriber interface,
the MX Series negotiates LCP in MLPPP with the CPE. If the CPE rejects MLPPP, then the MX Series
renegotiates LCP in PPP with the CPE.
Mixed mode operation for a LAC (tunneled PPPoE) subscriber is the same as for a terminated PPPoE
subscriber. The authentication phase has no effect on LAC mixed mode operation because LCP negotiation
must be completed prior to authentication.
301
LNS Subscribers
• If proxy data from the LAC indicates that MLPPP was negotiated, and the proxy data is acceptable, and
the lcp-renegotiation statement is not configured, then the proxy is accepted and the subscriber is
MLPPP.
• If proxy data from the LAC indicates that PPP was negotiated, or if there was no proxy data from LAC,
or if the lcp-renegotiation statement is configured for the LAC, then the MX Series starts LCP negotiation
in MLPPP with the CPE.
If the CPE rejects MLPPP, then the MX Series renegotiates LCP in PPP with the CPE.
RELATED DOCUMENTATION
CHAPTER 25
IN THIS CHAPTER
Priority scheduling on a multilink (MLPPP) bundle determines the order in which an output interface
transmits traffic from an output queue. The queues are serviced in a weighted round-robin fashion. But
when a queue containing large packets starts using the MLPPP bundle, small and delay-sensitive packets
must wait their turn for transmission. Because of this delay, some slow links can become useless for
delay-sensitive traffic.
Link fragmentation and interleaving (LFI) solves this problem by reducing delay and jitter on links by
fragmenting large packets and interleaving delay-sensitive packets with the resulting smaller packets for
simultaneous transmission across multiple links of a MLPPP bundle.
Device R0 and Device R1 have LFI enabled. When Device R0 receives large and small packets, such as
data and voice packets, it divides them into two categories:
• All voice packets and any other packets configured to be treated as voice packets are categorized as LFI
packets and transmitted without fragmentation or an MLPPP header.
• The remaining non-LFI (data) packets are fragmented or unfragmented based on the configured
fragmentation threshold. Packets larger than the fragmentation threshold are fragmented. An MLPPP
header (containing a multilink sequence number) is added to all non-LFI packets, fragmented and
unfragmented.
Fragmentation is performed according to the fragmentation threshold that you configure. For example, if
you configure a fragmentation threshold of 128 bytes, all packets greater than 128 bytes are fragmented.
When Device R1 receives the packets, it sends the unfragmented voice packets immediately but buffers
the packet fragments until it receives the last fragment for a packet. In this example, when Device R1
receives fragment 5, it reassembles the fragments and transmits the whole packet.
The unfragmented data packets are treated as a single fragment. Device R1 transmits the unfragmented
data packets as it receives them and does not buffer them.
RELATED DOCUMENTATION
IN THIS SECTION
You enable link fragmentation and interleaving (LFI) on inline service (si) interface bundles by configuring
fragmentation-maps. For multilink PPP (MLPPP) bundle support, you must configure fragmentation-maps
in class-of-services and reference them in either the bundle dynamic-profile or bundle logical interface
(IFL) configuration.
BEST PRACTICE: For MX Series and class-of-service (CoS) implementation, you can configure
a fragmentation map to have two forwarding classes pointing to the same queue. However, if
you assign multiple forwarding classes to a single queue, you must also reference all of those
forwarding classes in a fragmentation map to enable the expected behavior.
If you reference only one of the forwarding classes assigned to a queue, then the other forwarding
classes in that queue can clog that queue with large packets. For previous existing
fragmentation-map implementations, this condition did not occur because the other forwarding
classes inherited this fragmentation behavior assigned to that queue.
If you assign multiple forwarding classes to a queue, create a fragmentation map that addresses
each of those forwarding classes. This results in fragmentation-map behavior that more closely
reflects the expected behavior based on the fragmentation CLI, while the existing
fragmentation-map behavior remains unchanged.
Fragmentation-Map Settings
By setting fragmentation-maps under class-of-service, you can configure the fragmentation properties
on a particular forwarding class, as shown in the following sample output:
class-of-service {
fragmentation-maps {
map-name {
forwarding-class class-name {
fragment-threshold bytes;
no-fragmentation;
}
}
}
}
306
NOTE: The per-forwarding class drop-timeout statement enabling you to change the resequencing
interval in milliseconds for each fragmentation class is not supported in the fragmentation map.
• For MLPPP bundle interface configuration, you can set the fragment-threshold for all forwarding
classes. Any fragmentation threshold defined by a fragmentation-map and applied to that interface
takes precedence for the forwarding classes referenced by that fragmentation-map.
• For si bundle IFL configuration, the fragment-threshold applies to all forwarding classes. The
fragment-threshold setting in fragmentation-maps for a particular forwarding class, if configured,
overrides the threshold configured in si bundle IFL for that class. If no fragment-threshold is configured
anywhere, packets are still fragmented if the threshold exceeds the smallest MTU or MRRU of all links
in the bundle.
NOTE: For a given forwarding class, you can include either the fragment-threshold setting or
the no-fragmentation setting; they are mutually exclusive.
Using MLPPP in this manner generates two subscriber interfaces for each subscriber:
The data plane traffic destined for the subscriber exits through the (si) bundle interface IFL, and passes
through the PPP member link IFL. Queuing is provided for both of these IFLs, which then requires the
ability to define class of service.
When you are creating the two subscriber interfaces, the MX Series authenticates only a single user, and
the RADIUS server only provides a single set of class-of-service (CoS) attributes. These CoS RADIUS
attributes are then applied to both the (si) bundle interface IFL and the PPP member link IFL.
NOTE: For this scenario to succeed, you must have already configured the dynamic profiles for
these IFLs to accept CoS RADIUS attributes enabling both the (si) bundle interface IFL and the
PPP member link IFL to have the same CoS attributes.
To apply different CoS to the (si) bundle interface IFL and the PPP member link IFL, you can set CoS
RADIUS attributes to specify the Transmission Control Protocol (TCP) name to which the attribute is
intended. The dynamic profile associated with the (si) bundle interface IFL contains the CoS TCP for that
IFL, and the dynamic profile associated with the PPP member link IFL contains the CoS TCP for that IFL.
The RADIUS attributes each include a target TCP. When configured, two sets of CoS RADIUS attributes
are retrieved with the member link authentication; one set with the (si) bundle interface IFL TCP specified,
and the other set with the PPP member link IFL TCP specified.
RELATED DOCUMENTATION
IN THIS SECTION
Fragmented Multilink PPP (MLPPP) packets have a multilink header containing a multilink sequence number.
The sequence numbers on these fragments must be preserved so that the remote device receiving these
fragments can correctly reassemble them into a complete packet. To accommodate this requirement, Junos
OS queues all packets on member links of a multilink bundle with a MLPPP header into a single queue (q0)
by default.
• Traffic flows of a forwarding class that has MLPPP fragmentation configured are distributed from the
inline services si bundle interface queues to the member link queues (queue 0) following a round-robin
method.
• Traffic flows of a forwarding class without MLPPP fragmentation are distributed from the si bundle
interface queues to the member link queues based on a hashing algorithm computed from the destination
address, source address, and IP protocol of the packet.
If the IP payload contains TCP or UDP traffic, the hashing algorithm also includes the source and
destination ports. As a result, all traffic belonging to one traffic flow is queued to one member link.
Figure 10 on page 308 shows how traffic is queued on an MLPPP multilink bundle and its member links.
Packet flows in the figure use the notation Px,Fx; for example, P1,F1 represents Packet 1, Fragment 1.
• Forwarding classes be, af, and nc are mapped to queues q0, q1, and q3, respectively, on the multilink
bundle. These are fragmented.
• Forwarding class ef contains voice traffic, and is mapped to q2 and is not fragmented.
• Interface si-1/0/0.1 is the bundle, and pp0.1 and pp0.2 are the member links for that bundle.
1. The packet fragments of forwarding classes be, af, and nc on the multilink bundle are mapped to q0
on Member Links 1 and 2. These packets are distributed from the si queues to the member links using
a round-robin method.
2. The packets of forwarding class ef (voice) from the multilink bundle are mapped to q2 on the member
links. This forwarding class is not fragmented. The packets are distributed from the si queues to the
member links based on a hashing algorithm.
3. The network control packets from the multilink bundle are mapped to q0 on the member links. The
bundle network control traffic is queued with the data flows on the member link. However, q3 on the
member links transmits network control packets that exchange protocol information related to member
links, such as packets exchanging hello messages on member links.
On a multilink bundle, packet fragments from all forwarding classes with fragmentation enabled are
transmitted to q0 on member links. On the q0 queues of member links, packets are queued using a
round-robin method to enable per-fragment load balancing.
Figure 11 on page 309 shows how fragmented packet queuing is performed on the member links. Packet
flows in the figure use the notation Px,Fx; for example, P1,F1 represents Packet 1, Fragment 1.
Packet fragments from the multilink bundle are queued to member links one by one using a round-robin
method:
310
• Packet P2,F1 from q1 on the multilink bundle is queued to q0 on Member Link 2, and so on.
NOTE: Packets that are part of the fragmented forwarding class, but are not fragmented, follow
the same procedure.
After exiting the si interface, Microcode adds a header of approximately 40 bytes to the MLPPP packets.
When configuring the class-of-service shaping, you may need to adjust bytes to account for this.
On a multilink bundle, all non-MLPPP encapsulated traffic [link fragmenting and interleaving (LFI) traffic]
from the multilink bundle are queued to the queue as defined by the forwarding class of that packet.
Figure 12 on page 310 shows how LFI packet queuing is performed on the member links.
The packets are distributed from the si interface to the member links based on a hashing algorithm computed
from the source address, destination address, and IP protocol of the packet.
311
If the IP payload contains TCP or UDP traffic, the hashing algorithm also includes the source and destination
ports. As a result, all traffic belonging to one traffic flow is queued to one member link.
RELATED DOCUMENTATION
Multilink PPP (MLPPP) link fragmentation and interleaving (LFI) provides buffering at the receiver side of
a link to reassemble MLPPP fragmented packets. Dropping of the packet fragments is a concern because
the packet fragments’ remainder consumes valuable bandwidth and buffer space, only to have it eventually
being dropped.
The MX Series provides two stages of queuing for packets exiting an MLPPP bundle:
During the first stage of queuing at the si interface, when exiting from these queues, LFI packets are
fragmented and assigned a sequence number. These fragmented packets are then distributed to the
member links where they are queued for the second time.
Congestion at the member link queues can result in MLPPP packet fragments being dropped, as shown in
Figure 13 on page 312. Packet flows in the figure use the notation Px,Fx; for example, P1,F1 represents
Packet 1, Fragment 1.
312
Data packet and fragment P2,F2 is dropped due to congestion at the pp0.1 queues. This occurs after the
sequence numbers have been assigned for packet P2.
In a Broadband Remote Access Server (B-RAS) implementation, the bundle member links share the physical
interface with other bundle member links, as well as with PPP subscriber interfaces, causing the physical
interface to be oversubscribed and most likely creating congestion.
During the second stage of queuing, member link scheduler queues are added to provide a degree of
protection against the port traffic congestion causing fragmented MLPPP packets to be dropped. See
Figure 14 on page 312 and Figure 15 on page 313 for member link scheduler hierarchies.
RELATED DOCUMENTATION
CHAPTER 26
IN THIS CHAPTER
Enabling Inline Service Interfaces for PPPoE and LNS Subscribers | 317
Configuring Inline Service Interface for PPPoE and LNS Subscribers | 319
Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers | 320
IN THIS SECTION
Each MLPPP bundle for LNS or PPPoE (terminated and tunneled) subscribers is represented by an inline
service (si) logical interface (IFL).
L2TP network server (LNS) can sustain a throughput of approximately 67 percent of line rate for 64-byte
packets. Additionally, MLPPP reassembly must be performed on a subset of these L2TP sessions. By
introducing an si interface for the bundle, some of the MLPPP reassembly processing can be offloaded to
another lookup engine different from the one that is performing the LNS processing.
316
For example, Figure 16 on page 316 shows a typical MX Series containing two access-facing MPC2 slots,
with each slot containing two lookup engines. One or two of the lookup engines are underutilized within
the MPC2 slots. The underutilized lookup engines are available to host si interfaces to offload MLPPP
reassembly processing.
NOTE: To minimize fragment reordering, the MLPPP si interface must be on an MPC2 where
shaping and queuing is performed at the bundle.
You can map each link of a multilink bundle to a different lookup engine for LNS processing. Using an si
interface for the bundle guarantees that all fragments belonging to the same bundle arrive at a single
lookup engine for reassembly.
After a subscriber is tunneled, the bundle is no longer involved in both the control plane and the forwarding
path, and both MLPPP bundle IFL and session ID are noted in the graphical user interface.
317
RELATED DOCUMENTATION
Enabling Inline Service Interfaces for PPPoE and LNS Subscribers | 317
Configuring Inline Service Interface for PPPoE and LNS Subscribers | 319
Understanding MLPPP Link Fragmentation and Interleaving | 303
The inline service (si) interface is a virtual physical interface that resides on lookup engines. The si interface,
referred to as an anchor interface, makes it possible to support multilink PPP (MLPPP) bundles without a
special services PIC. The si interface is supported on MLPPP on the MX Series.
Four inline service interfaces are configurable per MPC-occupied chassis slot. The following MPC2 slots
are supported:
• The MPC2-3D contains two lookup engines, each with two si interfaces.
• The MPC1-3D contains only one lookup engine and it hosts all four si interfaces.
You can configure the following inline service interfaces as anchor interfaces for MLPPP bundles: si-slot/0/0,
si-slot/1/0, si-slot/2/0, and si-slot/3/0.
• For MLPPP over PPPoE subscribers, family mlppp is supported in pp0 member link IFL, and the bundle
is an si IFL.
• For MLPPP over LNS subscribers, family mlppp is supported in si- member link IFL, and the bundle is
an si IFL.
You enable inline services for PICs 0 to 3 individually by setting the inline-services statement at the [edit
chassis] hierarchy level for the FPCs.
The following example shows how to enable inline services for PIC 0 on MPC slot 1, and PIC 1 on MPC
on slot 5, and set 10g as the bandwidth for tunnel traffic. As a result, both si-1/0/0 and si-5/0/0 are
created for the specified PICs as well.
1. Access an MPC-occupied slot and the PIC where the interface is to be enabled.
[edit chassis]
user@host# edit fpc slot-number pic number
2. Enable the interface and specify the amount of bandwidth reserved on each lookup engine for tunnel
traffic using inline services.
chassis {
fpc 1 {
pic 0 {
inline-services {
bandwidth 10g;
}
}
}
fpc 5 {
pic 1 {
inline-services {
bandwidth 10g;
}
}
}
}
RELATED DOCUMENTATION
Configuring Inline Service Interface for PPPoE and LNS Subscribers | 319
Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers | 320
MLPPP Bundles and Inline Service Logical Interfaces Overview | 315
319
The inline service (si) interface is a virtual physical interface that resides on lookup engines. The si interface,
referred to as an anchor interface, makes it possible to support multilink PPP (MLPPP) bundles without a
special services PIC. The si interface is supported on MLPPP on the MX Series. Four inline service interfaces
are configurable per MPC-occupied chassis slot.
For existing Layer 2 and Layer 3 services, the si interface unit 0 is currently used to store the unilist next-hop
information. However, you must reserve and configure si interface unit 0 and set family inet for both
PPPoE and LNS subscribers because the si interface implements the bundle functionality. Setting family
inet6 is ignored by the system.
The following example shows how to configure inline services for PIC 0 on MPC slot 1, and PIC 1 on MPC
on slot 5, and set unit 0 family inet for both.
[edit interfaces]
user@host# edit si-slot/pic/port
2. (Optional; for per-session shaping only) Enable the inline service interface for hierarchical schedulers
and limit the number of scheduler levels to two.
3. (Optional; for per-session shaping only) Configure services encapsulation for inline service interface.
4. Reserve and configure the IPv4 family (inet) on the reserved unit 0 logical interface for PPPoE and LNS
subscribers and bundle functionality.
interfaces {
si-1/0/0 {
hierarchical-scheduler maximum-hierarchy-levels 2;
encapsulation generic-services;
320
unit 0 {
family inet;
}
}
si-5/1/0 {
hierarchical-scheduler maximum-hierarchy-levels 2;
encapsulation generic-services;
unit 0 {
family inet;
}
}
}
RELATED DOCUMENTATION
Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers | 320
MLPPP Bundles and Inline Service Logical Interfaces Overview | 315
Enabling Inline Service Interfaces for PPPoE and LNS Subscribers | 317
Configuring Service Device Pools for Load Balancing PPPoE and LNS
Subscribers
With dynamic L2TP network server (LNS) configuration, you can replace the services-interfaces with a
service-device-pool in the tunnel-group for load balancing LNS subscribers. Optionally, you can use the
service-device-pool statement for load balancing to dynamically select the inline services (si) interface for
both bundle (PPPoE or LNS subscribers), and LNS member link, respectively.
NOTE: The service-device-pool configuration enables interface overlap, which can result in over
usage of the overlapped interfaces.
Before you begin, enable the inline service interfaces for all FPC slots and PICs. See “Enabling Inline Service
Interfaces for PPPoE and LNS Subscribers” on page 317.
321
The following example shows how to configure two service device pools (pool1 and pool2) for inline
services for load balancing bundle and LNS member link.
2. Define the service device pools to assign si interfaces for load balancing.
The following shows sample output when all referenced FPC slots and PICs had been enabled for inline
services:
services {
service-device-pools {
pool pool1 {
interface si-1/0/0;
interface si-1/1/0;
interface si-3/0/0;
}
pool pool2 {
interface si-1/1/0;
interface si-2/1/0;
interface si-5/1/0;
}
}
}
RELATED DOCUMENTATION
Configuring Inline Service Interface for PPPoE and LNS Subscribers | 319
MLPPP Bundles and Inline Service Logical Interfaces Overview | 315
Example: Configuring Dynamic LNS MLPPP Subscribers | 359
323
CHAPTER 27
IN THIS CHAPTER
Configuring L2TP Client Access to Support MLPPP for Static Subscribers | 323
Configuring L2TP Client Access to Support MLPPP for Dynamic Subscribers | 326
To enable MLPPP over LT2P network server (LNS) support for MX Series, you must indicate whether
MLPPP is supported for static subscribers from a particular L2TP client (LAC) by configuring the multilink
statement currently supported in access profile. Access profiles define how to validate Layer 2 Tunneling
Protocol (L2TP) connections and session requests. Within each L2TP access profile, you configure one or
more clients (LACs). You can configure multiple access profiles and multiple clients within each profile.
With mixed mode support, the multilink statement enables MLPPP but does not set it. However, if you
do not configure the multilink statement, MLPPP is not supported for static LAC subscribers.
The following two examples show L2TP access profile configurations for an MLPPP-capable static L2TP
client and non-multilink (single link) static L2TP client.
[edit access]
user@host# edit profile access-profile-name
3. Associate a group profile containing PPP attributes to apply for the PPP sessions being tunneled from
this LAC client.
324
4. Configure the LNS to renegotiate the link control protocol (LCP) with the PPP client.
5. Configure the maximum number of sessions allowed in a tunnel from the client (LAC).
7. (Optional) Specify a local access profile that overrides the global access profile and the tunnel group
AAA access profile to configure RADIUS server settings for the client.
MLPPP is first negotiated with static subscribers coming from the LAC peer group profile, ce-lac-1-gp, but
then switches to PPP if the subscriber rejects MLPPP. The following shows sample output for
MLPPP-capable static L2TP client:
access profile {
ce-l2tp-profile1 {
client ce-lac-1 {
user-group-profile ce-lac-1-gp;
325
l2tp {
interface-id not-used;
lcp-renegotiation;
maximum-sessions-per-tunnel 2000;
shared-secret "$9$2wgUHQF/9pB";
aaa-access-profile ce-aaa-profile;
multilink;
}
}
}
}
To configure an L2TP access profile for non-MLPPP, or single link static L2TP clients, repeat Step 1 through
Step 7 for configuring an L2TP access profile for multilink-capable static L2TP clients. Do not set l2tp
multilink.
Only PPP is negotiated with static subscribers from the LAC peer group profile, ce-lac-2-gp, and an LCP
configuration request from the customer premises equipment (CPE) with maximum received reconstructed
unit (MRRU) option is rejected. The following shows sample output for single link static L2TP client:
access profile {
ce-l2tp-profile1 {
client ce-lac-2 {
user-group-profile ce-lac-1-gp;
l2tp {
interface-id not-used;
maximum-sessions-per-tunnel 1000;
shared-secret "$9$2aBcXyz/2lP";
aaa-access-profile ce-aaa-profile;
## multilink not entered,
static subscriber is single link only
}
}
}
}
RELATED DOCUMENTATION
Mixed Mode Support for MLPPP and PPP Subscribers Overview | 300
MLPPP Support for LNS and PPPoE Subscribers Overview | 295
326
To enable support for MLPPP over LT2P network server (LNS) you configure the family mlppp statement
in the dynamic profile name, which indicates that MLPPP is supported for dynamic subscribers from a
particular L2TP client (LAC).
NOTE: The multilink statement used to enable MLPPP for static LNS subscribers is ignored for
dynamic LNS subscribers if it is configured.
You can configure a dynamic profile name for the LAC using access profile from the l2tp statement. If you
specify a dynamic profile name in the L2TP client access profile, it overrides the dynamic-profile name
specified in the tunnel-group used to create the dynamic subscriber interface. If you do not configure a
dynamic profile name in the L2TP client access profile, then the dynamic-profile name specified in the
tunnel-group is used.
The following example shows an L2TP access profile configuration with a dynamic profile name for dynamic
LNS subscribers.
To configure an L2TP access profile configuration with a dynamic profile name for dynamic LNS subscribers:
[edit access]
user@host# edit profile access-profile-name
3. Associate a group profile containing PPP attributes to apply for the PPP sessions being tunneled from
this LAC client.
4. Configure the maximum number of sessions allowed in a tunnel from the client (LAC).
6. (Optional) Specify a local access profile that overrides the global access profile and the tunnel group
AAA access profile to configure RADIUS server settings for the client.
7. Specify the dynamic profile name for the dynamic LNS subscriber.
If the family mlppp statement is configured in dynamic-profile, MLPPP is negotiated first; otherwise, only
PPP is negotiated. The following shows sample output for an L2TP access profile configuration with a
dynamic profile name for dynamic LNS subscribers:
access profile {
ce-l2tp-profile2 {
client ce-lac-3 {
user-group-profile ce-lac-1-gp;
l2tp {
interface-id not-used;
maximum-sessions-per-tunnel 2000;
shared-secret "$9$2wgUHQF/9pB";
aaa-access-profile ce-aaa-profile;
dynamic-profile ml-lns-member-prof;
}
}
}
}
328
RELATED DOCUMENTATION
CHAPTER 28
IN THIS CHAPTER
IN THIS SECTION
Requirements | 329
Overview | 330
Configuration | 331
Verification | 338
This example shows how to configure static L2TP network server (LNS) multilink (MLPPP) subscribers.
Requirements
Before you configure static L2TP network server (LNS) multilink (MLPPP) subscribers, be sure you have:
• Enabled the inline service (si) interface for LNS subscribers. See “Enabling Inline Service Interfaces for
PPPoE and LNS Subscribers” on page 317.
• Configured the inline service (si) interface for LNS subscribers. See “Configuring Inline Service Interface
for PPPoE and LNS Subscribers” on page 319.
330
Overview
An MLPPP subscriber consists of two IFLs (logical interfaces), a member link, and a bundle. For static
MLPPP subscribers, you configure the member link and bundle statically. For static LNS MLPPP subscribers,
you configure both member link and bundle IFLs manually. After you configure the subscriber’s interface
using the family mlppp setting, before the member link IFL can start LCP (link control protocol) negotiation
for an LNS, you must also fully configure the member link’s bundle IFL. Figure 17 on page 330 shows how
the different types of traffic traverse through a network where the MX Series device is acting as the LNS
to terminate MLPPP bundles.
Topology
The following three domains are shown passing traffic through the LNS network:
Configuration
IN THIS SECTION
Configuring a Tunnel Group with Inline Service Interface and L2TP Access Profile Attributes | 332
Results | 336
To configure static L2TP network server (LNS) multilink (MLPPP) subscribers, perform these tasks:
[edit]
set access profile ce-l2tp-profile1 client ce-lac-1 user-group-profile ce-lac-1-gp
set access profile ce-l2tp-profile1 client ce-lac-1 l2tp lcp-renegotiation
set access profile ce-l2tp-profile1 client ce-lac-1 l2tp maximum-sessions-per-tunnel 2000
set access profile ce-l2tp-profile1 client ce-lac-1 l2tp shared-secret “password”
set access profile ce-l2tp-profile1 client ce-lac-1 l2tp multilink
set services l2tp tunnel-group lns1 l2tp-access-profile ce-l2tp-profile1
set services l2tp tunnel-group lns1 aaa-access-profile ce-authenticator
set services l2tp tunnel-group lns1 local-gateway address 10.1.1.2
set services l2tp tunnel-group lns1 service-interface si-1/0/0
[edit]
set interfaces si-1/0/0.1
set interfaces si-1/0/0.1 dial-options l2tp-interface-id not used dedicated
set interfaces si-1/0/0.1 family mlppp bundle si-5/1/0.100
set interfaces si-1/0/0.1 family inet unnumbered-address lo0.0
set interfaces si-1/0/0.2
set interfaces si-1/0/0.2 dial-options l2tp-interface-id not used dedicated
set interfaces si-1/0/0.2 family mlppp bundle si-5/1/0.101
set interfaces si-1/0/0.2 family inet
[edit]
set interfaces si-5/0/0 unit 100
set interfaces si-5/0/0 unit 100 encapsulation multilink-ppp
set interfaces si-5/0/0 unit 100 mrru 1500
set interfaces si-5/0/0 unit 100 fragment-threshold 640
332
Configuring a Tunnel Group with Inline Service Interface and L2TP Access Profile Attributes
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
To configure a tunnel group with inline service interface (si) and L2TP access profile attributes for static
LNS MLPPP subscribers:
[edit access]
user@host# set profile ce-l2tp-profile1
3. Associate a group profile containing PPP attributes to apply for the PPP sessions being tunneled from
this LAC client.
4. Configure the following L2TP access profile attributes for this example:
• L2TP client is MLPPP-capable for static subscribers. The multilink statement determines whether
MLPPP is supported for subscribers coming in from the LAC peer.
NOTE: Do not specify a dynamic profile name in the L2TP access client profile for static
LNS MLPPP subscribers.
333
6. Set the tunnel access profile equal to the setting you defined for the access profile.
NOTE: You can specify the L2TP AAA access profile at either the [edit access] or [edit
services] hierarchy levels, using the LNS access client profile or tunnel-group statements,
respectively. An L2TP AAA access profile defined using the [edit access] hierarchy level
overrides the L2TP AAA access profile defined for the tunnel-group using the [edit services]
hierarchy level.
9. Specify the inline services interface (si) for the static LNS MLPPP subscribers.
10. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Step-by-Step Procedure
334
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the static LNS member link IFL, you specify the static bundle using the family mlppp statement.
You must also configure the family inet statement in the subscriber (si) interface. The family inet setting
enables the L2TP long route to be installed and supported for the lookup engine to steer control packets
to the Routing Engine; and also enables mixed mode support, if required.
The following example shows that both PPP and MLPPP subscribers can log in successfully using the
si-1/0/0.1 interface, whereas only MLPPP subscribers can log in successfully using the si-1/0/0.2 interface.
[edit interfaces]
user@host# set si-1/0/0.1
user@host# set si-1/0/0.2
2. For the si-1/0/0.1 interface, set the L2TP dial options to specify that the logical interface can host one
session at a time (dedicated).
3. Enable MLPPP support and configure the static bundle inline interface (IFL).
5. For the si-1/0/0.2 interface, set the L2TP dial options to specify that the logical interface can host one
session at a time (dedicated).
6. Enable MLPPP support and configure the static bundle inline interface (IFL).
[edit]
user@host# commit
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the static inline services (si) interface MLPPP bundle IFL, you specify the encapsulation
multilink-ppp statement within the si interface. The si interface anchors the bundle interface.
You can also set these optional MLPPP parameters: MRRU, short sequence, and fragment-threshold. The
following example shows how to configure the static (si) interface MLPPP bundle IFL.
1. Create the static (si) interface MLPPP bundle IFL si-5/0/0 with a unit of 100.
[edit interfaces]
user@host# set si-5/0/0 unit 100
2. Configure the encapsulation multilink-ppp statement to enable MLPPP bundling for the si-5/0/0.100
interface.
• mrru—Specifies the maximum received reconstructed unit value ranging from 1500 through 4500
bytes.
• fragment-threshold—Applies to all packets and forwarding classes, ranging from 128 through 16,320
bytes.
4. Enable support for static (si) interface IFL dynamic services by configuring the ppp-options dynamic
profile setting.
[edit]
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show access, show services, and
show interfaces commands. If the output does not display the intended configuration, repeat the instructions
in this example to correct the configuration.
interfaces {
si-1/0/0 {
unit 1 {
dial-options {
l2tp-interface-id not-used;
dedicated;
}
family mlppp {
bundle si-5/1/0.100;
}
family inet {
unnumbered-address lo0.0;
}
}
unit 2 {
dial-options {
l2tp-interface-id not-used;
dedicated;
}
family mlppp {
bundle si-5/1/0.101;
}
family inet;
}
}
}
Verification
IN THIS SECTION
Purpose
Verify that the inline services (si) interface is configured.
Action
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Input errors
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Giants: 0,
Policed discards: 0, Resource errors: 0
Output errors:
Carrier transitions: 0, Errors: 0, Drops: 0, MTU errors: 0,
Resource errors: 0
Meaning
The (si) interface is enabled with its physical link up and running with Point-to-Point interface flags set. It
is shared between LNS subscribers, LNS MLPPP member links, and MX Series MLPPP bundles.
Purpose
Verify that the bundle IFL information is correct for MLPPP over LNS subscribers.
Action
Multilink classes 0
Link layer overhead 4.0 %
Bundle status:
Received sequence number 0xffffff
Transmit sequence number 0xffffff
Packet drops 0 (0 bytes)
Fragment drops 0 (0 bytes)
MRRU exceeded 0
Fragment timeout 0
Missing sequence number 0
Out-of-order sequence number 0
Out-of-range sequence number 0
Packet data buffer overflow 0
Fragment data buffer overflow 0
Statistics Frames fps Bytes bps
Bundle:
Multilink:
Input : 3 0 270 0
Output: 3 0 285 0
Network:
Input : 3 0 252 0
Output: 3 0 276 0
IPV6 Transit Statistics Packets Bytes
Network:
Input : 0 0
Output: 0 0
Link:
si-1/0/0.1073756925
Up time: 00:06:37
Input : 126 0 9596 0
Output: 126 0 1226 0
Multilink detail statistics:
Bundle:
Fragments:
Input : 0 0 0 0
Output: 0 0 0 0
Non-fragments:
Input : 0 0 0 0
Output: 0 0 0 0
LFI:
Input : 0 0 0 0
Output: 0 0 0 0
NCP state: inet: Opened, inet6: Not-configured, iso: Not-configured, mpls:
Not-configured
341
Meaning
Due to the particulars of implementation, the following error counts associated with a bundle always
display 0: packet drops (bytes), fragment drops (bytes), fragment timeout, missing sequence number,
out-of-order sequence number, out-of-range sequence number, packet data buffer overflow and fragment
data buffer overflow, and MRRU exceeded.
Purpose
Verify that the member link IFL information is correct for subscribers.
Action
Meaning
Multilink bundle si-5/1/0.1073756926 has been configured using the family mlppp protocol.
Purpose
Verify that the subscriber information for static MLPPP over LNS is correct.
Action
Type: L2TP
User Name: [email protected]
IP Address: 10.80.80.10
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: default
Interface: si-1/0/0.1
Interface type: Static
State: Active
Radius Accounting ID: 1
Session ID: 1
Bundle Session ID: 2
Login Time: 2011-04-11 07:55:59 PDT
Type: MLPPP
User Name: [email protected]
IP Address: 10.80.80.10
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: default
Interface: si-5/1/0.100
Interface type: Static
State: Active
Radius Accounting ID: 2
Session ID: 2
Underlying Session ID: 1
Login Time: 2011-04-11 07:55:59 PDT
Meaning
Subscriber information for interface si-5/1/0.100 has been configured for MLPPP with interface type of
static.
343
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 343
Overview | 343
Configuration | 344
Verification | 353
This example shows how to configure static Point-to-Point Protocol over Ethernet (PPPoE) MLPPP for
terminated and tunneled subscribers.
Requirements
Before you configure static PPPoE MLPPP for terminated and tunneled subscribers, be sure you have:
• Enabled the inline service (si) interface for LNS subscribers. See “Enabling Inline Service Interfaces for
PPPoE and LNS Subscribers” on page 317.
• Configured the inline service (si) interface for LNS subscribers. See “Configuring Inline Service Interface
for PPPoE and LNS Subscribers” on page 319.
Overview
An MLPPP subscriber consists of two IFLs (logical interfaces), a member link, and a bundle. For static
MLPPP subscribers, you configure both member link and bundle IFLs manually. After you configure the
344
subscriber’s interface using the family mlppp statement, before the member link IFL can start LCP (link
control protocol) negotiation PPPoE session, you must also fully configure the member link’s bundle IFL.
Figure 18 on page 344 shows how the different types of traffic traverse through a network where the MX
Series terminates PPPoE sessions.
Topology
The following two domains are shown terminating traffic at the MX Series:
Configuration
IN THIS SECTION
Results | 351
To configure static PPPoE MLPPP for terminated and tunneled subscribers, perform these tasks:
345
[edit]
set interfaces ge-3/0/0 vlan-tagging
set interfaces ge-3/0/0 unit 1 encapsulation ppp-over-ether vlan-id 1
set interfaces ge-3/0/0 unit 2 encapsulation ppp-over-ether vlan-id 2
set interfaces ge-3/0/0 unit 3 encapsulation ppp-over-ether vlan-id 3
set interfaces pp0
set interfaces pp0 unit 1 keepalives interval 30
set interfaces pp0 unit 1 pppoe-options underlying interface ge-3/0/0.1 server
set interfaces pp0 unit 1 ppp-options pap chap dynamic-profile pp0-l2l3-service prof
set interfaces pp0 unit 1 family mlppp bundle si-1/0/0.1
set interfaces pp0 unit 1 family inet unnumbered-address lo0.0
set interfaces pp0 unit 1 family inet6 address 2001:db8:204::1:1:2/64
set interfaces pp0 unit 2 keepalives interval 30
set interfaces pp0 unit 2 pppoe-options underlying-interface ge-3/0/0.2 server
set interfaces pp0 unit 2 ppp-options pap dynamic-profile pp0-l2l3-service prof
set interfaces pp0 unit 2 family mlppp bundle si-1/0/0.2
set interfaces pp0 unit 3 keepalives interval 30
set interfaces pp0 unit 3 pppoe-options underlying interface ge-3/0/0.3 server
set interfaces pp0 unit 3 ppp-options pap chap dynamic-profile pp0-l2l3-service prof
set interfaces pp0 unit 3 family mlppp bundle si-1/0/0.3
set interfaces pp0 unit 3 family inet
[edit]
set interfaces si-5/0/0 unit 100
set interfaces si-5/0/0 unit 100 encapsulation multilink-ppp
set interfaces si-5/0/0 unit 100 mrru 1500
set interfaces si-5/0/0 unit 100 fragment-threshold 640
set interfaces si-5/0/0 unit 100 short-sequence
set interfaces si-5/0/0 unit 100 ppp-options dynamic-profile l2l3-service-prof
Step-by-Step Procedure
346
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the static PPPoE member link, you specify the static bundle using the family mlppp statement.
PPPoE sessions are supported over the following underlying interfaces: Ethernet interfaces, static and
dynamic VLAN, VLAN demultiplexing (demux) over Ethernet interfaces, and VLAN demux over aggregated
Ethernet interfaces.
You must also configure the family inet statement in the pp0 interface for tunneled subscribers. The family
inet statement enables the L2TP long route to be installed and supported for the lookup engine to steer
control packets to the Routing Engine.
The following example shows how to configure pp0 member link IFL over static VLAN to support the
following different types of subscribers:
• si-1/0/0.1—Both terminated and tunneled PPP and MLPPP subscribers can log in successfully.
1. Create the Gigabit Ethernet underlying interface for the PPPoE session, ge-3/0/0, and enable VLAN
tagging.
[edit interfaces]
user@host# set ge-3/0/0 vlan-tagging
2. For the ge-3/0/0 interface, configure PPP over Ethernet encapsulation for three VLANs.
3. Configure the dynamic PPPoE pp0 subscriber interface to support PPPoE sessions.
[edit interfaces]
user@host# set pp0
a. Configure the first logical interface for the pp0 subscriber interface on the MX Series and set an
interval of 30 seconds for the keepalive value.
b. Configure the underlying interface ge-3/0/0.1 and PPPoE server mode for a dynamic PPPoE logical
interface in a dynamic profile.
347
c. Configure PPP-specific interface properties in a dynamic profile: pap and chap, and set the
dynamic-profile to the services dynamic profile.
NOTE: The dynamic profile is applied when Link Control Protocol (LCP) is negotiated
in PPP.
d. Configure the static bundle for the PPPoE member link for MLPPP subscribers using the family
mlppp statement.
NOTE: The family mlppp statement determines whether MLPPP is supported for
subscribers coming in from the underlying interface.
e. Configure the family inet statement and the unnumbered address for the protocol family required
for PPP subscribers for tunneled PPP and for MLPPP subscribers.
f. (Optional) Enable the family inet6 statement and address for the mixed mode support for PPP and
MLPPP subscribers.
a. Configure the second logical interface for the pp0 subscriber interface on the MX Series and set an
interval of 30 seconds for the keepalive value.
b. Configure the underlying interface ge-3/0/0.2 and PPPoE server mode for a dynamic PPPoE logical
interface in a dynamic profile.
c. Configure PPP-specific interface properties in a dynamic profile: pap, and set the dynamic-profile
to the services dynamic profile.
NOTE: The dynamic profile is applied when Link Control Protocol (LCP) is negotiated
in PPP.
d. Configure the static bundle for the PPPoE member link for MLPPP subscribers using the family
mlppp statement.
NOTE: The family mlppp statement determines whether MLPPP is supported for
subscribers coming in from the underlying interface.
a. Configure the third logical interface for the pp0 subscriber interface on the MX Series and set an
interval of 30 seconds for the keepalive value.
b. Configure the underlying interface ge-3/0/0.3 and PPPoE server mode for a dynamic PPPoE logical
interface in a dynamic profile.
c. Configure PPP-specific interface properties in a dynamic profile: pap and chap, and set the
dynamic-profile to the services dynamic profile.
NOTE: The dynamic profile is applied when Link Control Protocol (LCP) is negotiated
in PPP.
d. Configure the static bundle for the PPPoE member link for MLPPP subscribers using the family
mlppp statement.
NOTE: The family mlppp statement determines whether MLPPP is supported for
subscribers coming in from the underlying interface.
[edit]
user@host# commit
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the static inline services (si) interface MLPPP bundle IFL, you specify the encapsulation
multilink-ppp statement within the si interface. The si interface anchors the bundle interface.
You can also set these optional MLPPP parameters: MRRU, short sequence, and fragment-threshold. The
following example shows how to configure the static si interface MLPPP bundle IFL:
1. Create the static (si) interface MLPPP bundle IFL si-5/0/0 with a unit of 100.
[edit interfaces]
user@host# set si-5/0/0 unit 100
2. Configure the encapsulation multilink-ppp statement to enable MLPPP bundling for the si-5/0/0.100
interface.
• mrru—Specifies the maximum received reconstructed unit value ranging from 1500 through 4500
bytes.
• fragment-threshold—Applies to all packets and forwarding classes, ranging from 128 through 16,320
bytes.
4. Enable support for static si interface IFL dynamic services by configuring the ppp-options dynamic
profile statement.
[edit]
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show interfaces command. If the
output does not display the intended configuration, repeat the instructions in this example to correct the
configuration.
}
family inet6 {
address 2001:db8:204::1:1:2/64;
}
}
unit 2 {
keepalives interval 30;
pppoe-options {
underlying-interface ge-3/0/0.2;
server;
}
ppp-options {
pap;
dynamic-profile pp0-l2l3-service-prof;
}
family mlppp {
bundle si-1/0/0.2;
}
}
unit 3 {
keepalives interval 30;
pppoe-options {
underlying-interface ge-3/0/0.3;
server;
}
ppp-options {
pap;
chap;
dynamic-profile pp0-l2l3-service-prof;
}
family mlppp {
bundle si-1/0/0.3;
}
family inet;
}
}
}
fragment-threshold 640;
short-sequence;
ppp-options {
dynamic-profile l2l3-service-prof;
}
}
}
}
Verification
IN THIS SECTION
Purpose
Verify that the bundle IFL information is correct for PPPoE MLPPP subscribers.
Action
MRRU 1504
Remote MRRU 1504
Drop timer period 0
Inner PPP Protocol field compression disabled
Sequence number format long (24 bits)
Fragmentation threshold 500
Links needed to sustain bundle 1
Interleave fragments Enabled
Multilink classes 0
Link layer overhead 4.0 %
Bundle status:
Received sequence number 0xffffff
Transmit sequence number 0xffffff
Packet drops 0 (0 bytes)
Fragment drops 0 (0 bytes)
MRRU exceeded 0
Fragment timeout 0
Missing sequence number 0
Out-of-order sequence number 0
Out-of-range sequence number 0
Packet data buffer overflow 0
Fragment data buffer overflow 0
Statistics Frames fps Bytes bps
Bundle:
Multilink:
Input : 3 0 270 0
Output: 3 0 285 0
Network:
Input : 3 0 252 0
Output: 3 0 276 0
IPV6 Transit Statistics Packets Bytes
Network:
Input : 0 0
Output: 0 0
Link:
pp0.1073756925
Up time: 00:06:37
Input : 126 0 9596 0
Output: 126 0 1226 0
Multilink detail statistics:
Bundle:
Fragments:
Input : 0 0 0 0
Output: 0 0 0 0
355
Non-fragments:
Input : 0 0 0 0
Output: 0 0 0 0
LFI:
Input : 0 0 0 0
Output: 0 0 0 0
NCP state: inet: Opened, inet6: Not-configured, iso: Not-configured, mpls:
Not-configured
Protocol inet, MTU: 1500, Generation: 154, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Is-Primary
Destination: Unspecified, Local: 10.80.80.1, Broadcast: Unspecified,
Generation: 150
Meaning
Due to the particulars of implementation, the following error counts associated with a bundle always
display 0: packet drops (bytes), fragment drops (bytes), fragment timeout, missing sequence number,
out-of-order sequence number, out-of-range sequence number, packet data buffer overflow and fragment
data buffer overflow, and MRRU exceeded.
Purpose
Verify that the member link IFL information is correct for subscribers.
Action
Local statistics:
Input bytes : 133
Output bytes : 377
Input packets: 7
Output packets: 8
Transit statistics:
Input bytes : 476 0 bps
Output bytes : 112 0 bps
Input packets: 14 0 pps
Output packets: 14 0 pps
Keepalive settings: Interval 10 seconds, Up-count 1, Down-count 3
LCP state: Opened
NCP state: inet: Not-configured, inet6: Not-configured, iso: Not-configured,
mpls:
Not-configured
CHAP state: Success
PAP state: Closed
Protocol mlppp, Multilink bundle: si-1/0/0.1073756924
Service interface: si-1/0/0, Dynamic profile: ml-bundle-service-prof
MTU: 1526, Generation: 15535, Route table: 0
Meaning
Logical interface pp0.1073756923 has been configured with PPPoE, multilink bundle si-1/0/0.1073756924,
and protocol mlppp.
Purpose
Verify that the subscriber information for static MLPPP over PPPoE is correct.
Action
Type: PPPoE
User Name: user
IP Address: 10.4.1.2
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: pp0.20
Interface type: Static
MAC Address: 00:00:5e:00:53:32
357
State: Active
Radius Accounting ID: 4
Session ID: 4
Bundle Session ID: 5
Login Time: 2012-02-28 10:32:24 PST
Type: MLPPP
User Name: user
IP Address: 10.4.1.2
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: si-1/0/0.1020
Interface type: Static
State: Active
Radius Accounting ID: 5
Session ID: 5
Underlying Session ID: 4
Login Time: 2012-02-28 10:32:24 PST
Meaning
Subscriber information has been configured for static PPPoE with interface pp0.20, and static MLPPP with
interface si-1/0/0.1020.
RELATED DOCUMENTATION
CHAPTER 29
IN THIS CHAPTER
IN THIS SECTION
Requirements | 359
Overview | 360
Configuration | 361
Verification | 377
This example shows how to configure dynamic L2TP network server (LNS) multilink (MLPPP) subscribers.
Requirements
Before you configure dynamic LNS MLPPP subscribers, be sure you have:
• If configuring a tunnel group using an inline service (si) interface, enabled the inline service (si) interface
for LNS subscribers. See “Enabling Inline Service Interfaces for PPPoE and LNS Subscribers” on page 317.
360
• Configured the inline service (si) interface for LNS subscribers. See “Configuring Inline Service Interface
for PPPoE and LNS Subscribers” on page 319.
• If configuring a tunnel group using a pool of service interfaces, configured service device pools for LNS
subscribers. See “Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers” on
page 320.
Overview
An MLPPP subscriber consists of two IFLs (logical interfaces), a member link, and a bundle. For dynamic
LNS MLPPP subscribers, you configure the dynamic member link IFLs using dynamic profiles. The member
link dynamic profile includes the family mlppp statement containing the bundle dynamic profile and the
service interface (si), or a pool of service interfaces. This information is then used to create the dynamic
bundle IFL.
Each dynamic bundle accepts only one dynamic member link. If more than one dynamic member link
attempts to join the same dynamic bundle, the system fails the new member session.
Figure 19 on page 360 shows how the different types of traffic traverse through a network where the MX
Series is acting as the LNS to terminate MLPPP bundles.
Topology
The following three domains are shown passing traffic through the LNS network:
Configuration
IN THIS SECTION
Configuring a Tunnel Group with a Pool of Service Interfaces and L2TP Access Profile Attributes | 363
Configuring a Dynamic Profile for Dynamic LNS Member Link IFL Without Mixed Mode Support | 365
Configuring a Dynamic Profile for Dynamic LNS Member Link IFL With Mixed Mode Support | 367
Results | 372
[edit]
set access profile ce-l2tp-profile2 client ce-lac-3 user-group-profile ce-lac-1-gp
set access profile ce-l2tp-profile2 client ce-lac-3 l2tp multilink
set access profile ce-l2tp-profile2 client ce-lac-3 l2tp maximum-sessions-per-tunnel 2000
set access profile ce-l2tp-profile2 client ce-lac-3 l2tp shared-secret “password”
set access profile ce-l2tp-profile2 client ce-lac-3 l2tp dynamic-profile ml-lns-member-prof
set services l2tp tunnel-group dyn-l2tp-tunnel-group l2tp-access-profile ce-l2tp-profile2
set services l2tp tunnel-group dyn-l2tp-tunnel-group aaa-access-profile ce-authenticator
set services l2tp tunnel-group dyn-l2tp-tunnel-group local-gateway address 10.1.1.1
set services l2tp tunnel-group dyn-l2tp-tunnel-group service-device-pool pool1
set services l2tp tunnel-group dyn-l2tp-tunnel-group dynamic-profile ml-lns-member-prof
[edit]
set dynamic-profiles mlp-lns-member-profile
set dynamic-profiles mlp-lns-member-profile interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
set dynamic-profiles mlp-lns-member-profile interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
dial-options l2tp-interface-id dont care dedicated
set dynamic-profiles mlp-lns-member-profile interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
family mlppp bundle “$junos-bundle-interface-name”
362
Configuring a Tunnel Group with a Pool of Service Interfaces and L2TP Access Profile Attributes
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
To configure a tunnel group with a pool of service interfaces and L2TP access profile attributes for dynamic
LNS MLPPP subscribers:
[edit access]
user@host# set profile ce-l2tp-profile2
3. Associate a group profile containing PPP attributes to apply for the PPP sessions being tunneled from
this LAC client.
4. Configure the following L2TP access profile attributes for this example:
• L2TP client is multilink (MLPPP)-capable for subscribers. The multilink statement in the L2TP access
client profile determines whether MLPPP is supported for subscribers coming in from the LAC peer.
• Dynamic profile name in the L2TP access client profile for dynamic LNS MLPPP subscribers.
364
NOTE: If the dynamic-profile name is defined in the L2TP access client profile, it is
used to create the dynamic LNS MLPPP member link; otherwise, the dynamic-profile
name defined in the tunnel group is used. If neither profile contains the family mlppp
statement, then the incoming LNS session fails.
6. Set the tunnel access profile equal to the setting you defined for the access profile.
NOTE: You can specify the L2TP AAA access profile in either the [edit access] or [edit
services] hierarchy levels, using the LNS access client profile or tunnel-group statements,
respectively. An L2TP AAA access profile defined using the [edit access] hierarchy level
overrides the L2TP AAA access profile defined for the tunnel-group using the [edit services]
hierarchy level.
9. Specify the pool of service interfaces for the dynamic LNS MLPPP subscribers.
10. Specify the dynamic profile used to create the dynamic LNS MLPPP member link.
11. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Configuring a Dynamic Profile for Dynamic LNS Member Link IFL Without Mixed Mode Support
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
You can configure the dynamic-profile name used to create the dynamic LNS member link IFL in either
the L2TP client access profile or in the tunnel-group. See “Configuring a Tunnel Group with a Pool of
Service Interfaces and L2TP Access Profile Attributes” on page 363.
The following example shows dynamic-profile configuration for LNS MLPPP and PPP subscribers. The
family mlppp statement contains the dynamic-profile name, and either the service-interface or the
service-device-pool, used to create the dynamic bundle IFL. If you configure a service-device-pool, an
inline services (si) interface is selected from the pool to create the dynamic bundle IFL using a round-robin
method.
You must also configure the family inet statement in the si member link dynamic profile interface for
tunneled subscribers. The family inet statement enables the L2TP long route to be installed and supported
for the lookup engine to steer control packets to the Routing Engine.
NOTE: Optionally, you can configure the dynamic profile to support mixed mode to enable PPP
subscribers to successfully log in using the dynamic profile. See “Configuring a Dynamic Profile
for Dynamic LNS Member Link IFL With Mixed Mode Support” on page 367 for the additional
configuration commands required.
1. Specify the dynamic profile that you used to create the dynamic LNS MLPPP member link previously
in “Configuring a Tunnel Group with a Pool of Service Interfaces and L2TP Access Profile Attributes”
on page 363.
[edit dynamic-profiles]
user@host# set ml-lns-member-prof
2. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
366
$junos-interface-unit. The interface and unit number variables are dynamically replaced with the interface
and unit number that the subscriber accesses when connecting to the MX Series.
NOTE: The interface setting for a dynamic profile for PPPoE sessions can use either of
the following code formats:
or
3. For the $junos-interface-ifd-name interface, set the L2TP interface dial options to specify that the logical
interface can host one session at a time (dedicated).
4. Enable MLPPP support for LNS MLPPP subscribers and configure the dynamic bundle interface (IFL)
by setting the predefined dynamic bundle interface variable $junos-bundle-interface-name.
NOTE: The family mlppp statement determines whether MLPPP is supported for
subscribers coming in from the underlying interface.
5. Specify the pool of service interfaces for the dynamic LNS MLPPP subscribers.
7. Enable support for LNS subscribers and the LNS long route.
[edit]
user@host# commit
Configuring a Dynamic Profile for Dynamic LNS Member Link IFL With Mixed Mode Support
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
Optionally, you can configure the dynamic profile to support mixed mode to enable PPP subscribers to
successfully log in using the dynamic profile.
The following example shows the additional configurations required to support mixed mode for dynamic
profiles.
NOTE: The following configuration commands are not included in the “CLI Quick Configuration”
on page 361 section.
1. Specify the dynamic profile that you used to create the dynamic LNS MLPPP member link previously
in “Configuring a Tunnel Group with a Pool of Service Interfaces and L2TP Access Profile Attributes”
on page 363.
[edit dynamic-profiles]
user@host# set ml-lns-member-prof
2. When the customer premises equipment (CPE) is for a dynamic virtual routing and forwarding (VRF)
PPP subscriber, you must configure the routing instance and its interface.
7. Follow the procedure described in “Configuring a Dynamic Profile for Dynamic LNS Member Link IFL
Without Mixed Mode Support” on page 365 to configure the basic settings for the dynamic profile.
NOTE: To enable mixed mode support, when the CPE is a PPP subscriber, you must also
add an unnumbered address, and input and output filters to the family inet statement.
8. When the CPE is a PPP subscriber, you must also configure class of service and define the traffic control
profile.
9. For the traffic-control profile, define the following settings: scheduler map, shaping rate, overhead
accounting, guaranteed rate, and delay buffer rate.
369
10. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
$junos-interface-unit.
11. For the dynamic profile interface, define the following settings: output traffic control profile, classifiers,
and rewrite rules.
12. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Step-by-Step Procedure
370
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the dynamic profile for the dynamic bundle IFL, you specify the encapsulation multilink-ppp
statement within the dynamic profile. The dynamic profile for the dynamic bundle IFL is referenced from
the dynamic profile for dynamic PPPoE and LNS member link IFLs.
You must configure the fragmentation-maps statement statically using class-of-service and assign them
in the bundle dynamic profile. You can also set these optional MLPPP parameters: MRRU, short sequence,
and fragment-threshold. The following example shows how to configure the dynamic profile for the dynamic
bundle IFL.
[edit dynamic-profiles}
user@host# set ml-bundle-prof
2. Although MLPPP member links process authentication and routing-instance assignments, if a non-default
routing-instance is assigned, you must configure the bundle IFL under the assigned routing-instance.
As a result, you must also configure routing-instances in the bundle dynamic-profile.
7. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
$junos-interface-unit. The interface and unit number variables are dynamically replaced with the interface
and unit number that the subscriber accesses when connecting to the MX Series.
8. Configure the encapsulation multilink-ppp statement to enable MLPPP bundling for the dynamic profile.
• mrru—Specifies the maximum received reconstructed unit value ranging from 1500 through 4500
bytes.
• fragment-threshold—Applies to all packets and forwarding classes, ranging from 128 through 16,320
bytes.
11. To enable fragmentation-maps support, you must configure class-of-service and define the traffic
control profile.
12. For the traffic-control profile, define the following settings: scheduler map, shaping rate, guaranteed
rate, and delay buffer rate.
372
13. Configure the underlying interface for the dynamic profile by setting the predefined dynamic interface
variable $junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number
variable $junos-interface-unit. The interface and unit number variables are dynamically replaced with
the interface and unit number that the subscriber accesses when connecting to the MX Series.
14. For the dynamic profile interface, define the output traffic control profile.
15. Define the fragmentation-map required for dynamic profile bundles and used to enable link fragmentation
and interleaving (LFI).
16. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show access, show services, and
show dynamic-profiles commands. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
user-group-profile ce-lac-1-gp;
l2tp {
multilink;
interface-id not-used;
maximum-sessions-per-tunnel 2000;
shared-secret "$9$2wgUHQF/9pB";
dynamic-profile ml-lns-member-prof;
}
}
}
}
Dynamic profile for dynamic LNS member link IFL without mixed mode:
}
}
}
}
Dynamic profile for dynamic LNS member link IFL with mixed mode:
output "$junos-output-filter";
}
}
}
class-of-service {
traffic-control-profiles {
tc-profile {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
overhead-accounting "$junos-cos-shaping-mode" bytes
"$junos-cos-byte-adjust";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
output-traffic-control-profile tc-profile;
classifiers {
dscp GEN-CLASSIFIER-IN;
}
rewrite-rules {
dscp GEN-RW-OUT-DSCP;
}
}
}
}
}
}
access-internal {
route $junos-subscriber-ip-address {
qualified-next-hop $junos-interface-name;
}
}
}
}
}
}
interfaces "$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
encapsulation multilink_ppp;
mrru 1500;
short-sequence;
fragment-threshold 320;
family inet
}
}
}
class-of-service {
traffic-control-profiles {
tcp2 {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
output-traffic-control-profile tcp2;
fragmentation-map fragmap-2
}
}
}
}
377
Verification
IN THIS SECTION
Purpose
Verify that the subscriber information for dynamic MLPPP over LNS is correct.
Action
Type: L2TP
User Name: lns-client
IP Address: 198.51.100.20
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: default
Interface: si-1/0/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: ml-lns-member-prof
Dynamic Profile Version: 1
State: Active
Radius Accounting ID: 20
Session ID: 20
Bundle Session ID: 21
Login Time: 2011-04-11 10:55:13 PDT
Type: MLPPP
User Name: lns-client
IP Address: 198.51.100.20
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: default
378
Interface: si-3/0/0.1073741825
Interface type: Dynamic
Dynamic Profile Name: ml-bundle-prof
Dynamic Profile Version: 1
State: Active
Radius Accounting ID: 21
Session ID: 21
Underlying Session ID: 20
Login Time: 2011-04-11 07:55:59 PDT
Meaning
Subscriber information for interface si-1/0/0.1073741824 has been configured for MLPPP with interface
type of dynamic.
Purpose
Verify that mixed mode interfaces negotiated correctly for the single link PPP using a dynamic
MLPPP-capable subscriber.
Action
Meaning
When a dynamic MLPPP-capable subscriber negotiates a single link PPP, the results are the same as a
non-MLPPP subscriber; no bundle IFL or SDB session is created.
Purpose
Verify that the MLPPP over LAC member link IFL is correct.
Action
Meaning
When a PPPoE MLPPP session is tunneled, the bundle and member link binding remains. Although the
bundle IFL does not participate in the control and forwarding path, it remains in the user-interface.
RELATED DOCUMENTATION
Mixed Mode Support for MLPPP and PPP Subscribers Overview | 300
Configuring L2TP Client Access to Support MLPPP for Dynamic Subscribers | 326
IN THIS SECTION
Requirements | 381
Overview | 381
Configuration | 382
Verification | 395
This example shows how to configure dynamic Point-to-Point Protocol over Ethernet (PPPoE) multilink
(MLPPP) subscribers.
Requirements
Before you configure dynamic PPPoE MLPPP subscribers, be sure you have:
• If configuring a tunnel group using an inline service (si) interface, enabled the inline service (si) interface
for PPPoE subscribers. See “Enabling Inline Service Interfaces for PPPoE and LNS Subscribers” on page 317.
• Configured the inline service (si) interface for PPPoE subscribers. See “Configuring Inline Service Interface
for PPPoE and LNS Subscribers” on page 319.
• If configuring a tunnel group using a pool of service interfaces, configured service device pools for PPPoE
subscribers. See “Configuring Service Device Pools for Load Balancing PPPoE and LNS Subscribers” on
page 320.
Overview
An MLPPP subscriber consists of two IFLs (logical interfaces), a member link, and a bundle. For dynamic
PPPoE MLPPP subscribers, you configure the dynamic pp0 member link IFLs using dynamic profiles. The
382
pp0 member link dynamic profile includes the family mlppp statement containing the dynamic profile name
and the service interface (si), or a pool of service interfaces. This information is then used to create the
dynamic bundle IFL.
Each dynamic bundle accepts only one dynamic member link. If more than one dynamic member link
attempts to join the same dynamic bundle, the system fails the new member session.
Figure 20 on page 382 shows how the different types of traffic traverse through a network where the MX
Series terminates PPPoE sessions.
Topology
The following two domains are shown terminating traffic at the MX Series:
Configuration
IN THIS SECTION
Configuring a Dynamic Profile for Dynamic pp0 Member Link IFL Without Mixed Mode Support | 384
Configuring a Dynamic Profile for Dynamic pp0 Member Link IFL With Mixed Mode Support | 387
383
Results | 392
[edit]
set interfaces ge-1/0/0 flexible-vlan-tagging
set interfaces ge-1/0/0 unit 600 encapsulation ppp-over-ether vlan-id 600
set interfaces ge-1/0/0 unit 600 pppoe-underlying-options dynamic-profile ml-pp0-member-prof
set dynamic-profiles ml-pp0-member-prof
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
pppoe-options underlying-interface "$junos-underlying-interface" server
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
ppp-options pap chap lcp-restart-timer 5000
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
family mlppp bundle “$junos-bundle-interface-name”
set dynamic-profiles ml-pp0-member-profinterfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
family mlppp service-interface si-5/1/0
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
family mlppp dynamic-profile ml-bundle-prof
set dynamic-profiles ml-pp0-member-prof interfaces “$junos-interface-ifd-name” unit “$junos-interface-unit”
family inet
[edit]
set dynamic-profiles ml-bundle-prof
set dynamic-profiles ml-bundle-prof routing-instances "$junos-routing-instance" interface
"$junos-interface-name"
set dynamic-profiles ml-bundle-prof routing-instances "$junos-routing-instance" interface
"$junos-interface-name" routing-options access route $junos-framed-route-ip-address-prefix
set dynamic-profiles ml-bundle-prof routing-instances "$junos-routing-instance" interface
"$junos-interface-name" routing-options access route $junos-framed-route-ip-address-prefix next-hop
$junos-framed-route-nexthop
set dynamic-profiles ml-bundle-prof routing-instances "$junos-routing-instance" interface
"$junos-interface-name" routing-options access route $junos-framed-route-ip-address-prefix metric
$junos-framed-route-cost
384
Configuring a Dynamic Profile for Dynamic pp0 Member Link IFL Without Mixed Mode Support
Step-by-Step Procedure
385
The following example requires that you navigate various levels in the configuration hierarchy.
You configure the dynamic pp0 member link IFLs by using dynamic profiles and including the family mlppp
statement. The family mlppp statement contains the dynamic-profile name, and either the service-interface
or the service-device-pool used to create the dynamic bundle IFL. If you configure a service-device-pool,
an inline services (si) interface is selected from the pool to create the dynamic bundle IFL using a round-robin
method.
You must also configure the family inet statement in the tunneled pp0 member link dynamic profile. The
family inet statement enables the L2TP long route to be installed and supported for the lookup engine to
steer control packets to the Routing Engine.
NOTE: Optionally, you can configure the dynamic profile to support mixed mode to enable PPP
subscribers to successfully log in using the dynamic profile. See “Configuring a Dynamic Profile
for Dynamic pp0 Member Link IFL With Mixed Mode Support” on page 387 for the additional
configuration commands required.
The following example shows how to configure dynamic pp0 member link IFLs over flexible VLAN to
support PPPoE MLPPP subscribers.
1. Create the Gigabit Ethernet underlying interface for the dynamic profile, ge-1/0/0 and enable flexible
VLAN tagging.
[edit interfaces]
user@host# set ge-1/0/0 flexible vlan-tagging
2. For the ge-1/0/0 interface, configure PPP over Ethernet encapsulation for VLAN 600.
3. Configure the PPPoE underlying interface and set its dynamic profile.
4. Specify the dynamic profile that you previously set as the PPPoE underlying interface dynamic profile.
[edit dynamic-profiles]
user@host# set ml-pp0-member-prof
5. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
386
$junos-interface-unit. The interface and unit number variables are dynamically replaced with the interface
and unit number that the subscriber accesses when connecting to the MX Series.
NOTE: The interface setting for a dynamic profile for PPPoE sessions can use either of
the following code formats:
or
6. For the $junos-interface-ifd-name interface, configure the underlying interface for the PPPoE options
and PPPoE server mode for a dynamic PPPoE logical interface in a dynamic profile.
7. Configure PPP-specific interface properties in a dynamic profile: pap, chap, and set the lcp-restart-timer
to 5000.
8. Enable MLPPP support for dynamic PPPoE MLPPP subscribers and configure the dynamic bundle
interface (IFL) by setting the predefined dynamic bundle interface variable $junos-bundle-interface-name.
NOTE: The family mlppp statement determines whether MLPPP is supported for
subscribers coming in from the subscriber interface.
9. Specify the service interface for the dynamic PPPoE MLPPP subscribers.
387
11. Enable support for PPPoE tunneled subscribers and the LAC long route.
12. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Configuring a Dynamic Profile for Dynamic pp0 Member Link IFL With Mixed Mode Support
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy.
Optionally, you can configure the dynamic profile to support mixed mode to enable PPP subscribers to
successfully log in using the dynamic profile.
The following example shows the additional configurations required to support mixed mode for dynamic
profiles.
NOTE: The following configuration commands are not included in the “CLI Quick Configuration”
on page 383 section.
1. Configure dynamic pp0 member link IFLs over flexible VLAN to support PPPoE MLPPP subscribers.
See “Configuring a Dynamic Profile for Dynamic pp0 Member Link IFL Without Mixed Mode Support”
on page 384, steps 1 through 4.
2. Specify the dynamic profile that you used to create the dynamic PPPoE MLPPP member link.
[edit dynamic-profiles]
user@host# set ml-pp0-member-prof
388
3. When the customer premises equipment (CPE) is for a dynamic virtual routing and forwarding (VRF)
PPP subscriber, you must configure the routing instance and its interface.
8. Configure the basic settings for the dynamic profile. See “Configuring a Dynamic Profile for Dynamic
pp0 Member Link IFL Without Mixed Mode Support” on page 384, steps 5 through 11.
NOTE: To enable mixed mode support, when the CPE is a PPP subscriber, you must also
add an unnumbered address, and input and output filters to the family inet statement.
9. When the CPE is a PPP subscriber, you must also configure class of service and define the traffic control
profile.
10. For the traffic-control profile, define the following settings: scheduler map, shaping rate, overhead
accounting, guaranteed rate, and delay buffer rate.
11. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
$junos-interface-unit.
12. For the dynamic profile interface, define the following settings: output traffic control profile, classifiers,
and rewrite rules.
13. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Step-by-Step Procedure
390
The following example requires that you navigate various levels in the configuration hierarchy.
To configure the dynamic profile for the dynamic bundle IFL, you specify the encapsulation multilink-ppp
statement within the dynamic profile. The dynamic profile for the dynamic bundle IFL is referenced from
the dynamic profile for dynamic PPPoE and LNS member link IFLs.
You must configure the fragmentation-maps statement statically using class-of-service and assign them
in the bundle dynamic profile. You can also set these optional MLPPP parameters: MRRU, short sequence,
and fragment-threshold. The following example shows how to configure the dynamic profile for the dynamic
bundle IFL:
[edit dynamic-profiles}
user@host# set ml-bundle-prof
2. Although MLPPP member links process authentication and routing-instance assignments, if a non-default
routing-instance is assigned, you must configure the bundle IFL under the assigned routing-instance.
As a result, you must also configure routing-instances in the bundle dynamic-profile.
7. Configure the interface for the dynamic profile by setting the predefined dynamic interface variable
$junos-interface-ifd-name, and the logical interface unit by setting the predefined unit number variable
$junos-interface-unit. The interface and unit number variables are dynamically replaced with the interface
and unit number that the subscriber accesses when connecting to the MX Series.
8. Configure the encapsulation multilink-ppp statement to enable MLPPP bundling for the dynamic profile.
• mrru—Specifies the maximum received reconstructed unit value ranging from 1500 through 4500
bytes.
• fragment-threshold—Applies to all packets and forwarding classes, ranging from 128 through 16,320
bytes.
11. To enable fragmentation-maps support, you must configure class of service and define the traffic
control profile.
12. For the traffic-control profile, define the following settings: scheduler map, shaping rate, guaranteed
rate, and delay buffer rate.
392
13. Configure the underlying interface for the dynamic profile by setting the predefined dynamic interface
variable $junos-interface-ifd-name, and the underlying logical interface unit by setting the predefined
unit number variable $junos-interface-unit. The interface and unit number variables are dynamically
replaced with the interface and unit number that the subscriber accesses when connecting to the MX
Series.
14. For the dynamic profile interface, define the output traffic control profile.
15. Define the fragmentation-map required for dynamic profile bundles and used to enable link fragmentation
and interleaving (LFI).
16. If you are done configuring the device, commit the configuration.
[edit]
user@host# commit
Results
From configuration mode, confirm your configuration by entering the show dynamic-profiles command
with the sub-hierarchy levels interfaces. If the output does not display the intended configuration, repeat
the instructions in this example to correct the configuration.
flexible- vlan-tagging;
unit 600 {
encapsulation ppp-over-ether;
vlan-id 600;
pppoe-underlying-options {
dynamic-profile ml-pp0-member-prot;
}
}
}
}
Dynamic profile for dynamic PPPoE member link IFL without mixed mode:
Dynamic profile for dynamic PPPoE member link IFL with mixed mode:
routing-options {
access {
route $junos-framed-route-ip-address-prefix {
next-hop $junos-framed-route-nexthop;
metric $junos-framed-route-cost;
preference $junos-framed-route-distance;
}
}
access-internal {
route $junos-subscriber-ip-address {
qualified-next-hop $junos-interface-name;
}
}
}
}
}
}
interfaces $"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
ppp-options {
pap;
chap;
lcp-restart-timer 5000;
}
family mlppp {
bundle $junos-bundle-interface-name;
service-interface si-5/1/0;
dynamic-profile ml-bundle-prof;
}
family inet {
unnumbered-address $junos-loopback-interface;
filter {
input "$junos-input-filter";
output "$junos-output-filter";
}
}
}
class-of-service {
traffic-control-profiles {
tc-profile {
395
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
overhead-accounting "$junos-cos-shaping-mode" bytes
"$junos-cos-byte-adjust";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-interface-unit" {
output-traffic-control-profile tc-profile;
classifiers {
dscp GEN-CLASSIFIER-IN;
}
rewrite-rules {
dscp GEN-RW-OUT-DSCP;
}
}
}
}
}
}
Verification
IN THIS SECTION
Purpose
Verify that the subscriber information for dynamic MLPPP over PPPoE is correct.
396
Action
Type: PPPoE
User Name: [email protected]
Logical System: default
Routing Instance: default
Interface: pp0.1073741824
Interface type: Dynamic
Underlying Interface: ge-1/1/0.3000
Dynamic Profile Name: DS-lac-mlppp-link-ipv6
MAC Address: 00:00:5E:00:53:02
State: Active
PPP State: Tunneled
Local IP Address: 198.51.100.21
Remote IP Address: 198.51.100.22
Radius Accounting ID: 5
Session ID: 5
Bundle Session ID: 6
VLAN Id: 3000
Login Time: 2013-03-28 15:42:30 PDT
Type: MLPPP
Logical System: default
Routing Instance: default
Interface: si-1/1/0.1073741825
Interface type: Dynamic
Underlying Interface: si-1/1/0.1073741825
Dynamic Profile Name: DS-mlppp-bundle-ipv6
State: Active
PPP State: Tunneled
Local IP Address: N/A
Remote IP Address: N/A
Radius Accounting ID: 6
Session ID: 6
Underlying Session ID: 5
Login Time: 2013-03-28 15:42:30 PDT
Meaning
When a PPPoE MLPPP session is tunneled, the bundle and member link binding is maintained. The PPP
State setting for both bundle and member link is set to Tunneled. Although there is no NCP negotiation
over the bundle, the bundle session remains active.
397
Purpose
Verify that mixed-mode interfaces negotiated correctly for the single link PPP using a dynamic
MLPPP-capable subscriber.
Action
Not-configured
CHAP state: Closed
PAP state: Success
Protocol inet, MTU: 65531, Generation: 384, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Is-Primary
Destination: Unspecified, Local: 198.51.100.11, Broadcast: Unspecified,
Generation: 297
Protocol inet6, MTU: 65531, Generation: 385, Route table: 0
Addresses, Flags: Is-Primary
Destination: Unspecified, Local: 2030::1
Generation: 298
Destination: Unspecified, Local: fe80::2a0:a50f:fc64:6ef2
Generation: 299
Meaning
When a dynamic MLPPP-capable subscriber negotiates a single link PPP, the results are the same as a
non-MLPPP subscriber; no bundle IFL or SDB session is created.
Purpose
Verify that the PPPoE MLPPP member link IFL is correct.
Action
Input packets: 6
Output packets: 3
Transit statistics:
Input bytes : 135 0 bps
Output bytes : 115 0 bps
Input packets: 7 0 pps
Output packets: 7 0 pps
Keepalive settings: Interval 45 seconds, Up-count 1, Down-count 3
LCP state: Opened
NCP state: inet: Not-configured, inet6: Not-configured, iso: Not-configured,
mpls:
Not-configured
CHAP state: Closed
PAP state: Closed
Protocol inet, MTU: 1492, Generation: 15534, Route table: 0
Flags: Sendbcast-pkt-to-re
Protocol mlppp, Multilink bundle: si-1/0/0.1073756922
Service device pool: sipool-1, Dynamic profile: ml-bundle-prof
MTU: 1526, Generation: 15533, Route table: 0
Meaning
When a PPPoE MLPPP session is tunneled, the bundle and member link binding remains. Although the
bundle IFL does not participate in the control and forwarding path, it remains in the user interface.
RELATED DOCUMENTATION
CHAPTER 30
IN THIS CHAPTER
Dynamic PPP Subscriber Services for Static MLPPP Interfaces Overview | 401
Dynamic subscriber services are supported for MLPPP bundle interfaces, with certain interface and
hardware restrictions. See “Hardware Requirements for PPP Subscriber Services on Non-Ethernet Interfaces”
on page 402. Multiclass MLPPP enables the relative prioritization of up to eight classes of traffic over an
MLPPP bundle, but only on link services intelligent queuing (IQ) (LSQ) interfaces.
RADIUS previously supported only authentication for MLPPP. Address management, service deactivation,
and dynamic selection of subscriber properties based on RADIUS user ID are now also supported.
RADIUS can dynamically allocate IPv4 addresses for MLPPP connections. When the first subscriber logs
in, an address is allocated. The same address is allocated to all links in a bundle. Any other address provided
for any of the links is ignored. The IP address is released for re-allocation when the last member link in a
bundle logs out. Similar to the address allocation, the services configured for the first subscriber to log in
are configured for all subsequent subscribers in the bundle.
The Acct-Multi-Session-Id [50] attribute enables RADIUS to link multiple related sessions into a single log
file. RADIUS uses the session database (SDB) bundle session ID for the value of Acct-Multi-Session-Id.
This bundle ID enables RADIUS to initiate a disconnect for an entire bundle. By tracking the member link
sessions, RADIUS is also able to disconnect the individual member links in a bundle.
The Acct-Link-Count [51] attribute records the number of links present in a multilink session at the time
the accounting record is generated.
402
RELATED DOCUMENTATION
PPP subscriber services are supported for MLPPP bundle interfaces. These services require the following
hardware:
• MX Series router
• An Adaptive Services PIC or Multiservices PIC to support subscriber services on LSQ MLPPP bundle
interfaces
Subscriber services are not supported for single-link PPP interfaces with this hardware.
RELATED DOCUMENTATION
Dynamic PPP Subscriber Services for Static MLPPP Interfaces Overview | 401
You can configure PPP subscriber services for static LSQ MLPPP bundle interfaces.
To configure PPP subscriber services for static LSQ MLPPP bundle interfaces:
See “Enabling PPP Subscriber Services for Static Non-Ethernet Interfaces” on page 403.
RELATED DOCUMENTATION
403
You can enable PPP subscriber services for certain non-Ethernet interface types on particular associated
PICs. Supported interfaces are listed in “Hardware Requirements for PPP Subscriber Services on
Non-Ethernet Interfaces” on page 402.
[edit chassis]
user@host# set ppp-subscriber-services enable
[edit chassis]
user@host# set ppp-subscriber-services disable
RELATED DOCUMENTATION
For hardware requirements, see Hardware Requirements for PPP Subscriber Services on Non-Ethernet
Interfaces | 402
Configuring PPP Subscriber Services for MLPPP Bundles | 402
404
You can attach a dynamic profile to a static MLPPP bundle interface. When a PPP subscriber logs in on a
member link, the specified dynamic profile is instantiated and the services defined in the profile are applied
to the LSQ bundle interface.
2. Specify the dynamic profile you want to associate with the interface.
RELATED DOCUMENTATION
This example shows the minimum configuration for a dynamic profile that is used for static LSQ MLPPP
bundle interfaces.
dynamic-profiles {
mlppp-profile-1 {
interfaces {
"$junos-interface-ifd-name" {
405
unit "$junos-underlying-interface-unit";
}
}
}
}
RELATED DOCUMENTATION
This example shows how to configure dynamic subscriber services on MLPPP bundle interfaces. The
MLPPP bundles must be configured on link services intelligent queuing (IQ) (LSQ) interfaces. The MLPPP
interfaces must be statically configured.
[edit]
class-of-service
classifiers {
inet-precedence inet_classifier {
forwarding-class best-effort {
loss-priority low code-points 000;
}
forwarding-class expedited-forwarding {
loss-priority low code-points 011;
}
forwarding-class assured-forwarding {
loss-priority low code-points 100;
}
}
}
fragmentation-maps {
sample-fragmap {
forwarding-class {
best-effort {
fragment-threshold 1000;
406
multilink-class 1:
}
assured-forwarding {
fragment-threshold 1000;
multilink-class 2:
}
expedited-forwarding {
multilink-class 3:
}
}
}
}
forwarding-classes {
queue 0 best-effort;
queue 1 expedited-forwarding;
queue 2 assured-forwarding;
}
# traffic classifiers are statically defined
network traffic interface{
classifiers {
inet-precedence inet_classifier;
}
}
scheduler-maps {
allthree {
forwarding-class best-effort scheduler be-scheduler;
forwarding-class expedited-forwarding scheduler hiprior-sched;
forwarding-class assured-forwarding scheduler vpn-sched;
}
}
schedulers {
be-scheduler {
transmit-rate percent 30;
priority low;
}
hiprior-scheduler {
transmit-rate percent 40;
priority strict-high;
}
vpn-sched {
transmit-rate percent 30;
medium-high;
}
}
407
[edit interfaces]
t1-3/1/0:1:1 {
keepalives interval 600;
encapsulation ppp;
unit 0 {
ppp-options {
lcp-restart-timer 5000;
}
family mlppp {
bundle lsq-3/3/0.0;
}
}
}
t1-3/1/0:1:2 {
keepalives interval 600;
encapsulation ppp;
unit 0 {
ppp-options {
lcp-restart-timer 5000;
}
family mlppp {
bundle lsq-3/3/0.0;
}
}
}
lsq-3/3/0 {
unit 0 {
encapsulation multilink-ppp;
multilink-max-classes 4;
ppp-options {
ncp-restart-timer 10000;
dynamic-profile mlppp-profile;
}
family inet {
address 192.168.1.1/32 {
destination 192.168.25.45;
}
408
}
}
}
3. Configure the dynamic profile that is applied to the MLPPP bundle interfaces.
[edit]
dynamic-profiles {
mlppp-profile {
interfaces {
"$junos-interface-ifd-name" {
unit junos-underlying-interface-unit" {
family inet {
filter {
input "$junos-input-filter";
output "$junos-output-filter";
}
}
}
}
}
class-of-service {
interfaces {
"$junos-interface-ifd-name" {
unit junos-underlying-interface-unit" {
output-traffic-control-profile tcp1;
fragmentation-map sample-fragmap;
}
}
}
traffic-control-profiles {
tcp1 {
scheduler-map "junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
scheduler-maps {
data_smap {
forwarding-class be scheduler data_sch;
}
}
409
schedulers {
be_sch {
...
}
}
}
}
}
RELATED DOCUMENTATION
CHAPTER 31
IN THIS CHAPTER
IN THIS SECTION
For broadband subscriber management edge router Point-to-Point Protocol (PPP) subscribers, the accounting
statistics contain two groups:
• The aggregate (IPv4 and IPv6) statistics group consists of statistics reported through these RADIUS
attributes: Acct-Input-Octets, Acct-Output-Octets, Acct-Input-Packets, and Acct-Output-Packets.
• The IPv6 portion of the aggregate statistics group reported through the Juniper Networks ERX-VSAs
151 through 156.
Broadband subscriber management edge router PPP logical interfaces (IFLs) support accurate accounting
statistics by excluding PPP control traffic, and incrementing packet and octets at the point where the
packet is about to leave the router. The packet is not dropped by CoS, filters, or policers.
For MLPPP subscribers, accounting is performed for each member link (currently limited to one) and not
the bundle. The bundle IFL supports accurate accounting statistics only, and the member link supports
transit statistics only. As a result, the following restrictions apply for member link final aggregate statistics:
• Only aggregate statistics are available with no IPv6 specific statistics; for example, ERX-VSA 151 to 156
are all zeros.
• Packets sent and received over the member link include fragments and non-fragmented packets.
• Octets sent and received are bytes in the fragments and non-fragmented packets.
• Aggregate statistics include packets that can be dropped in the router, such as CoS, filters, and policers.
• Aggregate statistics include PPP control packets (LCP, PAP, CHAP, and NCP) and keepalive packets.
The following topics describe the statistics collection process in the lookup engine for member links and
its bundle.
MLPPP with MPC2 currently supports only one member link per bundle. However, support for accounting
statistics must consider a true multilink scenario where multiple member links exist per bundle. From the
lookup engine, only the bundle has the ability to maintain Layer 3 statistics. For an individual member link,
only protocol-agnostic fragments (plus non-fragmented packets) are counted.
Figure 21 on page 413 shows an MLPPP client with two active member links and the statistics maintained
by the lookup engine. For MLPPP with MPC2, each member link and bundle can reside on different lookup
engines from where the accounting statistics are maintained.
413
• F1 is sent on Link 1
• F2 is sent on Link 2
When Link 1 on the MX Series receives fragment F1, it is identified as an MLPPP encapsulated fragment.
Because IPv4 or IPv6 families are indicated on the first fragment, all of the incoming fragments are counted
using a protocol-agnostic method before the fragment is forwarded to the bundle for reassembly.
• The protocol-agnostic incoming byte count is incremented by the size of the fragment.
Similarly on Link 2, fragment F2 is also counted using a protocol-agnostic method, and then forwarded to
the bundle for reassembly.
Fragment F1 arrives at the bundle and is stored along with its MLPPP header containing the sequence
number with the begin flag set to 0, and the end flag set to 1.
Fragment F2 arrives at the bundle and is stored along with its MLPPP header containing the sequence
number with the begin flag set to 1, and the end flag set to 0.
The pattern of monotonically increasing sequence numbers, begin flag set to 1 and end flag set to 1, causes
fragments F1 and F2 to be reassembled into a single packet.
After the packet has been reassembled, the packet's Layer 3 type (either IPv4 or IPv6) is determined at
the bundle. Then, the packets and bytes are counted according to its Layer 3 type at the bundle based on
accurate accounting statistics:
• bundleA_ipv4_packets_from_client += 1
• bundleA_ipv4_bytes_from_client += packet_size
Or
• bundleA_ipv6_packets_from_client += 1
• bundleA_ipv6_bytes_from_client += packet_size
414
The packets and bytes are counted according to its Layer 3 type at the bundle:
• bundleA_ipv4_packets_to_client += 1
• bundleA_ipv4_bytes_to_client += packet_size
Or
• bundleA_ipv6_packets_to_client += 1
• bundleA_ipv6_bytes_to_client += packet_size
If the packets are fragmented, the fragments belonging to the same packet can be sent out different links.
Because no IPv4 or IPv6 families are indicated on the links, all of the outgoing fragments are counted using
a protocol-agnostic method.
• The protocol-agnostic outgoing byte count is incremented by the size of the fragment.
User-Name = "[email protected]"
Acct-Status-Type = Stop
Acct-Session-Id = "786"
Acct-Multi-Session-Id = "787"
Acct-Input-Octets = 1068151928
Acct-Output-Octets = 4268692096
Acct-Session-Time = 61965
Acct-Input-Packets = 406636696
Acct-Output-Packets = 357477811
Acct-Terminate-Cause = Lost-Carrier
Service-Type = Framed-User
Framed-Protocol = PPP
Framed-IPv6-Pool = "v6-pool-21"
Acct-Authentic = RADIUS
Acct-Delay-Time = 0
ERX-Dhcp-Mac-Addr = "0090.1a41.ec2d"
Event-Timestamp = "Oct 19 2012 10:31:03 IST"
Framed-IP-Address = 10.0.0.3
Framed-IP-Netmask = 255.0.0.0
ERX-Input-Gigapkts = 0
415
Acct-Input-Gigawords = 6
NAS-Identifier = "kalka"
NAS-Port = 306184213
NAS-Port-Id = "ge-1/1/9.21:21"
NAS-Port-Type = Ethernet
ERX-Output-Gigapkts = 0
Acct-Output-Gigawords = 4
ERX-Attr-151 = 0x00000000
ERX-Attr-152 = 0x00000000
ERX-Attr-153 = 0x00000000
ERX-Attr-154 = 0x00000000
ERX-Attr-155 = 0x00000000
ERX-Attr-156 = 0x00000000
NAS-IP-Address = 10.1.1.2
Acct-Unique-Session-Id = "03eeef735aef3520"
Timestamp = 1350604541
Request-Authenticator = Verified
RELATED DOCUMENTATION
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 461
CHAPTER 32
IN THIS CHAPTER
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 430
IN THIS SECTION
By using the ATM Modular Interface Card (MIC) with small form-factor pluggable transceiver (SFP) and a
supported Modular Port Concentrator (MPC), you can configure the MX Series router to support
configurations that enable subscribers to access the router over an ATM network using ATM Adaptation
Layer 5 (AAL5) permanent virtual connections (PVCs). Using these configurations enables the delivery of
subscriber-based services, such as class of service (CoS) and firewall filters, for subscribers accessing the
router over an ATM network.
On MX Series routers with MPC/MIC interfaces that use the ATM MIC with SFP (Model Number
MIC-3D-8OC3-2OC12-ATM), you can create the following configurations to enable subscribers to access
the router over an ATM network using ATM Adaptation Layer 5 (AAL5) permanent virtual connections
(PVCs):
• PPP-over-Ethernet-over-ATM
• Routed IP-over-ATM
• Bridged IP-over-Ethernet-over-ATM
• PPP-over-ATM
PPP-over-Ethernet-over-ATM Configurations
PPPoE-over-ATM configurations require static configuration of the underlying ATM physical interface
and ATM logical interface. You can configure the PPPoE (pp0) subscriber interface either dynamically, by
means of a dynamic profile, or statically. You must also configure the ATM underlying interface with
PPPoE-over-ATM logical link control (LLC) encapsulation (encapsulation ppp-over-ether-over-atm-llc).
Using dynamic PPPoE-over-ATM configurations for ATM subscriber access enables you to configure an
MX Series router to dynamically create PPPoE logical subscriber interfaces over static ATM underlying
interfaces only when needed; that is, when a subscriber logs in on the associated underlying interface.
Dynamic PPPoE over static ATM configurations are not supported on M Series routers and T Series routers.
Optionally, you can dynamically or statically apply subscriber services such as class of service (CoS) and
firewall filters to the PPPoE (pp0) subscriber interface. For PPPoE-over-ATM configurations that create a
dynamic PPPoE subscriber interface, you can configure CoS attributes and firewall filters in the dynamic
421
profile that defines the pp0 subscriber interface. For PPPoE-over-ATM configurations that create a static
PPPoE subscriber interface, you can statically configure CoS attributes and firewall filters as you would
for any static interface configured on an MX Series router.
Routed IP-over-ATM (IPoA) configurations support statically created IPv4 and IPv6 logical subscriber
interfaces over static ATM underlying interfaces. IPoA configurations are typically used to implement
business digital subscriber line (DSL) connections that do not require connection negotiation for address
assignment.
IPoA configurations require static configuration of the ATM underlying interface, IPv4 interface, IPv6
interface, CoS attributes, and firewall fiters. Dynamic configuration of these components is not supported.
To configure IPoA subscriber access, specify either of the following encapsulation types on the ATM
underlying interface:
• For IPoA encapsulation with logical link control (LLC), configure ATM subnetwork attachment point
(SNAP) encapsulation (encapsulation atm-snap).
• For IPoA encapsulation with virtual circuit (VC) multiplexing, configure ATM VC multiplex encapsulation
(encapsulation atm-vc-mux).
Optionally, you can statically configure subscriber services such as CoS and firewall filters and apply them
to the IPv4 or IPv6 interface; you cannot use a dynamic profile for this purpose.
For bridged IP-over-Ethernet-over-ATM configurations on an MX Series router, you must configure the
ATM underlying interface with Ethernet-over-ATM LLC encapsulation (encapsulation ether-over-atm-llc).
IPoE-over-ATM configurations require static configuration of the ATM underlying interface, IP interface,
CoS attributes, and firewall fiters. Dynamic configuration of these components is not supported. Optionally,
you can statically configure subscriber services such as class of service (CoS) and firewall filters and apply
them to the IPv4 or IPv6 interface; you cannot use a dynamic profile for this purpose.
422
PPP-over-ATM Configurations
PPP-over-ATM (PPPoA) configurations support statically created PPP logical subscriber interfaces over
static ATM underlying interfaces. Most features supported for PPPoE configurations are also supported
for PPP access to an MX Series router over an ATM network.
PPPoA configurations require static configuration of the ATM underlying interface and PPP subscriber
interface.
To configure PPPoA subscriber access, you must configure either of the following encapsulation types on
each PPP logical subscriber interface:
• For PPPoA encapsulation with logical link control (LLC), configure PPP-over-AAL5 LLC encapsulation
(encapsulation atm-ppp-llc).
• For PPPoA encapsulation with virtual circuit (VC) multiplexing, configure PPP-over-AAL5 multiplex
encapsulation (encapsulation atm-ppp-vc-mux).
Optionally, you can use dynamic profiles to dynamically or statically apply subscriber services, such as CoS
attributes and firewall filters, to the static PPP subscriber interface. Configuring CoS and firewall filters in
this manner enables you to efficiently and economically provide these services to PPP subscribers accessing
the router over an ATM network.
You can configure subscriber interfaces for both PPPoE-over-ATM and IPoE-over-ATM concurrently on
a single ATM PVC. IPoE-over-ATM includes support for both IPv4-over-Ethernet-over-ATM interfaces
and IPv6-over-Ethernet-over-ATM interfaces.
In concurrent PPPoE-over-ATM and IPoE-over-ATM configurations, you define the ATM logical interface
with IPoE-over-ATM encapsulation and specify PPPoE-over-ATM as a supported family. The
PPPoE-over-ATM underlying interface with IPoE-over-ATM encapsulation processes PPPoE Discovery
packets to establish the PPPoE session. When the PPPoE-over-ATM session is established, the router
processes PPPoE-over-ATM session packets and applies PPPoE-over-ATM–specific features on the
PPPoE-over-ATM session interface.
The concurrent PPPoE-over-ATM and IPoE-over-ATM configuration supports all features specific to
PPPoE-over-ATM interfaces and IPoE-over ATM interfaces, with no changes. These features include the
following:
• Traffic control profiles with ATM virtual path (VP) shaping and ATM virtual circuit (VC) shaping
• Firewall filters
• Interface statistics
• PPPoE-over-ATM statistics
You use the same basic statements, commands, and procedures to create, verify, and manage
PPPoE-over-ATM, IPoA, IPoE-over-ATM, and PPPoA configurations as the statements, commands, and
procedures you use for static configurations on M Series routers and T Series routers, and for dynamic
PPPoE configurations on MX Series routers.
A critical element of configuring ATM subscriber access is ensuring that you specify the correct encapsulation
type for the ATM logical interface. The encapsulation type you use depends on the supported configuration
and, for IPoA and PPPoA configurations, whether you want to configure an encapsulation type that uses
logical link control (LLC) or virtual circuit (VC) multiplexing.
On MX Series routers with Modular Port Concentrator (MPC) interfaces and an ATM Modular Interface
Card (MIC) with small form-factor pluggable transceiver (SFP) installed, you can configure class of service
(CoS) hierarchical shaping for the traffic carried on an ATM virtual path (VP). Traffic shaping helps you
manage and regulate the traffic flow in your network by shaping the traffic on the VP to a specified rate.
With traffic shaping, you can better control the traffic flow to avoid network congestion, and ensure that
the traffic adheres to the class-of-service policies you set for it.
To configure hierarchical VP shaping on an ATM MIC with SFP (Model number MIC-3D-8OC3-2OC12-ATM),
you must configure an interface set that consists of the ATM logical interface units on the ATM physical
interface. The members of the interface set must all share the same virtual path identifier (VPI) and have
different virtual circuit identifiers (VCIs). You then define one or more CoS traffic control profiles that
424
include the ATM service category (atm-service) and the peak cell rate (peak-rate), sustained cell rate
(sustained-rate), and maximum burst size (max-burst-size) parameters.
The ATM service category works in conjunction with the peak cell rate, sustained cell rate, and maximum
burst size ATM cell parameters to shape the traffic leaving the interface. Finally, you apply a specified
traffic control profile to the output traffic at the interface set and at each of its member ATM logical
interfaces.
In the queueing model used for ATM VP hierarchical shaping on ATM MICs with SFP, the ATM physical
interface functions as a level 1 scheduler node, the interface set containing the ATM logical interfaces
functions as a level 2 scheduler node, and the ATM logical interfaces function as level 3 scheduler nodes.
The following configuration requirements apply to ATM VP shaping on ATM MICs with SFP:
• All ATM interfaces that belong to the same interface set must share the same virtual path identifier (VPI)
and have a unique virtual circuit identifier (VCI).
• The ATM interface set can include only ATM interfaces. It cannot include Ethernet interfaces.
• The ATM interface set cannot include PPPoE over ATM interfaces, but it can include the underlying
ATM interface over which PPPoE over ATM is carried.
RELATED DOCUMENTATION
To enable subscriber access to an MX Series router over an ATM network, you can create any of the
following configurations on Modular Port Concentrator/Modular Interface Card (MPC/MIC) interfaces
that use the ATM MIC with SFP:
• Routed IP-over-ATM (IPoA) with a static IPv4 or IPv6 subscriber interface over a static ATM underlying
interface
• PPP-over-ATM (PPPoA) with a static PPP subscriber interface over a static ATM underlying interface
As part of the configuration procedure, you must specify the appropriate encapsulation type for your
configuration on the ATM logical interface.
Table 12 on page 425 lists and describes the encapsulation type you must specify as part of the encapsulation
statement when you configure the ATM logical interface for each supported configuration.
Table 12: Encapsulation Types for Supported ATM Subscriber Access Configurations
Table 12: Encapsulation Types for Supported ATM Subscriber Access Configurations (continued)
and
PPP-over-ATM (PPPoA) atm-ppp-llc (for PPPoA with logical PPP-over-AAL5 encapsulation with LLC
link control)
RELATED DOCUMENTATION
• Make sure you specify the correct encapsulation type on the ATM logical interface for your configuration,
as described in “ATM for Subscriber Access Encapsulation Types Overview” on page 425.
• For dynamic or static PPPoE-over-ATM configurations, you must configure the router to act as a PPPoE
server (also known as a remote access concentrator). Configuring the router to act as a PPPoE client is
not supported in these configurations.
• For dynamic PPPoE-over-ATM configurations, issue the dynamic-profile profile-name statement at the
[edit interfaces interface-name unit logical-unit-number family pppoe] hierarchy level to associate the
ATM logical interface with the dynamic profile that defines the PPPoE subscriber interface.
• Specify interface-specific options at the [edit interfaces interface-name unit logical-unit-number family
inet] hierarchy level (for IPv4) or at the [edit interfaces interface-name unit logical-unit-number family
inet6] hierarchy level (for IPv6).
• Specify PPP-specific options at the [edit interfaces interface-name unit logical-unit-number ppp-options]
hierarchy level.
RELATED DOCUMENTATION
On MX Series routers with MPC/MIC interfaces that use the ATM MIC with SFP, you can create the
following configurations to enable subscribers to access the router over an ATM network using ATM
Adaptation Layer 5 (AAL5) permanent virtual connections (PVCs):
• PPP-over-Ethernet-over-ATM (PPPoE-over ATM) with a dynamic PPPoE (pp0) subscriber interface over
a static ATM underlying interface
• PPP-over-Ethernet-over-ATM (PPPoE-over ATM) with a static PPPoE (pp0) subscriber interface over a
static ATM underlying interface
• Routed IP-over-ATM (IPoA) with a static IPv4 or IPv6 subscriber interface over a static ATM underlying
interface
• Bridged IP-over-Ethernet-over-ATM with a static IPv4 or IPv6 subscriber interface over a static ATM
underlying interface
• PPP-over-ATM (PPPoA) with a static PPP subscriber interface over a static ATM underlying interface
1. Make sure the MX Series router you are using has Modular Port Concentrator/Modular Interface Card
(MPC/MIC) interfaces and an ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) installed
and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
3. If your configuration includes dynamic profiles for PPPoE, class of service (CoS) attributes, or standard
firewall filters, make sure you understand how to configure these attributes and apply them to the
subscriber interface.
• For PPPoE dynamic profiles, see “Configuring Dynamic PPPoE Subscriber Interfaces” on page 192
• For CoS configuration, see Configuring Traffic Scheduling and Shaping for Subscriber Access
• For standard firewall flter configuration, see Guidelines for Configuring Firewall Filters and Guidelines
for Applying Standard Firewall Filters
1. For a PPPoE-over-ATM configuration with a dynamic PPPoE (pp0) subscriber interface, create a dynamic
profile that defines the pp0 subscriber interface.
See “Example: Configuring a Dynamic PPPoE Subscriber Interface over ATM” on page 437.
2. Configure one or more virtual path identifiers (VPIs) on the ATM physical interface.
See “ATM for Subscriber Access Encapsulation Types Overview” on page 425.
b. Configure a virtual circuit identifier (VCI) for each VPI configured on the ATM logical interface.
See “Guidelines for Configuring ATM for Subscriber Access” on page 427.
4. For static PPPoE-over-ATM configurations, define the static PPPoE (pp0) subscriber interface at the
[edit interfaces pp0 unit logical-unit-number] hierarchy level.
See “Example: Configuring a Static PPPoE Subscriber Interface over ATM” on page 449.
See RADIUS Servers and Parameters for Subscriber Access and Configuring the RADIUS NAS-Port Extended
Format for ATM Interfaces.
See “Verifying and Managing ATM Configurations for Subscriber Access” on page 497.
RELATED DOCUMENTATION
430
Starting in Junos OS Release 14.2, on MX Series routers with Modular Port Concentrator (MPC) interfaces
and an ATM Modular Interface Card (MIC) with small form-factor pluggable transceiver (SFP) installed,
you can configure class-of-service (CoS) hierarchical shaping and schedule for the traffic carried on an
ATM virtual path (VP).
After you configure the ATM physical interface and logical interface units, you must configure an interface
set that consists of the ATM logical interface units. You then define one or more CoS traffic control profiles
that includes the ATM service category (atm-service) and the peak cell rate (peak-rate), sustained cell rate
(sustained-rate), and maximum burst size (max-burst-size) parameters. Finally, you apply the specified
traffic control profile to the output traffic at the interface set and at its member ATM logical interface
units.
1. Enable CoS hierarchical shaping and scheduling on the ATM physical interface.
2. Specify that you want to configure ATM-specific options on the physical interface.
3. Configure one or more virtual path identifiers (VPIs) on the ATM physical interface.
4. Configure the appropriate encapsulation type for the ATM logical interface.
5. Configure one or more virtual circuit identifiers (VCI) for each VPI defined on the ATM physical interface.
7. Define the set of ATM logical interfaces for which you want to configure hierarchical schedulers.
[edit interfaces}
user@host# edit interface-set interface-set-name
NOTE: All ATM logical interfaces that belong to the same interface set must share
the same VPI and have a unique VCI.
432
8. Configure one or more traffic shaping and scheduling profiles. For each traffic control profile:
a. Specify the service category that determines the traffic shaping parameter for the ATM queue at
the ATM MIC with SFP.
b. Configure the transmit rate, shaping rate, and default excess rate for the ATM queue.
The ATM service category works in conjunction with the peak-rate, sustained-rate, and max-burst-size
ATM cell parameters to configure traffic shaping, transmit rate, shaping rate, and default excess rate
for an ATM queue.
9. Apply the traffic control profile to the output traffic at the interface set.
10. Apply the traffic control profile to the output traffic at each member interface of the ATM interface
set.
The following example configures ATM VP shaping on interface at-1/0/4 with VPI 40. The example defines
an ATM interface set named atm-vp-ifset with two member ATM logical interfaces, at-1/0/4.50 and
at-1/0/4.51, both of which use VPI 40. Traffic control profiles atm-vp-tcp1, atm-vp-tcp2, and atm-vp-tcp3
are each defined with the atm-service, peak-rate, sustained-rate, and max-burst size cell parameters.
Finally, the output-traffic-control-profile statement applies traffic control profile atm-vp-tcp1 to the output
traffic at interface at-1/0/4.50, atm-vp-tcp2 to the output traffic at interface at-1/0/4.51, and atm-vp-tcp3
to the output traffic at the atm-vp-ifset interface set.
[edit]
# Configure ATM Physical Interface
user@host# set interfaces at-1/0/4 hierarchical-scheduler
433
Release Description
14.2 Starting in Junos OS Release 14.2, on MX Series routers with Modular Port Concentrator (MPC)
interfaces and an ATM Modular Interface Card (MIC) with small form-factor pluggable transceiver
(SFP) installed, you can configure class-of-service (CoS) hierarchical shaping and schedule for the
traffic carried on an ATM virtual path (VP).
434
RELATED DOCUMENTATION
CHAPTER 33
IN THIS CHAPTER
Configuring Concurrent PPPoE-over-ATM and IPoE-over-ATM Subscriber Interfaces on an ATM PVC | 435
When the router detects the family pppoe stanza and the IPoE-over-ATM encapsulation, it identifies the
configuration as concurrently supporting both PPPoE-over-ATM and IPoE-over-ATM on the same ATM PVC.
1. Specify that you want to configure ATM-specific options on the physical interface.
5. Configure one or both of the following IP protocol families and addresses as appropriate for your
network configuration.
6. Configure PPPoE-over-ATM as a supported family by associating a PPPoE dynamic profile with the
ATM logical interface.
The dynamic profile defines PPPoE-specific options for the pp0 logical interface, and establishes the
PPPoE session. When the PPPoE-over-ATM session is established, PPPoE-over-ATM features operate
on the PPPoE-over-ATM session interface.
7. Enable the IPv6 neighbor discovery protocol for the ATM logical interface.
[edit]
user@host# set interfaces at-1/2/0 atm-options vpi 10
user@host# set interfaces at-1/2/0 unit 200 encapsulation ether-over-atm-llc
user@host# set interfaces at-1/2/0 unit 200 vci 10.200
user@host# set interfaces at-1/2/0 unit 200 family inet address 10.101.103.1/24
user@host# set interfaces at-1/2/0 unit 200 family inet6 address 201.db8:13:13::1/64
user@host# set interfaces at-1/2/0 unit 200 family pppoe dynamic-profile pppoeoa-profile
user@host# set protocols router-advertisement interface at-1/2/0.200 prefix 201.db8:13:13::/64
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 438
Overview | 438
Configuration | 440
Verification | 446
This example illustrates a Point-to-Point Protocol over Ethernet (PPPoE) over ATM configuration that
creates a dynamic PPPoE (pp0) subscriber interface over a static ATM underlying interface on an MX Series
router. The router must have Module Port Concentrator/Modular Interface Card (MPC/MIC) interfaces
that use an ATM MIC with small form-factor pluggable transceiver (SFP).
438
NOTE: You can also configure a static PPPoE interface over a static ATM underlying interface
on an MX Series router with an ATM MIC with SFP installed. For information, see “Example:
Configuring a Static PPPoE Subscriber Interface over ATM” on page 449.
Requirements
• ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) and compatible MPC1 or MPC2
1. Make sure the MX Series router you are using has an ATM MIC with SFP installed and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
3. Make sure you understand how to configure and use dynamic PPPoE subscriber interfaces.
• For overview information, see “Subscriber Interfaces and PPPoE Overview” on page 185
• For configuration instructions, see “Configuring Dynamic PPPoE Subscriber Interfaces” on page 192
Overview
By using the ATM MIC with SFP and a supported MPC, you can configure an MX Series router to support
dynamic PPPoE subscriber access over an ATM network. PPPoE-over-ATM configurations on MX Series
routers consist of one or more dynamically created PPPoE (pp0) subscriber interfaces over a static ATM
underlying interface. Most PPPoE and subscriber services features supported on terminated connections
and tunneled (L2TP access concentrator, or LAC) connections are also supported for PPPoE-over-ATM
connections on an MX Series router.
Optionally, you can dynamically apply subscriber services such as class of service (CoS) and firewall filters
to the PPPoE subscriber interface by configuring these services in the dynamic profile that creates the
pp0 subscriber interface. In this example, the PPPoE dynamic profile (pppoe-profile) applies CoS traffic
shaping parameters to the dynamic pp0 subscriber interface. Configuring CoS and firewall filters in this
439
manner enables you to efficiently and economically provide these services to PPPoE subscribers accessing
the router over an ATM network using ATM Adaptation Layer 5 (AAL5) permanent virtual connections
(PVCs).
This example includes the following basic steps to configure dynamic PPPoE-over-ATM subscriber access
on an MX Series router:
1. Create a PPPoE dynamic profile named pppoe-profile for the pp0 subscriber interface that includes all
of the following:
• The logical unit number, represented by the $junos-interface-unit predefined dynamic variable
• The name of the underlying ATM interface, represented by the $junos-underlying-interface predefined
dynamic variable
• The server statement, which configures the router to act as a PPPoE server
• The unnumbered address (lo0.0) for the IPv4 (inet) protocol family
2. Statically configure the ATM physical interface at-1/0/0 with virtual path identifier (VPI) 3.
3. Statically configure logical unit 2 on the ATM physical interface (at-1/0/0.2) with at least the following
properties:
• Virtual circuit identifier (VCI) 2 on VPI 3. The combination of VPIs and VCIs provisions the ATM AAL5
PVC for access over the ATM network.
• PPPoE-specific options at the [edit interfaces interface-name unit logical-unit-number family pppoe]
hierarchy level, including at least the name of the associated PPPoE dynamic profile (pppoe-profile)
that creates the pp0 dynamic subscriber interface
In dynamic PPPoE-over-ATM configurations, each pp0 interface defined in the dynamic profile
corresponds to a dynamic PPPoE subscriber interface.
Configuration
IN THIS SECTION
To configure a dynamic PPPoE subscriber interface over an underlying ATM interface, perform these tasks:
Step-by-Step Procedure
To configure the PPPoE dynamic profile for the pp0 subscriber interface:
[edit]
user@host# edit dynamic-profiles pppoe-profile
3. Specify that you want to configure the logical unit represented by the $junos-interface-unit predefined
variable.
The $junos-interface-unit variable is dynamically replaced with the actual unit number supplied by the
network when the subscriber logs in.
The $junos-underlying-interface variable is dynamically replaced with the actual name of the
underlying interface supplied by the network when the subscriber logs in.
b. Configure the router to act as a PPPoE server, also known as a remote access concentrator.
5. Configure Challenge Handshake Authentication Protocol (CHAP) authentication for the pp0 interface.
442
a. Specify that you want to configure the IPv4 (inet) protocol family.
8. Configure CoS traffic shaping parameters in the dynamic profile for the pp0 subscriber interface.
d. Apply the traffic shaping parameters to the pp0 dynamic subscriber interface.
443
e. Apply the output traffic scheduling and shaping profile to the interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the PPPoE dynamic profile
configuration by issuing the show dynamic-profiles pppoe-profile command. If the output does not display
the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show dynamic-profiles pppoe-profile
interfaces {
pp0 {
unit "$junos-interface-unit" {
ppp-options {
chap;
}
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
no-keepalives;
family inet {
unnumbered-address lo0.0;
}
}
}
}
class-of-service {
traffic-control-profiles {
tcp-test {
shaping-rate 10m;
}
}
interfaces {
pp0 {
unit "$junos-interface-unit" {
output-traffic-control-profile tcp-test;
444
}
}
}
}
If you are done configuring the dynamic profile, enter commit from configuration mode.
Step-by-Step Procedure
To configure the ATM physical interface:
1. Specify that you want to configure ATM-specific options on the physical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the ATM physical interface
configuration by issuing the show interfaces at-1/0/0 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/0
atm-options {
vpi 3;
}
If you are done configuring the ATM physical interface, enter commit from configuration mode.
Step-by-Step Procedure
To configure the dynamic PPPoE subscriber interface on logical unit 2:
4. Associate the interface with the dynamic profile that creates the dynamic PPPoE subscriber interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the dynamic PPPoE subscriber
interface configuration on logical unit 2 by issuing the show interfaces at-1/0/0.2 command. If the output
does not display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/0.2
encapsulation ppp-over-ether-over-atm-llc;
vci 3.2;
family pppoe {
access-concentrator ac-pppoeoa;
446
duplicate-protection;
dynamic-profile pppoe-profile;
max-sessions 3;
short-cycle-protection;
}
If you are done configuring the dynamic PPPoE subscriber interface on logical unit 2, enter commit from
configuration mode.
Verification
IN THIS SECTION
Verifying the Dynamic PPPoE Subscriber Interface Configuration on Logical Unit 2 | 447
To confirm that the dynamic PPPoE subscriber interface is properly configured on ATM interface at-1/0/0.2,
perform the following tasks:
Purpose
Verify that ATM physical interface at-1/0/0 is properly configured for use with ATM PVCs.
Action
From operational mode, issue the show interfaces at-1/0/0 command.
For brevity, this show command output includes only the configuration that is relevant to the at-1/0/0
physical interface. Any other configuration on the system has been replaced with ellipses (...).
Schedulers : 0
Current address: 00:00:5e:00:53:95
Last flapped : 2012-09-17 07:21:19 PDT (08:26:16 ago)
Input rate : 0 bps (0 pps)
Output rate : 0 bps (0 pps)
SDH alarms : None
SDH defects : None
VPI 3
Flags: Active
Total down time: 0 sec, Last down: Never
Traffic statistics:
Input packets: 0
Output packets: 0
...
Meaning
ATM-PVC in the Link-level Type field indicates that encapsulation for ATM permanent virtual circuits is
being used on ATM physical interface at-1/0/0. The Active flag for VPI 3 indicates that the virtual path is
up and operational.
Purpose
Verify that the dynamic PPPoE subscriber interface is properly configured on logical unit 2 (at-1/0/0.2).
Action
From operational mode, issue the show interfaces at-1/0/0.2 command.
Input packets : 0
Output packets: 0
Meaning
PPPoE-over-ATM-LLC in the Encapsulation field indicates that logical interface at-1/0/0.2 is properly
configured for PPPoE-over-ATM LLC encapsulation. Protocol pppoe indicates that the PPPoE protocol
family has been properly configured on the logical interface. The Dynamic Profile field indicates that
dynamic profile pppoe-profile creates the dynamic PPPoE subscriber interface. The Active flag for VCI
3.2 indicates that VCI 2 on VPI 3 is up and operational.
Purpose
Verify that the underlying interface is properly configured for dynamic PPPoE-over-ATM subscriber access.
Action
From operational mode, issue the show pppoe underlying-interfaces at-1/0/0.2 command.
Meaning
This command indicates that ATM logical interface at-1/0/0.2 is properly configured as the PPPoE underlying
interface. Static in the State field indicates that at-1/0/0/.2 is statically configured. The Dynamic Profile
field indicates that pppoe-profile is the name of the dynamic profile used to create this interface. The
remaining fields display information about the PPPoE-specific interface options configured for the PPPoE
underlying interface at the [edit interfaces at-1/0/0 unit 2 family pppoe] hierarchy level.
RELATED DOCUMENTATION
Example: Configuring a Static Subscriber Interface for IP Access over ATM | 467
Example: Configuring a Static Subscriber Interface for IP Access over Ethernet over ATM | 475
Example: Configuring a Static PPP Subscriber Interface over ATM | 483
IN THIS SECTION
Requirements | 449
Overview | 450
Configuration | 451
Verification | 456
This example illustrates a Point-to-Point Protocol over Ethernet (PPPoE) over ATM configuration that
creates a static PPPoE (pp0) subscriber interface over a static ATM underlying interface on an MX Series
router. The router must have Module Port Concentrator/Modular Interface Card (MPC/MIC) interfaces
that use an ATM MIC with small form-factor pluggable transceiver (SFP).
NOTE: You can also configure a dynamic PPPoE interface over a static ATM underlying interface
on an MX Series router with an ATM MIC with SFP installed. For information, see “Example:
Configuring a Dynamic PPPoE Subscriber Interface over ATM” on page 437.
Requirements
• ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) and compatible MPC1 or MPC2
1. Make sure the MX Series router you are using has an ATM MIC with SFP installed and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
450
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
Overview
By using the ATM MIC with SFP and a supported MPC, you can configure an MX Series router to support
static PPPoE subscriber access over an ATM network using ATM Adaptation Layer 5 (AAL5) permanent
virtual connections (PVCs). PPPoE-over-ATM configurations on MX Series routers consist of one or more
statically created PPPoE (pp0) logical subscriber interfaces over a static ATM underlying interface. Most
PPPoE and subscriber services features supported on terminated connections and tunneled (L2TP access
concentrator, or LAC) connections are also supported for PPPoE-over-ATM connections on an MX Series
router.
This example include the following basic steps to configure static PPPoE-over-ATM subscriber access on
an MX Series router:
1. Statically configure ATM physical interface at-1/0/6 with virtual path identifier (VPI) 6.
2. Statically configure logical unit 2 on the ATM physical interface (at-1/0/6.2) with the following properties:
• Virtual circuit identifier (VCI) 2 on VPI 6. The combination of VPIs and VCIs provisions the ATM AAL5
PVC for access over the ATM network.
3. Statically configure the pp0 logical subscriber interface (pp0.2) with at least the following properties:
• The server statement, which configures the router to act as a PPPoE server
• The unnumbered address (lo0.0) for the inet (IPv4) or inet6 (IPv6) protocol family
451
In static PPPoE-over-ATM configurations, each pp0 logical interface configured at the [edit interfaces
pp0 unit logical-unit-number] hierarchy level corresponds to a static PPPoE subscriber interface.
Configuration
IN THIS SECTION
To configure a static PPPoE subscriber interface over an underlying ATM interface, perform these tasks:
Step-by-Step Procedure
To configure the ATM physical interface:
1. Specify that you want to configure ATM-specific options on the physical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the ATM physical interface
configuration by issuing the show interfaces at-1/0/6 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/6
atm-options {
vpi 6;
}
If you are done configuring the ATM physical interface, enter commit from configuration mode.
Step-by-Step Procedure
To configure encapsulation, VCI, and PPPoE options on logical unit 2:
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the configuration on logical
unit 2 by issuing the show interfaces at-1/0/6.2 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/6.2
encapsulation ppp-over-ether-over-atm-llc;
vci 6.2;
family pppoe {
access-concentrator ac-pppoeoa;
duplicate-protection;
max-sessions 3;
max-sessions-vsa-ignore;
short-cycle-protection {
lockout-time-min 120;
lockout-time-max 240;
}
}
If you are done configuring logical unit 2, enter commit from configuration mode.
Step-by-Step Procedure
454
1. Specify that you want to configure the pp0 subscriber interface on logical unit 2.
[edit]
user@host# edit interfaces pp0 unit 2
2. Specify that you want to configure PPP options for the subscriber interface.
3. Configure Challenge Handshake Authentication Protocol (CHAP) authentication for the subscriber
interface.
5. Associate the PPPoE subscriber interface with the underlying ATM interface.
6. Configure the router to act as a PPPoE server, also known as a remote access concentrator.
8. Specify that you want to configure the IPv4 (inet) protocol family.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static PPPoE subscriber
interface configuration by issuing the show interfaces pp0 command. If the output does not display the
intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces pp0
unit 2 {
ppp-options {
chap;
}
pppoe-options {
underlying-interface at-1/0/6.2;
server;
}
keepalives interval 10;
family inet {
unnumbered-address lo0.0;
}
}
If you are done configuring the static PPPoE subscriber interface, enter commit from configuration mode.
456
Verification
IN THIS SECTION
Verifying the Encapsulation, VCI, and PPPoE Options Configuration on Logical Unit 2 | 457
To confirm that the static PPPoE subscriber interface pp0.2 is properly configured on ATM underlying
interface at-1/0/6.2, perform the following tasks:
Purpose
Verify that ATM physical interface at-1/0/6 is properly configured for use with ATM PVCs.
Action
From operational mode, issue the show interfaces at-1/0/6 command.
For brevity, this show command output includes only the configuration that is relevant to the at-1/0/6
physical interface. Any other configuration on the system has been replaced with ellipses (...).
Flags: Active
Total down time: 0 sec, Last down: Never
Traffic statistics:
Input packets: 0
Output packets: 0
...
Meaning
ATM-PVC in the Link-level Type field indicates that encapsulation for ATM permanent virtual circuits is
being used on ATM physical interface at-1/0/6. The Active flag for VPI 6 indicates that the virtual path is
up and operational.
Verifying the Encapsulation, VCI, and PPPoE Options Configuration on Logical Unit 2
Purpose
Verify that the encapsulation, VCI, and PPPoE settings have been properly configured on logical unit 2
(at-1/0/6.2).
Action
From operational mode, issue the show interfaces at-1/0/6.2 command.
Meaning
458
PPPoE-over-ATM-LLC in the Encapsulation field indicates that logical interface at-1/0/6.2 is properly
configured for PPPoE-over-ATM LLC encapsulation. Protocol pppoe indicates that the PPPoE protocol
family has been properly configured on the logical interface. The Active flag for VCI 6.2 indicates that
VCI 2 on VPI 6 is up and operational.
Purpose
Verify that the static PPPoE subscriber interface (pp0.2) is properly configured.
Action
From operational mode, issue the show interfaces pp0 command.
Meaning
PPPoE in the Link-level type field indicates that PPPoE encapsulation is in use on the pp0 physical interface.
PPPoE in the Encapsulation field indicates that PPPoE encapsulation is also in use on the pp0.2 logical
459
subscriber interface. The Underlying interface field indicates that at-1/0/6.2 is properly configured as the
underlying interface for the static PPPoE subscriber interface. Protocol inet indicates that the IPv4 protocol
family is properly configured on the pp0.2 logical subscriber interface.
Purpose
Verify that the underlying interface is properly configured for static PPPoE-over-ATM subscriber access.
Action
From operational mode, issue the show pppoe underlying-interfaces at-1/0/6.2 extensive command.
Meaning
This command indicates that ATM logical interface at-1/0/6.2 is properly configured as the PPPoE underlying
interface. Static in the State field indicates that at-1/0/0/.2 is statically configured. The remaining fields
display information about the PPPoE-specific interface options configured for the PPPoE underlying
interface at the [edit interfaces at-1/0/6 unit 2 family pppoe] hierarchy level. The Lockout Time fields,
which appear in this command only when you display the extensive level of output, show the minimum
lockout time (120 seconds) and maximum lockout time (240 seconds) configured for the PPPoE underlying
interface.
460
RELATED DOCUMENTATION
CHAPTER 34
IN THIS CHAPTER
Configuring ATM Virtual Path Shaping on ATM MICs with SFP | 461
Starting in Junos OS Release 14.2, on MX Series routers with Modular Port Concentrator (MPC) interfaces
and an ATM Modular Interface Card (MIC) with small form-factor pluggable transceiver (SFP) installed,
you can configure class-of-service (CoS) hierarchical shaping and schedule for the traffic carried on an
ATM virtual path (VP).
After you configure the ATM physical interface and logical interface units, you must configure an interface
set that consists of the ATM logical interface units. You then define one or more CoS traffic control profiles
that includes the ATM service category (atm-service) and the peak cell rate (peak-rate), sustained cell rate
(sustained-rate), and maximum burst size (max-burst-size) parameters. Finally, you apply the specified
traffic control profile to the output traffic at the interface set and at its member ATM logical interface
units.
1. Enable CoS hierarchical shaping and scheduling on the ATM physical interface.
2. Specify that you want to configure ATM-specific options on the physical interface.
3. Configure one or more virtual path identifiers (VPIs) on the ATM physical interface.
462
4. Configure the appropriate encapsulation type for the ATM logical interface.
5. Configure one or more virtual circuit identifiers (VCI) for each VPI defined on the ATM physical interface.
7. Define the set of ATM logical interfaces for which you want to configure hierarchical schedulers.
[edit interfaces}
user@host# edit interface-set interface-set-name
NOTE: All ATM logical interfaces that belong to the same interface set must share
the same VPI and have a unique VCI.
8. Configure one or more traffic shaping and scheduling profiles. For each traffic control profile:
a. Specify the service category that determines the traffic shaping parameter for the ATM queue at
the ATM MIC with SFP.
b. Configure the transmit rate, shaping rate, and default excess rate for the ATM queue.
The ATM service category works in conjunction with the peak-rate, sustained-rate, and max-burst-size
ATM cell parameters to configure traffic shaping, transmit rate, shaping rate, and default excess rate
for an ATM queue.
9. Apply the traffic control profile to the output traffic at the interface set.
10. Apply the traffic control profile to the output traffic at each member interface of the ATM interface
set.
The following example configures ATM VP shaping on interface at-1/0/4 with VPI 40. The example defines
an ATM interface set named atm-vp-ifset with two member ATM logical interfaces, at-1/0/4.50 and
at-1/0/4.51, both of which use VPI 40. Traffic control profiles atm-vp-tcp1, atm-vp-tcp2, and atm-vp-tcp3
are each defined with the atm-service, peak-rate, sustained-rate, and max-burst size cell parameters.
Finally, the output-traffic-control-profile statement applies traffic control profile atm-vp-tcp1 to the output
464
traffic at interface at-1/0/4.50, atm-vp-tcp2 to the output traffic at interface at-1/0/4.51, and atm-vp-tcp3
to the output traffic at the atm-vp-ifset interface set.
[edit]
# Configure ATM Physical Interface
user@host# set interfaces at-1/0/4 hierarchical-scheduler
user@host# set interfaces at-1/0/4 atm-options vpi 40
#
# Configure ATM Logical Units
user@host# set interfaces at-1/0/4 unit 50 encapsulation pppoe-over-ether-over-atm-llc
user@host# set interfaces at-1/0/4 unit 50 vci 40.50
user@host# set interfaces at-1/0/4 unit 50 family pppoe duplicate-protection
user@host# set interfaces at-1/0/4 unit 51 encapsulation pppoe-over-ether-over-atm-llc
user@host# set interfaces at-1/0/4 unit 51 vci 40.51
user@host# set interfaces at-1/0/4 unit 51 family pppoe duplicate-protection
#
# Configure ATM Interface Set
user@host# set interfaces interface-set atm-vp-ifset interface at-1/0/4 unit 50
user@host# set interfaces interface-set atm-vp-ifset interface at-1/0/4 unit 51
#
# Configure Traffic Shaping and Scheduling Profiles
user@host# set class-of-service traffic-control-profiles atm-vp-tcp1 atm-service nrtvbr
user@host# set class-of-service traffic-control-profiles atm-vp-tcp1 set peak-rate 3k
user@host# set class-of-service traffic-control-profiles atm-vp-tcp1 set sustained-rate 200
user@host# set class-of-service traffic-control-profiles atm-vp-tcp1 set max-burst-size 1000
user@host# set class-of-service traffic-control-profiles atm-vp-tcp2 atm-service nrtvbr
user@host# set class-of-service traffic-control-profiles atm-vp-tcp2 set peak-rate 200
user@host# set class-of-service traffic-control-profiles atm-vp-tcp2 set sustained-rate 100
user@host# set class-of-service traffic-control-profiles atm-vp-tcp2 set max-burst-size 150
user@host# set class-of-service traffic-control-profiles atm-vp-tcp3 atm-service nrtvbr
user@host# set class-of-service traffic-control-profiles atm-vp-tcp3 set peak-rate 5k
user@host# set class-of-service traffic-control-profiles atm-vp-tcp3 set sustained-rate 1k
user@host# set class-of-service traffic-control-profiles atm-vp-tcp3 set max-burst-size 2000
#
# Apply Traffic Shaping and Scheduling Profiles
user@host# set class-of-service interfaces interface-set atm-vp-ifset output-traffic-control-profile atm-vp-tcp3
user@host# set class-of-service interfaces at-1/0/4 unit 50 output-traffic-control-profile atm-vp-tcp1
user@host# set class-of-service interfaces at-1/0/4 unit 51 output-traffic-control-profile atm-vp-tcp2
465
Release Description
14.2 Starting in Junos OS Release 14.2, on MX Series routers with Modular Port Concentrator (MPC)
interfaces and an ATM Modular Interface Card (MIC) with small form-factor pluggable transceiver
(SFP) installed, you can configure class-of-service (CoS) hierarchical shaping and schedule for the
traffic carried on an ATM virtual path (VP).
RELATED DOCUMENTATION
CHAPTER 35
IN THIS CHAPTER
Example: Configuring a Static Subscriber Interface for IP Access over ATM | 467
Example: Configuring a Static Subscriber Interface for IP Access over Ethernet over ATM | 475
IN THIS SECTION
Requirements | 467
Overview | 468
Configuration | 469
Verification | 473
This example illustrates a routed IP-over-ATM (IPoA) configuration that creates a subscriber interface for
a static IPv4 interface over a static ATM interface on an MX Series router. The router must have Module
Port Concentrator/Modular Interface Card (MPC/MIC) interfaces that use an ATM MIC with small
form-factor pluggable transceiver (SFP).
Requirements
• ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) and compatible MPC1 or MPC2
468
1. Make sure the MX Series router you are using has an ATM MIC with SFP installed and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
3. Define the static standard firewall filters (biz-customer-in-filter and biz-customer-out-filter) referenced
in the configuration.
• For information about creating standard firewall filters, see Guidelines for Configuring Firewall Filters.
• For information about applying a firewall filter to an interface, see Guidelines for Applying Standard
Firewall Filters.
Overview
By using the ATM MIC with SFP and a supported MPC, you can configure the MX Series router to support
subscriber access for a statically created IPv4 or IPv6 interface over a static ATM underlying interface. An
IPoA configuration enables you to provide access to subscribers on static IPv4 or IPv6 interfaces over an
ATM network using ATM Adaptation Layer 5 (AAL5) permanent virtual circuits (PVCs).
NOTE: IPoA configurations require static configuration of the IPv4 interface, IPv6 interface,
CoS attributes, and firewall fiters. Dynamic configuration is not supported.
To configure IPoA subscriber access, configure the correct encapsulation type: atm-snap for IPoA
encapsulation with logical link control (LLC), or atm-vc-mux for IPoA encapsulation with virtual circuit (VC)
multiplexing. This example configures atm-vc-mux as the encapsulation type on the ATM logical interface.
To provision the ATM AAL5 PVCs for access over the ATM network, you must also configure the virtual
path identifiers (VPIs) on the ATM physical interface, and one or more virtual circuit identifiers (VCIs) for
each VPI.
In IPoA configurations, the subscriber interfaces correspond to the IPv4 or IPv6 addresses that are on the
same network as the statically configured ATM underlying interface. In this IPoA example, the IPv4 address
10.0.0.2 represents the subscriber interface. You can configure the destination address with the set address
10.0.0.254/32 destination 10.0.0.2 statement at the [edit interfaces at-1/0/3 unit 0 family inet] hierarchy
level.
469
This example includes the following basic steps to statically configure a single IPv4 subscriber interface
over an ATM underlying interface:
2. Configure ATM VC multiplex encapsulation, VCI 0.39 (VCI 39 on VPI 0), and the following IPv4 (inet)
protocol family characteristics on logical interface at-1/0/3.0 :
Configuration
IN THIS SECTION
To configure a static IPv4 subscriber interface over a static ATM underlying interface, perform these tasks:
# Routing Properties
set routing-options access route 200.10.10.0/24 qualified-next-hop at-1/0/0.0
Step-by-Step Procedure
To configure the ATM physical interface:
1. Specify that you want to configure ATM-specific options on the physical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the ATM physical interface
configuration by issuing the show interfaces at-1/0/3 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/3
atm-options {
vpi 0;
}
If you are done configuring the ATM physical interface, enter commit from configuration mode.
Step-by-Step Procedure
To configure the static IPv4 subscriber interface on logical unit 0:
3. Configure the IPv4 (inet) protocol family, IPv4 address, and remote (destination) address of the
connection.
4. Specify that you want to configure additional attributes for the IPv4 protocol family.
5. Enable IP source address validation, which checks whether traffic is arriving at the router on an expected
path.
6. Apply the previously defined standard firewall filters to the logical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static subscriber interface
configuration on logical unit 0 by issuing the show interfaces at-1/0/3.0 command. If the output does not
display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/3.0
encapsulation atm-vc-mux;
vci 0.39;
family inet {
rpf-check;
filter {
472
input biz-customer-in-filter;
output biz-customer-out-filter;
}
address 10.0.0.254/32 {
destination 10.0.0.2;
}
}
If you are done configuring the static subscriber interface on logical unit 0, enter commit from configuration
mode.
Step-by-Step Procedure
To configure static routing properties:
[edit]
user@host# edit routing-options
2. Configure a static access route for routing downstream traffic from the router, and a qualified-next-hop
address for routing upstream traffic to the router.
[edit routing-options]
user@host# set access route 200.10.10.0/24 qualified-next-hop at-1/0/0.0
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static routing properties
configuration by issuing the show routing-options command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show routing-options
access {
route 200.10.10.0/24 {
qualified-next-hop at-1/0/0.0;
}
}
If you are done configuring the static routing properties, enter commit from configuration mode.
473
Verification
IN THIS SECTION
To confirm that the IPoA configuration is working properly, perform the following tasks:
Purpose
Verify that the at-1/0/3 physical interface is properly configured for use with ATM PVCs.
Action
From operational mode, issue the show interfaces at-1/0/3 command.
For brevity, this show command output includes only the configuration that is relevant to the at-1/0/3
physical interface. Any other configuration on the system has been replaced with ellipses (...).
Input packets: 0
Output packets: 0
...
Meaning
ATM-PVC in the Link-level Type field indicates that encapsulation for ATM permanent virtual circuits is
being used on ATM physical interface at-1/0/3. The Active flag for VPI 0 indicates that the virtual path is
up and operational.
Purpose
Verify that the static subscriber interface on logical unit 0 is properly configured for IPv4 access over ATM.
Action
From operational mode, issue the show interfaces at-1/0/3.0 command.
Meaning
ATM-VCMUX in the Encapsulation field indicates that the logical interface at-1/0/3.0 is properly configured
for IPoA encapsulation with VC multiplexing. Protocol inet indicates that the IPv4 protocol family has
been properly configured on the logical interface. The local address 10.0.0.254 is the IPv4 address of the
logical interface. The destination address 10.0.0.2, which is in the same network as the local address, is
the IPv4 address of the remote side of the connection and represents the static subscriber interface. The
Active flag for VCI 0.39 indicates that virtual circuit identifier (VCI) 39 on VPI 0 is up and operational.
475
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 475
Overview | 476
Configuration | 477
Verification | 481
Requirements
• ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) and compatible MPC1 or MPC2
1. Make sure the MX Series router you are using has an ATM MIC with SFP installed and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
476
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
3. Define the static standard firewall filters (biz-customer-in-filter and biz-customer-out-filter) referenced
in the configuration.
• For information about creating standard firewall filters, see Guidelines for Configuring Firewall Filters.
• For information about applying a firewall filter to an interface, see Guidelines for Applying Standard
Firewall Filters.
Overview
By using the ATM MIC with SFP and a supported MPC, you can configure the MX Series router to support
subscriber access for a statically created IPv4 or IPv6 interface over a static ATM underlying interface. An
IPoE-over-ATM configuration enables you to provide access to subscribers on static IPv4 or IPv6 interfaces
over an underlying ATM interface on an ATM network using ATM Adaptation Layer 5 (AAL5) permanent
virtual circuits (PVCs).
To configure bridged IPoE-over-ATM subscriber access, you must configure Ethernet-over-ATM logical
link control (LLC) encapsulation on the ATM underlying interface by including the encapsulation
ether-over-atm-llc statement at the [edit interfaces interface-name unit logical-unit-number] hierarchy
level.
To provision the ATM AAL5 PVCs for access over the ATM network, you must also configure the virtual
path identifiers (VPIs) on the ATM physical interface, and one or more virtual circuit identifiers (VCIs) for
each VPI.
In IPoE-over-ATM configurations, the subscriber interfaces are associated with IPv4 or IPv6 addresses
that are mapped to media access control (MAC) addresses. To statically configure Address Resolution
Protocol (ARP) table entries that map IP address to MAC addresses, use the arp statement at the [edit
interfaces interface-name unit logical-unit-number family inet address address] hierarchy level. In this
example, the IPv4 address 10.0.50.2, configured with the set arp 10.0.50.2 mac 00:00:5e:00:53:ff publish
statement at the [edit interfaces at-1/0/2 unit 0 family inet address 10.0.50.254/24] hierarchy level,
represents the subscriber interface.
477
This example includes the following basic steps to statically configure a single IPv4 subscriber interface
over an ATM underlying interface:
2. Configure Ethernet-over-ATM LLC encapsulation, VCI 0.39 (VCI 39 on VPI 0), and the following IPv4
(inet) protocol family characteristics on logical interface at-1/0/2.0 :
• Static Address Resolution Protocol (ARP) table entries that provide explicit mappings between IP
addresses and MAC addresses
Configuration
IN THIS SECTION
To configure a static IPv4 subscriber interface over a static ATM underlying interface, perform these tasks:
Step-by-Step Procedure
To configure the ATM physical interface:
1. Specify that you want to configure ATM-specific options on the physical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the ATM physical interface
configuration by issuing the show interfaces at-1/0/2 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/2
atm-options {
vpi 0;
}
If you are done configuring the ATM physical interface, enter commit from configuration mode.
Step-by-Step Procedure
To configure the static IPv4 subscriber interface on logical unit 0:
4. Specify that you want to configure static ARP table entries to map between IP addresses and MAC
addresses.
5. Configure IP address 10.0.50.2, which maps to the MAC address, and MAC address 00:00:5e:00:53:ff,
which maps to the IP address. Include the publish option to specify that the router reply to ARP requests
for the specified IP address.
6. Enable IP source address validation, which checks whether traffic is arriving at the router on an expected
path.
7. Apply the previously defined standard firewall filters to the logical interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static subscriber interface
configuration on logical unit 0 by issuing the show interfaces at-1/0/2.0 command. If the output does not
display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/2.0
encapsulation ether-over-atm-llc;
vci 0.39;
family inet {
rpf-check;
filter {
input biz-customer-in-filter;
output biz-customer-out-filter;
}
address 10.0.50.254/24 {
arp 10.0.50.2 mac 00:00:5e:00:53:ff publish;
}
}
If you are done configuring the static subscriber interface on logical unit 0, enter commit from configuration
mode.
Step-by-Step Procedure
To configure static routing properties:
[edit]
user@host# edit routing-options
2. Configure a static access route for routing downstream traffic from the router, and a qualified-next-hop
address for routing upstream traffic to the router.
[edit routing-options]
user@host# set access route 10.200.10.0/24 qualified-next-hop at-1/0/0.0
Results
481
From the [edit] hierarchy level in configuration mode, confirm the results of the static routing properties
configuration by issuing the show routing-options command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show routing-options
access {
route 10.200.10.0/24 {
qualified-next-hop at-1/0/0.0;
}
}
If you are done configuring the static routing properties, enter commit from configuration mode.
Verification
IN THIS SECTION
To confirm that the IPoE-over-ATM configuration is working properly, perform the following tasks:
Purpose
Verify that the at-1/0/2 physical interface is properly configured for use with ATM PVCs.
Action
From operational mode, issue the show interfaces at-1/0/2 command.
For brevity, this show command output includes only the configuration that is relevant to the at-1/0/2
physical interface. Any other configuration on the system has been replaced with ellipses (...).
Meaning
ATM-PVC in the Link-level Type field indicates that encapsulation for ATM permanent virtual circuits is
being used on ATM physical interface at-1/0/2. The Active flag for VPI 0 indicates that the virtual path is
up and operational.
Purpose
Verify that the static subscriber interface on logical unit 0 is properly configured for IPoE-over-ATM access.
Action
From operational mode, issue the show interfaces at-1/0/2.0 command.
VCI 0.39
Flags: Active, Multicast
Total down time: 0 sec, Last down: Never
Input packets : 0
Output packets: 0
Meaning
Ether-over-ATM-LLC in the Encapsulation field indicates that logical interface at-1/0/2.0 is properly
configured for Ethernet-over-ATM encapsulation with LLC. Protocol inet indicates that the IPv4 protocol
family has been properly configured on the logical interface. The destination address 10.0.50/24 identifies
the network in which the subscriber interface (10.0.50.2) resides. The Active flag for VCI 0.39 indicates
that virtual circuit identifier (VCI) 39 on VPI 0 is up and operational.
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 484
Overview | 484
Configuration | 485
Verification | 492
This example illustrates a PPP-over-ATM (PPPoA) configuration that creates three static PPP logical
subscriber interfaces over a static ATM underlying interface on an MX Series router. The router must have
484
Module Port Concentrator/Modular Interface Card (MPC/MIC) interfaces that use an ATM MIC with small
form-factor pluggable transceiver (SFP).
Requirements
• ATM MIC with SFP (Model Number MIC-3D-8OC3-2OC12-ATM) and compatible MPC1 or MPC2
1. Make sure the MX Series router you are using has an ATM MIC with SFP installed and operational.
• For information about compatible MPCs for the ATM MIC with SFP, see the MX Series Interface
Module Reference.
• For information about installing MPCs and MICs in an MX Series router, see the Hardware Guide for
your MX Series router model.
2. Make sure you understand how to configure and use static ATM interfaces.
3. Create the dynamic profile (pppoa-cos-profile) and access profile (pe-B-ppp-clients) referenced in the
configuration.
• For information about creating a basic dynamic profile, see Configuring a Basic Dynamic Profile.
• For information about creating a dynamic profile for class of service (CoS) attributes, see Configuring
Traffic Scheduling and Shaping for Subscriber Access.
• For information about creating an access profile for PPP Challenge Handshake Authentication Protocol
(CHAP) authentication, see Configuring the PPP Challenge Handshake Authentication Protocol.
Overview
By using the ATM MIC with SFP and a supported MPC, you can configure an MX Series router to support
PPP subscriber access over an ATM network. PPPoA configurations on MX Series routers consist of one
or more statically created PPP logical subscriber interfaces over a static ATM underlying interface.
Optionally, you can use dynamic profiles to dynamically or statically apply subscriber services services,
such as CoS and firewall filters, to the static PPP logical interface. Configuring CoS and firewall filters in
this manner enables you to efficiently and economically provide these services to PPP subscribers accessing
the router over an ATM network using ATM Adaptation Layer 5 (AAL5) permanent virtual connections
(PVCs). This example uses a previously configured dynamic profile named pppoa-cos-profile to apply traffic
scheduling and shaping parameters to logical interface at-1/0/1.2.
485
To configure PPPoA subscriber access, configure the correct encapsulation type: atm-ppp-llc for PPPoA
encapsulation with logical link control (LLC), or atm-ppp-vc-mux for PPPoA encapsulation with virtual
circuit (VC) multiplexing. This example configures atm-ppp-llc as the encapsulation type on logical interface
at-1/0/1.0, and atm-ppp-vc-mux as the encapsulation type on logical interfaces at-1/0/1.1 and at-1/0/1.2.
To provision the ATM AAL5 PVCs for access over the ATM network, you must also configure the virtual
path identifiers (VPIs) on the ATM physical interface, and one or more virtual circuit identifiers (VCIs) for
each VPI.
In PPPoA configurations, each statically configured logical interface (for example, at-1/0/1.0) corresponds
to a PPP logical subscriber interface. This example configures three PPP logical subscriber interfaces over
an ATM interface, as follows:
• The ATM physical interface (at-1/0/1) is statically configured with VPI 0 and VPI 2.
• Logical interface at-1/0/1.0 (logical unit 0) is configured with PPP-over AAL5 LLC encapsulation, VCI
0.120 (VCI 120 on VPI 0), PPP-specific options, and the IPv4 protocol family and address.
Configuration
IN THIS SECTION
To configure static PPP logical subscriber interfaces over an ATM interface, perform these tasks:
To quickly configure this example, copy the following commands, paste them in a text file, remove any
line breaks, change any details necessary to match your network configuration, and then copy and paste
the commands into the CLI at the [edit] hierarchy level.
Step-by-Step Procedure
To configure the ATM physical interface:
1. Specify that you want to configure ATM-specific options on the physical interface.
487
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the ATM physical interface
configuration by issuing the show interfaces at-1/0/1 command. If the output does not display the intended
configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/1
atm-options {
vpi 0;
vpi 2;
}
If you are done configuring the ATM physical interface, enter commit from configuration mode.
Step-by-Step Procedure
To configure the static PPP subscriber interface on logical unit 0:
3. Specify that you want to configure options for PPP CHAP on the logical interface.
488
4. Assign the previously configured pe-B-ppp-clients access profile to the PPP logical subscriber interface.
5. Configure the local name used by the interface in CHAP challenge and response packets.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static PPP subscriber
interface configuration on logical unit 0 by issuing the show interfaces at-1/0/1.0 command. If the output
does not display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/1.0
encapsulation atm-ppp-llc;
vci 0.120;
ppp-options {
chap {
access-profile pe-B-ppp-clients;
489
local-name pe-A-at-1/0/1;
}
}
keepalives interval 5 up-count 6 down-count 4;
family inet {
address 192.0.2.133/30;
}
If you are done configuring the PPP logical subscriber interface on logical unit 0, enter commit from
configuration mode.
Step-by-Step Procedure
To configure the static PPP subscriber interface on logical unit 1:
Results
490
From the [edit] hierarchy level in configuration mode, confirm the results of the static PPP subscriber
interface configuration on logical unit 1 by issuing the show interfaces at-1/0/1.1 command. If the output
does not display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/1.1
encapsulation atm-ppp-vc-mux;
vci 2.120;
keepalives interval 6 up-count 6 down-count 4;
family inet {
address 192.0.2.143/30;
}
If you are done configuring the PPP logical subscriber interface on logical unit 1, enter commit from
configuration mode.
Step-by-Step Procedure
To configure the static PPP subscriber interface on logical unit 2:
3. Specify that you want to configure options for PPP CHAP on the logical interface.
4. Assign the previously configured pe-A-ppp-clients access profile to the PPP logical subscriber interface.
5. Configure the local name used by the interface in CHAP challenge and response packets.
7. Apply the previously configured pppoa-cos-profile dynamic profile to the PPP logical subscriber interface.
Results
From the [edit] hierarchy level in configuration mode, confirm the results of the static PPP subscriber
interface configuration on logical unit 2 by issuing the show interfaces at-1/0/1.2 command. If the output
does not display the intended configuration, repeat the instructions in this example to correct it.
[edit]
user@host# show interfaces at-1/0/1.2
encapsulation atm-ppp-vc-mux;
vci 2.121;
ppp-options {
492
chap {
access-profile pe-A-ppp-clients;
local-name pe-A-at-1/0/1;
passive;
}
dynamic-profile pppoa-cos-profile;
}
keepalives interval 5 up-count 6 down-count 4;
family inet {
address 192.0.2.153/30;
}
If you are done configuring the PPP logical subscriber interface on logical unit 2, enter commit from
configuration mode.
Verification
IN THIS SECTION
To confirm that the PPPoA configuration is working properly, perform the following tasks:
Purpose
Verify that the at-1/0/1 physical interface is properly configured for use with ATM PVCs.
Action
From operational mode, issue the show interfaces at-1/0/1 command.
For brevity, this show command output includes only the configuration that is relevant to the at-1/0/1
physical interface. Any other configuration on the system has been replaced with ellipses (...).
...
Meaning
ATM-PVC in the Link-level Type field indicates that encapsulation for ATM permanent virtual circuits is
being used on ATM physical interface at-1/0/1. The Active flag for VPI 0 and VPI 2 indicates that these
virtual paths are up and operational.
Purpose
Verify that the static PPP subscriber interface is properly configured on logical unit 0 (at-1/0/1.0).
Action
From operational mode, issue the show interfaces at-1/0/1.0 command.
Meaning
ATM-PPP-LLC in the Encapsulation field indicates that logical interface at-1/0/1.0 is properly configured
for PPP-over-AAL5 logical link control (LLC) encapsulation. Protocol inet indicates that the IPv4 protocol
family has been properly configured on the logical interface. The Active flag for VCI 0.120 indicates that
virtual circuit identifier (VCI) 120 on VPI 0 is up and operational.
Purpose
Verify that the static PPP subscriber interface is properly configured on logical unit 1 (at-1/0/1.1).
Action
From operational mode, issue the show interfaces at-1/0/1.1 command.
Input packets : 0
Output packets: 0
Keepalive settings: Interval 6 seconds, Up-count 6, Down-count 4
LCP state: Down
NCP state: inet: Not-configured, inet6: Not-configured, iso: Not-configured,
mpls: Not-configured
CHAP state: Closed
PAP state: Closed
Protocol inet, MTU: 2038
Flags: Sendbcast-pkt-to-re, Protocol-Down
Addresses, Flags: Dest-route-down Is-Preferred Is-Primary
Destination: 192.0.2.142/30, Local: 192.0.2.143, Broadcast: 192.0.2.145
VCI 2.120
Flags: Active, Inverse-ARP
Total down time: 0 sec, Last down: Never
ARP statistics
Received: 0, Sent: 0, Denied: 0, Operation not supported: 0,
Bad packet length: 0, Bad protocol: 0, Bad protocol length: 0,
Bad hardware length: 0, Dropped: 0
Last received: Never, Last sent: Never
Input packets : 0
Output packets: 0
Meaning
ATM-PPP-VCMUX in the Encapsulation field indicates that the logical interface at-1/0/1.1 is properly
configured for PPP-over-AAL5 VC multiplexing encapsulation. Protocol inet indicates that the IPv4 protocol
family has been properly configured on the logical interface. The Active flag for VCI 2.120 indicates that
virtual circuit identifier (VCI) 120 on VPI 2 is up and operational.
Purpose
Verify that the static PPP subscriber interface is properly configured on logical unit 2 (at-1/0/1.2).
Action
Input packets : 0
Output packets: 0
Keepalive settings: Interval 5 seconds, Up-count 6, Down-count 4
LCP state: Down
NCP state: inet: Not-configured, inet6: Not-configured, iso: Not-configured,
mpls: Not-configured
CHAP state: Closed
PAP state: Closed
Protocol inet, MTU: 2038
Flags: Sendbcast-pkt-to-re, Protocol-Down
Addresses, Flags: Dest-route-down Is-Preferred Is-Primary
Destination: 192.0.2.152/30, Local: 192.0.2.153, Broadcast: 192.0.2.155
VCI 2.121
Flags: Active
Total down time: 0 sec, Last down: Never
Input packets : 0
Output packets: 0
Meaning
ATM-PPP-VCMUX in the Encapsulation field indicates that the logical interface at-1/0/1.2 is properly
configured for PPP-over-AAL5 VC multiplexing encapsulation. Protocol inet indicates that the IPv4 protocol
family has been properly configured on the logical interface. The Active flag for VCI 2.121 indicates that
virtual circuit identifier 121 on VPI 2 is up and operational.
RELATED DOCUMENTATION
CHAPTER 36
IN THIS CHAPTER
Action
• To display information about the ATM physical interface to ensure that it is properly configured for use
with ATM PVCs:
• To display information about the ATM logical interface to ensure that it is properly configured as a
dynamic or static subscriber interface:
• To display information about all static PPPoE (pp0) subscriber interfaces for static PPPoE-over-ATM
configurations:
• To display information about a specified static PPPoE (pp0) subscriber interface for static
PPPoE-over-ATM configurations:
• To display detailed information about the PPPoE underlying interface for dynamic or static
PPPoE-over-ATM configurations:
• To display extensive information, including packet statistics and lockout time settings, about the PPPoE
underlying interface for dynamic or static PPPoE-over-ATM configurations:
• To display extensive information about the active ATM subscriber with the specified ATM virtual path
identifier (VPI) and ATM virtual circuit identifier (VCI):
RELATED DOCUMENTATION
Troubleshooting
CHAPTER 37
IN THIS CHAPTER
Collecting Subscriber Access Logs Before Contacting Juniper Networks Technical Support | 501
Solution
To collect standard troubleshooting information:
1. Review the following blocks of statements to determine which apply to your configuration.
[edit]
set system syslog archive size 100m files 25
set system auto-configuration traceoptions file filename
set system auto-configuration traceoptions file filename size 100m files 25
set protocols ppp-service traceoptions file filename size 100m files 25
set protocols ppp-service traceoptions level all
set protocols ppp-service traceoptions flag all
set protocols ppp traceoptions file filename size 100m files 25
set protocols ppp traceoptions level all
set protocols ppp traceoptions flag all
set protocols ppp monitor-session all
set interfaces pp0 traceoptions flag all
set demux traceoptions file filename size 100m files 25
set demux traceoptions level all
set demux traceoptions flag all
set system processes dhcp-service traceoptions file filename
set system processes dhcp-service traceoptions file size 100m
set system processes dhcp-service traceoptions file files 25
set system processes dhcp-service traceoptions flag all
set class-of-service traceoptions file filename
set class-of-service traceoptions file size 100m
set class-of-service traceoptions flag all
set class-of-service traceoptions file files 25
set routing-options traceoptions file filename
set routing-options traceoptions file size 100m
set routing-options traceoptions flag all
set routing-options traceoptions file files 25
set interfaces traceoptions file filename
set interfaces traceoptions file size 100m
set interfaces traceoptions flag all
set interfaces traceoptions file files 25
set system processes general-authentication-service traceoptions file filename
set system processes general-authentication-service traceoptions file size 100m
set system processes general-authentication-service traceoptions flag all
set system processes general-authentication-service traceoptions file files 25
503
2. Copy the relevant statements into a text file and modify the log filenames as you want.
3. Copy the statements from the text file and paste them into the CLI on your router to configure logging.
NOTE: The maximum file size for DHCP local server and DHCP relay log files is 1 GB. The
maximum number of log files for DHCP local server and DHCP relay is 1000.
BEST PRACTICE: Enable these logs only to collect information when troubleshooting specific
problems. Enabling these logs during normal operations can result in reduced system performance.
RELATED DOCUMENTATION
Compressing Troubleshooting Logs from /var/logs to Send to Juniper Networks Technical Support
7 PART
CHAPTER 38
Configuration Statements
IN THIS CHAPTER
accept | 512
access-concentrator | 515
access-profile | 517
address | 520
agent-specifier | 524
atm-options | 528
authentication | 530
auto-configure | 532
chap | 536
circuit-type | 539
delimiter | 544
direct-connect | 551
domain-name | 552
dynamic-profiles | 563
enhanced-mode | 582
family | 585
flexible-vlan-tagging | 602
fragmentation-maps | 606
host-prefix-only | 614
interface-name | 623
interfaces | 628
keepalives | 637
local-name | 642
mac | 643
mac-validate | 645
mtu | 653
nas-port-extended-format | 658
nd-override-preferred-src | 662
no-gratuitous-arp-request | 663
option-82 | 668
override | 673
ppp-options | 682
ppp-subscriber-services | 686
pppoe-options | 687
precedence | 692
radius-realm | 704
remove-when-no-subscribers | 707
routing-options | 710
rpf-check | 712
server | 715
service-name-table | 724
service-name-tables | 726
stacked-vlan-ranges | 732
511
stacked-vlan-tagging | 733
traffic-control-profiles | 739
underlying-interface | 744
unit | 749
user-prefix | 779
vci | 780
vlan-ranges | 783
vlan-tagging | 785
vlan-tags | 789
weight | 793
512
accept
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
dhcp-v4 option added in Junos OS Release 10.0.
dhcp-v6, inet6 and pppoe options added in Junos OS Release 10.2.
any option added in Junos OS Release 10.4.
Description
Specify the type of VLAN Ethernet packet accepted by an interface that is associated with a VLAN dynamic
profile or stacked VLAN dynamic profile.
Options
any—Any packet type. Specifies that any incoming packets trigger the dynamic creation of a VLAN with
properties determined by the auto-configure interface configuration stanza and associated profile attributes.
This option is used when configuring wholesaling in a Layer 2 network.
dhcp-v4—IPv4 DHCP packet type. Specifies that incoming IPv4 DHCP discover packets trigger the dynamic
creation of a VLAN with properties determined by the auto-configure interface configuration stanza and
associated profile attributes
NOTE: The DHCP-specific mac-address and option-82 options are rejected if the accept
statement is not set to dhcp-v4.
dhcp-v6—IPv6 DHCP packet type. Specifies that incoming IPv6 DHCP discover packets trigger the dynamic
creation of a VLAN with properties determined by the auto-configure interface configuration stanza and
associated profile attributes.
NOTE: The pppoe VLAN Ethernet packet type option is supported only for MPC/MIC interfaces.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring VLAN Interfaces for the Layer 2 Wholesale Solution
Configuring Subscriber Packet Types to Trigger VLAN Authentication | 38
514
access {
route ip-prefix</prefix-length> {
metric route-cost;
next-hop next-hop;
preference route-distance;
qualified-next-hop next-hop;
tag tag-number
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Statement introduced in Junos OS Release 12.3 for ACX Series routers.
Description
Configure access routes.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
access-concentrator
Syntax
access-concentrator name;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Support at the [edit interfaces interface-name unit logical-unit-number pppoe-underlying-options] and
[edit logical-systems logical-system-name interfaces interface-name unit logical-unit-number
pppoe-underlying-options] hierarchy levels introduced in Junos OS Release 10.1.
Support at the [edit ... family pppoe] hierarchies introduced in Junos OS Release 11.2.
Description
Configure an alternative access concentrator name in the AC-NAME tag in a PPPoE control packet for
use with a dynamic PPPoE subscriber interface. If you do not configure the access concentrator name, the
AC-NAME tag contains the system name.
NOTE: The [edit ... family pppoe] hierarchies are supported only on MX Series routers with
MPCs.
Options
name—Name of the access concentrator.
RELATED DOCUMENTATION
access-profile
Syntax
access-profile name;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Support for PAP added in Junos OS Release 8.3.
Support for VLAN and stacked VLAN ranges added in Junos OS Release 10.0.
Description
For CHAP authentication, the mapping between peer names (or “clients” ) and the secrets associated with
their respective links. For PAP authentication, the peer's username and password.
For Asynchronous Transfer Mode 2 (ATM2) IQ interfaces only, you can configure a Challenge Handshake
Authentication Protocol (CHAP) access profile on the logical interface unit if the logical interface is
configured with one of the following PPP over ATM encapsulation types:
Options
name—Name of the access profile.
RELATED DOCUMENTATION
access-profile svlan-access-profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 16.2.
Description
Access profiles contain subscriber access authentication, authorization and accounting (AAA) configuration
parameters. You can create an access profiles and then attach it at various configuration levels. When you
attach an access profile to an interface configured for dynamic VLAN or stacked VLAN, all the VLANs and
stacked VLANs use the same set of AAA parameters configured in that access profile. The different access
profiles can have different authentication/authorization settings so you can, for example, have authentication
on some VLAN and stacked VLAN ranges but no authentication on other ranges.
You can assign different access profiles to different dynamic profiles on the same interface. If you assign
an access profile at the global level, but a different access profile is assigned at the interface level, the
access profile at the interface level authenticates all dynamic VLANs and stacked VLANs on the interface.
Access profiles can be assigned at various levels, but the most specific access profile takes precedence
over any other profile assignments..
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
519
access-profile vlan-access-profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 16.2.
Description
Access profiles contain subscriber access authentication, authorization and accounting (AAA) configuration
parameters. You can create an access profiles and then attach it at various configuration levels. When you
attach an access profile to an interface configured for dynamic VLAN or stacked VLAN, all the VLANs and
stacked VLANs use the same set of AAA parameters configured in that access profile. The different access
profiles can have different authentication/authorization settings so you can, for example, have authentication
on some VLAN or stacked VLAN ranges but no authentication on other ranges.
You can assign different access profiles to different dynamic profiles on the same interface. If you assign
an access profile at the global level, but a different access profile is assigned at the interface level, the
access profile at the interface level authenticates all dynamic VLANs and stacked VLANs on the interface.
Access profiles can be assigned at various levels, but the most specific access profile takes precedence
over any other profile assignments.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
520
address
List of Syntax
Syntax MX Series and EX Series (dynamic-profiles) on page 520
Syntax QFX Series and QFabric (interfaces) on page 520
address address {
arp ip-address (mac | multicast-mac) mac-address <publish>;
broadcast address;
destination address;
destination-profile name;
reui-64;
master-only;
multipoint-destination addressdlci dlci-identifier;
multipoint-destination address {
epd-threshold cells;
inverse-arp;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
shaping {
(cbr rate |rtvbr peak rate sustained rate burst length |vbr peak rate sustained rate burst length);
queue-length number;
}
vci vpi-identifier.vci-identifier;
}
primary;
preferred;
(vrrp-group | vrrp-inet6-group) group-number {
(accept-data | no-accept-data);
advertise–interval seconds;
authentication-type authentication;
authentication-key key;
fast-interval milliseconds;
(preempt | no-preempt) {
hold-time seconds;
521
}
priority-number number;
track {
priority-cost seconds;
priority-hold-time interface-name {
interface priority;
bandwidth-threshold bits-per-second {
priority;
}
}
route ip-address/mask routing-instance instance-name priority-cost cost;
}
virtual-address [ addresses ];
}
}
Release Information
Statement introduced in Junos OS Release 9.2.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family
family] hierarchy level introduced in Junos OS Release 10.1.
Statement introduced before Junos OS Release 11.1 for QFX Series switches.
Support at the [edit interfaces interface-name unit logical-unit-number family inet] hierarchy level introduced
in Junos OS Release 13.2X50-D10 for EX Series switches.
Description
Configure the interface address.
522
Options
ip-address—IPv4 address of the interface.
ipv6-address—IPv6 address of the interface. When configuring an IPv6 address on a dynamically created
interface, use the $junos-ipv6–address dynamic variable.
RELATED DOCUMENTATION
agent-circuit-identifier {
dynamic-profile profile-name;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
Configure a static or dynamic underlying VLAN interface to enable dynamic VLAN subscriber interface
creation based on agent circuit identifier information.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
524
agent-specifier
Syntax
agent-specifier {
aci circuit-id-string ari remote-id-string {
drop;
delay seconds;
terminate;
dynamic-profile profile-name;
routing-instance routing-instance-name;
static-interface interface-name;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
drop, delay, terminate, dynamic-profile, routing-instance, and static-interface options introduced in Junos
OS Release 10.2.
Description
Specify the action taken by the interface for the specified agent circuit identifier/agent remote identifier
(ACI/ARI) pair when the interface receives a PPPoE Active Discovery Initiation (PADI) control packet that
includes the vendor-specific tag with ACI/ARI pair information. You can configure an ACI/ARI pair for a
named service, empty service, or any service in a PPPoE service name table. A maximum of 8000 ACI/ARI
pairs are supported per PPPoE service name table. You can distribute the ACI/ARI pairs in any combination
among the named, empty, and any service entries in the service name table.
You can use an asterisk (*) as a wildcard character to match ACI/ARI pairs, the ACI alone, or the ARI alone.
The asterisk can be placed only at the beginning, the end, or both the beginning and end of the identifier
string. You can also specify an asterisk alone for either the ACI or the ARI. You cannot specify only an
asterisk for both the ACI and the ARI. When you specify a single asterisk as the identifier, that identifier
is ignored in the PADI packet.
For example, suppose you care about matching only the ACI and do not care what value the ARI has in
the PADI packet, or even whether the packet contains an ARI value. In this case you can set the
remote-id-string to a single asterisk. Then the interface ignores the ARI received in the packet and the
interface takes action based only on matching the specified ACI.
Default
525
Options
aci circuit-id-string—Identifier for the agent circuit ID that corresponds to the DSLAM interface that initiated
the service request. This is a string of up to 63 characters.
ari remote-id-string—Identifier for the subscriber associated with the DSLAM interface that initiated the
service request. This is a string of up to 63 characters.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Options merge and replace introduced in Junos OS Release 9.5.
Description
Specify that the router merge (chain) client attributes such as firewall filters and CoS attributes or replace
them when multiple client sessions exist on the same underlying VLAN.
Options
merge—Aggregate multiple clients attributes for the same subscriber (logical interface)
replace—Replace the entire logical interface whenever a new client logs in to the network using the same
VLAN logical interface
RELATED DOCUMENTATION
527
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
528
atm-options
Syntax
atm-options {
cell-bundle-size cells;
ilmi;
linear-red-profiles profile-name {
high-plp-max-threshold percent;
low-plp-max-threshold percent;
queue-depth cells high-plp-threshold percent low-plp-threshold percent;
}
mpls {
pop-all-labels {
required-depth number;
}
}
pic-type (atm1 | atm2);
plp-to-clp;
promiscuous-mode {
vpi vpi-identifier;
}
scheduler-maps map-name {
forwarding-class class-name {
epd-threshold cells plp1 cells;
linear-red-profile profile-name;
priority (high | low);
transmit-weight (cells number | percent number);
}
vc-cos-mode (alternate | strict);
}
use-null-cw;
vpi vpi-identifier {
maximum-vcs maximum-vcs;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
shaping {
(cbr rate | rtvbr peak rate sustained rate burst length | vbr peak rate sustained rate burst length);
queue-length number;
}
}
}
529
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.2 for the ACX Series Universal Metro Routers.
Description
Configure ATM-specific physical interface properties.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
authentication
Syntax
authentication {
packet-types [packet-types];
password password-string;
username-include {
circuit-id;
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18;
option-37;
option-82 <circuit-id> <remote-id>;
radius-realm radius-realm-string;
remote-id;
user-prefix user-prefix-string;
vlan-tags;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify the authentication parameters that trigger the Access-Request message to AAA for the interface.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
auto-configure
Syntax
auto-configure {
vlan-ranges {
access-profile profile-name;
authentication {
packet-types [packet-types];
password password-string;
username-include{
circuit-id;
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18;
option-37;
option-82 <circuit-id> <remote-id>;
radius-realm radius-realm-string;
remote-id;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
accept (any | dhcp-v4 | dhcp-v6 | inet | inet6 | pppoe);
accept-out-of-band protocol;
ranges (any | low-tag)–(any | high-tag);
}
override;
}
stacked-vlan-ranges {
access-profile profile-name;
authentication {
packet-types [packet-types];
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18;
533
option-37;
option-82 <circuit-id> <remote-id>;
radius-realm radius-realm-string;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
accept (any | dhcp-v4 | dhcp-v6 | inet | inet6 | pppoe);
ranges (any | low-tag–high-tag),(any | low-tag–high-tag);
}
override;
}
remove-when-no-subscribers;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Enable the configuration of dynamic, auto-sensed VLANs.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
534
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
Enable the configuration of dynamic, auto-sensed VLAN subscriber interfaces on a static or dynamic
underlying VLAN interface. Use the agent-circuit-identifier statement to configure dynamic VLANs based
only on the ACI. Use the line-identity statement to configure dynamic VLANs that can be initiated by
receipt of ACI, ARI, both ACI and ARI, or neither.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
535
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
Configuring Dynamic Underlying VLAN Interfaces to Use Access-Line Identifiers | 68
Configuring Dynamic VLAN Subscriber Interfaces Based on Access-Line Identifiers | 72
536
chap
Syntax
chap {
access-profile name;
challenge-length minimum minimum-length maximum maximum-length;
default-chap-secret name;
local-name name;
passive;
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
Allow each side of a link to challenge its peer, using a “secret” known only to the authenticator and that
peer. The secret is not sent over the link.
By default, PPP CHAP is disabled. If CHAP is not explicitly enabled, the interface makes no CHAP challenges
and denies all incoming CHAP challenges.
For ATM2 IQ interfaces only, you can configure CHAP on the logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
BEST PRACTICE: On inline service (si) interfaces for L2TP, only the chap statement itself is
typically used for subscriber management. We recommend that you leave the subordinate
statements at their default values.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit
“$junos-interface-unit” ppp-options] hierarchy level introduced in Junos OS Release 12.2.
Description
Specify CHAP authentication in a PPP dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
circuit-type
Syntax
circuit-type;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify that the circuit type is concatenated with the username during the subscriber authentication
process.
RELATED DOCUMENTATION
class-of-service {
dynamic-class-of-service-options {
vendor-specific-tags tag;
}
interfaces {
interface-name ;
}
unit logical-unit-number {
classifiers {
type (classifier-name | default);
}
output-traffic-control-profile (profile-name | $junos-cos-traffic-control-profile);
report-ingress-shaping-rate bps;
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
(scheduler-name) {
buffer-size (seconds | percent percentage | remainder | temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high) protocol (any | non-tcp | tcp)
drop-profile profile-name;
excess-priority (low | high | $junos-cos-scheduler-excess-priority);
excess-rate (percent percentage | percent $junos-cos-scheduler-excess-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
priority priority-level;
shaping-rate (rate | predefined-variable);
transmit-rate (percent percentage | rate | remainder) <exact | rate-limit>;
}
}
traffic-control-profiles profile-name {
541
adjust-minimum rate;
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value | percent $junos-cos-excess-rate);
excess-rate-high (percent percentage | proportion value);
excess-rate-low (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate) <burst-size bytes>;
max-burst-size cells;
overhead-accounting (frame-mode | cell-mode) <bytes byte-value>;
peak-rate rate;
scheduler-map map-name;
shaping-rate (percent percentage | rate | predefined-variable) <burst-size bytes>;
shaping-rate-excess-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-strict-high (percent percentage | rate) <burst-size bytes>;
sustained-rate rate;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Description
Configure Junos OS CoS features in a dynamic client profile or a dynamic service profile.
Default
If you do not configure any CoS features, all packets are transmitted from output transmission queue 0.
RELATED DOCUMENTATION
delay seconds;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Support at [edit protocols pppoe service-name-tables table-name service service-name agent-specifier
aci circuit-id-string ari remote-id-string] hierarchy level introduced in Junos OS Release 10.2.
Description
Configure the PPPoE underlying interface on the router to wait a specified number of seconds after
receiving a PPPoE Active Discovery Initiation (PADI) control packet from a PPPoE client before sending
a PPPoE Active Discovery Offer (PADO) packet to indicate that it can service the client request
The router (PPPoE server) does not check whether another server has already sent a PADO packet during
the delay period in response to the PPPoE client’s PADI packet. It is up to the PPPoE client to determine
whether another PPPoE server has responded to its PADI request, or if it must respond to the delayed
PADO packet to establish a PPPoE session.
Options
seconds—Number of seconds that the PPPoE underlying interface waits after receiving a PADI packet from
a PPPoE client before sending a PADO packet in response.
Range: 1 through 120 seconds
RELATED DOCUMENTATION
delimiter
Syntax
delimiter delimiter-character;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify the character used as the delimiter between the concatenated components of the username. You
cannot use the semicolon (;) as a delimiter.
RELATED DOCUMENTATION
demux–options {
underlying-interface interface-name
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Description
Configure logical demultiplexing (demux) interface options in a dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Demultiplexing Interface Overview
546
demux-source {
source-address;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Description
Configure a logical demultiplexing (demux) source address for a subscriber in a dynamic profile.
Options
source-address—Either the specific source address you want to assign to the subscriber interface or the
source address variable. For IPv4, specify $junos-subscriber-ip-address; for IPv6, specify
$junos-subscriber-ipv6-address. The source address for the interface is dynamically supplied by DHCP
when the subscriber accesses the router.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Demultiplexing Interface Overview
547
demux-source family;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.6.
Description
Configure the logical demultiplexing (demux) source family type on the IP demux underlying interface
within a dynamic profile.
NOTE: The IP demux interface feature currently supports only Fast Ethernet, Gigabit Ethernet,
10-Gigabit Ethernet, or aggregated Ethernet underlying interfaces.
Options
family—Protocol family:
demux0 {
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
family family {
access-concentrator name;
address address;
demux-source {
source-prefix;
}
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
input filter-name;
output filter-name;
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name;
output filter-name;
}
vlan-id number;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Description
Configure the logical demultiplexing (demux) interface in a dynamic profile.
Logical IP demux interfaces do not support IPv4 and IPv6 dual stack.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Demultiplexing Interface Overview
550
destination (Tunnels)
Syntax
destination address;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.1 for EX Series switches.
Statement introduced in Junos OS Release 13.2 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Description
For encrypted, PPP-encapsulated, and tunnel interfaces, specify the remote address of the connection.
Options
address—Address of the remote side of the connection.
RELATED DOCUMENTATION
direct-connect
Syntax
direct-connect;
Hierarchy Level
Release Information
Statement introduced in Junos OS 13.3.
Description
Configure the router to ignore any DSL Forum VSAs that it receives in PPPoE control packets when the
router is directly connected to CPE devices.
RELATED DOCUMENTATION
domain-name
Syntax
domain-name domain-name-string;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify the domain name that is concatenated with the username during the subscriber authentication
process.
Options
domain-name-string—The domain name formatted string.
RELATED DOCUMENTATION
drop;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Support at [edit protocols pppoe service-name-tables table-name service service-name agent-specifier
aci circuit-id-string ari remote-id-string] hierarchy level introduced in Junos OS Release 10.2.
Description
Direct the router to drop (ignore) a PPPoE Active Discovery Initiation (PADI) control packet received from
a PPPoE client that contains the specified service name tag or agent circuit identifier/agent remote identifier
(ACI/ARI) information. This action effectively denies the client’s request to provide the specified service,
or to accept requests from the subscriber or subscribers represented by the ACI/ARI information.
RELATED DOCUMENTATION
duplicate-protection;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Support for the [edit ... family pppoe] hierarchies introduced in Junos OS Release 11.2.
Description
Prevent the activation of another dynamic PPPoE logical interface on the same underlying interface when
a dynamic PPPoE logical interface for a client with the same media access control (MAC) address is already
active on that interface. Duplicate protection is disabled by default. Enabling duplicate protection has no
effect on dynamic PPPoE logical interfaces that are already active.
NOTE: The [edit ... family pppoe] hierarchies are supported only on MX Series routers with
MPCs.
RELATED DOCUMENTATION
dynamic-profile profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS 17.1.
Description
Attach a dynamic profile to a static or dynamic underlying VLAN interface to create a dynamic VLAN on
the interface, based on receiving a trusted option in the DHCP or PPPoE discovery packet. The trusted
option can be the ACI, ARI, both ACI and ARI, or neither. The VLAN is known as an access-line-identifier
VLAN.
Options
profile-name—Name of the dynamic profile.
RELATED DOCUMENTATION
dynamic-profile profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
Attach a dynamic profile for an agent circuit identifier (ACI) interface set to a static or dynamic underlying
VLAN interface.
Options
• profile-name—Name of the dynamic profile that defines the ACI interface set.
RELATED DOCUMENTATION
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
557
dynamic-profile profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Support for the [edit ... family pppoe] hierarchies introduced in Junos OS Release 11.2.
Description
Attach a PPPoE dynamic profile to an underlying Ethernet interface. This underlying interface is configured
with either the encapsulation ppp-over-ether statement or the family pppoe statement; the two statements
are mutually exclusive. When the router creates a dynamic PPPoE logical interface on the underlying
interface, it uses the information in the dynamic profile to determine the properties of the dynamic PPPoE
logical interface.
NOTE: The [edit ... family pppoe] hierarchies are supported only on MX Series routers with
MPCs.
Starting in Junos OS Release 17.2R1, you can configure converged services for MS-MPCs and
MS-MICs. You can configure captive portal content delivery (CPCD) profiles for MS-MICs and
MS-MPCs by including the service interface ms-fpc/pic/port statement at the edit service-set
service set name captive-portal-content-delivery-profile profile name interface-service heirarchy
level.
Options
profile-name—Name of a previously configured PPPoE dynamic profile, up to 64 characters in length,
defined at the [edit dynamic-profiles profile-name interfaces pp0] hierarchy level.
RELATED DOCUMENTATION
dynamic-profile (PPP)
Syntax
dynamic-profile profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support for MLPPP on LSQ interfaces introduced in Junos OS Release 10.2.
Description
Specify the dynamic profile that is attached to the interface. On the MX Series routers, this statement is
supported on PPPoE interfaces only.
RELATED DOCUMENTATION
dynamic-profile profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.2.
Description
Specify a dynamic profile to instantiate a dynamic PPPoE interface. You can associate a dynamic profile
with a named service entry, empty service entry, or any service entry configured in a PPPoE service name
table, or with an agent circuit identifier/agent remote identifier (ACI/ARI) pair defined for these services.
The dynamic profile associated with a service entry in a PPPoE service name table overrides the dynamic
profile associated with the PPPoE underlying interface on which the dynamic PPPoE interface is created.
If you include the dynamic-profile statement at the [edit protocols pppoe service-name-tables table-name
service service-name agent-specifier aci circuit-id-string ari remote-id-string] hierarchy level, you cannot
also include the static-interface statement at this level. The dynamic-profile and static-interface statements
are mutually exclusive for ACI/ARI pair configurations.
Options
profile-name—Name of the dynamic profile that the router uses to instantiate a dynamic PPPoE interface.
RELATED DOCUMENTATION
dynamic-profile profile-name {
accept (any | dhcp-v4 |dhcp-v6| inet | inet6 | pppoe);
access-profilevlan-dynamic-profile-name;
ranges (any | low-tag–high-tag),(any | low-tag–high-tag);
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure a dynamic profile for use when configuring dynamic stacked VLANs.
Options
profile-name—Name of the dynamic profile that you want to use when configuring dynamic stacked VLANs.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
dynamic-profile (VLAN)
Syntax
dynamic-profile profile-name {
accept (any | dhcp-v4 |dhcp-v6| inet | inet6 | pppoe);
accept-out-of-band protocol;
access-profilevlan-dynamic-profile-name;
ranges (any | low-tag)–(any | high-tag);
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure a dynamic profile for use when configuring dynamic VLANs.
Options
profile-name—Name of the dynamic profile that you want to use when configuring dynamic VLANs.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
dynamic-profiles
Syntax
dynamic-profiles {
profile-name {
class-of-service {
dynamic-class-of-service-options {
vendor-specific-tags tag;
}
interfaces {
interface-name ;
}
unit logical-unit-number {
classifiers {
type (classifier-name | default);
}
output-traffic-control-profile (profile-name | $junos-cos-traffic-control-profile);
report-ingress-shaping-rate bps;
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
(scheduler-name) {
buffer-size (seconds | percent percentage | remainder | temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high) protocol (any | non-tcp |
tcp) drop-profile profile-name;
excess-priority (low | high | $junos-cos-scheduler-excess-priority);
excess-rate (percent percentage | percent $junos-cos-scheduler-excess-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
priority priority-level;
shaping-rate (rate | predefined-variable);
transmit-rate (percent percentage | rate | remainder) <exact | rate-limit>;
}
564
}
traffic-control-profiles profile-name {
adjust-minimum rate;
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value | percent $junos-cos-excess-rate);
excess-rate-high (percent percentage | proportion value);
excess-rate-low (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate) <burst-size bytes>;
max-burst-size cells;
overhead-accounting (frame-mode | cell-mode) <bytes byte-value>;
peak-rate rate;
scheduler-map map-name;
shaping-rate (percent percentage | rate | predefined-variable) <burst-size bytes>;
shaping-rate-excess-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-strict-high (percent percentage | rate) <burst-size bytes>;
sustained-rate rate;
}
}
565
firewall {
family family {
fast-update-filter filter-name {
interface-specific;
match-order [match-order];
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
only-at-create;
}
}
filter filter-name {
enhanced-mode-override;
fast-lookup-filter;
instance-shared;
interface-shared;
interface-specific;
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
only-at-create;
filter filter-name {
interface-specific;
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
}
hierarchical-policer uid {
aggregate {
566
if-exceeding {
bandwidth-limit-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
premium {
if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
}
policer uid {
filter-specific;
if-exceeding {
(bandwidth-limit bps | bandwidth-percent percentage);
burst-size-limit bytes;
}
logical-bandwidth-policer;
logical-interface-policer;
physical-interface-policer;
then {
policer-action;
}
}
567
three-color-policer uid {
action {
loss-priority high then discard;
}
logical-interface-policer;
single-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
excess-burst-size bytes;
}
two-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
peak-burst-size bytes;
peak-information-rate bps;
}
}
}
}
568
interfaces interface-name {
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
}
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
encapsulation (atm-ccc-cell-relay | atm-ccc-vc-mux | atm-cisco-nlpid | atm-tcc-vc-mux | atm-mlppp-llc |
atm-nlpid | atm-ppp-llc | atm-ppp-vc-mux | atm-snap | atm-tcc-snap | atm-vc-mux | ether-over-atm-llc
| ether-vpls-over-atm-llc | ether-vpls-over-fr | ether-vpls-over-ppp | ethernet | frame-relay-ccc |
frame-relay-ppp | frame-relay-tcc | frame-relay-ether-type | frame-relay-ether-type-tcc |
multilink-frame-relay-end-to-end | multilink-ppp | ppp-over-ether | ppp-over-ether-over-atm-llc |
vlan-bridge | vlan-ccc | vlan-vci-ccc | vlan-tcc | vlan-vpls);
family family {
address address;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name (
precedence precedence;
569
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
unnumbered-address interface-name <preferred-source-address address>;
}
570
filter {
input filter-name (
shared-name filter-shared-name;
}
output filter-name {
shared-name filter-shared-name;
}
}
host-prefix-only;
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
571
telemetry {
subscriber-statistics;
queue-statistics {
interface $junos-interface-name {
refresh rate;
queues queue set;
}
interface-set $junos-interface-set-name {
refresh rate;
queues queue set;
}
}
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
interfaces {
demux0 {...}
}
interfaces {
pp0 {...}
}
policy-options {
prefix-list uid {
ip-addresses;
dynamic-db;
}
}
predefined-variable-defaults predefined-variable <variable-option> default-value;
profile-type remote-device-service;
572
protocols {
igmp {
interface interface-name {
accounting;
disable;
group-limit limit;
group-policy;
group-threshold value;
immediate-leave
log-interval seconds;
no-accounting;
oif-map;
passive;
promiscuous-mode;
ssm-map ssm-map-name;
ssm-map-policy ssm-map-policy-name
static {
group group {
source source;
}
}
version version;
}
}
mld {
interface interface-name {
(accounting | no-accounting);
disable;
group-limit limit;
group-policy;
group-threshold value;
immediate-leave;
log-interval seconds;
oif-map;
passive;
ssm-map ssm-map-name;
ssm-map-policy ssm-map-policy-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
573
source-increment increment;
}
}
}
version version;
}
}
router-advertisement {
interface interface-name {
current-hop-limit number;
default-lifetime seconds;
(managed-configuration | no-managed-configuration);
max-advertisement-interval seconds;
min-advertisement-interval seconds;
(other-stateful-configuration | no-other-stateful-configuration);
prefix prefix;
reachable-time milliseconds;
retransmit-timer milliseconds;
}
}
}
574
routing-instances routing-instance-name {
interface interface-name;
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
rib routing-table-name {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
575
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
tag2 route-tag2;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
services {
captive-portal-content-delivery {
auto-deactivate value;
rule name {
match-direction (input | input-output | output);
term name {
then {
accept;
redirect url;
rewrite destination-address address <destination-port port-number>;
syslog;
}
}
}
}
}
576
variables {
variable-name {
default-value default-value;
equals expression;
mandatory;
uid;
uid-reference;
}
}
}
}
Hierarchy Level
[edit]
Release Information
Statement introduced in Junos OS Release 9.2.
Support at the filter, policer, hierarchical-policer, three-color-policer, and policy options hierarchy levels
introduced in Junos OS Release 11.4.
Description
Create dynamic profiles for use with DHCP or PPP client access.
Options
profile-name—Name of the dynamic profile; string of up to 80 alphanumeric characters.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.1X48 for PTX Series Packet Transport Routers
(ethernet,vlan-ccc, and vlan-tcc options only).
Statement introduced in Junos OS Release 12.2 for the ACX Series Universal Metro Routers. Only the
atm-ccc-cell-relay and atm-ccc-vc-mux options are supported on ACX Series routers.
Statement introduced in Junos OS Release 17.3R1 for QFX10000 Series switches (ethernet-ccc and
vlan-ccc options only).
Description
Configure a logical link-layer encapsulation type. Not all encapsulation types are supported on the switches.
See the switch CLI.
Options
atm-ccc-cell-relay—Use ATM cell-relay encapsulation.
atm-ccc-vc-mux—Use ATM virtual circuit (VC) multiplex encapsulation on CCC circuits. When you use
this encapsulation type, you can configure the ccc family only.
atm-cisco-nlpid—Use Cisco ATM network layer protocol identifier (NLPID) encapsulation. When you use
this encapsulation type, you can configure the inet family only.
atm-mlppp-llc—For ATM2 IQ interfaces only, use Multilink Point-to-Point (MLPPP) over AAL5 LLC. For
this encapsulation type, your router must be equipped with a Link Services or Voice Services PIC. MLPPP
over ATM encapsulation is not supported on ATM2 IQ OC48 interfaces.
578
atm-nlpid—Use ATM NLPID encapsulation. When you use this encapsulation type, you can configure the
inet family only.
atm-ppp-llc—(ATM2 IQ interfaces and MX Series routers with MPC/MIC interfaces using the ATM MIC
with SFP only) Use PPP over AAL5 LLC encapsulation.
atm-ppp-vc-mux—(ATM2 IQ interfaces and MX Series routers with MPC/MIC interfaces using the ATM
MIC with SFP only) Use PPP over ATM AAL5 multiplex encapsulation.
atm-snap—(All interfaces including MX Series routers with MPC/MIC interfaces using the ATM MIC with
SFP) Use ATM subnetwork attachment point (SNAP) encapsulation.
atm-tcc-vc-mux—Use ATM VC multiplex encapsulation on TCC circuits. When you use this encapsulation
type, you can configure the tcc family only.
atm-vc-mux—(All interfaces including MX Series routers with MPC/MIC interfaces using the ATM MIC
with SFP) Use ATM VC multiplex encapsulation. When you use this encapsulation type, you can configure
the inet family only.
ether-over-atm-llc—(All IP interfaces including MX Series routers with MPC/MIC interfaces using the ATM
MIC with SFP) For interfaces that carry IP traffic, use Ethernet over ATM LLC encapsulation. When you
use this encapsulation type, you cannot configure multipoint interfaces.
ether-vpls-over-atm-llc—For ATM2 IQ interfaces only, use the Ethernet virtual private LAN service (VPLS)
over ATM LLC encapsulation to bridge Ethernet interfaces and ATM interfaces over a VPLS routing instance
(as described in RFC 2684, Multiprotocol Encapsulation over ATM Adaptation Layer 5). Packets from the
ATM interfaces are converted to standard ENET2/802.3 encapsulated Ethernet frames with the frame
check sequence (FCS) field removed.
ether-vpls-over-fr—For E1, T1, E3, T3, and SONET interfaces only, use the Ethernet virtual private LAN
service (VPLS) over Frame Relay encapsulation to support Bridged Ethernet over Frame Relay encapsulated
TDM interfaces for VPLS applications, per RFC 2427, Multiprotocol Interconnect over Frame Relay.
NOTE: The SONET/SDH OC3/STM1 (Multi-Rate) MIC with SFP, the Channelized SONET/SDH
OC3/STM1 (Multi-Rate) MIC with SFP, and the DS3/E3 MIC do not support Ethernet over Frame
Relay encapsulation.
ether-vpls-over-ppp—For E1, T1, E3, T3, and SONET interfaces only, use the Ethernet virtual private LAN
service (VPLS) over Point-to-Point Protocol (PPP) encapsulation to support Bridged Ethernet over
PPP-encapsulated TDM interfaces for VPLS applications.
ethernet—Use Ethernet II encapsulation (as described in RFC 894, A Standard for the Transmission of IP
Datagrams over Ethernet Networks).
579
ethernet-vpls—Use Ethernet VPLS encapsulation on Ethernet interfaces that have VPLS enabled and that
must accept packets carrying standard Tag Protocol ID (TPID) values.
NOTE: The built-in Gigabit Ethernet PIC on an M7i router does not support extended VLAN
VPLS encapsulation.
frame-relay-ccc—Use Frame Relay encapsulation on CCC circuits. When you use this encapsulation type,
you can configure the ccc family only.
frame-relay-ether-type—Use Frame Relay ether type encapsulation for compatibility with Cisco Frame
Relay. The physical interface must be configured with flexible-frame-relay encapsulation.
frame-relay-ether-type-tcc—Use Frame Relay ether type TCC for Cisco-compatible Frame Relay on TCC
circuits to connect different media. The physical interface must be configured with flexible-frame-relay
encapsulation.
frame-relay-ppp—Use PPP over Frame Relay circuits. When you use this encapsulation type, you can
configure the ppp family only.
frame-relay-tcc—Use Frame Relay encapsulation on TCC circuits for connecting different media. When
you use this encapsulation type, you can configure the tcc family only.
gre-fragmentation—For adaptive services interfaces only, use GRE fragmentation encapsulation to enable
fragmentation of IPv4 packets in GRE tunnels. This encapsulation clears the do not fragment (DF) bit in
the packet header. If the packet’ s size exceeds the tunnel’ s maximum transmission unit (MTU) value, the
packet is fragmented before encapsulation.
multilink-ppp—Use MLPPP encapsulation. This encapsulation is used only on multilink, link services, and
voice services interfaces and their constituent T1 or E1 interfaces.
ppp-over-ether—Use PPP over Ethernet encapsulation to configure an underlying Ethernet interface for
a dynamic PPPoE logical interface on M120 and M320 routers with Intelligent Queuing 2 (IQ2) PICs, and
on MX Series routers with MPCs.
580
ppp-over-ether-over-atm-llc—(MX Series routers with MPCs using the ATM MIC with SFP only) For
underlying ATM interfaces, use PPP over Ethernet over ATM LLC encapsulation. When you use this
encapsulation type, you cannot configure the interface address. Instead, configure the interface address
on the PPP interface.
vlan-bridge—Use Ethernet VLAN bridge encapsulation on Ethernet interfaces that have IEEE 802.1Q
tagging, flexible-ethernet-services, and bridging enabled and that must accept packets carrying TPID
0x8100 or a user-defined TPID.
vlan-ccc—Use Ethernet virtual LAN (VLAN) encapsulation on CCC circuits. When you use this encapsulation
type, you can configure the ccc family only.
vlan-vci-ccc—Use ATM-to-Ethernet interworking encapsulation on CCC circuits. When you use this
encapsulation type, you can configure the ccc family only.
vlan-tcc—Use Ethernet VLAN encapsulation on TCC circuits. When you use this encapsulation type, you
can configure the tcc family only.
RELATED DOCUMENTATION
enhanced-mode
Syntax
enhanced-mode;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Statement introduced in Junos OS Release 12.3R2 for EX Series switches.
Description
Limit static service filters or API-client filters to term-based filter format only for inet or inet6 families
when enhanced network services mode is configured at the [edit chassis network-services] hierarchy
level. You cannot attach enhanced mode filters to local loopback, management, or MS-DPC interfaces.
These interfaces are processed by the Routing Engine and DPC modules and can accept only compiled
firewall filter format. In cases where both filter formats are needed for dynamic service filters, you can use
the enhanced-mode-override statement on the specific filter definition to override the default filter
term-based only format of chassis network-service enhanced IP mode.The enhanced-mode and the
enhanced-mode-override statements are mutually exclusive; you can define the filter with either
enhanced-mode or enhanced-mode-override, but not both.
583
NOTE:
For MX Series routers with MPCs, you need to initialize Trio-only match filters (that is, a filter
that includes at least one match condition or action that is only supported by the Trio chipset)
by walking the corresponding SNMP MIB. For example, for any filter that is configured or changed
with respect to their Trio only filters, you need to run a command such as the following: show
snmp mib walk (ascii | decimal) object-id. This forces Junos to learn the filter counters and ensure
that the filter statistics are displayed. This guidance applies to all enhanced-mode firewall filters.
It also applies to Firewall Filter Match Conditions for IPv4 Traffic with flexible match filter terms
for offset-range or offset-mask, gre-key, and Firewall Filter Match Conditions for IPv6 Traffic with
any of the following match conditions: payload-protocol, extension headers, is_fragment. It also
applies to filters with either of the following Firewall Filter Terminating Actions: encapsulate or
decapsulate, or either of the following Firewall Filter Nonterminating Actions: policy-map, and
clear-policy-map.
When used with one of the chassis enhanced network services modes, firewall filters are generated in
term-based format for use with MPC modules. Do not use enhanced mode for firewall filters that are
intended for control plane traffic. Control plane filtering is handled by the Routing Engine kernel, which
cannot use the term-based format of the enhanced mode filters.
If enhanced network services are not configured for the chassis, the enhanced-mode statement is ignored
and any enhanced mode firewall filters are generated in both term-based and the default, compiled format.
Only term-based (enhanced) firewall filters will be generated, regardless of the setting of the enhanced-mode
statement at the [edit chassis network-services] hierarchy level, if any of the following are true:
• Flexible filter match conditions are configured at the [edit firewall family family-name filter filter-name
term term-name from] or [edit firewall filter filter-name term term-name from] hierarchy levels.
• A tunnel header push or pop action, such as GRE encapsulate or decapsulate is configured at the [edit
firewall family family-name filter filter-name term term-name then] hierarchy level.
• Payload-protocol match conditions are configured at the [edit firewall family family-name filter filter-name
term term-name from] or [edit firewall filter filter-name term term-name from] hierarchy levels.
• An extension-header match is configured at the [edit firewall family family-name filter filter-name term
term-name from] or [edit firewall filter filter-name term term-name from] hierarchy levels.
• A match condition is configured that only works with MPC cards, such as firewall bridge filters for IPv6
traffic.
For packets sourced from the Routing Engine, the Routing Engine processes Layer 3 packets by applying
output filters to the packets and forwards Layer 2 packets to the Packet Forwarding Engine for transmission.
By configuring the enhanced mode filter, you explicitly specify that only the term-based filter format is
used, which also implies that the Routing Engine cannot use this filter.
584
RELATED DOCUMENTATION
family
Syntax
family family {
accounting {
destination-class-usage;
source-class-usage {
(input | output | input output);
}
}
access-concentrator name;
address address {
... the address subhierarchy appears after the main [edit interfaces interface-name unit logical-unit-number family
family-name] hierarchy ...
}
bundle interface-name;
core-facing;
demux-destination {
destination-prefix;
}
demux-source {
source-prefix;
}
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
group filter-group-number;
input filter-name;
input-list [ filter-names ];
output filter-name;
output-list [ filter-names ];
}
interface-mode (access | trunk);
ipsec-sa sa-name;
keep-address-and-control;
mac-validate (loose | strict);
max-sessions number;
max-sessions-vsa-ignore;
mtu bytes;
multicast-only;
nd6-stale-time seconds;
negotiate-address;
no-neighbor-learn;
586
no-redirects;
policer {
arp policer-template-name;
input policer-template-name;
output policer-template-name;
}
primary;
protocols [inet iso mpls];
proxy inet-address address;
receive-options-packets;
receive-ttl-exceeded;
remote (inet-address address | mac-address address);
rpf-check {
fail-filter filter-name
mode loose;
}
sampling {
input;
output;
}
service {
input {
post-service-filter filter-name;
service-set service-set-name <service-filter filter-name>;
}
output {
service-set service-set-name <service-filter filter-name>;
}
}
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds> <filter [aci]>;
(translate-discard-eligible | no-translate-discard-eligible);
(translate-fecn-and-becn | no-translate-fecn-and-becn);
translate-plp-control-word-de;
unnumbered-address interface-name destination address destination-profile profile-name;
vlan-id number;
vlan-id-list [number number-number];
587
address address {
arp ip-address (mac | multicast-mac) mac-address <publish>;
broadcast address;
destination address;
destination-profile name;
eui-64;
master-only;
multipoint-destination address dlci dlci-identifier;
multipoint-destination address {
epd-threshold cells;
inverse-arp;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
shaping {
(cbr rate | rtvbr burst length peak rate sustained rate | vbr burst length peak rate sustained rate);
queue-length number;
}
vci vpi-identifier.vci-identifier;
}
preferred;
primary;
vrrp-groupgroup-id {
(accept-data | no-accept-data);
advertise-interval seconds;
authentication-key key;
authentication-type authentication;
fast-interval milliseconds;
(preempt | no-preempt) {
hold-time seconds;
}
priority number;
track {
interface interface-name {
bandwidth-threshold bits-per-second priority-cost priority;
priority-cost priority;
}
priority-hold-time seconds;
route prefix routing-instance instance-name priority-cost priority;
}
}
virtual-address [ addresses ];
588
}
virtual-link-local-address ipv6-address;
}
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Option max-sessions-vsa-ignore introduced in Junos OS Release 11.4.
Description
Configure protocol family information for the logical interface.
NOTE: Not all subordinate statements are available to every protocol family.
589
Options
family—Protocol family:
• bridge—(M Series and T Series routers only) Configure only when the physical interface is configured
with ethernet-bridge type encapsulation or when the logical interface is configured with vlan-bridge
type encapsulation. You can optionally configure this protocol family for the logical interface on which
you configure VPLS.
• ethernet-switching—(M Series and T Series routers only) Configure only when the physical interface is
configured with ethernet-bridge type encapsulation or when the logical interface is configured with
vlan-bridge type encapsulation
• ccc—Circuit cross-connect protocol suite. You can configure this protocol family for the logical interface
of CCC physical interfaces. When you use this encapsulation type, you can configure the ccc family only.
• inet—Internet Protocol version 4 suite. You must configure this protocol family for the logical interface
to support IP protocol traffic, including Open Shortest Path First (OSPF), Border Gateway Protocol (BGP),
Internet Control Message Protocol (ICMP), and Internet Protocol Control Protocol (IPCP).
• inet6—Internet Protocol version 6 suite. You must configure this protocol family for the logical interface
to support IPv6 protocol traffic, including Routing Information Protocol for IPv6 (RIPng), Intermediate
System-to-Intermediate System (IS-IS), BGP, and Virtual Router Redundancy Protocol for IPv6 (VRRP).
• iso—International Organization for Standardization Open Systems Interconnection (ISO OSI) protocol
suite. You must configure this protocol family for the logical interface to support IS-IS traffic.
• mlfr-end-to-end—Multilink Frame Relay FRF.15. You must configure this protocol or multilink
Point-to-Point Protocol (MLPPP) for the logical interface to support multilink bundling.
• mlfr-uni-nni—Multilink Frame Relay FRF.16. You must configure this protocol or mlfr-end-to-end for
the logical interface to support link services and voice services bundling.
• multilink-ppp—Multilink Point-to-Point Protocol. You must configure this protocol (or mlfr-end-to-end)
for the logical interface to support multilink bundling.
• mpls—Multiprotocol Label Switching (MPLS). You must configure this protocol family for the logical
interface to participate in an MPLS path.
• tcc—Translational cross-connect protocol suite. You can configure this protocol family for the logical
interface of TCC physical interfaces.
590
• tnp—Trivial Network Protocol. This protocol is used to communicate between the Routing Engine and
the router’s packet forwarding components. The Junos OS automatically configures this protocol family
on the router’s internal interfaces only, as discussed in Understanding Internal Ethernet Interfaces.
• vpls—(M Series and T Series routers only) Virtual private LAN service. You can optionally configure this
protocol family for the logical interface on which you configure VPLS. VPLS provides an Ethernet-based
point-to-multipoint Layer 2 VPN to connect customer edge (CE) routers across an MPLS backbone.
When you configure a VPLS encapsulation type, the family vpls statement is assumed by default.
MX Series routers support dynamic profiles for VPLS pseudowires, VLAN identifier translation, and
automatic bridge domain configuration.
For more information about VPLS, see the Junos OS VPNs Library for Routing Devices.
RELATED DOCUMENTATION
family family {
access-concentrator name;
address address;
demux-source {
source-address;
}
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
input filter-name;
output filter-name;
}
mac-validate (loose | strict);
max-sessions number;
max-sessions-vsa-ignore;
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds> <filter [aci]>;
unnumbered-address interface-name <preferred-source-address address>;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
pppoe option added in Junos OS Release 11.2.
Description
Configure protocol family information for the logical interface.
NOTE: Not all subordinate stanzas are available to every protocol family.
Options
family—Protocol family:
592
• pppoe—(MX Series routers with MPCs only) Point-to-Point Protocol over Ethernet
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Subscriber Interfaces and Demultiplexing Overview | 92
593
family family {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
}
output filter-name {
precedence precedence;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
Configure protocol family information for the logical interface.
Options
family—Protocol family:
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
mac-validate (loose | strict);
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
596
}
}
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds> <filter [aci]>;
unnumbered-address interface-name <preferred-source-address address>;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
pppoe option added in Junos OS Release 11.2.
Description
Configure protocol family information for the logical interface.
NOTE: Not all subordinate stanzas are available to every protocol family.
Options
family—Protocol family:
• pppoe—(MX Series routers with MPCs only) Point-to-Point Protocol over Ethernet
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
filter {
group filter-group-number;
input filter-name;
input-list [ filter-names ];
output filter-name;
output-list [ filter-names ];
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.3R2 for EX Series switches.
Description
Apply a stateless firewall filter to a logical interface at a specific protocol level.
Options
group filter-group-number—(Only Ex, M, MX, and T Series) Number of the group to which the interface
belongs. Range: 1 through 255
input filter-name—Name of one filter to evaluate when packets are received on the interface.
input-list [ filter-names ]—Names of filters to evaluate when packets are received on the interface. Up to
16 filters can be included in a filter input list.
output filter-name—Name of one filter to evaluate when packets are transmitted on the interface.
output-list [ filter-names ]—Names of filters to evaluate when packets are transmitted on the interface.
Up to 16 filters can be included in a filter output list.
599
RELATED DOCUMENTATION
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family
family] hierarchy level introduced in Junos OS Release 10.1.
shared-name statement added in Junos OS Release 12.2.
Description
Apply a dynamic filter to an interface. You can configure filters for family any ,family inet, or family inet6.
The filters can be classic filters, fast update filters, or (for the adf statement) Ascend-Data-Filters.
Options
input filter-name—Name of one filter to evaluate when packets are received on the interface.
output filter-name—Name of one filter to evaluate when packets are transmitted on the interface.
601
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
For general information about configuring firewall filters, see the Junos OS Routing Policies, Firewall
Filters and Traffic Policers User Guide for Routing Devices.
Firewall Filters Overview
Understanding Dynamic Firewall Filters
Classic Filters Overview
Basic Classic Filter Syntax
Parameterized Filters Overview
602
flexible-vlan-tagging
Syntax
flexible-vlan-tagging;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 8.1.
Support for aggregated Ethernet added in Junos OS Release 9.0.
Statement introduced in Junos OS Release 12.1x48 for PTX Series Packet Transport Routers.
Statement introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Statement introduced in Junos OS Release 13.2X51-D20 for the QFX Series.
Description
Support simultaneous transmission of 802.1Q VLAN single-tag and dual-tag frames on logical interfaces
on the same Ethernet port, and on pseudowire logical interfaces.
This statement is supported on M Series and T Series routers, for Fast Ethernet and Gigabit Ethernet
interfaces only on Gigabit Ethernet IQ2 and IQ2-E, IQ, and IQE PICs, and for aggregated Ethernet interfaces
with member links in IQ2, IQ2-E, and IQ PICs or in MX Series DPCs, or on Ethernet interfaces for PTX
Series Packet Transport Routers or 100-Gigabit Ethernet Type 5 PIC with CFP.
This statement is supported on Gigabit Ethernet, 10-Gigabit Ethernet, 40-Gigabit Ethernet, and aggregated
Ethernet interfaces on EX Series and QFX Series switches.
RELATED DOCUMENTATION
forwarding-classes (CoS)
List of Syntax
SRX Series on page 603
M320, MX Series, T Series, EX Series, PTX Series on page 603
SRX Series
forwarding-classes {
class class-name {
priority (high | low);
queue-num number;
spu-priority (high | low | medium);
}
queue queue-number {
class-name {
priority (high | low);
}
}
}
forwarding-classes {
class queue-num queue-number priority (high | low);
queue queue-number class-name priority (high | low) [ policing-priority (premium | normal) ];
}
Hierarchy Level
[edit class-of-service]
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 8.5.
policing-priority option introduced in Junos OS Release 9.5.
Statement updated in Junos OS Release 11.4.
The spu-priority option introduced in Junos OS Release 11.4R2.
Statement introduced on PTX Series Packet Transport Routers in Junos OS Release 12.1.
Change from 2 to 4 queues was made in Junos OS Release 12.3X48-D40 and in Junos OS Release
15.1X49-D70.
medium-high and medium-low priorities for spu-priority are deprecated and medium priority is added in
Junos OS Release 19.1R1.
604
Description
Command used to associate forwarding classes with class names and queues with queue numbers.
All traffic traversing the SRX Series device is passed to an SPC to have service processing applied. Junos
OS provides a configuration option to enable packets with specific Differentiated Services (DiffServ) code
points (DSCP) precedence bits to enter a high-priority queue or a medium-priority queue or low-priority
queue on the SPC. The Services Processing Unit (SPU) draws packets from the highest priority queue first,
then from the medium priority queue, last from the low priority queue. The processing of queue is
weighted-based not strict-priority-based. This feature can reduce overall latency for real-time traffic, such
as voice traffic.
Initially, the spu-priority queue options were "high" and "low". Then, these options (depending on the
devices) were expanded to "high", "medium-high", "medium-low", and "low". The two middle options
("medium-high" and "medium-low") have now been deprecated (again, depending on the devices) and
replaced with "medium". So, the available options for spu-priority queue are "high", "medium", and "low".
We recommend that the high-priority queue be selected for real-time and high-value traffic. The other
options would be selected based on user judgement on the value or sensitivity of the traffic.
For M320, MX Series, T Series routers and EX Series switches only, you can configure fabric priority
queuing by including the priority statement. For Enhanced IQ PICs, you can include the policing-priority
option.
NOTE: The priority and policing-priority options are not supported on PTX Series Packet
Transport Routers.
605
Options
• class class-name—Displays the forwarding class name assigned to the internal queue number.
NOTE: AppQoS forwarding classes must be different from those defined for interface-based
rewriters.
• queue queue-number—Specify the internal queue number to which a forwarding class is assigned.
• spu-priority—Services Processing Unit (SPU) priority queue, high, medium, or low. The default spu-priority
is low.
RELATED DOCUMENTATION
fragmentation-maps
Syntax
fragmentation-maps {
map-name {
forwarding-class class-name {
drop-timeout milliseconds;
fragment-threshold bytes;
multilink-class number;
no-fragmentation;
}
}
}
Hierarchy Level
[edit class-of-service]
Release Information
Statement introduced before Junos OS Release 7.4.
Description
For Multiservices and Services PIC link services IQ (lsq) and virtual LSQ redundancy (rlsq) interfaces, define
fragmentation properties for individual forwarding classes.
Default
If you do not include this statement, traffic in all forwarding classes is fragmented.
Options
map-name—Name of the fragmentation map.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
group group-name {
access-profile profile-name;
authentication {
password password-string;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-description (device-interface | logical-interface);
logical-system-name;
mac-address;
option-60;
option-82 <circuit-id> <remote-id>;
relay-agent-interface-id
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name <aggregate-clients (merge | replace) | use-primary primary-profile-name>;
interface interface-name {
access-profile profile-name;
exclude;
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-discover-match <option60-and-option82>;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
609
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit;
}
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
trace;
upto upto-interface-name;
}
610
liveness-detection {
failure-action (clear-binding | clear-binding-if-interface-up | log-only);
method {
bfd {
version (0 | 1 | automatic);
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
detection-time {
threshold milliseconds;
}
session-mode(automatic | multihop | singlehop);
holddown-interval milliseconds;
}
layer2-liveness-detection {
max-consecutive-retries number;
transmit-interval interval;
}
}
}
611
overrides {
asymmetric-lease-time seconds;
asymmetric-prefix-lease-time seconds;
client-discover-match <option60-and-option82>;
client-negotiation-match incoming-interface;
delay-advertise {
based-on (option-15 | option-16 | option-18 | option-37) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delay-offer {
based-on (option-60 | option-77 | option-82) {
equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
not-equals {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
starts-with {
ascii ascii-string;
hexadecimal hexadecimal-string;
}
}
delay-time seconds;
}
delegated-pool;
delete-binding-on-renegotiation;
dual-stack dual-stack-group-name;
interface-client-limit number;
process-inform {
612
pool pool-name;
}
protocol-attributes attribute-set-name;
rapid-commit;
}
reconfigure {
attempts attempt-count;
clear-on-abort;
strict;
timeout timeout-value;
token token-value;
trigger {
radius-disconnect;
}
}
route-suppression;
service-profile dynamic-profile-name;
short-cycle-protection <lockout-min-time seconds> <lockout-max-time seconds>;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.0.
Statement introduced in Junos OS Release 12.1 for EX Series switches.
Description
Configure a group of interfaces that have a common configuration, such as authentication parameters. A
group must contain at least one interface.
Options
group-name—Name of the group.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
613
RELATED DOCUMENTATION
host-prefix-only
Syntax
host-prefix-only;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 17.2 on MX Series routers.
Description
(MPC5 and MPC6 cards) Improve datapath performance by allowing only DHCPv4 subscribers that
negotiate a 32-bit prefix to come up on the underlying VLAN interface. All DHCP subscribers on the
underlying interface must negotiate a 32-bit prefix. Subscribers that negotiate a subnet prefix are not
brought up. You can configure this statement for static or dynamic subscribers.
NOTE: You must add or remove this statement before subscribers become active. The
configuration fails if you attempt to configure the statement while subscribers are active.
NOTE: You must also configure demux-source inet for the logical interface. Only inet is
supported. A commit error occurs if you specify demux-source inet6 or demux-source [inet
inet6].
RELATED DOCUMENTATION
include {
accept-no-ids;
circuit-id;
remote-id;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS 17.1.
Description
Configure the access-line identifier received in DHCP or PPPoE discovery packets that is a trusted option.
Trusted options are accepted for dynamically creating a VLAN on a static or dynamic underlying VLAN
interface. These VLANs are known as access-line-identifier-based VLANs.
Options
accept-no-ids—(Optional) Enables creation of a VLAN in the absence of the ACI and the ARI string in the
received DHCP or PPPoE packet. This VLAN serves an a default VLAN to collect all subscribers for
which no sub-option is received.
circuit-id—(Optional) Enables creation of the VLAN when the ACI string is received in a DHCP or PPPoE
packet.
remote-id—(Optional) Enables creation of the VLAN when the ARI string is received in a DHCP or PPPoE
packet.
RELATED DOCUMENTATION
inline-services {
bandwidth (1g | 10g | 20g | 30g | 40g | 100g);
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
Description
Enable inline services on PICs residing on MPCs and optionally specify a bandwidth for traffic on the inline
service interface.
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
inner-tag-protocol-id tpids;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, configure the IEEE 802.1Q TPID value to rewrite for the inner tag. All TPIDs
you include in input and output VLAN maps must be among those you specify at the [edit interfaces
interface-name gigether-options ethernet-switch-profile tag-protocol-id tpids ] hierarchy level.
Default
If the inner-tag-protocol-id statement is not configured, the TPID value is 0x8100.
Options
tpids—TPIDs to be accepted on the VLAN. Specify TPIDs in hexadecimal format.
RELATED DOCUMENTATION
inner-vlan-id number;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, specify the VLAN ID to rewrite for the inner tag of the final packet.
You cannot include the inner-vlan-id statement with the swap statement, swap-push statement, push-push
statement, or push-swap statement and the inner-vlan-id statement at the [edit logical-systems
logical-system-name interfaces interface-name unit logical-unit-number output-vlan-map] hierarchy level.
If you include any of those statements in the output VLAN map, the VLAN ID in the outgoing frame is
rewritten to the inner-vlan-id statement you include at the [edit interfaces interface-name unit
logical-unit-number] hierarchy level.
Options
number—VLAN ID number. When used for input VLAN maps, you can specify the $junos-inner-vlan-map-id
predefined variable to dynamically obtain the VLAN identifier.
Range: 0 through 4094
RELATED DOCUMENTATION
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family family service]
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service] hierarchy level introduced in Junos OS Release 10.1.
Description
Define the input service sets and filters to be applied to traffic by a dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic interfaces, define the rewrite profile to be applied to incoming frames on this logical interface.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Stacking and Rewriting VLAN Tags for the Layer 2 Wholesale Solution
622
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
Add a subscriber interface to a dynamic interface set.
In a dynamic profile that defines an agent circuit identifier (ACI) interface set, observe the following
guidelines when you use the interface statement:
• Use the predefined dynamic interface variable $junos-interface-ifd-name to represent the interface
name. Do not use a specific interface name, such as demux0, when defining an ACI interface set.
Options
interface-name–Either the specific name of the interface to include in the interface set, or the predefined
dynamic interface variable $junos-interface-ifd-name. The interface variable is dynamically replaced with
the interface that the DHCP or PPPoE subscriber accesses when connecting to the router.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
interface-name
Syntax
interface-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Append the interface name and VLAN ID or stacked VLAN ID to the username string used for authentication.
The appended information takes the following format:
RELATED DOCUMENTATION
interface-set interface-set-name {
interface interface-name {
unit logical-unit-number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
For MX Series routers with MPC/MIC modules that face the access side of the network, associate an agent
circuit identifier (ACI) or access-line-identifier (ALI) interface set with a dynamic VLAN subscriber interface
for DHCP or PPPoE subscribers. To associate the interface set with a dynamic subscriber interface, you
must include the interface-set stanza in the dynamic profile that defines the logical subscriber interface.
An ACI or ALI interface set is a logical collection of subscriber interfaces that originate at the same household
or on the same access-loop port. An ACI set is created based on the receipt only of the ACI for the subscriber
access line in a DHCP or PPPoE control packet. An access-line-identifier set is created based on the receipt
of a trusted option, which can be the ACI, the ARI, both these identifiers, or the absence of both these
identifiers.
You specify the trigger for either interface set type at the [edit dynamic-profiles profile-name interfaces
“$junos-interface-ifd-name” unit “$junos-interface-unit” auto-configure] hierarchy level. For ACI interface
sets, use the agent-circuit-identifier statement. For ALI interface sets, use the line-identity statement.
Options
• interface-set-name—Name of the ACI interface set, which is represented in a dynamic profile for a
subscriber interface by the predefined variable $junos-interface-set-name.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
625
RELATED DOCUMENTATION
Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information | 55
Agent Circuit Identifier-Based Dynamic VLANs Overview | 45
Configuring Dynamic VLAN Subscriber Interfaces Based on Access-Line Identifiers | 72
Access-Line-Identifier-Based Dynamic VLANs Overview | 61
626
interface-set interface-set-name {
interface interface-name;
pppoe-underlying-options {
max-sessions number;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
For MX Series routers with MPC/MIC modules that face the access side of the network, configure an
agent circuit identifier (ACI) or access-line-identifier (ALI) interface set for the creation of dynamic VLAN
subscriber interfaces for DHCP or PPPoE subscribers based on information about the subscriber access
line received in DHCP or PPPoE control packets.
An ACI or ALI interface set is a logical collection of subscriber interfaces that originate at the same household
or on the same access-loop port. An ACI set is created based on the receipt only of the ACI for the subscriber
access line in a DHCP or PPPoE control packet. An access-line-identifier set is created based on the receipt
of a trusted option, which can be the ACI, the ARI, both these identifiers, or the absence of both these
identifiers.
You specify the trigger for either interface set type at the [edit dynamic-profiles profile-name interfaces
“$junos-interface-ifd-name” unit “$junos-interface-unit” auto-configure] hierarchy level. For ACI interface
sets, use the agent-circuit-identifier statement. For ALI interface sets, use the line-identity statement.
You must associate the interface set with the dynamic subscriber interface by including the interface-set
stanza in the dynamic profile that defines the interface set.
Options
• interface-set-name—Name of the ACI interface set, which is represented in a dynamic profile by the
predefined variable $junos-interface-set-name.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
627
RELATED DOCUMENTATION
interfaces
List of Syntax
Syntax (QFX Series) on page 628
Syntax (EX Series, MX Series and T Series) on page 628
interfaces interface-name {
no-mac-learning;
}
interfaces { ... }
QFX Series
[edit ethernet-switching-options]
[edit]
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 11.1 for the QFX Series.
Description
Configure settings for interfaces that have been assigned to family ethernet-switching.
Default
The management and internal Ethernet interfaces are automatically configured. You must configure all
other interfaces.
Options
interface-name —Name of an interface that is configured for family ethernet-switching.
RELATED DOCUMENTATION
interfaces {
interface-name {
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
max-sessions number;
631
max-sessions-vsa-ignore;
rpf-check {
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
host-prefix-only;
ppp-options {
chap;
pap;
}
proxy-arp;
service {
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
632
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
vlan-id;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
vlan-tagging;
}
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
pppoe-underlying-options {
max-sessions number;
}
}
633
demux0 {
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
demux-source {
source-prefix;
}
filter {
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name;
output filter-name;
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
634
pp0 {
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
635
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
}
}
}
stacked-interface-set {
interface-set-name interface-set-name {
interface-set-name interface-set-name;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Description
Define interfaces for dynamic client profiles.
636
Options
interface-name—The interface variable ($junos-interface-ifd-name). The interface variable is dynamically
replaced with the interface the DHCP client accesses when connecting to the router.
NOTE: Though we do not recommend it, you can also enter the specific name of the interface
you want to assign to the dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Configuring Dynamic PPPoE Subscriber Interfaces | 192
Configuring Dynamic VLANs Based on Agent Circuit Identifier Information | 48
DHCP Subscriber Interface Overview | 91
Subscribers over Static Interfaces Configuration Overview
Demultiplexing Interface Overview
637
keepalives
Syntax
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
Enable the sending of keepalives on a physical interface configured with PPP, Frame Relay, or Cisco HDLC
encapsulation.
For ATM2 IQ interfaces only, you can enable keepalives on a logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
Default
Sending of keepalives is enabled by default. The default keepalive interval is 10 seconds for PPP, Frame
Relay, or Cisco HDLC. The default down-count is 3 and the default up-count is 1 for PPP or Cisco HDLC.
Options
down-count number—The number of keepalive packets a destination must fail to receive before the
network takes down a link.
Range: 1 through 255
Default: 3
up-count number—The number of keepalive packets a destination must receive to change a link’s status
from down to up.
Range: 1 through 255
638
Default: 1
RELATED DOCUMENTATION
Configuring Keepalives
Configuring Frame Relay Keepalives
Applying PPP Attributes to L2TP LNS Subscribers per Inline Service Interface
639
keepalives {
interval seconds;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit”] hierarchy
level introduced in Junos OS Release 10.1.
Support at the [edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit
“$junos-interface-unit”] hierarchy level introduced in Junos OS Release 12.2.
Description
Specify the keepalive interval in a PPP dynamic profile.
Starting in Junos OS Release 15.1R5, you can configure the PPP keepalive interval for subscriber services
in the range 1 second through 600 seconds. Subscriber PPP keepalives are handled by the Packet Forwarding
Engine. If you configure a value greater than 600 seconds, the number is accepted by the CLI, but the
Packet Forwarding Engine limits the interval to 600 seconds.
In earlier Junos OS releases, the range is from 1 second through 60 seconds. The Packet Forwarding Engine
limits any higher configured value to an interval of 60 seconds.
PPP keepalives for nonsubscriber services are handled by the Routing Engine with an interval range from
1 second through 32,767 seconds.
Default
Sending of keepalives is enabled by default.
Options
interval seconds—The time in seconds between successive keepalive requests.
Range: 1 through 600 seconds for subscriber services
Range: 1 through 32767 seconds for nonsubscriber services
Default: 30 seconds for LNS-based PPP sessions. 10 seconds for all other PPP sessions.
640
RELATED DOCUMENTATION
line-identity {
dynamic-profile profile-name;
include {
accept-no-ids;
circuit-id;
remote-id;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS 17.1.
Description
Configure the access-line identifier received in DHCP or PPPoE discovery packets as a trusted option that
is accepted for dynamically creating a VLAN on a static or dynamic underlying VLAN interface according
to the specified dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
local-name
Syntax
local-name name;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Support for PAP added in Junos OS Release 8.3.
Support at the [edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit
“$junos-interface-unit” ppp-options] hierarchy level introduced in Junos OS Release 14.2.
Description
Specify the name of the interface used for CHAP or PAP authentication. Dynamic interfaces are supported
only for CHAP authentication.
For ATM2 IQ interfaces only, you can configure a CHAP local name on the logical interface unit if the
logical interface is configured with one of the following PPP over ATM encapsulation types:
Options
name—Name of the interface used as an identifier in CHAP challenge and response packets or PAP request
and response packets.
Default: When you do not include the local-name statement in the configuration, the interface sends the
router’s system hostname in CHAP challenge and response packets or PAP request and response packets.
Range: For CHAP authentication, a string of 1 through 32 characters. For PAP authentication, a string of 1
through 8 characters.
RELATED DOCUMENTATION
mac
Syntax
mac mac-address;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
Set the MAC address of the interface.
Use this statement at the [edit interfaces ... ps0] hierarchy level to configure the MAC address for a
pseudowire logical device that is used for subscriber interfaces over point-to-point MPLS pseudowires.
Options
mac-address—MAC address. Specify the MAC address as six hexadecimal bytes in one of the following
formats: nnnn.nnnn.nnnn or nn:nn:nn:nn:nn:nn. For example, 0000.5e00.5355 or 00:00:5e:00:53:55.
RELATED DOCUMENTATION
mac-address;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify that the client hardware address (chaddr) from the incoming DHCP discover packet be concatenated
with the username during the subscriber authentication process.
RELATED DOCUMENTATION
mac-validate
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Statement introduced in Junos OS Release 12.3R2 for EX Series switches.
Description
Enable IP and MAC address validation for static Ethernet and IP demux interfaces.
Options
loose—Forwards incoming packets when both the IP source address and the MAC source address match
one of the trusted address tuples. Drops packets when the IP source address matches one of the trusted
tuples, but the MAC address does not match the MAC address of the tuple. Continues to forward incoming
packets when the source address of the incoming packet does not match any of the trusted IP addresses.
strict—Forwards incoming packets when both the IP source address and the MAC source address match
one of the trusted address tuples. Drops packets when the MAC address does not match the tuple's MAC
source address, or when IP source address of the incoming packet does not match any of the trusted IP
addresses.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Description
Enable IP and MAC address validation for dynamic IP demux interfaces in a dynamic profile.
Options
loose—Forwards incoming packets when both the IP source address and the MAC source address match
one of the trusted address tuples. Drops packets when the IP source address matches one of the trusted
tuples, but the MAC address does not match the MAC address of the tuple. Continues to forward incoming
packets when the source address of the incoming packet does not match any of the trusted IP addresses.
strict—Forwards incoming packets when both the IP source address and the MAC source address match
one of the trusted address tuples. Drops packets when the MAC address does not match the tuple's MAC
source address, or when IP source address of the incoming packet does not match any of the trusted IP
addresses.
RELATED DOCUMENTATION
max-sessions number;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Support for the [edit ... family pppoe] hierarchies introduced in Junos OS Release 11.2.
Support at the [edit dynamic-profiles ... interfaces interface-set ... pppoe-underlying-options] hierarchy
level introduced in Junos OS Release 12.2.
Description
Configure the maximum number of dynamic PPPoE logical interfaces that the router can activate on the
underlying interface. The max-sessions value does not affect the maximum number of static PPPoE logical
interfaces that can be configured on the underlying interface.
NOTE: The [edit ... family pppoe] hierarchies and the [edit dynamic-profiles ... interfaces
interface-set ... pppoe-underlying-options] hierarchy level are supported only on MX Series
routers with MPCs/MICs.
Options
number—Maximum number of dynamic PPPoE logical interfaces (sessions) that the router can activate on
the underlying interface. The default value is equal to the maximum number of PPPoE sessions supported
on your routing platform. You can configure from 1 to the platform-specific default for your routing
platform. Changing the max-sessions value has no effect on dynamic PPPoE logical interfaces that are
already active.
RELATED DOCUMENTATION
Limiting the Maximum Number of PPPoE Sessions on the Underlying Interface | 233
Defining ACI Interface Sets | 50
PPPoE Maximum Session Limit Overview | 229
Guidelines for Using PPPoE Maximum Session Limit from RADIUS | 231
Juniper Networks VSAs Supported by the AAA Service Framework
Configuring an Interface Set of Subscribers in a Dynamic Profile
Subscriber Interfaces and PPPoE Overview | 185
649
max-sessions number;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.2.
Description
Configure the maximum number of active PPPoE sessions using either static or dynamic PPPoE interfaces
that the router can establish with the specified named service, empty service, or any service entry in a
PPPoE service name table. The router maintains a count of active PPPoE sessions for each service entry
to determine when the maximum sessions limit has been reached.
The router uses the max-sessions value for a PPPoE service name table entry in conjunction with the
max-sessions value configured for the PPPoE underlying interface, and with the maximum number of
PPPoE sessions supported on your router. If your configuration exceeds any of these maximum session
limits, the router is unable to establish the PPPoE session.
Options
number—Maximum number of active PPPoE sessions that the router can establish with the specified PPPoE
service name table entry, in the range 1 to the platform-specific maximum PPPoE sessions supported for
your router. The default value is equal to the maximum number of PPPoE sessions supported on your
routing platform.
RELATED DOCUMENTATION
Limiting the Number of Active PPPoE Sessions Established with a Specified Service Name | 271
Configuring PPPoE Service Name Tables | 262
PPPoE Maximum Session Limit Overview | 229
Configuring an Interface Set of Subscribers in a Dynamic Profile
Subscriber Interfaces and PPPoE Overview | 185
650
max-sessions-vsa-ignore;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Description
Configure the router to ignore (clear) the value returned by RADIUS in the Max-Clients-Per-Interface
Juniper Networks vendor-specific attribute (VSA) [26-143], and restore the PPPoE maximum session value
on the underlying interface to the value configured in the CLI with the max-sessions statement. The PPPoE
maximum session value specifies the maximum number of concurrent static or dynamic PPPoE logical
interfaces (sessions) that the router can activate on the PPPoE underlying interface, or the maximum
number of active static or dynamic PPPoE sessions that the router can establish with a particular service
entry in a PPPoE service name table.
Default
If you do not include the max-sessions-vsa-ignore statement, the maximum session value returned by
RADIUS in the Max-Clients-Per-Interface VSA takes precedence over the PPPoE maximum session value
configured with the max-sessions statement.
RELATED DOCUMENTATION
Limiting the Maximum Number of PPPoE Sessions on the Underlying Interface | 233
PPPoE Maximum Session Limit Overview | 229
651
Guidelines for Using PPPoE Maximum Session Limit from RADIUS | 231
Juniper Networks VSAs Supported by the AAA Service Framework
Configuring an Interface Set of Subscribers in a Dynamic Profile
Subscriber Interfaces and PPPoE Overview | 185
mode loose;
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family (inet) rpf-check]
Release Information
Statement introduced in Junos OS Release 9.6.
Description
Check whether the packet has a source address with a corresponding prefix in the routing table. If a
corresponding prefix is not found, unicast reverse path forwarding (RPF) loose mode does not accept the
packet. Unlike strict mode, loose mode does not check whether the interface expects to receive a packet
with a specific source address prefix.
Default
If you do not include this statement, unicast RPF is in strict mode.
RELATED DOCUMENTATION
mru size;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 14.2.
Description
Specify the size of maximum receive unit (MRU) that the router uses during link control protocol (LCP)
negotiation for dynamic and static PPP subscribers and L2TP tunneled subscribers.
Options
size—MRU size in bytes that is used during LCP negotiation.
Range: 64–65,535
RELATED DOCUMENTATION
mtu
Syntax
mtu bytes;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Support for Layer 2 VPNs and VPLS introduced in Junos OS Release 10.4.
Statement introduced in Junos OS Release 12.1X48 for PTX Series Packet Transport Routers.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Support at the[set interfaces interface-name unit logical-unit-number family ccc] hierarchy level introduced
in Junos OS Release 12.3R3 for MX Series routers.
Statement introduced in Junos OS 17.3R1 Release for MX Series Routers.
Description
654
Specify the maximum transmission unit (MTU) size for the media or protocol. The default MTU size depends
on the device type. Changing the media MTU or protocol MTU causes an interface to be deleted and
added again.
To route jumbo data packets on an integrated routing and bridging (IRB) interface or routed VLAN interface
(RVI) on EX Series switches, you must configure the jumbo MTU size on the member physical interfaces
of the VLAN that you have associated with the IRB interface or RVI, as well as on the IRB interface or RVI
itself (the interface named irb or vlan, respectively).
CAUTION: For EX Series switches, setting or deleting the jumbo MTU size on an IRB
interface or RVI while the switch is transmitting packets might cause packets to be
dropped.
NOTE:
The MTU for an IRB interface is calculated by removing the Ethernet header overhead
[6(DMAC)+6(SMAC)+2(EtherType)]. Because, the MTU is the lower value of the MTU configured
on the IRB interface and the MTU configured on the IRB’s associated bridge domain IFDs or
IFLs, the IRB MTU is calculated as follows:
• In case of Layer 2 IFL configured with the flexible-vlan-tagging statement, the IRB MTU is
calculated by including 8 bytes overhead (SVLAN+CVLAN).
• In case of Layer 2 IFL configured with the vlan-tagging statement, the IRB MTU is calculated
by including a single VLAN 4 bytes overhead.
655
NOTE:
• If a packet whose size is larger than the configured MTU size is received on the receiving
interface, the packet is eventually dropped. The value considered for MRU (maximum receive
unit) size is also the same as the MTU size configured on that interface.
• Not all devices allow you to set an MTU value, and some devices have restrictions on the range
of allowable MTU values. You cannot configure an MTU for management Ethernet interfaces
(fxp0, em0, or me0) or for loopback, multilink, and multicast tunnel devices.
• On ACX Series routers, you can configure the protocol MTU by including the mtu statement
at the [edit interfaces interface-name unit logical-unit-number family inet] or [edit interfaces
interface-name unit logical-unit-number family inet6] hierarchy level.
• If you configure the protocol MTU at any of these hierarchy levels, the configured value is
applied to all families that are configured on the logical interface.
• If you are configuring the protocol MTU for both inet and inet6 families on the same logical
interface, you must configure the same value for both the families. It is not recommended
to configure different MTU size values for inet and inet6 families that are configured on the
same logical interface.
• Starting in Release 14.2, MTU for IRB interfaces is calculated by removing the Ethernet header
overhead (6(DMAC)+6(SMAC)+2(EtherType)), and the MTU is a minimum of the two values:
• Configured MTU
• For Layer 2 logical interfaces configured with flexible-vlan-tagging, IRB MTU is calculated
by including 8 bytes overhead (SVLAN+CVLAN).
• For Layer 2 logical interfaces configured with vlan-tagging, IRB MTU is calculated by
including single VLAN 4 bytes overhead.
For more information about configuring MTU for specific interfaces and router or switch combinations,
see Configuring the Media MTU.
656
Options
bytes—MTU size.
Range: 256 through 9192 bytes, 256 through 9216 (EX Series switch interfaces), 256 through 9500 bytes
(Junos OS 12.1X48R2 for PTX Series routers), 256 through 9500 bytes (Junos OS 16.1R1 for MX Series
routers)
NOTE: Starting in Junos OS Release 16.1R1, the MTU size for a media or protocol is increased from
9192 to 9500 for Ethernet interfaces on the following MX Series MPCs:
• MPC1
• MPC2
• MPC2E
• MPC3E
• MPC4E
• MPC5E
• MPC6E
Default: 1500 bytes (INET, INET6, and ISO families), 1448 bytes (MPLS), 1514 bytes (EX Series switch interfaces)
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 14.2.
Description
Specify the size of maximum transmission unit (MTU) for the PPP connection. For a PPP connection, the
MTU size defines the largest data unit that can be forwarded without fragmentation. This size does not
include the overhead of the lower layers.
Options
size—MTU size in bytes for a PPP connection.
Range: 64–65,535
use-lower-layer—Set the PPP MTU size to the interface MTU size excluding the overhead of the lower
layers.
RELATED DOCUMENTATION
nas-port-extended-format
Syntax
nas-port-extended-format {
adapter-width bits;
ae-width bits;
atm {
adapter-width bits;
port-width bits;
slot-width bits;
vci-width bits;
vpi-width bits;
}
port-width bits;
pw-width bits;
slot-width bits;
stacked-vlan-width bits;
vlan-width bits;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.1.
Statement introduced in Junos OS Release 9.1 for EX Series switches.
ae-width option added in Junos OS Release 12.1.
atm option added in Junos OS Release 12.3R3 and supported in later 12.3Rx releases.
atm option supported in Junos OS Release 13.2 and later releases. (Not supported in Junos OS Release
13.1.)
pw-width option added in Junos OS Release 15.1.
Description
Configure the RADIUS client to use the extended format for RADIUS attribute 5 (NAS-Port) and specify
the width in bits of the fields in the NAS-Port attribute.
The NAS-Port attribute specifies the physical port number of the NAS that is authenticating the user, and
is formed by a combination of the physical port’s slot number, port number, adapter number, VLAN ID,
and S-VLAN ID. The NAS-Port extended format specifies the number of bits (bit width) for each field in
the NAS-Port attribute: slot, adapter, port, aggregated, Ethernet, VLAN, and S-VLAN.
659
NOTE: The combined total of the widths of all fields for a subscriber must not exceed 32 bits,
or the configuration fails. The router may truncate the values of individual fields depending on
the bit width you specify.
Options
adapter-width width—Number of bits in the adapter field.
ae-width width—(Ethernet subscribers only) Number of bits in the aggregated Ethernet identifier field.
pw-width width—(Ethernet subscribers only) Number of bits in the pseudowire field. Appears in the Cisco
NAS-Port-Info AVP (100).
vci-width width—(ATM subscribers only) Number of bits in the ATM virtual circuit identifier (VCI) field.
vpi-width width—(ATM subscribers only) Number of bits in the ATM virtual path identifier (VPI) field.
NOTE: The total of the widths must not exceed 32 bits, or the configuration will fail.
RELATED DOCUMENTATION
nas-port-extended-format (Interfaces)
Syntax
nas-port-extended-format {
adapter-width bits;
ae-width bits;
port-width bits;
slot-width bits;
stacked;
stacked-vlan-width bits;
vci-width bits:
vlan-width bits;
vpi-width bits;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.3.
Options vci-width and vpi-width introduced in Junos OS Release 12.3R3 and supported in later 12.3Rx
releases.
Options vci-width and vpi-width supported in Junos OS Release 13.2 and later releases. (Not supported
in Junos OS Release 13.1.)
Description
Configure the RADIUS client to use the extended format for RADIUS attribute 5 (NAS-Port) and specify
the width in bits of the fields in the NAS-Port attribute.
Options
adapter-width width—Number of bits in the adapter field.
stacked—Include stacked VLAN IDs, in addition to VLAN IDs, in the NAS-Port extended format.
vci-width width—Number of bits in the ATM virtual circuit identifier (VCI) field.
661
vpi-width width—Number of bits in the ATM virtual path identifier (VPI) field.
NOTE: Each field can be 0 through 32 bits wide; however, the total of the widths of all fields
must not exceed 32 bits, or the configuration fails.
The router may truncate the values of individual fields depending on the bit width you specify.
RELATED DOCUMENTATION
Configuring RADIUS NAS-Port Options for Subscriber Access per Physical Interface, VLAN, or Stacked VLAN
Guidelines for Configuring RADIUS NAS-Port Options for Subscriber Access per Physical Interface, VLAN, or
Stacked VLAN
662
nd-override-preferred-src
Syntax
nd-override-preferred-src;
Hierarchy Level
[edit system]
Release Information
Statement introduced in Junos OS Release 13.3
Description
Configure the router to override the default configuration and use the appropriate address based on
destination address scope for the source address for Neighbor Solicitation/Neighbor Advertisement
(NS/NA) for unnumbered interfaces.
Default
The router uses the preferred source address, if configured, as source for NS/NA for unnumbered interfaces.
If no preferred source address is configured, the router uses the appropriate address based on destination
address scope.
RELATED DOCUMENTATION
unnumbered-address | 773
663
no-gratuitous-arp-request
Syntax
no-gratuitous-arp-request;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.6 for EX Series switches.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Description
For Ethernet interfaces and pseudowire logical interfaces, do not respond to gratuitous ARP requests.
Default
Gratuitous ARP responses are enabled on all Ethernet interfaces.
RELATED DOCUMENTATION
no-keepalives;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Support of the [edit dynamic-profiles profile-name] hierarchy level introduced in Junos OS Release 9.5.
Support of the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit”] hierarchy
level introduced in Junos OS Release 10.1.
Description
Disable the sending of keepalives.
RELATED DOCUMENTATION
oam-on-svlan;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 13.1.
Description
Enable propagation of the Ethernet IEEE 802.1ag Operation, Administration, and Maintenance (OAM)
state of a static single-tagged service VLAN (S-VLAN) logical interface to the dynamic or static double-tagged
customer VLAN (C-VLAN) logical interface and associated subscriber interfaces configured on the S-VLAN.
The static S-VLAN logical interface must be configured with Ethernet OAM connectivity fault management
(CFM) on a Gigabit Ethernet, 10-Gigabit Ethernet, or aggregated Ethernet physical interface. The C-VLAN
logical interface must have the same S-VLAN (outer) tag as the S-VLAN logical interface.
RELATED DOCUMENTATION
Configuring Ethernet OAM Support for Service VLANs with Double-Tagged Customer VLANs | 82
Ethernet OAM Support for Service VLANs Overview | 79
666
option-18;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 13.2.
Description
Specify that Option 18 (Interface-ID) information received in the innermost DHCPv6 Relay-Forward
message header is concatenated with the username during the subscriber authentication process.
RELATED DOCUMENTATION
option-37;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 13.2.
Description
Specify that Option 37 (DHCPv6 Relay Agent Remote-ID) information, received in the innermost DHCPv6
Relay-Forward message header, is concatenated with the username during the subscriber authentication
process.
RELATED DOCUMENTATION
option-82
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Options circuit-id and remote-id introduced in Junos OS Release 11.4.
Description
Specify that the option 82 information from the client PDU is concatenated with the username during the
subscriber authentication process.
For autosense VLANs, you can additionally specify Option 82 suboption information that is concatenated
with the username. You can specify either both or neither of the Agent Circuit ID (suboption 1) and Agent
Remote ID (suboption 1). If you specify both, the Agent Circuit ID is supplied first, followed by a delimiter,
and then the Agent Remote ID. If you specify that neither suboption is supplied, the raw payload of Option
82 from the PDU is concatenated to the username.
NOTE: The option 82 value used in creating the username is based on the option 82 value that
is encoded in the incoming DHCP discover packet. The use of suboptions is supported for
DHCPv4 only.
Options
none—Use the raw payload of Option 82 from the PDU.
RELATED DOCUMENTATION
output {
service-set service-set-name {
service-filter filter-name;
}
}
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family family service]
Release Information
Statement introduced in Junos OS Release 9.5.
Support of the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service] hierarchy level introduced in Junos OS Release 10.1.
Description
Define the output service sets and filters to be applied to traffic by a dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Options
service-set-name—Name of the service set.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Variable $junos-cos-traffic-control-profile introduced in Junos OS Release 11.2.
Description
Apply an output traffic scheduling and shaping profile to the logical interface.
Options
profile-name—Name of the traffic-control profile to be applied to this interface
$junos-cos-traffic-control-profile—Variable for the traffic-control profile that is specified for the logical
interface. The variable is replaced with the traffic-control profile when the subscriber is authenticated at
login.
RELATED DOCUMENTATION
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic interfaces, define the rewrite profile to be applied to outgoing frames on this logical interface.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Stacking and Rewriting VLAN Tags for the Layer 2 Wholesale Solution
673
override
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.2.
Description
Override dynamic profile assignment to individual VLANs that are already part of a previously defined
VLAN range and dynamic profile.
Options
vlan-tag—VLAN tag that you want to override.
profile-name—Name of the dynamic profile that you want to use when overriding the specified VLAN tag.
RELATED DOCUMENTATION
packet-types [packet-types]
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 14.1.
Description
Specify one or more packet types to trigger authentication of an auto-configured dynamic VLAN. The
packet types must be a subset of the packet types configured in the VLAN dynamic profile to trigger
creation of the dynamic VLAN.
Options
packet-type—One or more of the following packet types that triggers VLAN authentication:
NOTE: The pppoe VLAN Ethernet packet type option is supported only for MIC and MPC
interfaces.
RELATED DOCUMENTATION
675
pap;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit
“$junos-interface-unit” ppp-options] hierarchy level introduced in Junos OS Release 12.2.
Description
Specify PAP authentication in a PPP dynamic profile.
RELATED DOCUMENTATION
passive (CHAP)
Syntax
passive;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
Do not challenge the peer, but respond if challenged. If you omit this statement from the configuration,
the interface always challenges its peer.
For ATM2 IQ interfaces only, you can configure CHAP on the logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
RELATED DOCUMENTATION
password (Interfaces)
Syntax
password password-string;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Configure the password that is sent to the external AAA authentication server for subscriber VLAN or
stacked VLAN interface authentication.
Options
password-string—Authentication password.
RELATED DOCUMENTATION
pop;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, specify the VLAN rewrite operation to remove a VLAN tag from the top of
the VLAN tag stack. The outer VLAN tag of the frame is removed.
RELATED DOCUMENTATION
post-service-filter filter-name;
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service input],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family family service input]
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service input] hierarchy level introduced in Junos OS Release 10.1.
Description
Define the filter to be applied to traffic after service processing. The filter is applied only if a service set
is configured and selected. You can configure a post-service filter on the input side of the interface only.
Options
filter-name—Identifier for the post-service filter.
RELATED DOCUMENTATION
pp0 {
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
681
precedence precedence;
}
output filter-name {
precedence precedence;
}
}
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
Configure the dynamic PPPoE logical interface in a dynamic profile. When the router creates a dynamic
PPPoE logical interface on an underlying Ethernet interface configured with PPPoE (ppp-over-ether)
encapsulation, it uses the information in the dynamic profile to determine the properties of the dynamic
PPPoE logical interface.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
ppp-options
Syntax
ppp-options {
authentication [ authentication-protocols ];
mru size;
mtu (size | use-lower-layer);
chap {
access-profile name;
challenge-length minimum minimum-length maximum maximum-length;
default-chap-secret name;
local-name name;
passive;
}
compression {
acfc;
pfc;
}
dynamic-profile profile-name;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
lcp-max-conf-req number
lcp-restart-timer milliseconds;
loopback-clear-timer seconds;
ncp-max-conf-req number
ncp-restart-timer milliseconds;
on-demand-ip-address
pap {
access-profile name;
default-pap-password password;
local-name name;
local-password password;
passive;
}
}
Hierarchy Level
Release Information
683
Description
On interfaces with PPP encapsulation, configure PPP-specific interface properties.
For ATM2 IQ interfaces only, you can configure CHAP on the logical interface unit if the logical interface
is configured with one of the following PPP over ATM encapsulation types:
BEST PRACTICE: On inline service (si) interfaces for L2TP, only the chap and pap statements
are typically used for subscriber management. We recommend that you leave the other statements
subordinate to ppp-options—including those subordinate to chap and pap—at their default values.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces "$junos-interface-ifd-name" unit
“$junos-interface-unit”] hierarchy level introduced in Junos OS Release 12.2.
Description
Configure PPP-specific interface properties in a dynamic profile.
685
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
NOTE:
PPP options can also be configured in a group profile with the ppp-options (L2TP) statement.
The following behavior determines the interaction between the PPP options configured in a
group profile and the PPP options configured in a dynamic profile:
• When PPP options are configured only in the group profile, the group profile options are
applied to the subscriber.
• When PPP options are configured in both a group profile and a dynamic profile, the dynamic
profile configuration takes complete precedence over the group profile when the dynamic
profile includes one or more of the PPP options that can be configured in the group profile.
Complete precedence means that there is no merging of options between the profiles. The
group profile is applied to the subscriber only when the dynamic profile does not include any
PPP option available in the group profile.
RELATED DOCUMENTATION
ppp-subscriber-services
Syntax
Hierarchy Level
[edit chassis]
Release Information
Statement introduced in Junos OS Release 10.2.
Description
Enable dynamic PPP subscriber services on non-PPPoE interfaces on certain PICs.
NOTE: When you include this statement, the relevant PICs restart. This action disrupts subscribers
already logged in through those PICs. You can confirm completion of the restart by issuing the
show chassis pic fpc-slot slot-number pic-slot slot-number command.
Options
disable—Disable subscriber services.
RELATED DOCUMENTATION
pppoe-options
Syntax
pppoe-options {
access-concentrator name;
auto-reconnect seconds;
(client | server);
service-name name;
underlying-interface interface-name;
ppp-max-payload ppp-max-payload
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
client Statement introduced in Junos OS Release 8.5.
server Statement introduced in Junos OS Release 8.5.
ppp-max-payload Statement introduced in Junos OS Release 15.1X49-D100.
Description
Configure PPP over Ethernet-specific interface properties.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
The maximum payload allowed on an Ethernet frame is 1500 bytes. For a PPPoE interface, the PPPoE
header uses 6 bytes and the PPP protocol ID uses 2 bytes. This restricts the maximum MTU size on a
PPPoE interface to 1492 bytes, which can cause frequent fragmentation and reassembly of larger PPP
packets received over the PPPoE interface. To prevent frequent fragmentation and reassembly for PPP
packets over Ethernet, you can configure the maximum transmission unit (MTU) and MRU sizes for PPP
subscribers.
For PPPoE subscribers, the PPP MRU or PPP MTU size can be greater than 1492 bytes if the
PPP-Max-Payload tag is received in the PPPoE Active Discovery Request (PADR) packets.
The PPP-Max-Payload option allows you to override the default behavior of the PPPoE client by providing
a maximum size that the PPP payload can support in both sending and receiving directions. The PPPoE
688
server might allow the negotiation of an MRU larger than 1492 octets and the ability to use an MTU larger
than 1500 octets.
It is important to set an appropriate value for the MTU size of the physical interface before setting
ppp-max-payload. The value of mtu must be greater than the value of ppp-max-payload.
To enable Jumbo frames refer Understanding Jumbo Frames Support for Ethernet Interfaces.
RELATED DOCUMENTATION
pppoe-options {
underlying-interface interface-name;
server;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
Configure the underlying interface and PPPoE server mode for a dynamic PPPoE logical interface in a
dynamic profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
pppoe-underlying-options {
max-sessions number;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 12.2.
Description
Configure PPPoE-specific interface properties in the dynamic profile that defines the agent circuit identifier
(ACI) interface set. An ACI interface set is a logical collection of subscriber interfaces that originate at the
same household or on the same access-loop port. Configuring PPPoE-specific interface properties for an
ACI interface set enables you to apply these attributes to all subscribers on a per-household basis.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
NOTE: When you configure PPPoE-specific interface properties for an ACI interface set, only
the max-sessions statement is currently supported.
RELATED DOCUMENTATION
pppoe-underlying-options {
access-concentrator name;
dynamic-profile profile-name;
direct-connect
duplicate-protection;
max-sessions number;
max-sessions-vsa-ignore;
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds> <lockout-time-max maximum-seconds> <filter [aci]>;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Configure PPPoE-specific interface properties for the underlying interface on which the router creates a
static or dynamic PPPoE logical interface. The underlying interface must be configured with PPPoE
(ppp-over-ether) encapsulation.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
precedence
Syntax
precedence precedence;
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family filter input
filter-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family filter output
filter-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number filter input filter-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number filter output filter-name],
[edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family family filter input filter-name],
[edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family family filter output filter-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family family filter input filter-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family family filter output filter-name]
Release Information
Statement introduced in Junos OS Release 9.3.
The [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family inet filter input
filter-name] hierarchy level and [edit dynamic-profiles profile-name interfaces pp0 unit
“$junos-interface-unit” family inet filter output filter-name] hierarchy level introduced in Junos OS Release
10.1.
Description
Apply a precedence to a dynamic filter.
Options
precedence—Precedence value for the filter. The lower the precedence value, the higher the precedence.
Range: 0 through 250
Default: 0
RELATED DOCUMENTATION
profile (Access)
Syntax
profile profile-name {
accounting {
address-change-immediate-update
accounting-stop-on-access-deny;
accounting-stop-on-failure;
ancp-speed-change-immediate-update;
coa-immediate-update;
coa-no-override service-class-attribute;
duplication;
duplication-filter;
duplication-vrf {
access-profile-name profile-name;
vrf-name vrf-name;
}
immediate-update;
order [ accounting-method ];
send-acct-status-on-config-change;
statistics (time | volume-time);
update-interval minutes;
wait-for-acct-on-ack;
}
accounting-order (radius | [accounting-order-data-list]);
authentication-order [ authentication-methods ];
client client-name {
chap-secret chap-secret;
group-profile profile-name;
ike {
allowed-proxy-pair {
remote remote-proxy-address local local-proxy-address;
}
pre-shared-key (ascii-text character-string | hexadecimal hexadecimal-digits);
ike-policy policy-name;
interface-id string-value;
}
l2tp {
aaa-access-profile profile-name;
interface-id interface-id;
lcp-renegotiation;
local-chap;
maximum-sessions number;
maximum-sessions-per-tunnel number;
695
multilink {
drop-timeout milliseconds;
fragment-threshold bytes;
}
override-result-code session-out-of-resource;
ppp-authentication (chap | pap);
ppp-profile profile-name;
service-profile profile-name(parameter)&profile-name;
sessions-limit-group limit-group-name;
shared-secret shared-secret;
}
pap-password pap-password;
ppp {
cell-overhead;
encapsulation-overhead bytes;
framed-ip-address ip-address;
framed-pool framed-pool;
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
primary-dns primary-dns;
primary-wins primary-wins;
secondary-dns secondary-dns;
secondary-wins secondary-wins;
}
user-group-profile profile-name;
}
domain-name-server;
domain-name-server-inet;
domain-name-server-inet6;
local {
flat-file-profile profile-name;
}
preauthentication-order preauthentication-method;
provisioning-order (gx-plus | jsrc | pcrf);
696
radius {
accounting-server [ ip-address ];
attributes {
exclude {
attribute-name packet-type;
standard-attribute number {
packet-type [ access-request | accounting-off | accounting-on | accounting-start | accounting-stop ];
}
vendor-id id-number {
vendor-attribute vsa-number {
packet-type [ access-request | accounting-off | accounting-on | accounting-start | accounting-stop ];
}
}
}
ignore {
dynamic-iflset-name;
framed-ip-netmask;
idle-timeout;
input-filter;
logical-system:routing-instance;
output-filter;
session-timeout;
standard-attribute number;
vendor-id id-number {
vendor-attribute vsa-number;
}
}
}
authentication-server [ ip-address ];
options {
accounting-session-id-format (decimal | description);
calling-station-id-delimiter delimiter-character;
calling-station-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
interface-text-description;
mac-address;
nas-identifier;
stacked-vlan;
vlan;
}
chap-challenge-in-request-authenticator;
client-accounting-algorithm (direct | round-robin);
697
nas-port-type {
ethernet {
port-type;
}
}
override {
calling-station-id remote-circuit-id;
nas-ip-address tunnel-client-gateway-address;
nas-port tunnel-client-nas-port;
nas-port-type tunnel-client-nas-port-type;
}
remote-circuit-id-delimiter;
remote-circuit-id-fallback {
remote-circuit-id-format;
agent-circuit-id;
agent-remote-id;
}
revert-interval interval;
service-activation {
dynamic-profile (optional-at-login | required-at-login);
extensible-service (optional-at-login | required-at-login);
}
vlan-nas-port-stacked-format;
}
preauthentication-server ip-address;
}
radius-server server-address {
accounting-port port-number;
accounting-retry number;
accounting-timeout seconds;
dynamic-request-port
port port-number;
preauthentication-port port-number;
preauthentication-secret password;
retry attempts;
routing-instance routing-instance-name;
secret password;
max-outstanding-requests value;
source-address source-address;
timeout seconds;
}
699
service {
accounting {
statistics (time | volume-time);
update-interval minutes;
}
accounting-order (activation-protocol | local | radius);
}
session-limit-per-username number;
session-options {
client-idle-timeout minutes;
client-idle-timeout-ingress-only;
client-session-timeoutminutes;
pcc-context {
input-service-filter-name filter-name;
input-service-set-name service-set-name;
ipv6-input-service-filter-name filter-name;
ipv6-input-service-set-name service-set-name;
ipv6-output-service-filter-name filter-name;
ipv6-output-service-set-name service-set-name;
output-service-filter-name filter-name;
output-service-set-name service-set-name;
profile-name pcef-profile-name;
}
strip-user-name {
delimiter [ delimiter ];
parse-direction (left-to-right | right-to-left);
}
}
subscriber username {
delegated-pool delegated-pool-name;
framed-ip-address ipv4-address;
framed-ipv6-pool ipv6-pool-name;
framed-pool ipv4-pool-name;
password password;
target-logical-system logical-system-name <target-routing-instance (default | routing-instance-name>;
target-routing-instance (default | routing-instance-name);
}
}
Hierarchy Level
[edit access]
700
Release Information
Statement introduced before Junos OS Release 7.4.
Description
Configure a subscriber access profile that includes subscriber access, L2TP, or PPP properties.
Options
profile-name—Name of the profile.
For CHAP, the name serves as the mapping between peer identifiers and CHAP secret keys. This entity
is queried for the secret key whenever a CHAP challenge or response is received.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
proxy-arp;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
For Ethernet interfaces only, configure the router to respond to any ARP request, as long as the router
has an active route to the target address of the ARP request.
RELATED DOCUMENTATION
push;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, specify the VLAN rewrite operation to add a new VLAN tag to the top of
the VLAN stack. An outer VLAN tag is pushed in front of the existing VLAN tag. If you include the push
statement in the configuration, you must also include the pop statement at the [edit dynamic-profiles
profile-name interfaces interface-name unit logical-unit-number output-vlan-map] hierarchy level.
RELATED DOCUMENTATION
Stacking and Rewriting VLAN Tags for the Layer 2 Wholesale Solution
703
qualified-next-hop (Access)
Syntax
qualified-next-hop next-hop;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Statement introduced in Junos OS Release 12.3 for ACX Series routers.
Description
Configure the qualified next-hop address for an access route.
Options
next-hop—Specific qualified next-hop address you want to assign to the access route.
radius-realm
Syntax
radius-realm radius-realm-string;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify that the user-defined RADIUS realm string is appended as a last piece to the username and used
by RADIUS to direct the authentication request to a profile that does not allocates addresses.
Options
radius-realm-string—A string to describe the RADIUS realm.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure VLAN ranges for dynamic, auto-sensed stacked VLANs.
Options
any—The entire VLAN range.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
706
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure VLAN ranges for dynamic, auto-sensed VLANs.
Options
any—The entire VLAN range.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
707
remove-when-no-subscribers
Syntax
remove-when-no-subscribers;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Description
Remove subscriber VLANs automatically when no client sessions (for example, DHCP or PPPoE) exist on
the VLAN.
RELATED DOCUMENTATION
route (Access)
Syntax
route ip-prefix</prefix-length> {
metric route-cost;
next-hop next-hop;
preference route-distance;
qualified-next-hop next-hop;
tag tag-number;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
Configure the parameters for access routes.
Options
ip-prefix</prefix-length>—Specific route prefix that you want to assign to the access route.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
routing-instance routing-instance-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.2.
Description
Use in conjunction with the dynamic-profile statement at the same hierarchy levels to specify the routing
instance in which to instantiate a dynamic PPPoE interface. You can associate a routing instance with a
named service entry, empty service entry, or any service entry configured in a PPPoE service name table,
or with an agent circuit identifier/agent remote identifier (ACI/ARI) pair defined for these services.
The routing instance associated with a service entry in a PPPoE service name table overrides the routing
instance associated with the PPPoE underlying interface on which the dynamic PPPoE interface is created.
If you include the routing-instance statement at the [edit protocols pppoe service-name-tables table-name
service service-name agent-specifier aci circuit-id-string ari remote-id-string] hierarchy level, you cannot
also include the static-interface statement at this level. The routing-instance and static-interface statements
are mutually exclusive for ACI/ARI pair configurations.
Options
routing-instance-name—Name of the routing instance in which the router instantiates the dynamic PPPoE
interface.
RELATED DOCUMENTATION
routing-options
Syntax
routing-options { ... }
For information on the complete list of routing-options, see the Protocol-Independent Routing Properties
User Guide .
Hierarchy Level
[edit],
[edit logical-systems logical-system-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name],
[edit tenants tenant-name routing-instances routing-instance-name],
[edit routing-instances routing-instance-name]
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
The [edit tenants tenant-name routing-instances routing-instance-name] hierarchy level introduced in Junos
OS Release 18.3R1.
Description
Configure protocol-independent routing properties.
RELATED DOCUMENTATION
rpf-check {
fail-filter filter-name;
mode loose;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.6.
Description
Reduce forwarding of IP packets that might be spoofing and address by checking whether traffic is arriving
on an expected path that the sender would use to reach the destination. You can include this statement
with the inet protocol family only. When the traffic passes the check, it is forwarded to the destination
address; otherwise it is discarded. When you configure rpf-check alone, then unicast RPF is in strict mode,
meaning that the check passes only when the packet’s source address is in the FIB and the interface
matches the routes RPF.
Starting in Junos OS Release 19.1, the show interfaces statistics logical-interface-name detail command
displays unicast RPF statistics for dynamic logical interfaces when either rpf-check or rpf-check mode
loose is enabled on the interface. No additional statistics are displayed when rpf-check fail-filter filter-name
is configured on the interface. The clear interfaces statistics logical-interface-name command clears RPF
statistics.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
rpf-check
List of Syntax
Syntax (MX Series, SRX Series, M Series, T Series, PTX Series) on page 712
Syntax (EX Series and QFX Series) on page 712
rpf-check {
fail-filter filter-name;
mode loose;
}
rpf-check;
Hierarchy Level (MX Series, SRX Series, M Series, T Series, PTX Series)
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.3 for EX Series switches.
Statement introduced in Junos OS Release 13.2 for the QFX Series.
Statement introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Support for interface ps0 (pseudowire subscriber logical interface device) added in Junos OS Release 15.1.
Description
Enable a reverse-path forwarding (RPF) check on unicast traffic.
On EX3200 and EX4200 switches, enable a reverse-path forwarding (RPF) check on unicast traffic (except
ECMP packets) on all ingress interfaces.
713
On EX4300 switches, enable a reverse-path forwarding (RPF) check on unicast traffic, including ECMP
packets, on all ingress interfaces.
On EX8200 and EX6200 switches, enable an RPF check on unicast traffic, including ECMP packets, on
the selected ingress interfaces.
On QFX Series switches, enable an RPF check on unicast traffic on the selected ingress interfaces. ECMP
packets are checked by QFX5000 Series switches only.
Default
Unicast RPF is disabled on all interfaces.
Options
fail-filter—A filter to evaluate when packets are received on the interface. If the RPF check fails, this
optional filter is evaluated. If the fail filter is not configured, the default action is to silently discard the
packet.
RELATED DOCUMENTATION
schedulers (CoS)
Syntax
schedulers {
scheduler-name {
adjust-minimum rate;
adjust-percent percentage;
buffer-size (seconds | percent percentage | remainder | temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high) protocol (any | non-tcp | tcp)
drop-profile profile-name;
excess-priority [ low | medium-low | medium-high | high | none];
excess-rate (percent percentage | proportion value);
priority priority-level;
shaping-rate (percent percentage | rate);
transmit-rate (percent percentage | rate | remainder) <exact | rate-limit>;
}
}
Hierarchy Level
[edit class-of-service]
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.1X48 for PTX Series routers.
Description
Specify the scheduler name and parameter values.
Options
scheduler-name—Name of the scheduler to be configured.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
715
server
Syntax
server;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 8.5.
Description
Configure the router to operate in the PPPoE server mode. Supported on M120 and M320 Multiservice
Edge Routers and MX Series 5G Universal Routing Platforms operating as access concentrators.
RELATED DOCUMENTATION
server;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
In a dynamic profile, configure the router to act as a PPPoE server, also known as a remote access
concentrator, when a PPPoE logical interface is dynamically created.
RELATED DOCUMENTATION
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family
family] hierarchy level introduced in Junos OS Release 10.1.
Description
Define the service sets and filters to be applied to an interface. This statement is not supported for family
inet6.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
service (PPPoE)
Syntax
service service-name {
drop;
delay seconds;
terminate;
dynamic-profile profile-name;
routing-instance routing-instance-name;
max-sessions number;
agent-specifier {
aci circuit-id-string ari remote-id-string {
drop;
delay seconds;
terminate;
dynamic-profile profile-name;
routing-instance routing-instance-name;
static-interface interface-name;
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
any, dynamic-profile, routing-instance, max-sessions, and static-interface options introduced in Junos
OS Release 10.2.
Description
Specify the action taken by the interface on receipt of a PPPoE Active Discovery Initiation (PADI) control
packet for the specified named service, empty service, or any service in a PPPoE service name table. You
can also specify the dynamic profile and routing instance that the router uses to instantiate a dynamic
PPPoE interface, and the maximum number of active PPPoE sessions that the router can establish with
the specified service.
Default
The default action is terminate.
Options
720
• empty—Service entry of zero length that represents an unspecified service. Each PPPoE service name
table includes one empty service entry by default.
• any—Default service for non-empty service entries that do not match the named or empty service entries
configured in the PPPoE service name table. Each PPPoE service name table includes one any service
entry by default.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
service-device-pool (L2TP)
Syntax
service-device-pool pool-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Description
Assign a pool of service interfaces to the tunnel group to balance traffic across.
NOTE: The service interface configuration is required for static LNS sessions. Either the service
interface configuration or the service device pool configuration can be used for dynamic LNS
sessions.
Options
pool-name—Name of the service device pool.
RELATED DOCUMENTATION
Configuring an L2TP Tunnel Group for LNS Sessions with Inline Services Interfaces
722
service-filter filter-name;
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service input
service-set service-set-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service output
service-set service-set-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family service input service-set
service-set-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family service output service-set
service-set-name]
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service input service-set service-set-name] and [edit dynamic-profiles profile-name interfaces pp0 unit
“$junos-interface-unit” family family service output service-set service-set-name] hierarchy levels introduced
in Junos OS Release 10.1.
Description
Define the filter to be applied to traffic before it is accepted for service processing. You can use the
predefined dynamic interface variables $junos-input-service-filter, $junos-output-service-filter,
$junos-input-ipv6-service-filter, and $junos-output-ipv6-service-filter. Configuration of a service filter
is optional; if you include the service-set statement without a service-filter definition, the router software
assumes that the match condition is true and selects the service set for processing automatically.
Options
filter-name—Identifies the filter to be applied in service processing.
RELATED DOCUMENTATION
service-name-table
Syntax
service-name-table table-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Support at the [edit ... family pppoe] hierarchies introduced in Junos OS Release 11.2.
Description
Specify the PPPoE service name table assigned to a PPPoE underlying interface. This underlying interface
is configured with either the encapsulation ppp-over-ether statement or the family pppoe statement; the
two statements are mutually exclusive.
NOTE: The [edit ... family pppoe] hierarchies are supported only on MX Series routers with
MPCs.
Options
table-name—Name of the PPPoE service name table, a string of up to 32 alphanumeric characters.
RELATED DOCUMENTATION
service-name-tables
Syntax
service-name-tables table-name {
service service-name {
drop;
delay seconds;
terminate;
dynamic-profile profile-name;
routing-instance routing-instance-name;
max-sessions number;
agent-specifier {
aci circuit-id-string ari remote-id-string {
drop;
delay seconds;
terminate;
dynamic-profile profile-name;
routing-instance routing-instance-name;
static-interface interface-name;
}
}
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
dynamic-profile, routing-instance, max-sessions, and static-interface options introduced in Junos OS
Release 10.2.
Description
Create and configure a PPPoE service name table. Specify the action taken for each service and remote
access concentrator on receipt of a PPPoE Active Discovery Initiation (PADI) packet. You can also specify
the dynamic profile and routing instance that the router uses to instantiate a dynamic PPPoE interface,
and the maximum number of active PPPoE sessions that the router can establish with the specified service.
A maximum of 32 PPPoE service name tables is supported per router.
Options
table-name—Name of the PPPoE service name table, a string of up to 32 alphanumeric characters.
727
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
service-set service-set-name {
service-filter filter-name;
}
Hierarchy Level
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service input],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family family service output],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family service input],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family service output]
Release Information
Statement introduced in Junos OS Release 9.5.
Support at the [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service input] and [edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family
family service output] hierarchy levels introduced in Junos OS Release 10.1.
From 17.2R1 onwards, you can configure converged services at the edit dynamic-profiles
http-redirect-converged hierarchy level.
Description
Define one or more service sets in a dynamic profile. Service sets are applied to an interface. If you define
multiple service sets, the router software evaluates the filters in the order in which they appear in the
configuration. You can use the predefined dynamic interface variables $junos-input-service-set,
$junos-output-service-set, $junos-input-ipv6-service-set, and $junos-output-ipv6-service-set.
NOTE: Starting in Junos OS Release 17.2R1, you can configure converged services at the edit
dynamic-profiles http-redirect-converged hierarchy level. CPCD rules can also be configured
under the dynamic profiles stanza to achieve parameterization of the rules. This mechanism
provides additional flexibility to customize the different rules on a per subscriber basis through
service attachment.
Options
service-set-name—Name of the service set.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
729
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 11.4.
Description
Configure the router to temporarily prevent (lock out) a failed or short-lived (also known as short-cycle)
PPPoE subscriber session from reconnecting for a default or configurable period of time. You can optionally
override the default lockout time, 1 through 300 seconds (5 minutes), by specifying the minimum lockout
time and maximum lockout time as part of the short-cycle-protection statement. You can optionally specify
the lockout based on the ACI, which locks out all PPPoE subscriber sessions that come from the same
household and share the same ACI string.
You can configure PPPoE subscriber session lockout, also known as short-cycle protection, for VLAN,
VLAN demux, and PPPoE-over-ATM dynamic subscriber interfaces. Enabling PPPoE subscriber session
lockout reduces excessive loading on the router, prevents failed or short-lived sessions from disrupting
other sessions on the same underlying interface, and preserves valuable system resources.
Options
filter aci—(Optional) Use the agent circuit identifier (ACI) lockout for all subscriber sessions.
lockout-time-min minimum-seconds—(Optional) Use the specified minimum lockout time for failed or
short-lived PPPoE subscriber sessions. The minimum-seconds value must be less than or equal to the
maximum-seconds value. Setting minimum-seconds and maximum-seconds to the same value causes the
lockout time to become fixed at that value.
Range: 1 through 86400 (24 hours)
Default: 1
731
lockout-time-max maximum-seconds—(Optional) Use the specified maximum lockout time for failed or
short-lived PPPoE subscriber sessions. The maximum-seconds value must be equal to or greater than the
minimum-seconds value. Setting maximum-seconds and minimum-seconds to the same value causes the
lockout time to become fixed at that value.
Range: 1 through 86400 (24 hours)
Default: 300 (5 minutes)
RELATED DOCUMENTATION
stacked-vlan-ranges
Syntax
stacked-vlan-ranges {
access-profile profile-name;
authentication {
packet-types [packet-types];
password password-string;
username-include {
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18
option-37
option-82;
radius-realm radius-realm-string;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
accept (any | dhcp-v4 | inet);
access-profilevlan-dynamic-profile-name;
ranges (any | low-tag–high-tag),(any | low-tag–high-tag);
}
override;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure multiple VLANs. Each VLAN is assigned a VLAN ID number from the range.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
733
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring Interfaces to Support Both Single and Stacked VLANs | 26
stacked-vlan-tagging
Syntax
stacked-vlan-tagging;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Description
For Gigabit Ethernet IQ interfaces, Gigabit Ethernet, 10-Gigabit Ethernet LAN/WAN PIC, and 100-Gigabit
Ethernet Type 5 PIC with CFP, enable stacked VLAN tagging for all logical interfaces on the physical
interface.
For pseudowire subscriber interfaces, enable stacked VLAN tagging for logical interfaces on the pseudowire
service.
RELATED DOCUMENTATION
swap;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, specify the VLAN rewrite operation to replace a VLAN tag. The outer VLAN
tag of the frame is overwritten with the user-specified VLAN tag information.
RELATED DOCUMENTATION
tag-protocol-id tpids;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, configure the outer TPID value. All TPIDs you include in input and output
VLAN maps must be among those you specify at the [edit interfaces interface-name gigether-options
ethernet-switch-profile tag-protocol-id [ tpids ]] hierarchy level.
Default
If the tag-protocol-id statement is not configured, the TPID value is 0x8100.
Options
tpids—TPIDs to be accepted on the VLAN. Specify TPIDs in hexadecimal format.
RELATED DOCUMENTATION
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 16.1.
weight option added in Junos OS Release 17.3 for MX Series and MX Virtual Chassis.
$junos-interface-target-weight option added in Junos OS Release 18.4R1.
Description
Configure primary and backup links, group similar subscribers, and specify a subscriber weight for manual
targeting to distribute subscribers across aggregated Ethernet member links.
Options
backup—(Optional) Specify a backup member link per subscriber when you configure manual targeting.
group—(Optional) Assign a group name for subscribers with similar bandwidth usage. Subscribers that are
configured for targeted distribution without a group name are added to the default group and distributed
evenly across member links. Grouping of subscribers is supported only for static subscribers.
Default: default
primary—Specify a primary member link per subscriber when you configure manual targeting. You must
always configure a primary link when you configure manual targeting.
RELATED DOCUMENTATION
Understanding Support for Targeted Distribution of Logical Interface Sets of Static VLANs over Aggregated
Ethernet Logical Interfaces
Using RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 177
RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 175
738
terminate;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Support at [edit protocols pppoe service-name-tables table-name service service-name agent-specifier
aci circuit-id-string ari remote-id-string] hierarchy level introduced in Junos OS Release 10.2.
Description
Direct the router to immediately respond to a PPPoE Active Discovery Initiation (PADI) control packet
received from a PPPoE client by sending the client a PPPoE Active Discovery Offer (PADO) packet. The
PADO packet contains the name of the access concentrator (router) that can service the client request.
The terminate action is the default action for a named service entry, empty service entry, any service
entry, or agent circuit identifier/agent remote identifier (ACI/ARI) pair in a PPPoE service name table.
RELATED DOCUMENTATION
traffic-control-profiles
Syntax
EX Series (Except EX4600), M Series, MX Series, PTX Series, T Series
traffic-control-profiles profile-name {
adjust-minimum rate;
atm-service (cbr | rtvbr | nrtvbr);
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value );
excess-rate-high (percent percentage | proportion value);
excess-rate-low (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate) <burst-size bytes>;
max-burst-size cells;
overhead-accounting (frame-mode | cell-mode | frame-mode-bytes | cell-mode-bytes) <bytes
(byte-value)>;
peak-rate rate;
scheduler-map map-name;
shaping-rate (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-strict-high (percent percentage | rate) <burst-size bytes>;
strict-priority-scheduler;
sustained-rate rate;
}
traffic-control-profiles profile-name {
guaranteed-rate (rate| percent percentage);
scheduler-map map-name;
shaping-rate (rate| percent percentage);
}
740
ACX Series
traffic-control-profiles profile-name {
atm-service (cbr | nrtvbr | rtvbr);
delay-buffer-rate cps;
max-burst-size max-burst-size;
peak-rate peak-rate;
sustained-rate sustained-rate;
}
Hierarchy Level
[edit class-of-service]
Release Information
Statement was introduced in Junos OS Release 7.6 (EX series, M series, MX series, T series, and PTX series
devices).
Statement was introduced in Junos OS Release 11.1 for the QFX Series.
Statement was introduced in Junos OS Release 12.3 for ACX series routers.
Statement was introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Description
ACX Series Routers
NOTE: For CoS on ACX6360-OR, see the documentation for the PTX1000.
EX Series (Except EX4600), M Series, MX Series, T Series, and PTX Series Routers
For Gigabit Ethernet IQ, Channelized IQ PICs, FRF.15 and FRF.16 LSQ interfaces, Enhanced Queuing (EQ)
DPCs, and PTX Series routers only, configure traffic shaping and scheduling profiles. For Enhanced EQ
PICs, EQ DPCs, and PTX Series routers only, you can include the excess-rate statement.
Configure traffic shaping and scheduling profiles for forwarding class sets (priority groups) to implement
enhanced transmission selection (ETS) or for logical interfaces.
741
Options
profile-name—Name of the traffic-control profile. This name is also used to specify an output traffic control
profile.
The remaining statements are explained separately. See CLI Explorer or click a linked statement in the
Syntax section for details.
RELATED DOCUMENTATION
traffic-control-profiles profile-name {
adjust-minimum rate;
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value | percent $junos-cos-excess-rate);
excess-rate-high (percent percentage | proportion value);
excess-rate-low (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate) <burst-size bytes>;
max-burst-size cells;
overhead-accounting (frame-mode | cell-mode) <bytes byte-value>;
peak-rate rate;
scheduler-map map-name;
shaping-rate (percent percentage | rate | predefined-variable) <burst-size bytes>;
shaping-rate-excess-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-excess-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-high (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-medium-low (percent percentage | rate) <burst-size bytes>;
shaping-rate-priority-strict-high (percent percentage | rate) <burst-size bytes>;
sustained-rate rate;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Description
Configure traffic shaping and scheduling profiles for use in a dynamic client profile or a dynamic service
profile.
Options
profile-name—Name of the traffic-control profile.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
743
RELATED DOCUMENTATION
underlying-interface
Syntax
underlying-interface interface-name;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Support for aggregated Ethernet added in Junos OS Release 9.4.
Description
Configure the interface on which PPP over Ethernet is running.
For demux interfaces, configure the underlying interface on which the demultiplexing (demux) interface
is running.
Options
interface-name—Name of the interface on which PPP over Ethernet or demux is running. For example,
at-0/0/1.0 (ATM VC), fe-1/0/1.0 (Fast Ethernet interface), ge-2/0/0.0 (Gigabit Ethernet interface), ae1.0
(for IP demux on an aggregated Ethernet interface), or ae1 (for VLAN demux on an aggregated Ethernet
interface).
NOTE: Demux interfaces are currently supported on Gigabit Ethernet, Fast Ethernet, 10-Gigabit
Ethernet interfaces, or aggregated Ethernet devices.
RELATED DOCUMENTATION
underlying-interface (demux0)
Syntax
underlying-interface underlying-interface-name;
Hierarchy Level
[edit dynamic-profiles profile-name interfaces demux0 interface-name unit unit logical-unit-number demux-options]
Release Information
Statement introduced in Junos OS Release 9.3.
Support for aggregated Ethernet introduced in Junos OS Release 9.4.
Description
Configure the underlying interface on which the demultiplexing (demux) interface is running.
CAUTION: Before you make any changes to the underlying interface for a demux0
interface, you must ensure that no subscribers are currently present on that underlying
interface. If any subscribers are present, you must remove them before you make
changes.
Options
underlying-interface-name—Either the specific name of the interface on which the DHCP discover packet
arrives or one of the following interface variables:
The variable is used to specify the underlying interface when a new demux interface is dynamically created.
The variable is dynamically replaced with the underlying interface that DHCP supplies when the subscriber
logs in.
NOTE: Logical demux interfaces are currently supported on Gigabit Ethernet, Fast Ethernet,
10-Gigabit Ethernet, or aggregated Ethernet interfaces.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
Dynamic PPPoE Subscriber Interfaces over Static Underlying Interfaces Overview | 188
For information about static underlying interfaces, see the Junos OS Network Interfaces Library for Routing
Devices
748
underlying-interface interface-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
In a dynamic profile, configure the underlying interface on which the router creates the dynamic PPPoE
logical interface.
Options
interface-name—Variable used to specify the name of the underlying interface on which the PPPoE logical
interface is dynamically created. In the underlying-interface interface-name statement for dynamic PPPoE
logical interfaces, you must use the predefined variable $junos-underlying-interface in place of
interface-name. When the router creates the dynamic PPPoE interface, the $junos-underlying-interface
predefined variable is dynamically replaced with the name of the underlying interface supplied by the
network when the subscriber logs in.
RELATED DOCUMENTATION
unit
Syntax
unit logical-unit-number {
accept-source-mac {
mac-address mac-address {
policer {
input cos-policer-name;
output cos-policer-name;
}
}
}
accounting-profile name;
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
allow-any-vci;
atm-scheduler-map (map-name | default);
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
backup-options {
interface interface-name;
}
bandwidth rate;
cell-bundle-size cells;
clear-dont-fragment-bit;
compression {
rtp {
maximum-contexts number <force>;
f-max-period number;
queues [queue-numbers];
port {
750
minimum port-number;
maximum port-number;
}
}
}
compression-device interface-name;
copy-tos-to-outer-ip-header;
751
demux {
inet {
address-source address;
auto-configure {
address-ranges {
authentication {
password password-string;
username-include {
auth-server-realm realm-string;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
source-address;
user-prefix user-prefix-string;
}
}
dynamic-profile profile-name {
network ip-address {
range name {
low lower-limit;
high upper-limit;
}
}
}
}
}
}
inet6 {
address-source address;
auto-configure {
address-ranges {
authentication {
password password-string;
username-include {
auth-server-realm realm-string;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
source-address;
user-prefix user-prefix-string;
}
}
dynamic-profile profile-name {
network ip-address {
752
range name {
low lower-limit;
high upper-limit;
}
}
}
}
}
}
}
demux-destination family;
demux-source family;
demux-options {
underlying-interface interface-name;
}
description text;
etree-ac-role (leaf | root);
interface {
l2tp-interface-id name;
(dedicated | shared);
}
dialer-options {
activation-delay seconds;
callback;
callback-wait-period time;
deactivation-delay seconds;
dial-string [dial-string-numbers];
idle-timeout seconds;
incoming-map {
caller caller-id | accept-all;
initial-route-check seconds;
load-interval seconds;
load-threshold percent;
pool pool-name;
redial-delay time;
watch-list {
[routes];
}
}
}
disable;
disable-mlppp-inner-ppp-pfc;
dlci dlci-identifier;
drop-timeout milliseconds;
753
dynamic-call-admission-control {
activation-priority priority;
bearer-bandwidth-limit kilobits-per-second;
}
encapsulation type;
epd-threshold cells plp1 cells;
family family-name {
... the family subhierarchy appears after the main [edit interfaces interface-name unit logical-unit-number] hierarchy
...
}
fragment-threshold bytes;
host-prefix-only;
inner-vlan-id-range start start-id end end-id;
input-vlan-map {
(pop | pop-pop | pop-swap | push | push-push | swap |
swap-push | swap-swap);
inner-tag-protocol-id tpid;
inner-vlan-id number;
tag-protocol-id tpid;
vlan-id number;
}
interleave-fragments;
inverse-arp;
layer2-policer {
input-policer policer-name;
input-three-color policer-name;
output-policer policer-name;
output-three-color policer-name;
}
link-layer-overhead percent;
minimum-links number;
mrru bytes;
multicast-dlci dlci-identifier;
multicast-vci vpi-identifier.vci-identifier;
multilink-max-classes number;
multipoint;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
754
output-vlan-map {
(pop | pop-pop | pop-swap | push | push-push | swap |
swap-push | swap-swap);
inner-tag-protocol-id tpid;
inner-vlan-id number;
tag-protocol-id tpid;
}
passive-monitor-mode;
peer-unit unit-number;
plp-to-clp;
point-to-point;
ppp-options {
mru size;
mtu (size | use-lower-layer);
chap {
access-profile name;
default-chap-secret name;
local-name name;
passive;
}
compression {
acfc;
pfc;
}
dynamic-profile profile-name;
ipcp-suggest-dns-option;
lcp-restart-timer milliseconds;
loopback-clear-timer seconds;
ncp-restart-timer milliseconds;
pap {
access-profile name;
default-pap-password password;
local-name name;
local-password password;
passive;
}
}
pppoe-options {
access-concentrator name;
auto-reconnect seconds;
(client | server);
service-name name;
underlying-interface interface-name;
}
755
pppoe-underlying-options {
access-concentrator name;
direct-connect;
dynamic-profile profile-name;
max-sessions number;
}
proxy-arp;
service-domain (inside | outside);
shaping {
(cbr rate | rtvbr peak rate sustained rate burst length | vbr peak rate sustained rate burst length);
queue-length number;
}
short-sequence;
targeted-distribution;
transmit-weight number;
(traps | no-traps);
trunk-bandwidth rate;
trunk-id number;
tunnel {
backup-destination address;
destination address;
key number;
routing-instance {
destination routing-instance-name;
}
source source-address;
ttl number;
}
vci vpi-identifier.vci-identifier;
vci-range start start-vci end end-vci;
vpi vpi-identifier;
vlan-id number;
vlan-id-range number-number;
vlan-tags inner tpid.vlan-id outer tpid.vlan-id;
756
family family {
accounting {
destination-class-usage;
source-class-usage {
(input | output | input output);
}
}
access-concentrator name;
address address {
... the address subhierarchy appears after the main [edit interfaces interface-name unit logical-unit-number
family family-name] hierarchy ...
}
bundle interface-name;
core-facing;
demux-destination {
destination-prefix;
}
demux-source {
source-prefix;
}
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
group filter-group-number;
input filter-name;
input-list [filter-names];
output filter-name;
output-list [filter-names];
}
interface-mode (access | trunk);
ipsec-sa sa-name;
keep-address-and-control;
mac-validate (loose | strict);
max-sessions number;
mtu bytes;
multicast-only;
no-redirects;
policer {
arp policer-template-name;
input policer-template-name;
output policer-template-name;
}
primary;
757
address address {
arp ip-address (mac | multicast-mac) mac-address <publish>;
broadcast address;
destination address;
destination-profile name;
eui-64;
master-only;
multipoint-destination address {
dlci dlci-identifier;
epd-threshold cells <plp1 cells>;
inverse-arp;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
shaping {
(cbr rate | rtvbr burst length peak rate sustained rate | vbr burst length peak rate sustained rate);
queue-length number;
}
vci vpi-identifier.vci-identifier;
}
preferred;
primary;
(vrrp-group | vrrp-inet6-group) group-number {
(accept-data | no-accept-data);
advertise–interval seconds;
authentication-type authentication;
authentication-key key;
fast-interval milliseconds;
(preempt | no-preempt) {
hold-time seconds;
}
priority number;
track {
interface interface-name {
bandwidth-threshold bits-per-second priority-cost number;
}
priority-hold-time seconds;
route ip-address/prefix-length routing-instance instance-name priority-cost cost;
}
virtual-address [addresses];
virtual-link-local-address ipv6–address;
vrrp-inherit-from {
759
active-interface interface-name;
active-group group-number;
}
}
}
}
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Range increased for static pseudowire interfaces to 1,073,741,823 in Junos OS Release 18.3R1.
Description
Configure a logical interface on the physical device. You must configure a logical interface to be able to
use the physical device.
Options
logical-unit-number—Number of the logical unit.
Range: 0 through 1,073,741,823 for demux, PPPoE, and pseudowire static interfaces. 0 through 16,385 for
all other static interface types.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
family family {
access-concentrator name;
address address;
demux-source {
source-address;
}
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
input filter-name;
output filter-name;
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name;
output filter-name;
}
}
vlan-id number;
Hierarchy Level
Release Information
761
Description
Configure a dynamic logical interface on the physical device. You must configure a logical interface to be
able to use the physical device.
Options
logical-unit-number—Either the specific unit number of the interface or the unit number variable
($junos-interface-unit). The variable is used to specify the unit of the interface when a new demux interface
is dynamically created. The static unit number variable is dynamically replaced with the unit number that
DHCP supplies when the subscriber logs in.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles | 101
762
unit logical-unit-number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
Apply the logical interface unit to the interface set.
Options
logical-unit-number—One of the following options:
• $junos-underlying-interface-unit—For static VLANs, the unit number variable. The static unit number
variable is dynamically replaced with the client unit number when the client session begins. The client
unit number is specified by the DHCP when it accesses the subscriber network.
• $junos-interface-unit—For dynamic demux and dynamic PPPoE interfaces, the unit number variable.
The static unit number variable is dynamically replaced with the client unit number when the client
session begins. The client unit number is specified by the DHCP or PPP when it accesses the subscriber
network.
• value—Specific unit number of the interface you want to assign to the dynamic-profile
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier Information | 55
Applying Traffic Shaping and Scheduling to a Subscriber Interface in a Dynamic Profile
Configuring an Interface Set of Subscribers in a Dynamic Profile
Agent Circuit Identifier-Based Dynamic VLANs Overview | 45
Guidelines for Configuring Dynamic CoS for Subscriber Access
764
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
mru size;
mtu (size | use-lower-layer);
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
ignore-magic-number-mismatch;
initiate-ncp (ip | ipv6 | dual-stack-passive)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
765
input filter-name {
precedence precedence;
}
output filter-name {
precedence precedence;
}
}
}
filter {
input filter-name;
output filter-name;
}
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
In a dynamic profile, configure a logical unit number for the dynamic PPPoE logical interface. You must
configure a logical interface to be able to use the router.
Options
logical-unit-number—Variable used to specify the unit number when the PPPoE logical interface is
dynamically created. In the unit logical-unit-number statement for dynamic PPPoE logical interfaces, you
must use the predefined variable $junos-interface-unit in place of logical-unit-number. The
$junos-interface-unit predefined variable is dynamically replaced with the unit number supplied by the
router when the subscriber logs in.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
unit logical-unit-number {
actual-transit-statistics;
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
line-identity {
include {
accept-no-ids;
circuit-id;
remote-id;
}
dynamic-profile profile-name;
}
}
dial-options {
ipsec-interface-id name;
l2tp-interface-id name;
(shared | dedicated);
}
encapsulation (atm-ccc-cell-relay | atm-ccc-vc-mux | atm-cisco-nlpid | atm-tcc-vc-mux | atm-mlppp-llc | atm-nlpid
| atm-ppp-llc | atm-ppp-vc-mux | atm-snap | atm-tcc-snap | atm-vc-mux | ether-over-atm-llc |
ether-vpls-over-atm-llc | ether-vpls-over-fr | ether-vpls-over-ppp | ethernet | frame-relay-ccc | frame-relay-ppp
| frame-relay-tcc | frame-relay-ether-type | frame-relay-ether-type-tcc | multilink-frame-relay-end-to-end |
multilink-ppp | ppp-over-ether | ppp-over-ether-over-atm-llc | vlan-bridge | vlan-ccc | vlan-vci-ccc | vlan-tcc |
vlan-vpls);
family family {
address address;
demux-destination,
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
768
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
769
filter {
input filter-name {
shared-name filter-shared-name;
}
output filter-name {
shared-name filter-shared-name;
}
}
host-prefix-only;
keepalives {
interval seconds;
}
ppp-options {
aaa-options aaa-options-name;
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
local-name name;
}
ignore-magic-number-mismatch;
initiate-ncp (dual-stack-passive | ipv6 | ip)
ipcp-suggest-dns-option;
mru size;
mtu (size | use-lower-layer);
on-demand-ip-address;
pap;
peer-ip-address-optional;
local-authentication {
password password;
username-include {
circuit-id;
delimiter character;
domain-name name;
mac-address;
remote-id;
}
}
}
service {
pcef pcef-profile-name {
activate rule-name | activate-all;
}
}
770
targeted-options {
backup backup;
group group;
primary primary;
weight ($junos-interface-target-weight | weight-value);
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Description
Configure a logical interface on the physical device. You must configure a logical interface to be able to
use the physical device.
Options
logical-unit-number—The specific unit number of the interface you want to assign to the dynamic profile,
or one of the following predefined variables:
• $junos-underlying-interface-unit—For static VLANs, the unit number variable. The static unit number
variable is dynamically replaced with the client unit number when the client session begins. The client
unit number is specified by the DHCP when it accesses the subscriber network.
• $junos-interface-unit—The unit number variable on a dynamic underlying VLAN interface for which you
want to enable the creation of dynamic VLAN subscriber interfaces based on the ACI.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 52
Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information | 54
Agent Circuit Identifier-Based Dynamic VLANs Overview | 45
unnumbered-address (PPP)
Syntax
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
For interfaces with PPP encapsulation, enable the local address to be derived from the specified interface.
Options
interface-name—Interface from which the local address is derived. The interface name must include a
logical unit number and must have a configured address.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
unnumbered-address interface-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.1.
Description
For dynamic PPPoE interfaces, enable the local address to be derived from the specified interface.
Configuring unnumbered Ethernet interfaces enables IP processing on the interface without assigning an
explicit IP address to the interface.
Options
interface-name—Interface from which the local address is derived. The interface name must include a
logical unit number and must have a configured address.
RELATED DOCUMENTATION
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Support for the $junos-preferred-source-address and $junos-preferred-source-ipv6-address predefined
variables introduced in Junos OS Release 9.6.
Support for the $junos-loopback-interface predefined variable introduced in Junos OS Release 9.6.
Description
For Ethernet interfaces, enable the local address to be derived from the specified interface. Configuring
unnumbered Ethernet interfaces enables IP processing on the interface without assigning an explicit IP
address to the interface. To configure unnumbered address dynamically, include the
$junos-loopback-interface-address predefined variable.
You can configure unnumbered address support on Ethernet interfaces for IPv4 and IPv6 address families.
Options
interface-name—Name of the interface from which the local address is derived. The specified interface
must have a logical unit number, a configured IP address, and must not be an unnumbered interface. This
value can be a specific interface name or the $junos-loopback-interface predefined variable.
When defining the unnumbered-address statement using a static interface, keep the following in mind:
• If you choose to include the routing-instance statement at the [edit dynamic-profiles] hierarchy level,
that statement must be configured with a dynamic value by using the $junos-routing-instance predefined
variable. In addition, whatever static unnumbered interface you specify must belong to that routing
instance; otherwise, the profile instantiation fails.
• If you choose to not include the routing-instance statement at the [edit dynamic-profiles] hierarchy
level, the unnumbered-address statement uses the default routing instance. The use of the default
routing instance requires that the unnumbered interface be configured statically and that it reside in the
default routing instance.
774
NOTE: When you specify a static logical interface for the unnumbered interface in a dynamic
profile that includes the $junos-routing-instance predefined variable, you must not configure a
preferred source address, whether with the $junos-preferred-source-address predefined variable,
the $junos-preferred-source-ipv6-address predefined variable, or the preferred-source-address
statement. Configuring the preferred source address in this circumstance causes a commit failure.
• To use the $junos-loopback-interface predefined variable, the dynamic profile must also contain the
routing-instance statement configured with the $junos-routing-instance predefined variable at the [edit
dynamic-profiles] hierarchy level.
• The applied loopback interface is based on the dynamically obtained routing instance of the subscriber.
address—(Optional) Secondary IP address of the donor interface. Configuring the preferred source address
enables you to use an IP address other than the primary IP address on some of the unnumbered Ethernet
interfaces in your network. This value can be a static IP address, the $junos-preferred-source-address
predefined variable for the inet family, or the $junos-preferred-source-ipv6-address predefined variable
for the inet6 family.
When defining the preferred-source-address value using a static IP address, keep the following in mind:
• The IP address specified as the preferred-source-address must be configured in the specified unnumbered
interface.
• You must configure the unnumbered-address statement using the $junos-loopback-interface predefined
variable.
• You must configure the routing-instance statement using the $junos-routing-instance predefined variable
at the [edit dynamic-profiles] hierarchy level.
• The preferred source address chosen is based on the dynamically applied loopback address which is in
turn derived from the dynamically obtained routing instance of the subscriber. The configured loopback
address with the closest network match to the user IP address is selected as the preferred source address.
RELATED DOCUMENTATION
use-primary primary-profile-name;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.3.
Statement introduced in Junos OS Release 12.3R2 for EX Series switches.
Description
Specify the dynamic profile to configure as the primary dynamic profile. The primary dynamic profile is
instantiated when the first subscriber or DHCP client logs in. Subsequent subscribers (or clients) are not
assigned the primary dynamic profile; instead, they are assigned the dynamic profile specified for the
interface. When the first subscriber (or client) logs out, the next subscriber (or client) that logs in is assigned
the primary dynamic profile.
Options
primary-profile-name—Name of the dynamic profile to configure as the primary dynamic profile
RELATED DOCUMENTATION
Attaching Dynamic Profiles to DHCP Subscriber Interfaces or DHCP Client Interfaces | 149
777
username-include (Interfaces)
Syntax
username-include {
circuit-id;
circuit-type;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18;
option-37;
option-82 <circuit-id> <remote-id>;
radius-realm radius-realm-string;
remote-id;
user-prefix user-prefix-string;
vlan-tags;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
vlan-tags option added in Junos OS Release 18.3R1 on MX Series routers.
Description
Configure the username that the router passes to the external AAA server. You must include at least one
of the optional statements for the username to be valid. If you do not configure a username, the router
accesses the local authentication service only and does not use external authentication services, such as
RADIUS.
The username takes the format user-prefix mac-address circuit-type circuit-id remote-id option–82
interface-name domain-name radius-realm. By default, each component is separated by a period (.), but you
can specify a different delimiter with the delimiter statement.
Options
vlan-tags—Include the subscriber session VLAN tags in the username for interactions with an external
authority. Both single-tagged and double-tagged VLANs are supported: The tags are added in the
778
format outer-vlan-tag-inner-vlan-tag. The outer tag is always included; the inner tag is included for
double-tagged VLANs.
You can use this option instead of the interface-name option when the outer VLAN tag is unique
across the system and you do not need the underlying physical interface name to be part of the format.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
user-prefix
Syntax
user-prefix user-prefix-string;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.0.
Description
Specify the user prefix that is concatenated with the username during the subscriber authentication process.
Options
user-prefix-string—The user prefix string.
RELATED DOCUMENTATION
vci
Syntax
vci vpi-identifier.vci-identifier;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 11.1 for the QFX Series.
Statement introduced in Junos OS Release 12.2 for the ACX Series Universal Metro routers.
Description
For ATM point-to-point logical interfaces only, configure the virtual circuit identifier (VCI) and virtual path
identifier (VPI).
To configure a VPI for a point-to-multipoint interface, specify the VPI in the multipoint-destination statement.
VCIs 0 through 31 are reserved for specific ATM values designated by the ATM Forum.
Options
vci-identifier—ATM virtual circuit identifier. Unless you configure the interface to use promiscuous mode,
this value cannot exceed the highest-numbered VC configured for the interface with the maximum-vcs
option of the vpi statement.
Range: 0 through 4089 or 0 through 65,535 with promiscuous mode, with VCIs 0 through 31 reserved.
RELATED DOCUMENTATION
781
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
VLAN demux interface support introduced in Junos OS Release 10.2.
Description
For VLAN demux, Fast Ethernet, Gigabit Ethernet, and Aggregated Ethernet interfaces only, bind a 802.1Q
VLAN tag ID to a logical interface.
Options
number—A valid VLAN identifier. When used in the dynamic-profiles hierarchy, specify the $junos-vlan-id
predefined variable to dynamically obtain the VLAN identifier.
• For aggregated Ethernet, 4-port, 8-port, and 12-port Fast Ethernet PICs, and for management and
internal Ethernet interfaces, 1 through 1023.
• For 48-port Fast Ethernet and Gigabit Ethernet PICs, 1 through 4094.
RELATED DOCUMENTATION
Configuring Dynamic Subscriber Interfaces Using VLAN Demux Interfaces in Dynamic Profiles | 104
782
vlan-id number;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 10.4.
Description
For dynamic VLAN interfaces, specify the line VLAN identifiers to be rewritten at the input or output
interface.
You cannot include the vlan-id statement with the swap statement, swap-push statement, push-push
statement, or push-swap statement at the [edit dynamic-profiles profile-name interfaces interface-name
unit logical-unit-number output-vlan-map] hierarchy level. If you include any of those statements in the
output VLAN map, the VLAN ID in the outgoing frame is rewritten to the vlan-id statement that you include
at the [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number] hierarchy
level.
Options
number—A valid VLAN identifier. When used for input VLAN maps, you can specify the $junos-vlan-map-id
predefined variable to dynamically obtain the VLAN identifier.
RELATED DOCUMENTATION
vlan-ranges
Syntax
vlan-ranges {
access-profile profile-name;
authentication {
packet-types [packet-types];
password password-string;
username-include {
circuit-type;
circuit-id;
delimiter delimiter-character;
domain-name domain-name-string;
interface-name;
mac-address;
option-18;
option-37;
option-82 <circuit-id> <remote-id>;
radius-realm radius-realm-string;
remote-id;
user-prefix user-prefix-string;
vlan-tags;
}
}
dynamic-profile profile-name {
accept (any | dhcp-v4 | inet);
accept-out-of-band protocol;
access-profilevlan-dynamic-profile-name;
ranges (any | low-tag)–(any | high-tag);
}
override;
}
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
Description
Configure multiple VLANs. Each VLAN is assigned a VLAN ID number from the range.
784
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring Interfaces to Support Both Single and Stacked VLANs | 26
785
vlan-tagging
Syntax
vlan-tagging;
vlan-tagging;
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Statement introduced in Junos OS Release 9.5.
Statement introduced in Junos OS Release 11.3 for the QFX Series.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Statement introduced in Junos OS Release 13.2 for PTX Series Routers.
Statement introduced in Junos OS Release 14.1X53-D10 for the QFX Series.
Description
786
For Fast Ethernet and Gigabit Ethernet interfaces, aggregated Ethernet interfaces configured for VPLS,
and pseudowire subscriber interfaces, enable the reception and transmission of 802.1Q VLAN-tagged
frames on the interface.
NOTE: For QFX Series configure VLAN identifier for untagged packets received on the physical
interface of a trunk mode interface. Enable VLAN tagging. The platform receives and forwards
single-tag frames with 802.1Q VLAN tags.
On EX Series switches except for EX4300 and EX9200 switches, the vlan-tagging and family
ethernet-switching statements cannot be configured on the same interface. Interfaces on EX2200,
EX3200, EX3300, EX4200, and EX4500 switches are set to family ethernet-switching by the
default factory configuration. EX6200 and EX8200 switch interfaces do not have a default family
setting.
Default
VLAN tagging is disabled by default.
Options
native-vlan-id— (SRX Series)Configures a VLAN identifier for untagged packets. Enter a number from 0
through 4094.
NOTE: The native-vlan-id can be configured only when either flexible-vlan-tagging mode or
interface-mode trunk is configured.
RELATED DOCUMENTATION
vlan-tagging (Dynamic)
Syntax
vlan-tagging;
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.2.
Description
For Fast Ethernet and Gigabit Ethernet interfaces and aggregated Ethernet interfaces configured for VPLS,
enable the reception and transmission of 802.1Q VLAN-tagged frames on the interface.
NOTE: For Ethernet, Fast Ethernet, Tri-Rate Ethernet copper, Gigabit Ethernet, 10-Gigabit
Ethernet, and aggregated Ethernet interfaces supporting VPLS, the Junos OS supports a subset
of the IEEE 802.1Q standard for channelizing an Ethernet interface into multiple logical interfaces,
allowing many hosts to be connected to the same Gigabit Ethernet switch, but preventing them
from being in the same routing or bridging domain.
RELATED DOCUMENTATION
Configuring an Interface to Use the Dynamic Profile Configured to Create Stacked VLANs | 23
Configuring an Interface to Use the Dynamic Profile Configured to Create Single-Tag VLANs | 19
Configuring the L2TP LNS Peer Interface
789
vlan-tags
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 9.5.
VLAN demux interface support introduced in Junos OS Release 10.2.
Description
For Gigabit Ethernet IQ and IQE interfaces only, binds TPIDs and 802.1Q VLAN tag IDs to a logical interface.
You must include the stacked-vlan-tagging statement at the [edit interfaces interface-name] hierarchy
level.
Options
inner [tpid].vlan-id—A TPID (optional) and a valid VLAN identifier in the format tpid.vlan-id. When used in
the dynamic-profiles hierarchy, specify the $junos-vlan-id predefined variable to dynamically obtain the
VLAN ID.
NOTE: On the network-to-network (NNI) or egress interfaces of provider edge (PE) routers, you
cannot configure the inner-range tpid. vid1—vid2 option with the vlan-tags statement for
ISP-facing interfaces.
Range: For VLAN ID, 1 through 4094. VLAN ID 0 is reserved for tagging the priority of frames.
outer [tpid].vlan-id—A TPID (optional) and a valid VLAN identifier in the format tpid.vlan-id. When used in
the dynamic-profiles hierarchy, specify the $junos-stacked-vlan-id predefined variable.
Range: For VLAN ID, 1 through 511 for normal interfaces, and 512 through 4094 for VLAN CCC interfaces.
VLAN ID 0 is reserved for tagging the priority of frames.
RELATED DOCUMENTATION
vpi vpi-identifier {
maximum-vcs maximum-vcs;
oam-liveness {
up-count cells;
down-count cells;
}
oam-period (disable | seconds);
shaping {
(cbr rate | rtvbr peak rate sustained rate burst length | vbr peak rate sustained rate burst length);
queue-length number;
}
}
Hierarchy Level
Release Information
Statement introduced before Junos OS Release 7.4.
Description
For ATM interfaces, configure the virtual path (VP).
Options
vpi-identifier—ATM virtual path identifier. This is one of the VPIs that you define in the vci statement. (For
a list of hierarchy levels at which you can include the vci statement, see vci.)
Range: 0 through 255
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
RELATED DOCUMENTATION
weight
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 17.3 for MX240, MX480, MX960, and MX Virtual Chassis.
$junos-interface-set target-weight option added in Junos OS Release 18.4R1.
Description
Configure weight for targeted subscribers like PPPoe, demux, and conventional VLANs. The weight assigned
is based on factors such as customer preference, CoS, or bandwidth requirement. The member links are
then assigned based on the value of the weight. The value of the weight can range from 1 through 1000.
Options
weight ($junos-interface-set-target-weight | weight-value)—Specify the weight for targeted subscribers.
Member links for logical interfaces of aggregated Ethernet logical interfaces are assigned based on
the value of the weight . When a new VLAN is added to the same aggregated Ethernet bundle, then
the primary member link selected for targeting is the one with the minimum primary load and the
backup link selected for targeting is the one with the minimum overall load.
When you configure the $junos-interface-set-target-weight predefined variable, the weight value is
sourced from VSA 26-214 in the RADIUS Access-Accept message when a dynamic subscriber is
authenticated and applies to both the interface set and all its member interfaces; you must configured
targeted distribution for both the interface set and its member interfaces. If the interface set is not
explicitly configured and RADIUS VSA 26-214 is not received, then the interface set weight derives
from the weight assigned to the first member interface that is authorized.
Range: 1 through 1000
RELATED DOCUMENTATION
794
Understanding Support for Targeted Distribution of Logical Interface Sets of Static VLANs over Aggregated
Ethernet Logical Interfaces
Using RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 177
RADIUS-Sourced Weights for Interface and Interface Set Targeted Distribution | 175
795
CHAPTER 39
Operational Commands
IN THIS CHAPTER
Release Information
Command introduced in Junos OS Release 9.5.
Description
Clear dynamically created VLAN interfaces.
NOTE: For the clear command to be successful, no interface bindings (for example, DHCP server
bindings) can exist on the dynamic interface.
Options
interface-name—Name of a physical or logical interface.
RELATED DOCUMENTATION
Output Fields
When you enter this command, you are provided feedback on the status of your request.
797
Sample Output
clear auto-configuration interfaces (All Interfaces)
user@host> clear auto-configuration interfaces ge-1/0/0
Release Information
Command introduced in Junos OS Release 12.2.
Description
Clear a specified dynamic agent circuit identifier (ACI) interface set or access-line identifier (ALI) interface
set on the router. An ACI or ALI interface set is a logical collection of dynamic VLAN subscriber interfaces
that originate at the same household or on the same access-loop port.
You can clear only those ACI or ALI interface sets that have no active subscriber interface members. If the
ACI or ALI interface set that you want to clear still has valid member interfaces, you must first remove
these interfaces before issuing the clear auto-configuration interfaces interface-set interface-set-name
command.
Options
interface-set-name—Name of the empty ACI or ALI interface set that you want to clear. Use the ACI or
ALI interface set name generated by the router, such as aci-1003-ge-1/0/0.4001, and not the actual
ACI or ALI string found in the DHCP or PPPoE control packets. To view the names of the ACI or ALI
interface sets configured on the router, you can issue the show subscribers command.
RELATED DOCUMENTATION
Output Fields
When you enter this command, you are provided feedback on the status of your request.
799
Sample Output
clear auto-configuration interfaces interface-set
user@host> clear auto-configuration interfaces interface-set aci-1003-ge-1/0/0.4001
clear auto-configuration interfaces interface-set (Error Message for ACI Interface Set with Active Members)
user@host> clear auto-configuration interfaces interface-set aci-1005-ge-1/0/0.2800
Release Information
Command introduced in Junos OS Release 11.4 on MX Series routers.
aci option introduced in Junos OS Release 13.3.
Description
Clear the lockout condition for the PPPoE client associated with the specified media access control (MAC)
source address or agent circuit identifier (ACI) value.
Options
none—Clear the lockout condition for the PPPoE clients associated with all MAC source addresses on all
PPPoE underlying interfaces.
aci circuit-id—(Optional) Clear the lockout condition for the PPPoE client associated with the specified ACI
value. To clear the lockout condition by a specified ACI value, you must specify the filter aci option
in the short-cycle-protection statement when you configure PPPoE subscriber session lockout. If the
filter aci option is missing from the short-cycle-protection statement , no PPPoE client sessions are
cleared using the ACI filter. The aci option and the mac-address option are mutually exclusive.
mac-address mac-address—(Optional) Clear the lockout condition for the PPPoE client associated with the
specified MAC source address. The mac-address option and the aci option are mutually exclusive.
RELATED DOCUMENTATION
clear pppoe lockout mac-address underlying-interfaces (Specified MAC Source Address on Specified
Underlying Interface) on page 801
clear pppoe lockout underlying-interfaces (All MAC Source Addresses on Specified Underlying
Interface) on page 801
clear pppoe lockout underlying-interfaces aci (ACI on Specified Underlying Interface) on page 801
Sample Output
clear pppoe lockout (All MAC Source Addresses on All Underlying Interfaces)
user@host> clear pppoe lockout
clear pppoe lockout mac-address underlying-interfaces (Specified MAC Source Address on Specified
Underlying Interface)
user@host> clear pppoe lockout mac-address 00:00:5e:00:53:30 underlying-interfaces ge-1/0/0.101
clear pppoe lockout underlying-interfaces (All MAC Source Addresses on Specified Underlying Interface)
user@host> clear pppoe lockout underlying-interfaces ge-1/0/0.101
clear pppoe lockout atm-identifier device-name device-name vpi vpi-identifier vci vci-identifier
<aci circuit-id | mac-address mac-address >
Release Information
Command introduced in Junos OS Release 15.2 on MX Series routers.
Description
Clear the lockout condition for the PPPoE client associated with the specified ATM encapsulation type
and, optionally, media access control (MAC) source address or agent circuit identifier (ACI) value. Because
the lockout condition persists even in the absence of an underlying interface or after automatic removal
of the VLAN or VLAN demux interface, using the clear pppoe lockout atm-identifier command enables
you to clear the lockout condition for PPPoE clients by specifying ATM identifying characteristics instead
of the ATM interface name.
Options
circuit-id—(Optional) ACI value associated with the PPPoE client for which you want to clear lockout. To
clear the lockout condition by a specified ACI value, you must specify the filter aci option in the
short-cycle-protection statement when you configure PPPoE subscriber session lockout. If the filter
aci option is missing from the short-cycle-protection statement, no PPPoE client sessions are cleared
using the ACI filter. The aci option and the mac-address option are mutually exclusive.
device-name—Name of the ATM physical interface or aggregated Ethernet bundle associated with the
PPPoE client for which you want to clear lockout.
mac-address—(Optional) MAC address value associated with the PPPoE client for which you want to clear
lockout. The mac-address option and the aci option are mutually exclusive.
vci-identifier—ATM VCI value associated with the PPPoE client for which you want to clear lockout.
Range: 0 through 65535
vpi-identifier—ATM VPI value associated with the PPPoE client for which you want to clear lockout.
Range: 0 through 255
clear
RELATED DOCUMENTATION
Sample Output
clear pppoe lockout atm-identifier device-name vpi vci (PPPoE Client with Specified VPI and VCI on ATM
Physical Interface)
user@host> clear pppoe lockout atm-identifier device-name at-1/0/0 vpi 10 vci 40
clear pppoe lockout atm-identifier device-name vpi vci aci (PPPoE Client with Specified VPI and VCI on
Aggregated Ethernet Bundle Where ACI Matches Regular Expression)
user@host> clear pppoe lockout atm-identifier device-name ae1 vpi 1 vci 30 aci ““Relay-identifier atm
1/0:100\.*”
clear pppoe lockout atm-identifier device-name vpi vci mac-address (PPPoE Client with Specified VPI,
VCI, and MAC Address on ATM Logical Interface)
user@host> clear pppoe lockout atm-identifier device-name at-1/1/0.20 vpi 1 vci 20 mac-address
00:00:5e:00:53:30
804
Release Information
Command introduced in Junos OS Release 15.2 on MX Series routers.
Description
Clear the lockout condition for the PPPoE client associated with the specified VLAN encapsulation type
and, optionally, media access control (MAC) source address and agent circuit identifier (ACI) value. Because
the lockout condition persists even in the absence of an underlying interface or after automatic removal
of the VLAN or VLAN demux interface, using the clear pppoe lockout vlan-identifier command enables
you to clear the lockout condition for PPPoE clients by specifying VLAN identifying characteristics rather
than by specifying the underlying interface name.
You can configure PPPoE subscriber session lockout, also known as PPPoE short-cycle protection, for
VLAN, VLAN demux, and PPPoE-over-ATM dynamic subscriber interfaces.
Options
circuit-id—(Optional) ACI value associated with the PPPoE client for which you want to clear lockout. To
clear the lockout condition by a specified ACI value, you must specify the filter aci option in the
short-cycle-protection statement when you configure PPPoE subscriber session lockout. If the filter
aci option is missing from the short-cycle-protection statement, no PPPoE client sessions are cleared
using the ACI filter. The aci option and the mac-address option are mutually exclusive.
device-name—Name of the Ethernet physical interface or aggregated Ethernet bundle associated with the
PPPoE client for which you want to clear lockout.
mac-address—(Optional) MAC address value associated with the PPPoE client for which you want to clear
lockout. The mac-address option and the aci option are mutually exclusive.
805
svlan-identifier—(Optional) A valid S-VLAN identifier associated with the PPPoE client for which you want
to clear lockout.
Range: 1 through 4094
vlan-identifier—(Optional) A valid VLAN identifier associated with the PPPoE client for which you want to
clear lockout.
Range: 1 through 4094
RELATED DOCUMENTATION
Sample Output
clear pppoe lockout vlan-identifier device-name (Untagged VLAN on Aggregated Ethernet Bundle)
user@host> clear pppoe lockout vlan-identifier device-name ae3
clear pppoe lockout vlan-identifier device-name vlan-id (Single-Tagged VLAN on Gigabit Ethernet Interface)
user@host> clear pppoe lockout vlan-identifier device-name ge-2/0/0 vlan-id 2000
clear pppoe lockout vlan-identifier device-name svlan-id vlan-id aci (Dual-Tagged VLAN on 10-Gigabit
Ethernet Interface Where ACI Matches Regular Expression)
user@host> clear pppoe lockout vlan-identifier device-name xe-1/0/0 svlan-id 10 vlan-id 20 aci
““Relay-identifier atm 1/0:100\.*”
806
clear pppoe lockout vlan-identifier device-name svlan-id vlan-id mac-address (Dual-Tagged VLAN on
Aggregated Ethernet Bundle with Specified MAC Address)
user@host> clear pppoe lockout vlan-identifier device-name ae0 svlan-id 1 vlan-id 100 mac-address
00:00:5e:00:53:30
807
Release Information
Command introduced before Junos OS Release 7.4.
underlying-interface-name option introduced in Junos OS Release 9.5.
Description
Reset PPPoE session statistics information.
Options
none—Reset PPPoE statistics for all interfaces.
underlying-interface-name—(Optional) Reset PPPoE statistics for the specified underlying PPPoE interface.
RELATED DOCUMENTATION
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear pppoe statistics
user@host> clear pppoe statistics
808
Release Information
Command introduced in Junos OS Release 9.0.
Options interfaces-vlan and interfaces-wildcard added in Junos OS Release 12.1.
Description
Display the address bindings in the client table on the extended Dynamic Host Configuration Protocol
(DHCP) local server.
NOTE: If you delete the DHCP server configuration, DHCP server bindings might still remain.
To ensure that DHCP bindings are removed, issue the clear dhcp server binding command before
you delete the DHCP server configuration.
Options
address—(Optional) Display DHCP binding information for a specific client identified by one of the following
entries:
brief | detail | summary—(Optional) Display the specified level of output about active client bindings. The
default is brief, which produces the same output as show dhcp server binding.
interface interface-name—(Optional) Display information about active client bindings on the specified
interface. You can optionally filter on VLAN ID and SVLAN ID.
interfaces-vlan—(Optional) Show the binding state information on the interface VLAN ID and S-VLAN ID.
810
interfaces-wildcard—(Optional) The set of interfaces on which to show the binding state information. This
option supports the use of the wildcard character (*).
logical-system logical-system-name—(Optional) Display information about active client bindings for DHCP
clients on the specified logical system.
RELATED DOCUMENTATION
Output Fields
Table 13 on page 811 lists the output fields for the show dhcp server binding command. Output fields are
listed in the approximate order in which they appear.
811
number clients, Summary counts of the total number of DHCP clients summary
(number init, and the number of DHCP clients in each state.
number bound,
number selecting,
number requesting,
number renewing,
number releasing)
Lease Expires Date and time at which the client’s IP address lease detail
expires.
Lease Start Date and time at which the client’s IP address lease detail
started.
Last Packet Received Date and time at which the router received the last detail
packet.
Client Pool Name Name of address pool used to assign client IP address detail
lease.
813
Liveness Detection State State of the liveness detection status for a subscriber’s detail
Bidirectional Forwarding Detection (BFD) protocol
session:
ACI Interface Set Name Internally generated name of the dynamic agent circuit detail
identifier (ACI) interface set.
ACI Interface Set Index Index number of the dynamic ACI interface set. detail
ACI Interface Set Session ID Identifier of the dynamic ACI interface set entry in the detail
session database.
Sample Output
show dhcp server binding
user@host> show dhcp server binding
When DHCP binding is configured with dual-stack, we get the following output:
Session Id: 2
Client Pool Name: my-v4-pool
Client Profile Name: dhcp-retail
Dual Stack Group: my-dual-stack
Dual Stack Peer Prefix: 2001:db8:ffff:0:4::/64
Dual Stack Peer Address: 2001:db8:0:8003::1/128
Release Information
Command introduced in Junos OS Release 13.3.
Description
Display dynamic profile (client or service) information for all subscribers or for subscribers specified by
client ID or service session ID. You can filter the output by also specifying a dynamic profile.
NOTE:
• The output does not display the variable stanzas defined in the dynamic profile configuration.
• The variables in the profile configuration are replaced with subscriber specific values.
• If the conditional variable in the dynamic profile is evaluated as NULL, the subscriber value
for the variable is displayed as NONE in the command output.
• The variable is also displayed as NONE when the variable (any variable and not necessarily
conditional) in the dynamic profile has no value associated with it.
• The format in which the configuration is displayed looks similar, but not exactly the same as
the format of the show configuration dynamic-profiles command.
Options
client-id client-id—Display dynamic profile information for subscribers associated with the specified client.
profile-name profile-name—(Optional) Display dynamic profile information for the specified subscriber or
service profile.
service-id service-id—Display dynamic profile information for subscribers associated with the specified
service session.
show dynamic-profile session client-id profile-name (Client ID and Dynamic Profile) on page 822
show dynamic-profile session service-id (Service Session) on page 823
Output Fields
This command displays the dynamic client or service profile configuration for each subscriber.
Sample Output
show dynamic-profile session client-id (Client ID)
user@host>show dynamic-profile session client-id 20
pppoe {
interfaces {
pp0 {
unit 1073741831 {
ppp-options {
chap;
pap;
}
pppoe-options {
underlying-interface ge-2/0/0.0;
server;
}
family {
inet {
unnumbered-address lo0.0;
}
}
}
}
}
class-of-service {
traffic-control-profiles {
tcp1 {
scheduler-map smap1_UID1024;
shaping-rate 100m;
}
}
interfaces {
pp0 {
unit 1073741831 {
output-traffic-control-profile tcp1;
821
}
}
}
scheduler-maps {
smap1_UID1024 {
forwarding-class best-effort scheduler sch1_UID1023;
}
}
schedulers {
sch1_UID1023 {
transmit-rate percent 40;
buffer-size percent 40;
priority low;
}
}
}
}
filter-service {
interfaces {
pp0 {
unit 1073741831 {
family {
inet {
filter {
input input-filter_UID1026 precedence 50;
output output-filter_UID1027 precedence 50;
}
}
}
}
}
}
firewall {
family {
inet {
filter input-filter_UID1026 {
interface-specific;
term t1 {
then {
policer policer1_UID1025;
service-accounting;
}
}
term rest {
822
then accept;
}
}
filter output-filter_UID1027 {
interface-specific;
term rest {
then accept;
}
}
}
}
policer policer1_UID1025 {
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 15k;
}
then discard;
}
}
}
cos-service {
class-of-service {
scheduler-maps {
smap2_UID1029 {
forwarding-class assured-forwarding scheduler sch2_UID1028;
}
}
schedulers {
sch2_UID1028 {
transmit-rate percent 60;
buffer-size percent 60;
priority high;
}
}
}
}
bsimmons
}
cos-service {
class-of-service {
scheduler-maps {
smap2_UID1029 {
forwarding-class assured-forwarding scheduler sch2_UID1028;
}
}
schedulers {
sch2_UID1028 {
transmit-rate percent 60;
buffer-size percent 60;
priority high;
}
}
}
}
filter-service {
interfaces {
pp0 {
unit 1073741831 {
family {
inet {
filter {
input input-filter_UID1026 precedence 50;
output output-filter_UID1027 precedence 50;
}
}
}
}
}
}
firewall {
family {
inet {
filter input-filter_UID1026 {
interface-specific;
term t1 {
then {
824
policer policer1_UID1025;
service-accounting;
}
}
term rest {
then accept;
}
}
filter output-filter_UID1027 {
interface-specific;
term rest {
then accept;
}
}
}
}
policer policer1_UID1025 {
if-exceeding {
bandwidth-limit 1m;
burst-size-limit 15k;
}
then discard;
}
}
}
825
show interfaces
List of Syntax
Syntax (Gigabit Ethernet) on page 825
Syntax (10 Gigabit Ethernet) on page 825
Syntax (SRX Series Devices and (vSRX and vSRX 3.0 platforms)) on page 825
Syntax (SRX Series Devices and (vSRX and vSRX 3.0 platforms))
show interfaces (
<interface-name>
<brief | detail | extensive | terse>
<controller interface-name>|
<descriptions interface-name>|
<destination-class (all | destination-class-name logical-interface-name)>|
<diagnostics optics interface-name>|
<far-end-interval interface-fpc/pic/port>|
<filters interface-name>|
<flow-statistics interface-name>|
<interval interface-name>|
<load-balancing (detail | interface-name)>|
<mac-database mac-address mac-address>|
<mc-ae id identifier unit number revertive-info>|
<media interface-name>|
<policers interface-name>|
826
Release Information
Command introduced before Junos OS Release 7.4 for Gigabit interfaces.
Command introduced in Junos OS Release 8.0 for 10 Gigabit interfaces.
Command modified in Junos OS Release 9.5 for SRX Series devices.
Command introduced in Junos OS Release 18.1 for Gigabit interfaces.
Command modified in Junos OS Release 19.3R1 for MX Series Routers.
Starting in Junos OS Release 19.3R1, Output fields Ifindex and speed is modified in the show interfaces
interface name extensive command, on all MX Series routers.
• The default behavior of WAN-PHY interface remains the same.The new precise-bandwidth option
reflects the new speed (9.294-Gbps) configured on the supported line cards.
• The WAN-PHY framing mode is supported only on MPC5E and MPC6E line cards.
Starting in Junos OS Release 19.3R1, class of service (CoS) features can be configured on the physical
interface with speed rates of 1-Gbps, 10-Gbps, 40-Gbps, and 100-Gbps to provide better bandwidth for
processing traffic during congestion using variant speeds.
Description
Display status information about the specified Gigabit Ethernet interface.
(M320, M120, MX Series, and T Series routers only) Display status information about the specified
10-Gigabit Ethernet interface.
Display the IPv6 interface traffic statistics about the specified Gigabit Ethernet interface for MX series
routers. The input and output bytes (bps) and packets (pps) rates are not displayed for IFD and local traffic.
Display status information and statistics about interfaces on SRX Series, vSRX, and vSRX 3.0 platforms
running Junos OS.
827
NOTE: On SRX Series appliances, on configuring identical IPs on a single interface, you will not
see a warning message; instead, you will see a syslog message.
Starting in Junos OS Release 18.4R1, Output fields Next-hop and vpls-status is displayed in the show
interfaces interface name detail command, only for Layer 2 protocols on MX480 routers.
Options
For Gigabit interfaces:
NOTE: Interfaces with different speeds are named uniformly with ge-0/0/x for backward
compatibility. Use the show interfaces command to view the interface speeds.
snmp-index snmp-index—(Optional) Display information for the specified SNMP index of the interface.
snmp-index snmp-index—(Optional) Display information for the specified SNMP index of the interface.
• ct1-pim/0/port—Channelized T1 interface.
• e1-pim/0/port—E1 interface.
• e3-pim/0/port—E3 interface.
• se-pim/0/port—Serial interface.
• wx-slot/0/0—WAN acceleration interface, for the WXC Integrated Services Module (ISM 200).
• ct1-pim/0/port—Channelized T1 interface.
• e1-pim/0/port—E1 interface.
• e3-pim/0/port—E3 interface.
• se-pim/0/port—Serial interface.
• wx-slot/0/0—WAN acceleration interface, for the WXC Integrated Services Module (ISM 200).
Additional Information
In a logical system, this command displays information only about the logical interfaces and not about the
physical interfaces.
829
Release Description
18.4R1 Starting in Junos OS Release 18.4R1, Output fields Next-hop and vpls-status is displayed
in the show interfaces interface name detail command, only for Layer 2 protocols on MX480
routers.
RELATED DOCUMENTATION
Output Fields
Table 14 on page 831 describes the output fields for the show interfaces (Gigabit Ethernet) command.
Output fields are listed in the approximate order in which they appear. For Gigabit Ethernet IQ and IQE
PICs, the traffic and MAC statistics vary by interface type. For more information, see Table 15 on page 869.
831
Physical Interface
Enabled State of the interface. Possible values are described in the “Enabled Field” All levels
section under Common Output Fields Description.
Interface index Index number of the physical interface, which reflects its initialization detail extensive none
sequence.
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Link-level type Encapsulation being used on the physical interface. All levels
MTU Maximum transmission unit size on the physical interface. All levels
Loopback Loopback status: Enabled or Disabled. If loopback is enabled, type of All levels
loopback: Local or Remote.
LAN-PHY mode 10-Gigabit Ethernet interface operating in Local Area Network Physical All levels
Layer Device (LAN PHY) mode. LAN PHY allows 10-Gigabit Ethernet wide
area links to use existing Ethernet applications.
WAN-PHY mode 10-Gigabit Ethernet interface operating in Wide Area Network Physical All levels
Layer Device (WAN PHY) mode. WAN PHY allows 10-Gigabit Ethernet
wide area links to use fiber-optic cables and other devices intended for
SONET/SDH.
Unidirectional Unidirectional link mode status for 10-Gigabit Ethernet interface: Enabled All levels
or Disabled for parent interface; Rx-only or Tx-only for child interfaces.
Auto-negotiation (Gigabit Ethernet interfaces) Autonegotiation status: Enabled or Disabled. All levels
832
Device flags Information about the physical device. Possible values are described in All levels
the “Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the All levels
“Interface Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Links All levels
Flags” section under Common Output Fields Description.
Frequency (10-Gigabit Ethernet DWDM interfaces only) Displays the frequency All levels
associated with the configured wavelength, in terahertz (THz).
Schedulers (Gigabit Ethernet intelligent queuing 2 [IQ2] interfaces only) Number of extensive
CoS schedulers configured.
Hold-times Current interface hold-time up and hold-time down, in milliseconds (ms). detail extensive
Last flapped Date, time, and how long ago the interface went from down to up. The detail extensive none
format is Last flapped: year-month-day hour:minute:second:timezone
(hour:minute:second ago). For example, Last flapped: 2002-04-26 10:52:40
PDT (04:33:20 ago).
Input Rate Input rate in bits per second (bps) and packets per second (pps). The value None
in this field also includes the Layer 2 overhead bytes for ingress traffic on
Ethernet interfaces if you enable accounting of Layer 2 overhead at the
PIC level or the logical interface level.
833
Output Rate Output rate in bps and pps. The value in this field also includes the Layer None
2 overhead bytes for egress traffic on Ethernet interfaces if you enable
accounting of Layer 2 overhead at the PIC level or the logical interface
level.
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Egress account Layer 2 overhead in bytes that is accounted in the interface statistics for detail extensive
overhead egress traffic.
Ingress account Layer 2 overhead in bytes that is accounted in the interface statistics for detail extensive
overhead ingress traffic.
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
physical interface.
For Gigabit Ethernet IQ PICs, the input byte counts vary by interface type.
For more information, see Table 31 under the show interfaces command.
834
Input errors Input errors on the interface. The following paragraphs explain the extensive
counters whose meaning might not be obvious:
Output errors Output errors on the interface. The following paragraphs explain the extensive
counters whose meaning might not be obvious:
Egress queues Total number of egress queues supported on the specified interface. detail extensive
NOTE: In DPCs that are not of the enhanced type, such as DPC 40x 1GE
R, DPCE 20x 1GE + 2x 10GE R, or DPCE 40x 1GE R, you might notice a
discrepancy in the output of the show interfaces command because
incoming packets might be counted in the Egress queues section of the
output. This problem occurs on non-enhanced DPCs because the egress
queue statistics are polled from IMQ (Inbound Message Queuing) block
of the I-chip. The IMQ block does not differentiate between ingress and
egress WAN traffic; as a result, the combined statistics are displayed in
the egress queue counters on the Routing Engine. In a simple VPLS
scenario, if there is no MAC entry in DMAC table (by sending unidirectional
traffic), traffic is flooded and the input traffic is accounted in IMQ. For
bidirectional traffic (MAC entry in DMAC table), if the outgoing interface
is on the same I-chip then both ingress and egress statistics are counted
in a combined way. If the outgoing interface is on a different I-chip or
FPC, then only egress statistics are accounted in IMQ. This behavior is
expected with non-enhanced DPCs
Queue counters CoS queue number and its associated user-configured forwarding class detail extensive
(Egress) name.
Ingress queues Total number of ingress queues supported on the specified interface. extensive
Displayed on IQ2 interfaces.
Queue counters CoS queue number and its associated user-configured forwarding class extensive
(Ingress) name. Displayed on IQ2 interfaces.
Active alarms and Ethernet-specific defects that can prevent the interface from passing detail extensive none
Active defects packets. When a defect persists for a certain amount of time, it is
promoted to an alarm. Based on the router configuration, an alarm can
ring the red or yellow alarm bell on the router, or turn on the red or yellow
alarm LED on the craft interface. These fields can contain the value None
or Link.
Interface transmit (On MX Series devices) Status of the interface-transmit-statistics detail extensive
statistics configuration: Enabled or Disabled.
OTN FEC statistics The forward error correction (FEC) counters provide the following detail extensive
statistics:
PCS statistics (10-Gigabit Ethernet interfaces) Displays Physical Coding Sublayer (PCS) detail extensive
fault conditions from the WAN PHY or the LAN PHY device.
• Bit errors—Number of seconds during which at least one bit error rate
(BER) occurred while the PCS receiver is operating in normal mode.
• Errored blocks—Number of seconds when at least one errored block
occurred while the PCS receiver is operating in normal mode.
838
Link Degrade Shows the link degrade status of the physical link and the estimated bit detail extensive
error rates (BERs). This field is available only for the PICs supporting the
physical link monitoring feature.
OTN Received APS/PCC0: 0x02, APS/PCC1: 0x11, APS/PCC2: 0x47, APS/PCC3: 0x58 extensive
Overhead Bytes Payload Type: 0x08
OTN Transmitted APS/PCC0: 0x00, APS/PCC1: 0x00, APS/PCC2: 0x00, APS/PCC3: 0x00 extensive
Overhead Bytes Payload Type: 0x08
842
Filter statistics Receive and Transmit statistics reported by the PIC's MAC address filter extensive
subsystem. The filtering is done by the content-addressable memory
(CAM) on the PIC. The filter examines a packet's source and destination
MAC addresses to determine whether the packet may enter the system
or be rejected.
PMA PHY (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET error extensive
information:
WIS section (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET error extensive
information:
WIS line (10-Gigabit Ethernet interfaces, WAN PHY mode) Active alarms and extensive
defects, plus counts of specific SONET errors with detailed information:
WIS path (10-Gigabit Ethernet interfaces, WAN PHY mode) Active alarms and extensive
defects, plus counts of specific SONET errors with detailed information:
Received path trace, (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET/SDH interfaces extensive
Transmitted path allow path trace bytes to be sent inband across the SONET/SDH link.
trace Juniper Networks and other router manufacturers use these bytes to help
diagnose misconfigurations and network errors by setting the transmitted
path trace message so that it contains the system hostname and name of
the physical interface. The received path trace value is the message
received from the router at the other end of the fiber. The transmitted
path trace value is the message that this router transmits.
Packet Forwarding Information about the configuration of the Packet Forwarding Engine: extensive
Engine configuration
• Destination slot—FPC slot number.
CoS information Information about the CoS queue for the physical interface. extensive
Logical Interface
Index Index number of the logical interface, which reflects its initialization detail extensive none
sequence.
SNMP ifIndex SNMP interface index number for the logical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
848
Flags Information about the logical interface. Possible values are described in All levels
the “Logical Interface Flags” section under Common Output Fields
Description.
VLAN-Tag Rewrite profile applied to incoming or outgoing frames on the outer (Out) brief detail extensive
VLAN tag or for both the outer and inner (In) VLAN tags. none
• push—An outer VLAN tag is pushed in front of the existing VLAN tag.
• pop—The outer VLAN tag of the incoming frame is removed.
• swap—The outer VLAN tag of the incoming frame is overwritten with
the user-specified VLAN tag information.
• push—An outer VLAN tag is pushed in front of the existing VLAN tag.
• push-push—Two VLAN tags are pushed in from the incoming frame.
• swap-push—The outer VLAN tag of the incoming frame is replaced by
a user-specified VLAN tag value. A user-specified outer VLAN tag is
pushed in front. The outer tag becomes an inner tag in the final frame.
• swap-swap—Both the inner and the outer VLAN tags of the incoming
frame are replaced by the user-specified VLAN tag value.
• pop-swap—The outer VLAN tag of the incoming frame is removed, and
the inner VLAN tag of the incoming frame is replaced by the
user-specified VLAN tag value. The inner tag becomes the outer tag in
the final frame.
• pop-pop—Both the outer and inner VLAN tags of the incoming frame
are removed.
Demux IP demultiplexing (demux) value that appears if this interface is used as detail extensive none
the demux underlying interface. The output is one of the following:
ACI VLAN Information displayed for agent circuit identifier (ACI) interface set brief detail extensive
configured with the agent-circuit-id autoconfiguration stanza. none
NOTE: The ACI VLAN field is replaced with the Line Identity field when
an ALI interface set is configured with the line-identity autoconfiguration
stanza.
Line Identity Information displayed for access-line-identifier (ALI) interface sets detail
configured with the line-identity autoconfiguration stanza.
NOTE: The Line Identity field is replaced with the ACI VLAN field when
an ACI interface set is configured with the agent-circuit-id
autoconfiguration stanza.
Protocol Protocol family. Possible values are described in the “Protocol Field” detail extensive none
section under Common Output Fields Description.
MTU Maximum transmission unit size on the logical interface. detail extensive none
Neighbor Discovery NDP statistics for protocol inet6 under logical interface statistics. All levels
Protocol
(NDP)Queue • Max nh cache—Maximum interface neighbor discovery nexthop cache
size.
Statistics
• New hold nh limit—Maximum number of new unresolved nexthops.
• Curr nh cnt—Current number of resolved nexthops in the NDP queue.
• Curr new hold cnt—Current number of unresolved nexthops in the NDP
queue.
• NH drop cnt—Number of NDP requests not serviced.
850
Dynamic Profile Name of the dynamic profile that was used to create this interface detail extensive none
configured with a Point-to-Point Protocol over Ethernet (PPPoE) family.
Service Name Table Name of the service name table for the interface configured with a PPPoE detail extensive none
family.
Max Sessions Maximum number of PPPoE logical interfaces that can be activated on detail extensive none
the underlying interface.
Duplicate State of PPPoE duplicate protection: On or Off. When duplicate protection detail extensive none
Protection is configured for the underlying interface, a dynamic PPPoE logical
interface cannot be activated when an existing active logical interface is
present for the same PPPoE client.
Direct Connect State of the configuration to ignore DSL Forum VSAs: On or Off. When detail extensive none
configured, the router ignores any of these VSAs received from a directly
connected CPE device on the interface.
Maximum labels Maximum number of MPLS labels configured for the MPLS protocol family detail extensive none
on the logical interface.
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
specified interface set.
IPv6 transit Number of IPv6 transit bytes and packets received and transmitted on extensive
statistics the logical interface if IPv6 statistics tracking is enabled.
Local statistics Number and rate of bytes and packets destined to the router. extensive
851
Transit statistics Number and rate of bytes and packets transiting the switch. extensive
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route Table Route table in which the logical interface address is located. For example, detail extensive none
0 refers to the routing table inet.0.
Flags Information about protocol family flags. Possible values are described in detail extensive
the “Family Flags” section under Common Output Fields Description.
Donor interface (Unnumbered Ethernet) Interface from which an unnumbered Ethernet detail extensive none
interface borrows an IPv4 address.
Preferred source (Unnumbered Ethernet) Secondary IPv4 address of the donor loopback detail extensive none
address interface that acts as the preferred source address for the unnumbered
Ethernet interface.
Input Filters Names of any input filters applied to this interface. If you specify a detail extensive
precedence value for any filter in a dynamic profile, filter precedence
values appear in parentheses next to all interfaces.
Output Filters Names of any output filters applied to this interface. If you specify a detail extensive
precedence value for any filter in a dynamic profile, filter precedence
values appear in parentheses next to all interfaces.
Mac-Validate Number of MAC address validation failures for packets and bytes. This detail extensive none
Failures field is displayed when MAC address validation is enabled for the logical
interface.
Addresses, Flags Information about the address flags. Possible values are described in the detail extensive none
“Addresses Flags” section under Common Output Fields Description.
852
protocol-family Protocol family configured on the logical interface. If the protocol is inet, brief
the IP address of the interface is also displayed.
Flags Information about the address flag. Possible values are described in the detail extensive none
“Addresses Flags” section under Common Output Fields Description.
Destination IP address of the remote side of the connection. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
The following table describes the output fields for the show interfaces (10–Gigabit Ethernet) command.
Enabled State of the interface. Possible values are described in the “Enabled Field” All levels
section under Common Output Fields Description.
Interface index Index number of the physical interface, which reflects its initialization sequence. detail
extensive none
SNMP ifIndex SNMP index number for the physical interface. detail
extensive none
Generation Unique number for use by Juniper Networks technical support only. detail
extensive
Link-level type Encapsulation being used on the physical interface. All levels
MTU Maximum transmission unit size on the physical interface. All levels
Loopback Loopback status: Enabled or Disabled. If loopback is enabled, type of loopback: All levels
Local or Remote.
853
LAN-PHY mode 10-Gigabit Ethernet interface operating in Local Area Network Physical Layer All levels
Device (LAN PHY) mode. LAN PHY allows 10-Gigabit Ethernet wide area links
to use existing Ethernet applications.
WAN-PHY mode 10-Gigabit Ethernet interface operating in Wide Area Network Physical Layer All levels
Device (WAN PHY) mode. WAN PHY allows 10-Gigabit Ethernet wide area
links to use fiber-optic cables and other devices intended for SONET/SDH.
Unidirectional Unidirectional link mode status for 10-Gigabit Ethernet interface: Enabled or All levels
Disabled for parent interface; Rx-only or Tx-only for child interfaces.
Auto-negotiation (Gigabit Ethernet interfaces) Autonegotiation status: Enabled or Disabled. All levels
Device flags Information about the physical device. Possible values are described in the All levels
“Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the “Interface All levels
Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Links Flags” All levels
section under Common Output Fields Description.
Frequency (10-Gigabit Ethernet DWDM interfaces only) Displays the frequency associated All levels
with the configured wavelength, in terahertz (THz).
Schedulers (Gigabit Ethernet intelligent queuing 2 (IQ2) interfaces only) Number of CoS extensive
schedulers configured.
Last flapped Date, time, and how long ago the interface went from down to up. The format detail
is Last flapped: year-month-day hour:minute:second:timezone (hour:minute:second extensive none
ago). For example, Last flapped: 2002-04-26 10:52:40 PDT (04:33:20 ago).
Input Rate Input rate in bits per second (bps) and packets per second (pps). The value in None specified
this field also includes the Layer 2 overhead bytes for ingress traffic on Ethernet
interfaces if you enable accounting of Layer 2 overhead at the PIC level or the
logical interface level.
Output Rate Output rate in bps and pps. The value in this field also includes the Layer 2 None specified
overhead bytes for egress traffic on Ethernet interfaces if you enable accounting
of Layer 2 overhead at the PIC level or the logical interface level.
Statistics last Time when the statistics for the interface were last set to zero. detail
cleared extensive
Egress account Layer 2 overhead in bytes that is accounted in the interface statistics for egress detail
overhead traffic. extensive
Ingress account Layer 2 overhead in bytes that is accounted in the interface statistics for ingress detail
overhead traffic. extensive
Traffic statistics Number and rate of bytes and packets received and transmitted on the physical detail
interface. extensive
Input errors Input errors on the interface. The following paragraphs explain the counters extensive
whose meaning might not be obvious:
Output errors Output errors on the interface. The following paragraphs explain the counters extensive
whose meaning might not be obvious:
Egress queues Total number of egress queues supported on the specified interface. detail
extensive
NOTE: In DPCs that are not of the enhanced type, such as DPC 40x 1GE R,
DPCE 20x 1GE + 2x 10GE R, or DPCE 40x 1GE R, you might notice a
discrepancy in the output of the show interfaces command because incoming
packets might be counted in the Egress queues section of the output. This
problem occurs on non-enhanced DPCs because the egress queue statistics
are polled from IMQ (Inbound Message Queuing) block of the I-chip. The IMQ
block does not differentiate between ingress and egress WAN traffic; as a
result, the combined statistics are displayed in the egress queue counters on
the Routing Engine. In a simple VPLS scenorio, if there is no MAC entry in
DMAC table (by sending unidirectional traffic), traffic is flooded and the input
traffic is accounted in IMQ. For bidirectional traffic (MAC entry in DMAC table),
if the outgoing interface is on the same I-chip then both ingress and egress
statistics are counted in a combined way. If the outgoing interface is on a
different I-chip or FPC, then only egress statistics are accounted in IMQ. This
behavior is expected with non-enhanced DPCs
Queue counters CoS queue number and its associated user-configured forwarding class name. detail
(Egress) extensive
• Queued packets—Number of queued packets.
• Transmitted packets—Number of transmitted packets.
• Dropped packets—Number of packets dropped by the ASIC's RED mechanism.
Ingress queues Total number of ingress queues supported on the specified interface. Displayed extensive
on IQ2 interfaces.
Queue counters CoS queue number and its associated user-configured forwarding class name. extensive
(Ingress) Displayed on IQ2 interfaces.
Active alarms and Ethernet-specific defects that can prevent the interface from passing packets. detail
Active defects When a defect persists for a certain amount of time, it is promoted to an alarm. extensive none
Based on the routing device configuration, an alarm can ring the red or yellow
alarm bell on the routing device, or turn on the red or yellow alarm LED on the
craft interface. These fields can contain the value None or Link.
OTN Line Status of the line loopback, if configured for the DWDM OTN PIC. Its value detail
Loopback can be: enabled or disabled. extensive
OTN FEC The forward error correction (FEC) counters for the DWDM OTN PIC. detail
statistics extensive
• Corrected Errors—The count of corrected errors in the last second.
• Corrected Error Ratio—The corrected error ratio in the last 25 seconds. For
example, 1e-7 is 1 error per 10 million bits.
OTN FEC alarms OTN FEC excessive or degraded error alarms triggered on the interface. detail
extensive
• FEC Degrade—OTU FEC Degrade defect.
• FEC Excessive—OTU FEC Excessive Error defect.
Received DAPI Destination Access Port Interface (DAPI) from which the packets were received. detail
extensive
Received SAPI Source Access Port Interface (SAPI) from which the packets were received. detail
extensive
Transmitted DAPI Destination Access Port Interface (DAPI) to which the packets were transmitted. detail
extensive
Transmitted SAPI Source Access Port Interface (SAPI) to which the packets were transmitted. detail
extensive
PCS statistics (10-Gigabit Ethernet interfaces) Displays Physical Coding Sublayer (PCS) fault detail
conditions from the WAN PHY or the LAN PHY device. extensive
• Bit errors—The number of seconds during which at least one bit error rate
(BER) occurred while the PCS receiver is operating in normal mode.
• Errored blocks—The number of seconds when at least one errored block
occurred while the PCS receiver is operating in normal mode.
860
MAC statistics Receive and Transmit statistics reported by the PIC's MAC subsystem, including extensive
the following:
• Total octets and total packets—Total number of octets and packets. For
Gigabit Ethernet IQ PICs, the received octets count varies by interface type.
• Unicast packets, Broadcast packets, and Multicast packets—Number of
unicast, broadcast, and multicast packets.
• CRC/Align errors—Total number of packets received that had a length
(excluding framing bits, but including FCS octets) of between 64 and 1518
octets, inclusive, and had either a bad FCS with an integral number of octets
(FCS Error) or a bad FCS with a nonintegral number of octets (Alignment
Error).
• FIFO error—Number of FIFO errors that are reported by the ASIC on the
PIC. If this value is ever nonzero, the PIC or a cable is probably malfunctioning.
• MAC control frames—Number of MAC control frames.
• MAC pause frames—Number of MAC control frames with pause operational
code.
• Oversized frames—Number of frames that exceed 1518 octets.
• Jabber frames—Number of frames that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either an FCS error
or an alignment error. This definition of jabber is different from the definition
in IEEE-802.3 section 8.2.1.5 (10BASE5) and section 10.3.1.4 (10BASE2).
These documents define jabber as the condition in which any packet exceeds
20 ms. The allowed range to detect jabber is from 20 ms to 150 ms.
• Fragment frames—Total number of packets that were less than 64 octets in
length (excluding framing bits, but including FCS octets), and had either an
FCS error or an alignment error. Fragment frames normally increment because
both runts (which are normal occurrences caused by collisions) and noise
hits are counted.
• VLAN tagged frames—Number of frames that are VLAN tagged. The system
uses the TPID of 0x8100 in the frame to determine whether a frame is tagged
or not.
• Code violations—Number of times an event caused the PHY to indicate “Data
reception error” or “invalid data symbol error.”
OTN Received APS/PCC0: 0x02, APS/PCC1: 0x11, APS/PCC2: 0x47, APS/PCC3: 0x58 Payload extensive
Overhead Bytes Type: 0x08
OTN Transmitted APS/PCC0: 0x00, APS/PCC1: 0x00, APS/PCC2: 0x00, APS/PCC3: 0x00 Payload extensive
Overhead Bytes Type: 0x08
861
Filter statistics Receive and Transmit statistics reported by the PIC's MAC address filter extensive
subsystem. The filtering is done by the content-addressable memory (CAM) on
the PIC. The filter examines a packet's source and destination MAC addresses
to determine whether the packet should enter the system or be rejected.
PMA PHY (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET error information: extensive
WIS section (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET error information: extensive
WIS line (10-Gigabit Ethernet interfaces, WAN PHY mode) Active alarms and defects, extensive
plus counts of specific SONET errors with detailed information.
WIS path (10-Gigabit Ethernet interfaces, WAN PHY mode) Active alarms and defects, extensive
plus counts of specific SONET errors with detailed information.
Received path (10-Gigabit Ethernet interfaces, WAN PHY mode) SONET/SDH interfaces allow extensive
trace, path trace bytes to be sent inband across the SONET/SDH link. Juniper
Transmitted path Networks and other router manufacturers use these bytes to help diagnose
trace misconfigurations and network errors by setting the transmitted path trace
message so that it contains the system hostname and name of the physical
interface. The received path trace value is the message received from the
routing device at the other end of the fiber. The transmitted path trace value
is the message that this routing device transmits.
865
Packet Information about the configuration of the Packet Forwarding Engine: extensive
Forwarding
Engine • Destination slot—FPC slot number.
configuration
CoS information Information about the CoS queue for the physical interface. extensive
Logical Interface
Index Index number of the logical interface, which reflects its initialization sequence. detail
extensive none
SNMP ifIndex SNMP interface index number for the logical interface. detail
extensive none
Generation Unique number for use by Juniper Networks technical support only. detail
extensive
Flags Information about the logical interface. Possible values are described in the All levels
“Logical Interface Flags” section under Common Output Fields Description.
866
VLAN-Tag Rewrite profile applied to incoming or outgoing frames on the outer (Out) VLAN brief detail
tag or for both the outer and inner (In) VLAN tags. extensive none
• push—An outer VLAN tag is pushed in front of the existing VLAN tag.
• pop—The outer VLAN tag of the incoming frame is removed.
• swap—The outer VLAN tag of the incoming frame is overwritten with the
user specified VLAN tag information.
• push—An outer VLAN tag is pushed in front of the existing VLAN tag.
• push-push—Two VLAN tags are pushed in from the incoming frame.
• swap-push—The outer VLAN tag of the incoming frame is replaced by a
user-specified VLAN tag value. A user-specified outer VLAN tag is pushed
in front. The outer tag becomes an inner tag in the final frame.
• swap-swap—Both the inner and the outer VLAN tags of the incoming frame
are replaced by the user specified VLAN tag value.
• pop-swap—The outer VLAN tag of the incoming frame is removed, and the
inner VLAN tag of the incoming frame is replaced by the user-specified VLAN
tag value. The inner tag becomes the outer tag in the final frame.
• pop-pop—Both the outer and inner VLAN tags of the incoming frame are
removed.
Demux: IP demultiplexing (demux) value that appears if this interface is used as the detail
demux underlying interface. The output is one of the following: extensive none
Protocol Protocol family. Possible values are described in the “Protocol Field” section detail
under Common Output Fields Description. extensive none
Maximum labels Maximum number of MPLS labels configured for the MPLS protocol family on detail
the logical interface. extensive none
867
Traffic statistics Number and rate of bytes and packets received and transmitted on the specified detail
interface set. extensive
IPv6 transit Number of IPv6 transit bytes and packets received and transmitted on the extensive
statistics logical interface if IPv6 statistics tracking is enabled.
Local statistics Number and rate of bytes and packets destined to the routing device. extensive
Transit statistics Number and rate of bytes and packets transiting the switch. extensive
NOTE: For Gigabit Ethernet intelligent queuing 2 (IQ2) interfaces, the logical
interface egress statistics might not accurately reflect the traffic on the wire
when output shaping is applied. Traffic management output shaping might drop
packets after they are tallied by the Output bytes and Output packets interface
counters. However, correct values display for both of these egress statistics
when per-unit scheduling is enabled for the Gigabit Ethernet IQ2 physical
interface, or when a single logical interface is actively using a shared scheduler.
Generation Unique number for use by Juniper Networks technical support only. detail
extensive
Route Table Route table in which the logical interface address is located. For example, 0 detail
refers to the routing table inet.0. extensive none
Flags Information about protocol family flags. Possible values are described in the detail
“Family Flags” section under Common Output Fields Description. extensive
Donor interface (Unnumbered Ethernet) Interface from which an unnumbered Ethernet interface detail
borrows an IPv4 address. extensive none
Preferred source (Unnumbered Ethernet) Secondary IPv4 address of the donor loopback interface detail
address that acts as the preferred source address for the unnumbered Ethernet interface. extensive none
Input Filters Names of any input filters applied to this interface. If you specify a precedence detail
value for any filter in a dynamic profile, filter precedence values appear in extensive
parenthesis next to all interfaces.
868
Output Filters Names of any output filters applied to this interface. If you specify a precedence detail
value for any filter in a dynamic profile, filter precedence values appear in extensive
parenthesis next to all interfaces.
Mac-Validate Number of MAC address validation failures for packets and bytes. This field is detail
Failures displayed when MAC address validation is enabled for the logical interface. extensive none
Addresses, Flags Information about the address flags. Possible values are described in the detail
“Addresses Flags” section under Common Output Fields Description. extensive none
protocol-family Protocol family configured on the logical interface. If the protocol is inet, the brief
IP address of the interface is also displayed.
Flags Information about address flag (possible values are described in the “Addresses detail
Flags” section under Common Output Fields Description. extensive none
Generation Unique number for use by Juniper Networks technical support only. detail
extensive
For Gigabit Ethernet IQ PICs, traffic and MAC statistics output varies. The following table describes the
traffic and MAC statistics for two sample interfaces, each of which is sending traffic in packets of 500
bytes (including 478 bytes for the Layer 3 packet, 18 bytes for the Layer 2 VLAN traffic header, and 4
bytes for cyclic redundancy check [CRC] information). The ge-0/3/0 interface is the inbound physical
interface, and the ge-0/0/0 interface is the outbound physical interface. On both interfaces, traffic is
carried on logical unit .50 (VLAN 50).
869
Table 15: Gigabit and 10 Gigabit Ethernet IQ PIC Traffic and MAC Statistics by Interface Type
Inbound physical interface show interfaces ge-0/3/0 Traffic statistics: The additional 4 bytes are
extensive for the CRC.
Input bytes: 496 bytes per
packet, representing the
Layer 2 packet
MAC statistics:
Outbound physical show interfaces ge-0/0/0 Traffic statistics: For input bytes, the
interface extensive additional 12 bytes include
Input bytes: 490 bytes per
6 bytes for the destination
packet, representing the
MAC address plus 4 bytes
Layer 3 packet + 12 bytes
for VLAN plus 2 bytes for
Table 16 on page 870 lists the output fields for the show interfaces command. Output fields are listed in
the approximate order in which they appear.
870
Physical Interface
Interface index Index number of the physical interface, which reflects its initialization detail extensive none
sequence.
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Link-level type Encapsulation being used on the physical interface. All levels
Generation Unique number for use by Juniper Networks technical support only. detail extensive
MTU Maximum transmission unit size on the physical interface. All levels
BPDU error Bridge protocol data unit (BPDU) error: Detected or None
Loopback Loopback status: Enabled or Disabled. If loopback is enabled, type of All levels
loopback: Local or Remote.
Auto-negotiation (Gigabit Ethernet interfaces) Autonegotiation status: Enabled or Disabled. All levels
Last flapped Date, time, and how long ago the interface went from down to up. The detail extensive none
format is Last flapped: year-month-day hour:minute:second:timezone
(hour:minute:second ago). For example, Last flapped: 2002-04-26 10:52:40
PDT (04:33:20 ago).
Input Rate Input rate in bits per second (bps) and packets per second (pps). None
Active alarms and Ethernet-specific defects that can prevent the interface from passing detail extensive none
Active defects packets. When a defect persists for a certain amount of time, it is
promoted to an alarm. These fields can contain the value None or Link.
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
physical interface.
Ingress queues Total number of ingress queues supported on the specified interface. extensive
Queue counters and CoS queue number and its associated user-configured forwarding class detail extensive
queue number name.
MAC statistics Receive and Transmit statistics reported by the PIC's MAC subsystem, extensive
including the following:
Filter statistics Receive and Transmit statistics reported by the PIC's MAC address filter extensive
subsystem. The filtering is done by the content-addressable memory
(CAM) on the PIC. The filter examines a packet's source and destination
MAC addresses to determine whether the packet should enter the system
or be rejected.
Packet Forwarding Information about the configuration of the Packet Forwarding Engine: extensive
Engine configuration
• Destination slot—FPC slot number.
CoS information Information about the CoS queue for the physical interface. extensive
Queue counters CoS queue number and its associated user-configured forwarding class detail extensive
(Egress) name.
Logical Interface
Index Index number of the logical interface, which reflects its initialization detail extensive none
sequence.
SNMP ifIndex SNMP interface index number for the logical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
specified interface set.
Local statistics Number and rate of bytes and packets destined to the device. extensive
Transit statistics Number and rate of bytes and packets transiting the switch. extensive
MTU Maximum transmission unit size on the logical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route Table Route table in which the logical interface address is located. For example, detail extensive none
0 refers to the routing table inet.0.
Addresses, Flags Information about the address flags.. detail extensive none
Destination IP address of the remote side of the connection. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
show interfaces extensive (Gigabit Ethernet on MX Series Routers showing interface transmit statistics
configuration)
user@host> show interfaces ge-2/1/2 extensive | match "output|interface"
Logical interface ge-2/1/2.0 (Index 331) (SNMP ifIndex 955) (Generation 146)
Output bytes : 195560312716 522726272 bps
Output packets: 4251311146 1420451 pps
Logical interface ge-5/2/0.0 (Index 71) (SNMP ifIndex 573) (Generation 135)
Flags: SNMP-Traps 0x4000 Encapsulation: ENET2
Egress account overhead: 100
Ingress account overhead: 90
Traffic statistics:
Input bytes : 271524
Output bytes : 37769598
Input packets: 3664
Output packets: 885790
IPv6 transit statistics:
Input bytes : 0
Output bytes : 16681118
Input packets: 0
Output packets: 362633
Local statistics:
Input bytes : 271524
Output bytes : 308560
Input packets: 3664
882
Logical interface ge-3/0/2.0 (Index 72) (SNMP ifIndex 69) (Generation 140)
Flags: SNMP-Traps 0x4000
VLAN-Tag [0x8100.512 0x8100.513 ] In(pop-swap 0x8100.530)
Out(swap-push 0x8100.512 0x8100.513)
Encapsulation: VLAN-CCC
Egress account overhead: 100
Ingress account overhead: 90
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
884
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol ccc, MTU: 1522, Generation: 149, Route table: 0
Flags: Is-Primary
Direction : Input
CoS transmit queue Bandwidth Buffer Priority Limit
% bps % usec
0 best-effort 95 950000000 95 0 low none
Logical interface ge-7/1/3.0 (Index 70) (SNMP ifIndex 85) (Generation 150)
Flags: SNMP-Traps Encapsulation: ENET2
Traffic statistics:
Input bytes : 812400
Output bytes : 1349206
Input packets: 9429
Output packets: 9449
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 812400
Output bytes : 1349206
Input packets: 9429
Output packets: 9449
Transit statistics:
Input bytes : 0 7440 bps
Output bytes : 0 7888 bps
Input packets: 0 10 pps
Output packets: 0 11 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 1500, Generation: 169, Route table: 0
Flags: Is-Primary, Mac-Validate-Strict
Mac-Validate Failures: Packets: 0, Bytes: 0
Addresses, Flags: Is-Preferred Is-Primary
Input Filters: F1-ge-3/0/1.0-in, F3-ge-3/0/1.0-in
Output Filters: F2-ge-3/0/1.0-out (53)
Destination: 203.0.113/24, Local: 203.0.113.2, Broadcast: 203.0.113.255,
Generation: 196
888
NOTE: For Gigabit Ethernet intelligent queuing 2 (IQ2) interfaces, the logical interface egress statistics
displayed in the show interfaces command output might not accurately reflect the traffic on the wire
when output shaping is applied. Traffic management output shaping might drop packets after they are
tallied by the interface counters. For detailed information, see the description of the logical interface
Transit statistics fields in Table 14 on page 831.
Logical interface ge-1/0/0.10 (Index 346) (SNMP ifIndex 554) (Generation 155)
Flags: Up SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.10 ] Encapsulation: ENET2
Line Identity:
Dynamic Profile: ali-set-profile
Circuit-id Remote-id Accept-no-ids
PPPoE:
Dynamic Profile: ali-vlan-pppoe-profile,
Service Name Table: None,
Max Sessions: 32000, Max Sessions VSA Ignore: Off,
Duplicate Protection: On, Short Cycle Protection: Off,
Direct Connect: Off,
AC Name: nbc
Input packets : 9
Output packets: 8
Protocol multiservice, MTU: Unlimited
% bps % usec
0 best-effort 95 950000000 95 0 low none
3 network-control 5 50000000 5 0 low none
Logical interface xe-5/0/0.0 (Index 71) (SNMP ifIndex 95) (Generation 195)
Flags: SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.100 ] Encapsulation: ENET2
Egress account overhead: 100
Ingress account overhead: 90
Traffic statistics:
Input bytes : 0
Output bytes : 46
Input packets: 0
Output packets: 1
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 46
Input packets: 0
Output packets: 1
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 1500, Generation: 253, Route table: 0
Addresses, Flags: Is-Preferred Is-Primary
Destination: 192.0.2/24, Local: 192.0.2.1, Broadcast: 192.0.2.255,
Generation: 265
Protocol multiservice, MTU: Unlimited, Generation: 254, Route table: 0
Flags: None
Policer: Input: __default_arp_policer__
FIFO errors 0 0
MAC control frames 0 0
MAC pause frames 0 0
Oversized frames 0
Jabber frames 0
Fragment frames 0
VLAN tagged frames 0
Code violations 0
Filter statistics:
Input packet count 0
Input packet rejects 0
Input DA rejects 0
Input SA rejects 0
Output packet count 0
Output packet pad count 0
Output packet error count 0
CAM destination filters: 0, CAM source filters: 0
PMA PHY: Seconds Count State
PLL lock 0 0 OK
PHY light 63159 1 Light Missing
WIS section:
BIP-B1 0 0
SEF 434430 434438 Defect Active
LOS 434430 1 Defect Active
LOF 434430 1 Defect Active
ES-S 434430
SES-S 434430
SEFS-S 434430
WIS line:
BIP-B2 0 0
REI-L 0 0
RDI-L 0 0 OK
AIS-L 434430 1 Defect Active
BERR-SF 0 0 OK
BERR-SD 0 0 OK
ES-L 434430
SES-L 434430
UAS-L 434420
ES-LFE 0
SES-LFE 0
UAS-LFE 0
WIS path:
BIP-B3 0 0
REI-P 0 0
895
LOP-P 0 0 OK
AIS-P 434430 1 Defect Active
RDI-P 0 0 OK
UNEQ-P 0 0 OK
PLM-P 0 0 OK
ES-P 434430
SES-P 434430
UAS-P 434420
ES-PFE 0
SES-PFE 0
UAS-PFE 0
Received path trace:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Transmitted path trace: orissa so-1/0/0
6f 72 69 73 73 61 20 73 6f 2d 31 2f 30 2f 30 00 orissa so-1/0/0.
Packet Forwarding Engine configuration:
Destination slot: 1
CoS information:
CoS transmit queue Bandwidth Buffer Priority Limit
% bps % bytes
0 best-effort 95 950000000 95 0 low none
3 network-control 5 50000000 5 0 low none
Unicast packets 0 0
Broadcast packets 0 0
Multicast packets 0 0
CRC/Align errors 0 0
FIFO errors 0 0
MAC control frames 0 0
MAC pause frames 0 0
Oversized frames 0
Jabber frames 0
Fragment frames 0
VLAN tagged frames 0
Code violations 0
OTN alarms : None
OTN defects : None
OTN FEC Mode : GFEC
OTN Rate : Fixed Stuff Bytes 11.0957Gbps
OTN Line Loopback : Enabled
OTN FEC statistics :
Corrected Errors 0
Corrected Error Ratio ( 0 sec average) 0e-0
OTN FEC alarms: Seconds Count State
FEC Degrade 0 0 OK
FEC Excessive 0 0 OK
OTN OC: Seconds Count State
LOS 2 1 OK
LOF 67164 2 Defect Active
LOM 67164 71 Defect Active
Wavelength Lock 0 0 OK
OTN OTU:
AIS 0 0 OK
BDI 65919 4814 Defect Active
IAE 67158 1 Defect Active
TTIM 7 1 OK
SF 67164 2 Defect Active
SD 67164 3 Defect Active
TCA-ES 0 0 OK
TCA-SES 0 0 OK
TCA-UAS 80 40 OK
TCA-BBE 0 0 OK
BIP 0 0 OK
BBE 0 0 OK
ES 0 0 OK
SES 0 0 OK
UAS 587 0 OK
898
Received DAPI:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Received SAPI:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Transmitted DAPI:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
Transmitted SAPI:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
OTN Received Overhead Bytes:
APS/PCC0: 0x02, APS/PCC1: 0x42, APS/PCC2: 0xa2, APS/PCC3: 0x48
Payload Type: 0x03
OTN Transmitted Overhead Bytes:
APS/PCC0: 0x00, APS/PCC1: 0x00, APS/PCC2: 0x00, APS/PCC3: 0x00
Payload Type: 0x03
Filter statistics:
Input packet count 0
Input packet rejects 0
Input DA rejects 0
Input SA rejects 0
Output packet count 0
Output packet pad count 0
Output packet error count 0
CAM destination filters: 0, CAM source filters: 0
Packet Forwarding Engine configuration:
Destination slot: 7
CoS information:
Direction : Output
CoS transmit queue Bandwidth Buffer Priority
Limit
% bps % usec
0 best-effort 95 9500000000 95 0 low
none
3 network-control 5 500000000 5 0 low
none
...
show interfaces extensive (10-Gigabit Ethernet, LAN PHY Mode, Unidirectional Mode)
user@host> show interfaces xe-7/0/0 extensive
show interfaces extensive (10-Gigabit Ethernet, LAN PHY Mode, Unidirectional Mode, Transmit-Only)
user@host> show interfaces xe-7/0/0–tx extensive
...
Filter statistics:
Output packet count 328810554250
Output packet pad count 0
Output packet error count 0
...
Logical interface xe-7/0/0-tx.0 (Index 73) (SNMP ifIndex 138) (Generation 139)
Flags: SNMP-Traps Encapsulation: ENET2
Egress account overhead: 100
Ingress account overhead: 90
Traffic statistics:
Input bytes : 0
Output bytes : 322891152287160
Input packets: 0
Output packets: 328809727380
IPv6 transit statistics:
900
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 322891152287160 9627472888 bps
Input packets: 0 0 pps
Output packets: 328809727380 1225492 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 1500, Generation: 147, Route table: 0
Addresses, Flags: Is-Preferred Is-Primary
Destination: 10.11.12/24, Local: 10.11.12.13, Broadcast: 10.11.12.255,
Generation: 141
Protocol multiservice, MTU: Unlimited, Generation: 148, Route table: 0
Flags: None
Policer: Input: __default_arp_policer__
show interfaces extensive (10-Gigabit Ethernet, LAN PHY Mode, Unidirectional Mode, Receive-Only)
user@host> show interfaces xe-7/0/0–rx extensive
...
Filter statistics:
Input packet count 328775015056
Input packet rejects 1
Input DA rejects 0
...
Logical interface xe-7/0/0-rx.0 (Index 72) (SNMP ifIndex 120) (Generation 138)
Flags: SNMP-Traps Encapsulation: ENET2
Traffic statistics:
Input bytes : 322857456303482
Output bytes : 0
Input packets: 328775413751
Output packets: 0
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 322857456303482 9627496104 bps
Output bytes : 0 0 bps
Input packets: 328775413751 1225495 pps
Output packets: 0 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 1500, Generation: 145, Route table: 0
Addresses, Flags: Is-Preferred Is-Primary
Destination: 192.0.2/24, Local: 192.0.2.1, Broadcast: 192.0.2.255,
902
Generation: 139
Protocol multiservice, MTU: Unlimited, Generation: 146, Route table: 0
Flags: None
Policer: Input: __default_arp_policer__
Sample Output
Sample Output SRX Gigabit Ethernet
user@host> show interfaces ge-0/0/1
Logical interface ge-0/0/1.0 (Index 71) (SNMP ifIndex 514) (Generation 136)
Flags: Device-Down SNMP-Traps 0x0 Encapsulation: ENET2
905
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Security: Zone: public
Flow Statistics :
Flow Input statistics :
Self packets : 0
ICMP packets : 0
VPN packets : 0
Multicast packets : 0
Bytes permitted by policy : 0
Connections established : 0
Flow Output statistics:
Multicast packets : 0
Bytes permitted by policy : 0
Flow error statistics (Packets dropped due to):
Address spoofing: 0
Authentication failed: 0
Incoming NAT errors: 0
Invalid zone received packet: 0
Multiple user authentications: 0
Multiple incoming NAT: 0
No parent for a gate: 0
No one interested in self packets: 0
No minor session: 0
No more sessions: 0
No NAT gate: 0
No route present: 0
No SA for incoming SPI: 0
No tunnel found: 0
No session for a gate: 0
No zone or NULL zone binding 0
906
Policy denied: 0
Security association not active: 0
TCP sequence number out of window: 0
Syn-attack protection: 0
User authentication errors: 0
Protocol inet, MTU: 1500, Generation: 150, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Dest-route-down Is-Preferred Is-Primary
Destination: 1.1.1/24, Local: 1.1.1.1, Broadcast: 1.1.1.255, Generation:
150
Logical interface st0.0 (Index 71) (SNMP ifIndex 609) (Generation 136)
Flags: Up Point-To-Point SNMP-Traps Encapsulation: Secure-Tunnel
Traffic statistics:
Input bytes : 528152756774
Output bytes : 575950643520
Input packets: 11481581669
Output packets: 12520666095
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 121859888 bps
Output bytes : 0 128104112 bps
Input packets: 0 331141 pps
Output packets: 0 348108 pps
Security: Zone: untrust
Allowed host-inbound traffic : any-service bfd bgp dvmrp igmp ldp msdp nhrp
ospf ospf3 pgm pim rip ripng router-discovery rsvp
sap vrrp
Flow Statistics :
Flow Input statistics :
Self packets : 0
ICMP packets : 0
VPN packets : 0
Multicast packets : 0
Bytes permitted by policy : 525984295844
Connections established : 7
907
Logical interface ge-0/0/1.0 (Index 71) (SNMP ifIndex 514) (Generation 136)
Flags: Device-Down SNMP-Traps 0x0 Encapsulation: ENET2
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Security: Zone: public
910
Flow Statistics :
Flow Input statistics :
Self packets : 0
ICMP packets : 0
VPN packets : 0
Multicast packets : 0
Bytes permitted by policy : 0
Connections established : 0
Flow Output statistics:
Multicast packets : 0
Bytes permitted by policy : 0
Flow error statistics (Packets dropped due to):
Address spoofing: 0
Authentication failed: 0
Incoming NAT errors: 0
Invalid zone received packet: 0
Multiple user authentications: 0
Multiple incoming NAT: 0
No parent for a gate: 0
No one interested in self packets: 0
No minor session: 0
No more sessions: 0
No NAT gate: 0
No route present: 0
No SA for incoming SPI: 0
No tunnel found: 0
No session for a gate: 0
No zone or NULL zone binding 0
Policy denied: 0
Security association not active: 0
TCP sequence number out of window: 0
Syn-attack protection: 0
User authentication errors: 0
Protocol inet, MTU: 1500, Generation: 150, Route table: 0
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Dest-route-down Is-Preferred Is-Primary
Destination: 1.1.1/24, Local: 1.1.1.1, Broadcast: 1.1.1.255,
Generation: 150
ge-0/0/2 up up
e-0/0/3 up up
ge-0/0/4 up up
ge-15/0/0 up up SMB-OSPF_Area100
ge-15/0/1 up up GSR-13#3
04:30-04:45:
ES-L: 0, SES-L: 0, UAS-L: 0
04:15-04:30:
ES-L: 0, SES-L: 0, UAS-L: 0
04:00-04:15:
...
vt-0/3/0 up up
at-1/0/0 up up
at-1/0/0.0 up up inet
iso
at-1/1/0 up down
at-1/1/0.0 up down inet
iso
....
No minor session: 0
No more sessions: 0
No NAT gate: 0
No route present: 0
No SA for incoming SPI: 0
No tunnel found: 0
No session for a gate: 0
No zone or NULL zone binding 0
Policy denied: 0
Security association not active: 0
TCP sequence number out of window: 0
Syn-attack protection: 0
User authentication errors: 0
Protocol inet, MTU: 1500
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 203.0.113.1/24, Local: 203.0.113.2, Broadcast: 2.2.2.255
so-2/1/0 up down
...
The following truncated example shows the CoS queue sizes for queues 0, 1, and 3. Queue 1 has a queue
buffer size (guaranteed allocated memory) of 9192 bytes.
Medium-high : 0 0 bps
High : 0 0 bps
Queue Buffer Usage:
Reserved buffer : 118750000 bytes
Queue-depth bytes :
Current : 0
..
..
Queue: 1, Forwarding classes: class1
..
..
Queue Buffer Usage:
Reserved buffer : 9192 bytes
Queue-depth bytes :
Current : 0
..
..
Queue: 3, Forwarding classes: class3
Queued:
..
..
Queue Buffer Usage:
Reserved buffer : 6250000 bytes
Queue-depth bytes :
Current : 0
..
..
Interface : rlsq0
State : On primary
Last change : 00:45:47
Primary : lsq-0/2/0
Secondary : lsq-1/2/0
Current status : both up
Mode : hot-standby
Interface : rlsq0:0
State : On primary
Last change : 00:45:46
Primary : lsq-0/2/0:0
Secondary : lsq-1/2/0:0
Current status : both up
Mode : warm-standby
so-5/0/3.0
Index: 15, Refcount: 2, State: Up <Broadcast PointToPoint Multicast> Change:<>
Metric: 0, Up/down transitions: 0, Full-duplex
Link layer: HDLC serial line Encapsulation: PPP Bandwidth: 155Mbps
ISO address (null)
State: <Broadcast PointToPoint Multicast> Change: <>
Preference: 0 (120 down), Metric: 0, MTU: 4470 bytes
so-5/0/2.0
Index: 14, Refcount: 7, State: <Up Broadcast PointToPoint Multicast> Change:<>
Metric: 0, Up/down transitions: 0, Full-duplex
Link layer: HDLC serial line Encapsulation: PPP Bandwidth: 155Mbps
MPLS address (null)
State: <Up Broadcast PointToPoint Multicast> Change: <>
Preference: 0 (120 down), Metric: 0, MTU: 4458 bytes
ISO address (null)
State: <Up Broadcast PointToPoint Multicast> Change: <>
Preference: 0 (120 down), Metric: 0, MTU: 4470 bytes
INET address 192.168.2.120
State: <Up Broadcast PointToPoint Multicast Localup> Change: <>
Preference: 0 (120 down), Metric: 0, MTU: 4470 bytes
Local address: 192.168.2.120
Destination: 192.168.2.110/32
INET address (null)
State: <Up Broadcast PointToPoint Multicast> Change: <>
Preference: 0 (120 down), Metric: 0, MTU: 4470 bytes
...
( 0) ( 0)
silver 116113 9753492
( 939) ( 631616)
OTU-BBE 0 800 No No
OTU-ES 0 135 No No
OTU-SES 0 90 No No
OTU-UAS 427 90 No No
Far End Suspect Flag:True Reason:Unknown
PM COUNT THRESHOLD TCA-ENABLED TCA-RAISED
OTU-BBE 0 800 No No
930
OTU-ES 0 135 No No
OTU-SES 0 90 No No
OTU-UAS 0 90 No No
Near End Suspect Flag:False Reason:None
PM COUNT THRESHOLD TCA-ENABLED TCA-RAISED
ODU-BBE 0 800 No No
ODU-ES 0 135 No No
ODU-SES 0 90 No No
ODU-UAS 427 90 No No
Far End Suspect Flag:True Reason:Unknown
PM COUNT THRESHOLD TCA-ENABLED TCA-RAISED
ODU-BBE 0 800 No No
ODU-ES 0 135 No No
ODU-SES 0 90 No No
ODU-UAS 0 90 No No
FEC Suspect Flag:False Reason:None
PM COUNT THRESHOLD TCA-ENABLED TCA-RAISED
FEC-CorrectedErr 2008544300 0 NA NA
FEC-UncorrectedWords 0 0 NA NA
BER Suspect Flag:False Reason:None
PM MIN MAX AVG THRESHOLD TCA-ENABLED
TCA-RAISED
BER 3.6e-5 5.8e-5 3.6e-5 10.0e-3 No
Yes
Physical interface: et-0/1/0, SNMP ifIndex 515
14:45-current
Suspect Flag:True Reason:Object Disabled
PM CURRENT MIN MAX AVG THRESHOLD
TCA-ENABLED TCA-RAISED
(MIN)
(MAX) (MIN) (MAX) (MIN) (MAX)
Lane chromatic dispersion 0 0 0 0 0
0 NA NA NA NA
Lane differential group delay 0 0 0 0 0
0 NA NA NA NA
q Value 120 120 120 120 0
0 NA NA NA NA
SNR 28 28 29 28 0
0 NA NA NA NA
Tx output power(0.01dBm) -5000 -5000 -5000 -5000 -300
-100 No No No No
931
Release Information
Command introduced before Junos OS Release 7.4.
Description
(M Series and T Series routers only) Display status information about the specified ATM interface.
Options
at-fpc/pic/port—Display standard information about the specified ATM interface.
Output Fields
Table 17 on page 933 lists the output fields for the show interfaces (ATM) command. Output fields are
listed in the approximate order in which they appear.
Physical Interface
Enabled State of the interface. Possible values are described in the “Enabled Field” All levels
section under Common Output Fields Description.
Interface index Physical interface's index number, which reflects its initialization sequence. detail extensive
none
SNMP ifIndex SNMP index number for the physical interface. detail extensive
none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
934
Link-level type Encapsulation being used on the physical interface: All levels
Speed Speed at which the interface is running as represented by the interface All levels
type (for example, OC3, ADSL2+, and SHDSL(2-wire).
Loopback Whether loopback is enabled and the type of loopback (local or remote). All levels
Device flags Information about the physical device. Possible values are described in All levels
the “Device Flags” section under Common Output Fields Description.
Link flags Information about the link. Possible values are described in the “Link Flags” All levels
section under Common Output Fields Description.
935
Hold-times Current interface hold-time up and hold-time down, in milliseconds. detail extensive
Current address Ethernet MAC address for this interface for Ethernet over ATM detail extensive none
encapsulation.
Last flapped Date, time, and how long ago the interface went from down to up. The detail extensive none
format is Last flapped: year-month-day hour:minute:second timezone
(hour:minute:second ago). For example, Last flapped: 2002-04-26 10:52:40
PDT (04:33:20 ago).
Input Rate Input rate in bits per second (bps) and packets per second (pps). None specified
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Input errors Input errors on the interface whose definitions are as follows: extensive
Output errors Output errors on the interface. The following paragraphs explain the extensive
counters whose meaning might not be obvious:
Egress queues Total number of egress queues supported on the specified interface. detail extensive
Queue counters CoS queue number and its associated user-configured forwarding class detail extensive
name.
SONET alarms SONET media-specific defects that prevent the interface from passing detail extensive
packets. When a defect persists for a certain period, it is promoted to an none
SONET defects
alarm. Based on the router configuration, an alarm can ring the red or
yellow alarm bell on the router or light the red or yellow alarm LED on
the craft interface. See these fields for possible alarms and defects: SONET
PHY, SONET section, SONET line, and SONET path.
SONET PHY Counts of specific SONET errors with detailed information. extensive
SONET section Counts of specific SONET errors with detailed information. extensive
SONET line Active alarms and defects, plus counts of specific SONET errors with extensive
detailed information.
SONET path Active alarms and defects, plus counts of specific SONET errors with extensive
detailed information.
Received SONET Values of the received and transmitted SONET overhead: extensive
overhead
• C2—Signal label. Allocated to identify the construction and content of
Transmitted the STS-level SPE and for PDI-P.
SONET overhead • F1—Section user channel byte. This byte is set aside for the purposes
of users.
• K1 and K2—These bytes are allocated for APS signaling for the
protection of the multiplex section.
• J0—Section trace. This byte is defined for STS-1 number 1 of an STS-N
signal. Used to transmit a 1-byte fixed-length string or a 16-byte
message so that a receiving terminal in a section can verify its continued
connection to the intended transmitter.
• S1—Synchronization status. The S1 byte is located in the first STS-1 of
an STS-N.
• Z3 and Z4—Allocated for future use.
941
SDH alarms SDH media-specific defects that can prevent the interface from passing All levels
packets. When a defect persists for a certain period, it is promoted to an
SDH defects
alarm. Based on the router configuration, an alarm can ring the red or
yellow alarm bell on the router or light the red or yellow alarm LED on
the craft interface. See these fields for possible alarms and defects: SDH
PHY, SDH regenerator section, SDH multiplex section, and SDH path.
SDH PHY Active alarms and defects, plus counts of specific SDH errors with detailed extensive
information.
SDH regenerator Active alarms and defects, plus counts of specific SDH errors with detailed extensive
section information.
SDH multiplex Active alarms and defects, plus counts of specific SDH errors with detailed extensive
section information.
SDH path Active alarms and defects, plus counts of specific SDH errors with detailed extensive
information.
Received SDH Values of the received and transmitted SONET overhead: extensive
overhead
• C2—Signal label. This byte is allocated to identify the construction and
Transmitted SDH content of the STS-level SPE and for PDI-P.
overhead • F1—Section user channel byte. This byte is set aside for the purposes
of users.
• K1 and K2—These bytes are allocated for APS signaling for the
protection of the multiplex section.
• J0—Section trace. This byte is defined for STS-1 number 1 of an STS-N
signal. This bye is used to transmit a 1-byte fixed-length string or a
16-byte message so that a receiving terminal in a section can verify its
continued connection to the intended transmitter.
• S1—Synchronization status. The S1 byte is located in the first STS-1 of
an STS-N.
• Z3 and Z4—These bytes are allocated for future use.
944
Received path SONET/SDH interfaces allow path trace bytes to be sent inband across extensive
trace the SONET/SDH link. Juniper Networks and other router manufacturers
use these bytes to help diagnose misconfigurations and network errors
Transmitted path
by setting the transmitted path trace message so that it contains the
trace
system hostname and name of the physical interface. The received path
trace value is the message received from the router at the other end of
the fiber. The transmitted path trace value is the message that this router
transmits.
• HCS State—Status of the header check sequence. ATM uses the HCS
field in the cell header in the cell delineation process to frame ATM cell
boundaries. The HCS is an FCS-8 calculation over the first four octets
of the ATM cell header.
• LOC—Current loss of cell (LOC) delineation state. OK means that no
LOC is currently asserted.
945
Packet Information about the configuration of the Packet Forwarding Engine: extensive
Forwarding
Engine • Destination slot—FPC slot number.
configuration
CoS information Information about the CoS queue for the physical interface. extensive
Traffic statistics:
Logical Interface
Index Logical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the logical interface. Possible values are described in All levels
the “Logical Interface Flags” section under Common Output Fields
Description.
Input packets Number of packets received on the logical interface. None specified
Output packets Number of packets transmitted on the logical interface. None specified
Traffic statistics Total number of bytes and packets received and transmitted on the logical detail extensive
interface. These statistics are the sum of the local and transit statistics.
When a burst of traffic is received, the value in the output packet rate
field might briefly exceed the peak cell rate. It takes a while (generally,
less than 1 second) for this counter to stabilize.
Local statistics Statistics for traffic received from and transmitted to the Routing Engine. detail extensive
When a burst of traffic is received, the value in the output packet rate
field might briefly exceed the peak cell rate. It takes a while (generally,
less than 1 second) for this counter to stabilize.
Transit statistics Statistics for traffic transiting the router. When a burst of traffic is detail extensive
received, the value in the output packet rate field might briefly exceed
the peak cell rate. It takes a while (generally, less than 1 second) for this
counter to stabilize.
Input packets Number of packets received on the logical interface. None specified
Output packets Number of packets transmitted on the logical interface. None specified
protocol-family Protocol family configured on the logical interface. If the protocol is inet, brief
the IP address of the interface is also displayed.
950
Protocol Protocol family configured on the logical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route table Routing table in which the logical interface address is located. For example, detail extensive
0 refers to the routing table inet.0.
Flags Information about the protocol family flags. Possible values are described detail extensive none
in the “Family Flags” section under Common Output Fields Description.
Addresses, Flags Information about the address flags. Possible values are described in the detail extensive none
“Addresses Flags” section under Common Output Fields Description.
Destination IP address of the remote side of the connection. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
951
• Flags—VCI flags:
• Active—VCI is up and in working condition.
• CCC down—VCI CCC is not in working condition.
• Closed—VCI is closed because the user disabled the logical or physical
interface from the CLI.
• Configured—VCI is configured.
• Down—VCI is not in working condition. The VCI might have alarms,
defects, F5 AIS/RDI, or no response to OAM loopback cells.
• ILMI—VCI is up and in working condition.
• OAM—OAM loopback is enabled.
• Multicast—VCI is a multicast VCI or DLCI.
• Multipoint destination—VCI is configured as a multipoint destination.
• None—No VCI flags.
• Passive-OAM—Passive OAM is enabled.
• Shaping—Shaping is enabled.
• Sustained—Shaping rate is set to Sustained.
• Unconfigured—VCI is not configured.
• Total down time—Total number of seconds the VCI has been down,
using the format Total down time: hh:mm:ss orNever.
• Last down—Time of last Down transition, using the format Last down:
hh:mm:ss.
• EPD threshold—(ATM2 only) Threshold at which a packet is dropped
when the queue size (in number of cells) exceeds the early
packet-discard (EPD) value.
952
VCI (continued) • Transmit weight cells—(ATM2 only) Amount of bandwidth assigned to All levels
this queue.
• ATM per-VC transmit statistics:
• Tail queue packet drops—Number of packets dropped because of
bandwidth constraints. This value indicates that packets are queued
to send out at a rate faster than allowed.
IMA group • Version—The specified IMA specification version, either IMA 1.0 or detail extensive none
properties IMA 1.1.
• Frame length—The specified frame size, which can be 32, 64, 128, or
256.
• Differential delay—Maximum differential delay among links in
milliseconds.
• Symmetry—Either Common Transmit Clock or Independent Transmit
Clock timing mode.
• Transmit clock—The specified IMA clock mode, either common or
independent.
• Minimum links—The number of minimum active links specified in both
transmit and receive directions.
• Transmit—The per-PIC limit on the number of minimum active links
in the transmit direction.
• Receive—The per-PIC limit on the number of minimum active links
in the receive direction.
IMA Group state Near-end and far-end group status detail extensive none
IMA group media IMA group media status, including seconds, count and state for the detail extensive none
following media parameters:
• FC
• FC-FE
• Addr-Mismatch
• Running
• UAS
Sample Output
show interfaces (ATM, IMA Group)
user@host> show interfaces at-1/0/0
Version : 1.1
Frame length : 128
Differential delay : 25 milliseconds
Symmetry : Symmetrical Configuration and Operation
Transmit clock : Common
Minimum links : Transmit: 1, Receive: 1
Frame synchronization: Alpha: 2, Beta: 2, Gamma: 1
Link #1 : t1-0/0/4 up
IMA Group alarms : None
IMA Group defects : None
L2 circuit cell bundle size: 1, bundle timeout: 125 usec, timeout count: 0
L2 circuit out-of-sequence count: 0, denied packets count: 0
BERR-SF 0 0 OK
BERR-SD 0 0 OK
ES-L 0
SES-L 0
UAS-L 0
ES-LFE 0
SES-LFE 0
UAS-LFE 0
SONET path:
BIP-B3 0 0
REI-P 0 0
LOP-P 0 0 OK
AIS-P 0 0 OK
RDI-P 0 0 OK
UNEQ-P 1 1 OK
PLM-P 0 0 OK
ES-P 1
SES-P 1
UAS-P 0
ES-PFE 0
SES-PFE 0
UAS-PFE 0
Received SONET overhead:
F1 : 0x00, J0 : 0x00, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, C2(cmp) : 0x13, F2 : 0x00
Z3 : 0x00, Z4 : 0x00, S1(cmp) : 0x00
Transmitted SONET overhead:
F1 : 0x00, J0 : 0x01, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, F2 : 0x00, Z3 : 0x00
Z4 : 0x00
ATM status:
HCS state: Sync
LOC : OK
ATM Statistics:
Uncorrectable HCS errors: 0, Correctable HCS errors: 0,
Tx cell FIFO overruns: 0, Rx cell FIFO overruns: 0,
Rx cell FIFO underruns: 0, Input cell count: 0, Output cell count: 0,
Output idle cell count: 0, Output VC queue drops: 0, Input no buffers: 0,
Input length errors: 0, Input timeouts: 0, Input invalid VCs: 0,
Input bad CRCs: 0, Input OAM cell no buffers: 0
Packet Forwarding Engine configuration:
Destination slot: 1
CoS information:
CoS transmit queue Bandwidth Buffer Priority Limit
962
% bps % usec
0 best-effort 95 147744000 95 0 low none
3 network-control 5 7776000 5 0 low none
Logical interface at-0/2/1.0 (Index 75) (SNMP ifIndex 51) (Generation 25)
Flags: Point-To-Point SNMP-Traps 0x4000 Encapsulation: ATM-SNAP
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 4470, Generation: 62, Route table: 0
Flags: None
966
MS-FEBE 1 17476
MS-FERF 2 1 OK
MS-AIS 2 1 OK
BERR-SF 0 0 OK
BERR-SD 0 0 OK
MS-ES 4
MS-SES 2
MS-UAS 0
MS-ES-FE 3
MS-SES-FE 2
MS-UAS-FE 0
SDH path:
HP-BIP8 1 6
HP-FEBE 1 251
HP-LOP 0 0 OK
HP-AIS 2 1 OK
HP-FERF 3 2 OK
HP-UNEQ 1 1 OK
HP-PLM 2 1 OK
HP-ES 4
HP-SES 3
HP-UAS 0
HP-ES-FE 3
HP-SES-FE 3
HP-UAS-FE 0
Received SDH overhead:
F1 : 0x00, J0 : 0x00, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, C2(cmp) : 0x13, F2 : 0x00
Z3 : 0x00, Z4 : 0x00, S1(cmp) : 0x00
Transmitted SDH overhead:
F1 : 0x00, J0 : 0x01, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, F2 : 0x00, Z3 : 0x00
Z4 : 0x00
ATM status:
HCS state: Sync
LOC : OK
ATM Statistics:
Uncorrectable HCS errors: 0, Correctable HCS errors: 0,
Tx cell FIFO overruns: 0, Rx cell FIFO overruns: 0,
Rx cell FIFO underruns: 0, Input cell count: 0, Output cell count: 0,
Output idle cell count: 0, Output VC queue drops: 0, Input no buffers: 0,
Input length errors: 0, Input timeouts: 0, Input invalid VCs: 0,
Input bad CRCs: 0, Input OAM cell no buffers: 0
Packet Forwarding Engine configuration:
969
Destination slot: 0
VPI 0
Flags: Active
Total down time: 0 sec, Last down: Never
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Logical interface at-0/2/1.0 (Index 75) (SNMP ifIndex 51) (Generation 25)
Flags: Point-To-Point SNMP-Traps 0x4000 Encapsulation: ATM-SNAP
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 4470, Generation: 62, Route table: 0
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 10.0.12.6, Local: 10.0.12.5, Broadcast: Unspecified,
Generation: 58
Protocol iso, MTU: 4470, Generation: 63, Route table: 0
Flags: None
VCI 0.128
Flags: Active
Total down time: 0 sec, Last down: Never
EPD threshold: 2129, Transmit weight cells: 0
ATM per-VC transmit statistics:
Tail queue packet drops: 0
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
970
Output packets: 0
Logical interface at-0/2/1.32767 (Index 76) (SNMP ifIndex 50) (Generation 26)
Flags: Point-To-Multipoint No-Multicast SNMP-Traps 0x4000
Encapsulation: ATM-VCMUX
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
VCI 0.4
Flags: Active
Total down time: 0 sec, Last down: Never
EPD threshold: 0, Transmit weight cells: 0
ATM per-VC transmit statistics:
Tail queue packet drops: 0
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Logical interface at-0/3/1.0 (Index 78) (SNMP ifIndex 77) (Generation 20)
Flags: Point-To-Point Copy-PLP-To-CLP SNMP-Traps 0x4000
Encapsulation: ATM-SNAP
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 4470, Generation: 38, Route table: 0
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 10.0.59.5, Local: 10.0.59.6, Broadcast: Unspecified,
Generation: 44
Protocol iso, MTU: 4470, Generation: 39, Route table: 0
Flags: None
VCI 0.128
Flags: Active
Total down time: 0 sec, Last down: Never
EPD threshold: 2129, Transmit weight cells: 10
ATM per-VC transmit statistics:
Tail queue packet drops: 0
975
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Logical interface at-0/3/1.32767 (Index 79) (SNMP ifIndex 76) (Generation 21)
Flags: Point-To-Multipoint Copy-PLP-To-CLP No-Multicast SNMP-Traps 0x4000
Encapsulation: ATM-VCMUX
Traffic statistics:
Input bytes : 360
Output bytes : 3302
Input packets: 6
Output packets: 50
Local statistics:
Input bytes : 360
Output bytes : 3302
Input packets: 6
Output packets: 50
VCI 0.16
Flags: Active, ILMI
Total down time: 0 sec, Last down: Never
EPD threshold: 0, Transmit weight cells: 0
ATM per-VC transmit statistics:
Tail queue packet drops: 0
Traffic statistics:
Input bytes : 0
Output bytes : 2640
Input packets: 0
Output packets: 44
VCI 0.4
Flags: Active, OAM
OAM, Period 30 sec, Up count: 10, Down count: 10
Total down time: 0 sec, Last down: Never
EPD threshold: 2129, Transmit weight cells: 0
ATM per-VC transmit statistics:
Tail queue packet drops: 0
Traffic statistics:
Input bytes : 312
Output bytes : 312
Input packets: 6
Output packets: 6
OAM F4 cell statistics:
Total received: 6, Total sent: 6
Loopback received: 6, Loopback sent: 6
976
SEF 0 0 OK
LOS 0 0 OK
LOF 0 0 OK
ES-S 0
SES-S 0
SEFS-S 0
SONET line:
BIP-B2 0 0
REI-L 0 0
RDI-L 0 0 OK
AIS-L 0 0 OK
BERR-SF 0 0 OK
BERR-SD 0 0 OK
ES-L 0
SES-L 0
UAS-L 0
ES-LFE 0
SES-LFE 0
UAS-LFE 0
SONET path:
BIP-B3 0 0
REI-P 0 0
LOP-P 0 0 OK
AIS-P 0 0 OK
RDI-P 0 0 OK
UNEQ-P 1 1 OK
PLM-P 0 0 OK
ES-P 1
SES-P 1
UAS-P 0
ES-PFE 0
SES-PFE 0
UAS-PFE 0
Received SONET overhead:
F1 : 0x00, J0 : 0x00, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, C2(cmp) : 0x13, F2 : 0x00
Z3 : 0x00, Z4 : 0x00, S1(cmp) : 0x00
Transmitted SONET overhead:
F1 : 0x00, J0 : 0x01, K1 : 0x00, K2 : 0x00
S1 : 0x00, C2 : 0x13, F2 : 0x00, Z3 : 0x00
Z4 : 0x00
ATM status:
HCS state: Sync
LOC : OK
978
ATM Statistics:
Uncorrectable HCS errors: 0, Correctable HCS errors: 0,
Tx cell FIFO overruns: 0, Rx cell FIFO overruns: 0,
Rx cell FIFO underruns: 0, Input cell count: 0, Output cell count: 0,
Output idle cell count: 0, Output VC queue drops: 0, Input no buffers: 0,
Input length errors: 0, Input timeouts: 0, Input invalid VCs: 0,
Input bad CRCs: 0, Input OAM cell no buffers: 0
Packet Forwarding Engine configuration:
Destination slot: 0
VPI 0
Flags: Active, OAM, Shaping
CBR, Peak: 50kbps
OAM, Period 30 sec, Up count: 10, Down count: 10
Total down time: 0 sec, Last down: Never
OAM F4 cell statistics:
Total received: 10, Total sent: 10
Loopback received: 10, Loopback sent: 10
Last received: 00:00:02, Last sent: 00:00:02
RDI received: 0, RDI sent: 0
AIS received: 0
Traffic statistics:
Input bytes : 520
Output bytes : 4240
Input packets: 10
Output packets: 72
VPI 10
Flags: Active
Total down time: 0 sec, Last down: Never
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Logical interface at-0/3/1.0 (Index 78) (SNMP ifIndex 77) (Generation 20)
Flags: Point-To-Point Copy-PLP-To-CLP SNMP-Traps 0x4000
Encapsulation: ATM-SNAP
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
979
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 4470, Generation: 38, Route table: 0
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 10.0.59.5, Local: 10.0.59.6, Broadcast: Unspecified,
Generation: 44
Protocol iso, MTU: 4470, Generation: 39, Route table: 0
Flags: None
VCI 0.128
Flags: Active
Total down time: 0 sec, Last down: Never
EPD threshold: 2129, Transmit weight cells: 10
ATM per-VC transmit statistics:
Tail queue packet drops: 0
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Logical interface at-0/3/1.32767 (Index 79) (SNMP ifIndex 76) (Generation 21)
Flags: Point-To-Multipoint Copy-PLP-To-CLP No-Multicast SNMP-Traps 0x4000
Encapsulation: ATM-VCMUX
Traffic statistics:
Input bytes : 660
Output bytes : 5473
Input packets: 11
Output packets: 83
Local statistics:
Input bytes : 660
Output bytes : 5473
Input packets: 11
Output packets: 83
VCI 0.16
Flags: Active, ILMI
Total down time: 0 sec, Last down: Never
EPD threshold: 0, Transmit weight cells: 0
980
Release Information
Command introduced before Junos OS Release 7.4.
Description
(M120 routers, M320 routers, and MX Series routers only). Display status information about the PPPoE
interface.
Options
pp0.logical—Display standard status information about the PPPoE interface.
snmp-index snmp-index—(Optional) Display information for the specified SNMP index of the interface.
Output Fields
Table 18 on page 982 lists the output fields for the show interfaces (PPPoE) command. Output fields are
listed in the approximate order in which they appear.
982
Physical Interface
Enabled State of the interface. Possible values are described in the “Enabled Field” All levels
section under Common Output Fields Description.
Interface index Physical interface index number, which reflects its initialization sequence. detail extensive none
SNMP ifIndex SNMP index number for the physical interface. detail extensive none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Device flags Information about the physical device. Possible values are described in All levels
the “Device Flags” section under Common Output Fields Description.
Interface flags Information about the interface. Possible values are described in the All levels
“Interface Flags” section under Common Output Fields Description.
Link type Physical interface link type: full duplex or half duplex. All levels
Link flags Information about the interface. Possible values are described in the “Link All levels
Flags” section under Common Output Fields Description.
Input rate Input rate in bits per second (bps) and packets per second (pps). None specified
Hold-times Current interface hold-time up and hold-time down, in milliseconds. detail extensive
983
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
physical interface.
IPv6 transit Number of IPv6 transit bytes and packets received and transmitted on detail extensive
statistics the physical interface if IPv6 statistics tracking is enabled.
NOTE: These fields include dropped traffic and exception traffic, as those
fields are not separately defined.
Output errors Output errors on the interface. The following paragraphs explain the extensive
counters whose meaning might not be obvious:
• Carrier transitions —Number of times the interface has gone from down
to up. This number does not normally increment quickly, increasing
only when the cable is unplugged, the far-end system is powered down
and then up, or another problem occurs. If the number of carrier
transitions increments quickly (perhaps once every 10 seconds), then
the cable, the far-end system, or the PIM is malfunctioning.
• Errors—Sum of the outgoing frame aborts and FCS errors.
• Drops—Number of packets dropped by the output queue of the I/O
Manager ASIC. If the interface is saturated, this number increments
once for every packet that is dropped by the ASIC's RED mechanism.
• MTU errors—Number of packets whose size exceeded the MTU of the
interface.
• Resource errors—Sum of B chip Tx drops and IXP Tx net transmit drops.
Logical Interface
Index Logical interface index number (which reflects its initialization sequence). detail extensive none
SNMP ifIndex Logical interface SNMP interface index number. detail extensive none
985
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the logical interface. Possible values are described in All levels
the “Logical Interface Flags” section under Common Output Fields
Description.
Link Name of the physical interfaces for member links in an aggregated Ethernet All levels
bundle for a PPPoE over aggregated Ethernet configuration. PPPoE traffic
goes out on these interfaces.
Traffic statistics Total number of bytes and packets received and transmitted on the logical detail extensive
interface. These statistics are the sum of the local and transit statistics.
When a burst of traffic is received, the value in the output packet rate
field might briefly exceed the peak cell rate. This counter usually takes
less than 1 second to stabilize.
986
IPv6 transit Number of IPv6 transit bytes and packets received and transmitted on detail extensive
statistics the logical interface if IPv6 statistics tracking is enabled.
NOTE: The packet and byte counts in these fields include traffic that is
dropped and does not leave the router.
Local statistics Statistics for traffic received from and transmitted to the Routing Engine. detail extensive
When a burst of traffic is received, the value in the output packet rate
field might briefly exceed the peak cell rate. This counter usually takes
less than 1 second to stabilize.
Transit statistics Statistics for traffic transiting the router. When a burst of traffic is detail extensive
received, the value in the output packet rate field might briefly exceed
the peak cell rate. This counter usually takes less than 1 second to stabilize.
NOTE: The packet and byte counts in these fields include traffic that is
dropped and does not leave the router.
Keepalive (PPP and HDLC) Configured settings for keepalives. detail extensive
settings
• interval seconds—The time in seconds between successive keepalive
requests. The range is 10 seconds through 32,767 seconds, with a
default of 10 seconds.
• down-countnumber—The number of keepalive packets a destination
must fail to receive before the network takes a link down. The range is
1 through 255, with a default of 3.
• up-count number—The number of keepalive packets a destination must
receive to change a link’s status from down to up. The range is 1 through
255, with a default of 1.
987
Keepalive (PPP and HDLC) Information about keepalive packets. detail extensive
statistics
• Input—Number of keepalive packets received by PPP.
• (last seen 00:00:00 ago)—Time the last keepalive packet was received,
in the format hh:mm:ss.
Input packets Number of packets received on the logical interface. None specified
Output packets Number of packets transmitted on the logical interface. None specified
LCP state (PPP) Link Control Protocol state. none detail extensive
NCP state (PPP) Network Control Protocol state. detail extensive none
CHAP state (PPP) Displays the state of the Challenge Handshake Authentication none detail extensive
Protocol (CHAP) during its transaction.
Protocol Protocol family configured on the logical interface. detail extensive none
protocol-family Protocol family configured on the logical interface. If the protocol is inet, brief
the IP address of the interface is also displayed.
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route table Routing table in which the logical interface address is located. For example, detail extensive none
0 refers to the routing table inet.0.
Flags Information about the protocol family flags. Possible values are described detail extensive none
in the “Family Flags” section under Common Output Fields Description.
Addresses, Flags Information about the addresses configured for the protocol family. detail extensive none
Possible values are described in the “Addresses Flags” section under
Common Output Fields Description.
Destination IP address of the remote side of the connection. detail extensive none
Sample Output
show interfaces (PPPoE)
user@host> show interfaces pp0
ge-1/0/1.32767
Input packets : 6
Output packets: 6
LCP state: Opened
NCP state: inet: Opened, inet6: Not-configured, iso: Not-configured, mpls:
Not-configured
CHAP state: Closed
PAP state: Success
Protocol inet, MTU: 1500
Flags: Sendbcast-pkt-to-re
Addresses, Flags: Is-Primary
Local: 203.0.113.1
Logical interface pp0.0 (Index 69) (SNMP ifIndex 96) (Generation 194)
Flags: Point-To-Point SNMP-Traps 0x4000 Encapsulation: PPPoE
PPPoE:
State: SessionUp, Session ID: 26,
Session AC name: None, AC MAC address: 00:00:5e:00:53:12,
Service name: None, Configured AC name: None,
Auto-reconnect timeout: Never, Idle timeout: Never,
Underlying interface: ge-3/0/1.0 (Index 67)
Traffic statistics:
Input bytes : 252
Output bytes : 296
Input packets: 7
Output packets: 8
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
993
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 252
Output bytes : 296
Input packets: 7
Output packets: 8
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Keepalive settings: Interval 10 seconds, Up-count 1, Down-count 3
Keepalive statistics:
Input : 1 (last seen 00:00:00 ago)
Output: 1 (last sent 00:00:03 ago)
LCP state: Opened
NCP state: inet: Opened, inet6: Not-configured, iso: Not-configured, mpls:
Not-configured
CHAP state: Closed
PAP state: Closed
Protocol inet, MTU: 1492, Generation: 171, Route table: 0
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 203.0.113.2, Local: 203.0.113.1, Broadcast: Unspecified,
Generation: 206
994
Release Information
Command introduced in Junos OS Release 9.0.
Description
(MX Series and M Series routers only) Display status information about the specified demux interface.
Options
none—Display standard information about the specified demux interface.
snmp-index snmp-index—(Optional) Display information for the specified SNMP index of the interface.
RELATED DOCUMENTATION
Output Fields
995
Table 19 on page 995 lists the output fields for the show interfaces demux0 (Demux Interfaces) command.
Output fields are listed in the approximate order in which they appear.
Physical Interface
Interface index Index number of the physical interface, which reflects its initialization brief detail
sequence. extensive none
Enabled State of the interface. Possible values are described in the “Enabled Field” brief detail
section under Common Output Fields Description. extensive none
Physical link Status of the physical link (Up or Down). detail extensive
none
Interface index Index number of the physical interface, which reflects its initialization detail extensive
sequence. none
Targeting Status of aggregated Ethernet links that are configured with targeted extensive
summary distribution (primary or backup)
Bandwidth Bandwidth allocated to the aggregated Ethernet links that are configured extensive
with targeted distribution.
SNMP ifIndex SNMP index number for the physical interface. detail extensive
none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Type Type of interface. Software-Pseudo indicates a standard software interface brief detail
with no associated hardware device. extensive none
Link-level type Encapsulation being used on the physical interface. brief detail
extensive
996
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
MTU Maximum transmission unit size on the physical interface. brief detail
extensive
Clocking Reference clock source: Internal (1) or External (2). brief detail
extensive
Device flags Information about the physical device. Possible values are described in brief detail
the “Device Flags” section under Common Output Fields Description. extensive none
Interface flags Information about the interface. Possible values are described in the brief detail
“Interface Flags” section under Common Output Fields Description. extensive none
Link flags Information about the link. Possible values are described in the “Link Flags” detail extensive
section under Common Output Fields Description. none
Hold-times Current interface hold-time up and hold-time down, in milliseconds. detail extensive
Last flapped Date, time, and how long ago the interface went from down to up. The detail extensive
format is Last flapped: year-month-day hour:minute:second:timezone none
(hour:minute:second ago). For example, Last flapped: 2002-04-26 10:52:40
PDT (04:33:20 ago).
Statistics last Time when the statistics for the interface were last set to zero. detail extensive
cleared
997
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
physical interface.
Input errors Input errors on the interface whose definitions are as follows: extensive
Input Rate Input rate in bits per second (bps) and packets per second (pps). none
998
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Output errors Output errors on the interface. The following paragraphs explain the extensive
counters whose meaning might not be obvious:
Logical Interface
Index Index number of the logical interface, which reflects its initialization detail extensive
sequence. none
SNMP ifIndex SNMP interface index number for the logical interface. detail extensive
none
Generation Unique number for use by Juniper Networks technical support only. detail
Flags Information about the logical interface. Possible values are described in brief detail
the “Logical Interface Flags” section under Common Output Fields extensive none
Description.
ACI VLAN: Name of the dynamic profile that defines the agent circuit identifier (ACI) brief detail
Dynamic Profile interface set. If configured, the ACI interface set enables the underlying extensive none
demux interface to create dynamic VLAN subscriber interfaces based on
ACI information.
999
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail extensive
specified interface set.
NOTE: The packet and byte counts in these fields include traffic that
is dropped and does not leave the router.
Local statistics Number of transit bytes and packets received and transmitted on the local detail extensive
interface.
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Transit statistics Number and rate of bytes and packets transiting the switch. detail extensive
NOTE: The packet and byte counts in these fields include traffic that is
dropped and does not leave the router.
IPv6 Transit Number of IPv6 transit bytes and packets received and transmitted on detail extensive
statistics the logical interface if IPv6 statistics tracking is enabled.
NOTE: The packet and byte counts in these fields include traffic that is
dropped and does not leave the router.
Protocol Protocol family. Possible values are described in the “Protocol Field” detail extensive
section under Common Output Fields Description. none
MTU Maximum transmission unit size on the logical interface. detail extensive
none
Maximum labels Maximum number of MPLS labels configured for the MPLS protocol family detail extensive
on the logical interface. none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Route table Route table in which the logical interface address is located. For example, detail extensive
0 refers to the routing table inet.0.
Flags Information about protocol family flags. Possible values are described in detail extensive
the “Family Flags” section under Common Output Fields Description. none
1001
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Mac-Validate Number of MAC address validation failures for packets and bytes. This detail extensive
Failures field is displayed when MAC address validation is enabled for the logical none
interface.
Addresses, Flags Information about the address flags. Possible values are described in the detail extensive
“Addresses Flags” section under Common Output Fields Description. none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Link Name of the physical interfaces for member links in an aggregated Ethernet detail extensive
bundle for a PPPoE over aggregated Ethernet configuration. PPPoE traffic none
goes out on these interfaces.
Dynamic-profile Name of the PPPoE dynamic profile assigned to the underlying interface. detail extensive
none
Service Name Name of the PPPoE service name table assigned to the PPPoE underlying detail extensive
Table interface. none
Max Sessions Maximum number of dynamic PPPoE logical interfaces that the router detail extensive
can activate on the underlying interface. none
Duplicate State of duplicate protection: On or Off. Duplicate protection prevents detail extensive
Protection the activation of another dynamic PPPoE logical interface on the same none
underlying interface when a dynamic PPPoE logical interface for a client
with the same MAC address is already active on that interface.
Direct Connect State of the configuration to ignore DSL Forum VSAs: On or Off. When detail extensive
configured, the router ignores any of these VSAs received from a directly none
connected CPE device on the interface.
1002
Table 19: show interfaces demux0 (Demux Interfaces) Output Fields (continued)
Sample Output
show interfaces demux0 (Demux)
user@host> show interfaces demux0
Logical interface demux0.0 (Index 87) (SNMP ifIndex 84) (Generation 312)
Flags: SNMP-Traps 0x4000 Encapsulation: ENET2
Demux:
Underlying interface: ge-2/0/1.0 (Index 74)
Family Inet Source prefixes, total 1
Prefix: 203.0.113/24
Traffic statistics:
Input bytes : 0
Output bytes : 1554
Input packets: 0
Output packets: 37
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 1554
Input packets: 0
Output packets: 37
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
IPv6 transit statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Protocol inet, MTU: 1500, Generation: 395, Route table: 0
Flags: Is-Primary, Mac-Validate-Strict
Mac-Validate Failures: Packets: 0, Bytes: 0
Addresses, Flags: Is-Preferred Is-Primary
Destination: 203.0.113/24, Local: 203.0.113.13, Broadcast: 203.0.113.255,
Generation: 434
show interfaces demux0 extensive (Targeted Distribution for Aggregated Ethernet Links)
user@host> show interfaces demux0.1073741824 extensive
ENET2
Demux: Source Family Inet
ACI VLAN:
Dynamic Profile: aci-vlan-set-profile
Demux:
Underlying interface: ge-1/0/0 (Index 138)
Input packets : 18
Output packets: 16
Protocol inet, MTU: 1500
Flags: Sendbcast-pkt-to-re, Unnumbered
Donor interface: lo0.0 (Index 322)
Preferred source address: 203.0.113.202
Addresses, Flags: Primary Is-Default Is-Primary
Local: 203.0.113.119
Protocol pppoe
Dynamic Profile: aci-vlan-pppoe-profile,
Service Name Table: None,
Max Sessions: 32000, Max Sessions VSA Ignore: Off,
Duplicate Protection: On, Short Cycle Protection: Off,
Direct Connect: Off,
AC Name: nbc
1006
Release Information
Command introduced in Junos OS Release 8.5.
Description
Display information about the specified gigabit or 10-Gigabit Ethernet interface set.
You can also use the show interfaces interface-set command to display information about agent circuit
identifier (ACI) interface sets.
Options
interface-set interface-set-name—Display information about the specified Gigabit Ethernet, 10-Gigabit
Ethernet, ACI, or ALI interface set.
RELATED DOCUMENTATION
Output Fields
1007
Table 20 on page 1007 describes the information for the show interfaces interface-set command. Output
fields are listed in the approximate order in which they appear.
Physical Interface
For ACI interface sets, the set name is prefixed with aci-.
For ALI interface sets, the set name is prefixed with the trusted option
that the interface set is based on:
ACI VLAN For ACI interface sets, the string received in DHCP or PPPoE control detail none
packets that uniquely identifies the subscriber’s access node and the DSL
line on the access node. Only the Agent Circuit ID can be used to create
the interface set.
NOTE: The ACI VLAN field is replaced with the Line Identity field when
an ALI interface set is configured with the line-identity autoconfiguration
stanza.
Line Identity For ALI interface sets, the trusted option received in DHCP or PPPoE detail none
control packets that uniquely identifies the subscriber’s access node and
the DSL line on the access node. The trusted option can be either or both
of the following:
NOTE: The Line Identity field is replaced with the ACI VLAN field when
an ACI interface set is configured with the agent-circuit-id
autoconfiguration stanza.
1008
PPPoE Dynamic PPPoE subscriber interface that the router creates using the ACI detail none
or ALI interface set.
Max Sessions For dynamic PPPoE subscriber interfaces, maximum number of PPPoE detail none
logical interfaces that that can be activated on the underlying interface.
Max Sessions For dynamic PPPoE subscriber interfaces, whether the router is configured detail none
VSA Ignore to ignore (clear) the PPPoE maximum session value returned by RADIUS
in the Max-Clients-Per-Interface Juniper Networks VSA [26-143] and
restore the PPPoE maximum session value on the underlying interface to
the value configured with the max-sessions statement: Off (default) or
On.
Traffic statistics Number and rate of bytes and packets received and transmitted on the detail
specified interface set.
Egress queues Total number of egress queues supported on the specified interface set. detail
supported
Egress queues in Total number of egress queues used on the specified interface set. detail
use
Queue counters Queued packets, Transmitted packets, and Dropped packets statistics detail
for the four forwarding classes.
Members List of all interface sets or, for ACI interface sets, list of all subscriber detail none
interfaces belonging to the specified ACI interface set.
Sample Output
show interfaces interface-set terse
user@host> show interfaces interface-set terse
1009
Interface set:
iflset-xe-11/3/0-0
ge-1/0/1-0
ge-1/0/1-2
show interfaces interface-set (ACI Interface Set based on ACI Trusted Option)
user@host> show interfaces interface-set
1010
show interfaces interface-set (ACI Interface Set based on ARI Trusted Option)
user@host> show interfaces interface-set
show interfaces interface-set (ACI Interface Set based on ARI Trusted Option when both ACI and ARI
are received)
user@host> show interfaces interface-set
show interfaces interface-set (ACI Interface Set based on Accept-No-IDs Trusted Option when neither
ACI nor ARI is received)
user@host> show interfaces interface-set
1011
Release Information
Command introduced in Junos OS Release 7.5.
Description
Display information about PPP interfaces.
Options
interface-name—Name of a logical interface.
Starting in Junos OS Release 17.3, the * (asterisk) wildcard character is supported for the interface
name for debugging purpose. With this support, you can match any string of characters in that position
in the interface name. For example, so* matches all SONET/SDH interfaces.
Output Fields
Table 21 on page 1012 lists the output fields for the show ppp interface command. Output fields are listed
in the approximate order in which they appear.
Level of
Field Name Field Description Output
Session Name of the logical interface on which the session is running. All levels
Phase PPP process phase: Authenticate, Pending, Establish, LCP, Network, Disabled, All levels
and Tunneled.
1013
Level of
Field Name Field Description Output
Session flags Special conditions present in the session: Bundled, TCC, No-keepalives, Looped, All levels
Monitored, and NCP-only.
protocol State Protocol state information. See specific protocol state fields for information. None
specified
Keepalive settings Keepalive settings for the PPP sessions on the L2TP network server (LNS). extensive
LNS-based PPP sessions are supported only on service interfaces (si).
Magic-Number Indicates whether the local peer is configured to ignore mismatches between peer extensive
validation magic numbers when the numbers are validated during PPP keepalive
(Echo-Request/Echo-Reply) exchanges.
Level of
Field Name Field Description Output
RE Keepalive Keepalive statistics for the packets handled by the Routing Engine. extensive
statistics
• LCP echo req Tx—LCP echo requests sent from the Routing Engine.
• LCP echo req Rx—LCP echo requests received at the Routing Engine.
• LCP echo rep Tx—LCP echo responses sent from the Routing Engine.
• LCP echo rep Rx—LCP echo responses received at the Routing Engine.
• LCP echo req timeout—Number of keepalive packets where the keepalive aging
timer has expired.
• LCP Rx echo req Magic Num Failures—LCP echo requests where the magic
numbers shared between the PPP peers during LCP negotiation did not match.
• LCP Rx echo rep Magic Num Failures—LCP echo responses where the magic
numbers shared between the PPP peers during LCP negotiation did not match.
1015
Level of
Field Name Field Description Output
• State—LCP protocol state (all platforms except M120 and M320 routers):
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is not available for traffic.
• Opened—Link is administratively available for traffic.
• Req-sent—An attempt has been made to configure the connection.
• State—LCP protocol state (M120 and M320 routers):
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is available (up), but no Open has occurred.
• Closing—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
• Opened—Link is administratively available for traffic. A Configure-Ack has
been both sent and received.
• Req-sent—An attempt has been made to configure the connection. A
Configure-Request has been sent but a Configure-Ack has not yet been
received.
• Starting—An administrative Open has been initiated, but the lower layer is
still unavailable (Down).
• Stopped—The system is waiting for a Down event after the
This-Layer-Finished action, or after sending a Terminate-Ack.
• Stopping—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
Level of
Field Name Field Description Output
1017
Level of
Field Name Field Description Output
• Negotiated options:
• ACFC—Address and-Control Field Compression. A configuration option that
provides a method to negotiate the compression of the Data Link Layer
Address and Control fields.
• Asynchronous map—Asynchronous control character map. A configuration
option used on asynchronous links such as telephone lines to identify control
characters that must be replaced by a two-character sequence to prevent
them from being interpreted by equipment used to establish the link.
• Authentication protocol—Protocol used for authentication. This option
provides a method to negotiate the use of a specific protocol for
authentication. It requires a peer to authenticate itself before allowing
network-layer protocol packets to be exchanged. By default, authentication
is not required.
• Authentication algorithm—Type of authentication algorithm. The Message
Digest algorithm (MD5) is the only algorithm supported.
• Endpoint discriminator class—For multilink PPP (MLPPP), a configuration
option that identifies the system transmitting the packet. This option advises
a system that the peer on this link could be the same as the peer on another
existing link.
• Magic number—A configuration option that provides a method to detect
looped-back links and other data-link layer anomalies. By default, the magic
number is not negotiated.
• MRU—Maximum receive unit. A configuration option that may be sent to
inform the peer that the implementation can receive larger packets, or to
request that the peer send smaller packets. The default value is 1500 octets.
• MRRU—For multilink PPP, the maximum receive reconstructed unit. A
configuration option that specifies the maximum number of octets in the
Information fields of reassembled packets.
• Multilink header suspendable classes—For MLPPP, an LCP option that advises
the peer that the implementation wishes to receive fragments with a format
given by the code number, with the maximum number of suspendable classes
given.
• Multilink header format classes—For MLPPP, an LCP option that advises the
peer that the implementation wishes to receive fragments with a format given
by the code number.
• PFC—Protocol-Field-Compression. A configuration option that provides a
method to negotiate the compression of the PPP Protocol field.
• short sequence—For MLPPP, an option that advises the peer that the
1018
Level of
Field Name Field Description Output
Authentication CHAP or PAP authentication state information. For CHAP authentication: None
specified
• Chap-ans-rcvd—Packet was sent from the peer, indicating that the peer received
the Chap-resp-sent packet.
• Chap-ans-sent—Packet was sent from the authenticator, indicating that the
authenticator received the peer's Chap-resp-rcvd packet.
• Chap-chal-rcvd—Challenge packet has been received by the peer.
• Chap-chal-sent—Challenge packet has been sent by the authenticator to begin
the CHAP protocol or has been transmitted at any time during the
Network-Layer Protocol (NCP) phase to ensure that the connection has not
been altered.
• Chap-resp-rcvd—CHAP response packet has been received by the authenticator.
• Chap-resp-sent—CHAP response packet has been sent to the authenticator.
• Closed—Link is not available for authentication.
• Failure—Authenticator compares the response value in the response packet
from the peer with its own response value, but the value does not match.
Authentication fails.
• Success—Authenticator compares the response value in the response packet
from the peer with its own response value, and the value matches.
Authentication is successful.
For PAP authentication:
• Pap-resp-sent—PAP response sent to peer (ACK/NACK)t.
• Pap-req-rcvd—PAP request packet received from peer.
• Pap-resp-rcvd—PAP response received from the peer (ACK/NACK).
• Pap-req-sent—PAP request packet sent to the peer.
• Closed—Link is not available for authentication.
• Failure—Authenticator compares the response value in the response packet
from the peer with its own response value, but the value does not match.
Authentication fails.
• Success—Authenticator compares the response value in the response packet
from the peer with its own response value, and the value matches.
Authentication is successful.
1019
Level of
Field Name Field Description Output
IPCP extensive
1020
Level of
Field Name Field Description Output
• State—(All platforms except M120 and M320 routers) One of the following
values:
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is not available for traffic.
• Opened—Link is administratively available for traffic.
• Req-sent—An attempt has been made to configure the connection.
• State—(M120 and M320 routers) One of the following values:
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is available (up), but no Open has occurred.
• Closing—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
• Opened—Link is administratively available for traffic. A Configure-Ack has
been both sent and received.
• Req-sent—An attempt has been made to configure the connection. A
Configure-Request has been sent but a Configure-Ack has not yet been
received.
• Starting—An administrative Open has been initiated, but the lower layer is
still unavailable (Down).
• Stopped—The system is waiting for a Down event after the
This-Layer-Finished action, or after sending a Terminate-Ack.
• Stopping—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
Level of
Field Name Field Description Output
• primary DNS server—Negotiate with the remote peer to select the address
of the primary DNS server to be used on the local end of the link.
• primary WINS server—Negotiate with the remote peer to select the address
of the primary WINS server to be used on the local end of the link.
• remote address—IP address of the remote end of the link in dotted quad
notation.
• secondary DNS server—Negotiate with the remote peer to select the address
of the secondary DNS server to be used on the local end of the link.
• secondary WINS server—Negotiate with the remote peer to select the address
of the secondary WINS server to be used on the local end of the link.
Level of
Field Name Field Description Output
IPV6CP extensive
1023
Level of
Field Name Field Description Output
• State—(All platforms except M120 and M320 routers) One of the following
values:
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is not available for traffic.
• Opened—Link is administratively available for traffic.
• Req-sent—An attempt has been made to configure the connection.
• State—(M120 and M320 routers) One of the following values:
• Ack-rcvd—A Configure-Request has been sent and a Configure-Ack has been
received.
• Ack-sent—A Configure-Request and a Configure-Ack have both been sent,
but a Configure-Ack has not yet been received.
• Closed—Link is available (up), but no Open has occurred.
• Closing—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
• Opened—Link is administratively available for traffic. A Configure-Ack has
been both sent and received.
• Req-sent—An attempt has been made to configure the connection. A
Configure-Request has been sent but a Configure-Ack has not yet been
received.
• Starting—An administrative Open has been initiated, but the lower layer is
still unavailable (Down).
• Stopped—The system is waiting for a Down event after the
This-Layer-Finished action, or after sending a Terminate-Ack.
• Stopping—A Terminate-Request has been sent but a Terminate-Ack has not
yet been received.
Level of
Field Name Field Description Output
quad notation.
OSINLCP State OSI Network Layer Control Protocol (OSINLCP) protocol state information (all extensive
platforms except M120 and M320 routers):
• State:
• Ack-rcvd—Configure-Request has been sent and Configure-Ack has been
received.
• Ack-sent—Configure-Request and Configure-Ack have both been sent, but
Configure-Ack has not yet been received.
• Closed—Link is not available for traffic.
• Opened—Link is administratively available for traffic.
• Req-sent—Attempt has been made to configure the connection.
• Last started—OSINLCP state start time.
• Last completed—OSINCLP state completion time.
1025
Level of
Field Name Field Description Output
Sample Output
show ppp interface
user@host> show ppp interface si-1/3/0.0
IPV6CP
State: Opened
Last started: 2007-01-29 10:43:50 PST
Last completed: 2007-01-29 10:43:50 PST
Negotiated options:
Local interface identifier: 2a0:a522:64:d319, Remote interface identifier:
0:0:0:c
Negotiation mode: Passive
Release Information
Command introduced before Junos OS Release 7.4.
Description
Display session-specific information about PPPoE interfaces.
Options
none—Display interface information for all PPPoE interfaces.
pp0.logical—(Optional) Name of an interface. The logical unit number for static interfaces can be a value
from 0 through 16385. The logical unit number for dynamic interfaces can be a value from 1073741824
through the maximum number of logical interfaces supported on your router.
RELATED DOCUMENTATION
Output Fields
Table 22 on page 1029 lists the output fields for the show pppoe interfaces command. Output fields are
listed in the approximate order in which they appear. Not all fields are displayed for PPPoE interfaces on
M120 and M320 routers in server mode.
1029
Logical Interface
Index Index number of the logical interface, which reflects its initialization detail extensive none
sequence.
Type Origin of the logical interface: Static or Dynamic. Indicates whether the detail extensive none
interface was statically or dynamically created.
Service name Type of service required (can be used to indicate an ISP name or a class detail extensive none
or quality of service).
Remote MAC MAC address of the remote side of the connection, either the access All levels
address or concentrator or the PPPoE client.
Remote MAC
Session uptime Length of time the session has been up, in hh:mm:ss. detail extensive none
Dynamic Profile Name of the dynamic profile that was used to create this interface. If the detail extensive none
interface was statically created, this field is not displayed.
Agent Circuit ID Agent circuit identifier (ACI) that corresponds to the DSLAM interface detail extensive none
that initiated the client service request. An asterisk is interpreted as a
wildcard character and can appear at the beginning, the end, or both the
beginning and end of the string. If the agent circuit ID is not configured,
this field is not displayed.
1030
Agent Remote ID Agent remote identifier that corresponds to the subscriber associated detail extensive none
with the DSLAM interface that initiated the service request. An asterisk
is interpreted as a wildcard character and can appear at the beginning,
the end, or both at the beginning and end of the string. If the agent remote
ID is not configured, this field is not displayed.
ACI Interface Set Internally-generated name of the dynamic ACI interface set, if configured, detail extensive none
and the set index number of the ACI entry in the session database.
Packet Type Number of packets sent and received during the PPPoE session, extensive
categorized by packet type and packet errors:
Sample Output
show pppoe interfaces
user@host> show pppoe interfaces
pp0.0 Index 66
State: Down, Session ID: None,
Service name: None, Configured AC name: sapphire,
Session AC name: None, Remote MAC address: 00:00:5e:00:53:00,
1031
pp0.1073741827 Index 70
State: Session Up, Session ID: 30, Type: Dynamic,
Session AC name: velorum,
Remote MAC address: 00:00:5e:00:53:c1,
Session uptime: 16:45:46 ago,
Underlying interface: ge-2/0/3.1 Index 73
Service name: premium
Dynamic Profile: PppoeProfile
Agent Circuit ID: velorum-ge-2/0/3
Agent Remote ID: westford
pp0.0 Index 66
State: Down, Session ID: None, Type: Static,
Service name: None, Configured AC name: sapphire,
Session AC name: None, Remote MAC address: 00:00:5e:00:53:00,
Auto-reconnect timeout: 100 seconds, Idle timeout: Never,
Underlying interface: at-5/0/0.0 Index 71
1032
show pppoe interfaces (PPPoE Subscriber Interface with ACI Interface Set)
user@host> show pppoe interfaces pp0.1073741827
Release Information
Command introduced in Junos OS Release 11.4.
Description
Display summary information about PPPoE clients currently undergoing lockout or currently in a lockout
grace period on all PPPoE underlying logical interfaces or on a specified PPPoE underlying logical interface.
You can configure PPPoE subscriber session lockout, also known as short-cycle protection, for VLAN,
VLAN demux, and PPPoE-over-ATM dynamic subscriber interfaces.
Options
none—Display information about the lockout condition and the lockout grace period for PPPoE clients on
all PPPoE underlying logical interfaces.
underlying-interface-name—(Optional) Name of the PPPoE underlying logical interface. If you do not specify
an underlying interface, the router iteratively displays output for all existing clients undergoing lockout
per PPPoE underlying logical interface.
RELATED DOCUMENTATION
Output Fields
Table 23 on page 1034 lists the output fields for the show pppoe lockout command. Output fields are listed
in the approximate order in which they appear.
1034
Index Index number of the logical interface, which reflects its initialization sequence.
Short-Cycle State of PPPoE short-cycle protection, also known as PPPoE subscriber session lockout, on
Protection the underlying interface:
• circuit-id—Filters PPPoE client sessions by their agent circuit identifier (ACI) value when
configured for short-cycle protection
• mac-address—Filters PPPoE client sessions by their unique media access control (MAC)
address when configured for short-cycle protection
• off—Short-cycle protection not configured for PPPoE client sessions
Enabling short-cycle protection temporarily prevents (locks out) a failed or short-lived
(short-cycle) PPPoE subscriber session from reconnecting to the router for a default or
configurable period of time.
Lockout Time Displays the PPPoE lockout time range, the number of PPPoE clients in lockout condition, and
(seconds) the number of PPPoE clients in a lockout grace period:
Client Address MAC source address or agent circuit idenfiier (ACI) value of the PPPoE client.
Current Current lockout time, in seconds; displays 0 (zero) if the PPPoE client is not undergoing lockout.
1035
Elapsed Time elapsed into the lockout period, in seconds; displays 0 (zero) if the PPPoE client is not
undergoing lockout
Next Lockout time, in seconds, that the router uses for the next lockout event; displays a nonzero
value if the PPPoE client is currently in a lockout grace period.
Sample Output
show pppoe lockout (ACI-Based Short-Cycle Protection)
user@host> show pppoe lockout at-1.0.0.30
show pppoe lockout atm-identifier device-name device-name vpi vpi-identifier vci vci-identifier
Release Information
Command introduced in Junos OS Release 15.2 on MX Series routers.
Description
Display information about the lockout condition or lockout grace period for all PPPoE subscriber sessions
associated with the specified ATM encapsulation type identifiers. Because the lockout condition persists
even in the absence of an underlying interface or after automatic removal of the VLAN or VLAN demux
interface, using the show pppoe lockout atm-identifier command enables you to display the lockout
condition for PPPoE clients by specifying ATM identifying characteristics instead of the ATM interface
name.
You can configure PPPoE subscriber session lockout, also known as PPPoE short-cycle protection, for
VLAN, VLAN demux, and PPPoE-over-ATM dynamic subscriber interfaces.
Options
device-name—Name of the ATM physical interface or aggregated Ethernet bundle associated with the
PPPoE client for which you want to display lockout information.
vci-identifier—ATM VCI value associated with the PPPoE client for which you want to display lockout
information.
Range: 0 through 65535
vpi-identifier—ATM VPI value associated with the PPPoE client for which you want to display lockout
information.
Range: 0 through 255
RELATED DOCUMENTATION
1038
Output Fields
Table 24 on page 1038 lists the output fields for the show pppoe lockout atm-identifier command. Output
fields are listed in the approximate order in which they appear.
If no associated underlying interface exists, the underlying interface name is not displayed.
Instead, the command output displays only the encapsulation type identifier.
Index Index number of the logical interface, which reflects its initialization sequence.
If no associated underlying interface exists, the index number is not displayed. Instead, the
command output displays only the encapsulation type identifier.
Short Cycle State of PPPoE short-cycle protection, also known as PPPoE subscriber session lockout, on
Protection the underlying interface:
• circuit-id—Filters PPPoE client sessions by their agent circuit identifier (ACI) value when
configured for short-cycle protection.
• mac-address—Filters PPPoE client sessions by their unique media access control (MAC)
address when configured for short cycle-protection .
• off—Short-cycle protection not configured for PPPoE client sessions.
1039
Lockout Time Displays the PPPoE lockout time range, the number of PPPoE clients in lockout condition, and
(seconds) the number of PPPoE clients in a lockout grace period:
Client Address MAC source address or agent circuit identifier (ACI) value of the PPPoE client.
Current Current lockout time, in seconds; displays 0 (zero) if the PPPoE client is not undergoing lockout.
Elapsed Time elapsed into the lockout period, in seconds; displays 0 (zero) if the PPPoE client is not
undergoing lockout.
Next Lockout time, in seconds, that the router uses for the next lockout event; displays a nonzero
value if the PPPoE client is currently in a lockout grace period.
Sample Output
show pppoe lockout atm-identifier device-name vpi vci (PPPoE Client with Specified VPI and VCI on
ATM Physical Interface)
user@host> show pppoe-lockout atm-identifier device-name at-1/0/0 vpi 1 vci 30
Release Information
Command introduced in Junos OS Release 15.2 on MX Series routers.
Description
Display information about the lockout condition or lockout grace period for all PPPoE subscriber sessions
associated with the specified VLAN encapsulation type identifiers. Because the lockout condition persists
even in the absence of an underlying interface or after automatic removal of the VLAN or VLAN demux
interface, using the show pppoe lockout vlan-identifier command enables you to display the lockout
condition for PPPoE clients by specifying VLAN identifying characteristics instead of the underlying
interface name.
You can configure PPPoE subscriber session lockout, also known as PPPoE short-cycle protection, for
VLAN, VLAN demux, and PPPoE-over-ATM dynamic subscriber interfaces.
Options
device-name—Name of the Ethernet physical interface or aggregated Ethernet bundle associated with the
PPPoE client for which you want to display lockout information.
svlan-identifier—(Optional) A valid S-VLAN identifier associated with the PPPoE client for which you want
to display lockout information.
Range: 1 through 4094
vlan-identifier—(Optional) A valid VLAN identifier associated with the PPPoE client for which you want to
display lockout information.
Range: 1 through 4094
RELATED DOCUMENTATION
Output Fields
Table 25 on page 1041 lists the output fields for the show pppoe lockout vlan-identifier command. Output
fields are listed in the approximate order in which they appear.
If no associated underlying interface exists, the underlying interface name is not displayed.
Instead, the command output displays only the encapsulation type identifier.
Index Index number of the logical interface, which reflects its initialization sequence.
If no associated underlying interface exists, the index number is not displayed. Instead, the
command output displays only the encapsulation type identifier.
Short Cycle State of PPPoE short-cycle protection, also known as PPPoE subscriber session lockout, on
Protection the underlying interface:
• circuit-id—Filters PPPoE client sessions by their agent circuit identifier (ACI) value when
configured for short-cycle protection.
• mac-address—Filters PPPoE client sessions by their unique media access control (MAC)
address when configured for short-cycle protection .
• off—Short-cycle protection not configured for PPPoE client sessions.
1042
Lockout Time PPPoE lockout time range, the number of PPPoE clients in lockout condition, and the number
(seconds) of PPPoE clients in a lockout grace period:
Client Address MAC source address or agent circuit identifier (ACI) value of the PPPoE client.
Current Current lockout time, in seconds; displays 0 (zero) if the PPPoE client is not undergoing lockout.
Elapsed Time elapsed into the lockout period, in seconds; displays 0 (zero) if the PPPoE client is not
undergoing lockout.
Next Lockout time, in seconds, that the router uses for the next lockout event; displays a nonzero
value if the PPPoE client is currently in a lockout grace period.
Sample Output
show pppoe lockout vlan-identifier device-name vlan-id (Single-Tagged VLAN on Aggregated Ethernet
Bundle)
user@host> show pppoe lockout vlan-identifier device-name ae0 vlan-id 100
show pppoe lockout vlan-identifier device-name svlan-id vlan-id (Dual-Tagged VLAN on Gigabit Ethernet
Interface)
user@host> show pppoe lockout vlan-identifier device-name ge-1/1/0 svlan-id 100 vlan-id 1
show pppoe lockout vlan-identifier device-name (Untagged VLAN on Aggregated Ethernet Bundle)
user@host> show pppoe lockout vlan-identifier device-name ae2
Device: ae3
Short Cycle Protection: mac-address,
Lockout Time (sec): Min: 30, Max: 90
Total clients in lockout: 0
Total clients in lockout grace period: 1
Client Address Current Elapsed Next
00:00:5e:00:53:22 0 0 60
1044
Release Information
Command introduced in Junos OS Release 10.0.
Description
Display configuration information about PPPoE service name tables.
Options
none—Display the names of configured PPPoE service name tables.
RELATED DOCUMENTATION
Output Fields
Table 26 on page 1044 lists the output fields for the show pppoe service-name-tables command. Output
fields are listed in the approximate order in which they appear.
Service Name Name of a configured service in the PPPoE service name table: none
Action Action taken when the PPPoE underlying interface interface receives a none
PPPoE Active Discovery Initiation (PADI) packet with the specified named
service, empty service, any service, or ACI/ARI pair:
Dynamic Profile Name of the dynamic profile with which the router creates a dynamic none
PPPoE subscriber interface. A dynamic profile can be assigned to a named
service, empty service, any service, or ACI/ARI pair.
Routing Instance Name of the routing instance in which to instantiate the dynamic PPPoE none
subscriber interface. A routing instance can be assigned to a named service,
empty service, any service, or ACI/ARI pair.
Max Sessions Maximum number of active PPPoE sessions that the router can establish none
with the specified named service, empty service, or any service.
Active Sessions Current count of active PPPoE sessions created using the specified named none
service, empty service, or any service. The Active Sessions value cannot
exceed the Max Sessions value.
ACI Agent circuit identifier (ACI) that corresponds to the DSLAM interface none
that initiated the client service request. An asterisk is interpreted as a
wildcard character and can appear at the beginning, the end, or both the
beginning and end of the string. An ACI can be configured as part of an
ACI/ARI pair for a named service, empty service, or any service.
1046
ARI Agent remote identifier (ARI) that corresponds to the subscriber associated none
with the DSLAM interface that initiated the service request. An asterisk
is interpreted as a wildcard character and can appear at the beginning,
the end, or both at the beginning and end of the string. An ARI can be
configured as part of an ACI/ARI pair for a named service, empty service,
or any service.
Static Interface Name of the static PPPoE interface reserved for exclusive use by the none
PPPoE client with matching ACI/ARI information. A static interface can
be configured only for an ACI/ARI pair.
Sample Output
show pppoe service-name-tables
user@host> show pppoe service-name-tables
ARI: sunnyvale
Action: Terminate
Static Interface: pp0.101
Service Name: Wholesale
Action: Terminate
Dynamic Profile: WholesalePppoeProfile
Routing Instance: WholesaleRI
Max Sessions: 16000
Active Sessions: 4
1048
Release Information
Command introduced in Junos OS Release 10.2.
Description
Display information about all active PPPoE sessions on the router, or about the active PPPoE sessions
established for a specified service name, agent circuit identifier (ACI), or agent remote identifier (ARI).
Options
none—Display information for all active PPPoE sessions on the router.
aci circuit-id-string—(Optional) Display information only for active PPPoE sessions established with the
specified agent circuit identifier. The agent circuit identifier corresponds to the DSLAM interface that
initiated the service request.
ari remote-id-string—(Optional) Display information only for active PPPoE sessions established with the
specified agent remote identifier. The agent remote identifier corresponds to the subscriber associated
with the DSLAM interface that initiated the service request.
service service-name—(Optional) Display information only for active PPPoE sessions established with the
specified service, where service-name can be empty, any, or a named service.
RELATED DOCUMENTATION
Output Fields
1049
Table 27 on page 1049 lists the output fields for the show pppoe sessions command. Output fields are listed
in the approximate order in which they appear.
State State of the PPPoE session; displays Session Up for active PPPoE sessions. none
Remote MAC MAC address of the remote side of the connection, either the access none
concentrator or the PPPoE client.
Sample Output
show pppoe sessions (For All Active Sessions)
user@host> show pppoe sessions
show pppoe sessions (For All Active Sessions Matching the Agent Circuit Identifier)
user@host> show pppoe sessions aci “velorum-ge-2/0/3”
Release Information
Command introduced before Junos OS Release 7.4.
logical-interface-name option introduced in Junos OS Release 10.1.
Description
Display statistics information about PPPoE interfaces.
Options
none—Display PPPoE statistics for all interfaces.
RELATED DOCUMENTATION
Output Fields
Table 28 on page 1051 lists the output fields for the show pppoe statistics command. Output fields are listed
in the approximate order in which they appear.
1051
Active PPPoE Total number of active PPPoE sessions and the number of packets sent and received during
sessions the PPPoE session, categorized by packet type and packet errors:
Timeouts Information about timeouts that occurred during the PPPoE session (not displayed for M120,
M320, and MX Series routers):
• PADI—No PADR packet has been received within the timeout period. (This value is always
zero and is not supported.)
• PADO—No PPPoE Active Discovery Offer packet has been received within the timeout
period.
• PADR—No PADS packet has been received within the timeout period.
Sample Output
show pppoe statistics
user@host> show pppoe statistics
PADT 0 0
Service name error 0 0
AC system error 0 0
Generic error 0 0
Malformed packets 0 0
Unknown packets 0 0
Timeouts
PADI 0
PADO 0
PADR 0
Release Information
Command introduced in Junos OS Release 10.0.
lockout option added in Junos OS Release 11.4.
Description
Display information about PPPoE underlying interfaces.
Options
brief | detail | extensive—(Optional) Display the specified level of output.
lockout—(Optional) Display summary information about the lockout condition and the lockout grace period
for PPPoE clients on the PPPoE underlying interface.
RELATED DOCUMENTATION
Output Fields
Table 29 on page 1054 lists the output fields for the show pppoe underlying-interfaces command. Output
fields are listed in the approximate order in which they appear.
Dynamic Profile Name of the dynamic profile that was used to create this interface. If the All levels
interface was statically created, then the value is none.
Index Index number of the logical interface, which reflects its initialization detail extensive
sequence.
State Origin of the logical interface: Static or Dynamic. Indicates whether the detail extensive
interface was statically or dynamically created.
Operational Fields in this block are actual operational values rather than simply the detail extensive
States configured values. The operational values can be the result of
RADIUS-initiated changes.
Max Sessions Maximum number of PPPoE logical interfaces that can be activated on detail extensive
the underlying interface. When this number of logical interfaces has been
established, all subsequent PPPoE Active Discovery Initiation (PADI)
packets are dropped and all subsequent PPPoE Active Discovery Request
(PADR) packets trigger PPPoE Active Discovery Session (PADS) error
responses.
Max Sessions Whether the router is configured to ignore (clear) the PPPoE maximum detail extensive none
VSA Ignore session value returned by RADIUS in the Max-Clients-Per-Interface Juniper
Networks VSA [26-143] and restore the PPPoE maximum session value
on the underlying interface to the value configure with the max-sessions
statement: Off (default) or On.
1055
Active Sessions Number of active PPPoE sessions on the underlying interface. If a dynamic detail extensive
profile is listed, then it is the number of active PPPoE sessions on the
underlying interface that are using this profile. The Active Sessions value
must not exceed the Max Sessions value.
Agent Circuit Whether the underlying interface is configured with the detail extensive none
Identifier agent-circuit-identifier statement to enable creation of autosensed
dynamic VLAN subscriber interfaces based on agent circuit identifier (ACI)
information.
NOTE: The Agent Circuit Identifier field is replaced with the Line Identity
field when an ALI interface set is configured with the line-identity
autoconfiguration stanza.
Line Identity Whether the underlying interface is configured with the line-identity detail extensive none
statement to enable creation of autosensed dynamic VLAN subscriber
interfaces based on the specified trusted option: ACI, ARI, both, or neither.
NOTE: The Line Identity field is replaced with the ACI VLAN field when
an ACI interface set is configured with the agent-circuit-id
autoconfiguration stanza.
Duplicate State of PPPoE duplicate protection: On or Off. When duplicate protection detail extensive
Protection is configured for the underlying interface, a dynamic PPPoE logical
interface cannot be activated when an existing active logical interface is
present for the same PPPoE client. The uniqueness of the PPPoE client
is determined by the client's MAC address.
1056
Short Cycle State of PPPoE short cycle protection: mac-address, circuit-id, or Off. detail extensive
Protection Enabling short cycle protection, also known as PPPoE lockout, on the
PPPoE underlying interface temporarily prevents (locks out) a failed or
short-lived (short-cycle) PPPoE subscriber session from reconnecting to
the router for a default or configurable period of time. PPPoE client
sessions are identified by their unique media access control (MAC) source
address or agent circuit identifier (ACI) value.
Direct Connect State of the configuration to ignore DSL Forum VSAs: On or Off. When detail extensive none
configured, the router ignores any of these VSAs received from a directly
connected CPE device on the interface.
PacketType Number of packets sent and received during the PPPoE session, detail extensive
categorized by packet type and packet errors:
Lockout Time The PPPoE lockout time range, the number of PPPoE clients in lockout extensive
(sec) condition, and the number of PPPoE clients in a lockout grace period if
Short Cycle Protection is enabled (On):
Current Current lockout time, in seconds; displays 0 (zero) if the PPPoE client is extensive
not undergoing lockout.
Elapsed Time elapsed into the lockout period, in seconds; displays 0 if the PPPoE extensive
client is not undergoing lockout
Next Lockout time, in seconds, that the router uses for the next lockout event; extensive
displays a nonzero value if the PPPoE client is currently in a lockout grace
period.
Sample Output
show pppoe underlying-interfaces brief
user@host> show pppoe underlying-interfaces brief
ge-4/0/3.1 Index 73
Operational States:
State: Static, Dynamic Profile: None,
Max Sessions: 4000, Max Sessions VSA Ignore: Off,
Active Sessions: 0,
Service Name Table: Premium,
Direct Connect: Off,
AC Name: velorum, Duplicate Protection: On,
Short Cycle Protection: Off
ge-4/0/3.2 Index 78
Operational States:
State: Dynamic, Dynamic Profile: PppoeProfile,
Max Sessions: 500, Max Sessions VSA Ignore: Off,
Active Sessions: 3,
Service Name Table: None,
Direct Connect: Off,
AC Name: velorum, Duplicate Protection: On,
Short Cycle Protection: Off
ge-4/0/3.1 Index 73
Operational States:
State: Static, Dynamic Profile: None,
Max Sessions: 4000, Max Sessions VSA Ignore Off,
Active Sessions: 0,
Service Name Table: None,
Direct Connect: Off,
AC Name: velorum, Duplicate Protection: Off,
Short Cycle Protection: Off
PADI 0 0
PADO 0 0
PADR 0 0
PADS 0 0
PADT 0 0
1059
ge-4/0/3.2 Index 78
Operational States:
State: Dynamic, Dynamic Profile: PppoeProfile,
Max Sessions: 4000, Max Sessions VSA Ignore: Off
Active Sessions: 3,
Service Name Table: None,
Direct Connect: Off,
AC Name: velorum, Duplicate Protection: Off,
Short Cycle Protection: Off
ge-1/0/0.0 Index 71
State: Static, Dynamic Profile: None,
Max Sessions: 32000, Max Sessions VSA Ignore: Off,
Active Sessions: 0,
Service Name Table: None,
Direct Connect: Off,
AC name: winona, Duplicate Protection: On,
Short Cycle Protection: Off
PADR 0 3
PADS 3 0
PADT 2 1
Service name error 0 0
AC system error 0 0
Generic error 0 0
Malformed packets 0 0
Unknown packets 0 0
ge-1/0/0.0 Index 71
Short Cycle Protection: Off,
Lockout Time (sec): Min: 10, Max: 60
Total clients in lockout: 0
Total clients in lockout grace period: 0
show pppoe underlying-interfaces detail (Autosensing Configured for ACI-based Dynamic VLANs)
user@host> show pppoe underlying-interfaces demux0.1073741826 detail
show pppoe underlying-interfaces detail (Autosensing Configured for ALI-based Dynamic VLANs)
user@host> show pppoe underlying-interfaces demux0.1073741826 detail
Release Information
Command introduced before Junos OS Release 7.4.
Support for LAC on MX Series routers introduced in Junos OS Release 10.4.
Support for LNS on MX Series routers introduced in Junos OS Release 11.4.
Description
(M10i and M7i routers only) Display information about active L2TP sessions for LNS.
(MX Series routers only) Display information about active L2TP sessions for LAC and LNS.
Options
none—Display standard information about all active L2TP sessions.
interface interface-name—(Optional) Display L2TP session information for only the specified adaptive
services or inline services interface. The interface type depends on the line card as follows:
• si-fpc/pic/port— MPCs on MX Series routers only. This option is not available for L2TP on M Series
routers.
• sp-fpc/pic/port—AS or Multiservices PICs on M7i, M10i, and M120 routers only. This option is not
available for L2TP on MX Series routers.
local-gateway gateway-address—(Optional) Display L2TP session information for only the specified local
gateway address.
local-gateway-name gateway-name—(Optional) Display L2TP session information for only the specified
local gateway name.
1063
local-session-id session-id—(Optional) Display L2TP session information for only the specified local session
identifier.
local-tunnel-id tunnel-id—(Optional) Display L2TP session information for only the specified local tunnel
identifier.
peer-gateway gateway-address—(Optional) Display L2TP session information for only the specified peer
gateway address.
peer-gateway-name gateway-name—(Optional) Display L2TP session information for only the specified
peer gateway name.
statistics—(Optional) Display the number of control packets and bytes transmitted and received for the
session. You cannot include this option with any of the level options, brief, detail, or extensive.
tunnel-group group-name—(Optional) Display L2TP session information for only the specified tunnel group.
To display information about L2TP CPU and memory usage, you can include the tunnel group name
in the show services service-sets memory-usage group-name and show services service-sets cpu-usage
group-name commands. This option is not available for L2TP LAC on MX Series routers.
user username—(M Series routers only) (Optional) Display L2TP session information for only the specified
username.
RELATED DOCUMENTATION
Output Fields
1064
Table 30 on page 1064 lists the output fields for the show services l2tp session command. Output fields are
listed in the approximate order in which they appear.
Tunnel local ID Identifier of the local endpoint of the tunnel, as assigned by the L2TP All levels
network server (LNS).
Session local ID Identifier of the local endpoint of the L2TP session, as assigned by the All levels
LNS.
Session remote Identifier of the remote endpoint of the L2TP session, as assigned by the All levels
ID L2TP access concentrator (LAC).
Bundle ID (LNS only) Bundle identifier. Indicates the session is part of a multilink All levels
bundle. Sessions that have a blank Bundle field are not participating in
the Multilink Protocol. Sessions in a multilink bundle might belong to
different L2TP tunnels. For L2TP output organized by bundle ID, issue
the show services l2tp multilink extensive command.
Mode (LNS) Mode of the interface representing the session: shared or exclusive. extensive
Local IP IP address of local endpoint of the Point-to-Point Protocol (PPP) session. extensive
1065
Username (LNS only) Name of the user logged in to the session. All levels
Local name For LNS, name of the LNS instance in which the session was created. For extensive
LAC, name of the LAC.
Remote name For LNS, name of the LAC from which the session was created. For LAC, extensive
name of the LAC instance.
Local MRU (LNS only) Maximum receive unit (MRU) setting of the local device, in extensive
bytes.
Remote MRU (LNS only) MRU setting of the remote device, in bytes. extensive
Tx speed Transmit speed of the session conveyed from the LAC to the LNS, in bits extensive
per second (bps) and the source method from which the speed is derived.
Starting in Junos OS Release 14.1, either the initial (initial) line speed or
both the initial and current (update) line speeds can be displayed on MX
Series routers:
• When connection speed updates are not enabled, then only the initial
line speed is displayed.
• When connection speed updates are enabled, then both the initial and
the current speeds are displayed.
For Junos OS Release 17.2 and Release 17.3, only the current (update)
line speed can be displayed on MX Series routers.
Starting in Junos OS Release 17.4R1, once again either the initial (initial)
line speed or both the initial and current (update) line speeds can be
displayed on MX Series routers.
Rx speed Receive speed of the session conveyed from the LAC to the LNS, in bits extensive
per second (bps) and the source method from which the speed is derived.
Starting in Junos OS Release 14.1, either the initial (initial) line speed or
both the initial and current (update) line speeds can be displayed on MX
Series routers:
• When connection speed updates are not enabled, then only the initial
line speed is displayed.
• When connection speed updates are enabled, then both the initial and
the current speeds are displayed.
For Junos OS Release 17.2 and Release 17.3, only the current (update)
line speed can be displayed on MX Series routers.
Starting in Junos OS Release 17.4R1, once again either the initial (initial)
line speed or both the initial and current (update) line speeds can be
displayed on MX Series routers.
• 0—Might indicate that the call was not received over a physical link (for
example, when the LAC and PPP are located in the same subsystem).
• 1—Digital access requested.
• 2—Analog access requested.
• 4—Asynchronous Transfer Mode (ATM) bearer support.
• 1—Synchronous framing
• 2—Asynchronous framing
LCP (LNS only) Whether Link Control Protocol (LCP) renegotiation is extensive
renegotiation configured: On or Off.
Interface ID (LNS only) Identifier used to look up the logical interface for this session. extensive
1067
Policer burst size Maximum policer burst size configured for this session. extensive
Create time Date and time when the call was created. extensive
Up time Length of time elapsed since the call became active, in hours, minutes, extensive
and seconds.
Idle time Length of time elapsed since the call became idle, in hours, minutes, and extensive
seconds.
1068
Statistics since Date and time when collection of the following statistics began: extensive
Sample Output
show services l2tp session (LNS on M Series Routers)
user@host> show services l2tp session
ID ID unit Name
17967 1 Established 1073749824 si-5/2/0
Errors Tx 0
Errors Rx 0
show subscribers
Syntax
show subscribers
<detail | extensive | terse>
<aci-interface-set-name aci-interface-set-name>
<address address>
<agent-circuit-identifier agent-circuit-identifier>
<agent-remote-identifier agent-remote-identifier>
<aggregation-interface-set-name interface-set-name>
<client-type client-type>
<count>
<id session-id <accounting-statistics>>
<interface interface <accounting-statistics>>
<logical-system logical-system>
<mac-address mac-address>
<physical-interface physical-interface-name>
<profile-name profile-name>
<routing-instance routing-instance>
<stacked-vlan-id stacked-vlan-id>
<subscriber-state subscriber-state>
<user-name user-name>
<vci vci-identifier>
<vpi vpi-identifier>
<vlan-id vlan-id>
Release Information
Command introduced in Junos OS Release 9.3.
Command introduced in Junos OS Release 9.3 for EX Series switches.
client-type, mac-address, subscriber-state, and extensive options introduced in Junos OS Release 10.2.
count option usage with other options introduced in Junos OS Release 10.2.
Command introduced in Junos OS Release 11.1 for the QFX Series.
Options aci-interface-set-name and agent-circuit-identifier introduced in Junos OS Release 12.2.
The physical-interface and user-name options introduced in Junos OS Release 12.3.
Options vci and vpi introduced in Junos OS Release 12.3R3 and supported in later 12.3Rx releases.
Options vci and vpi supported in Junos OS Release 13.2 and later releases. (Not supported in Junos OS
Release 13.1.)
Command introduced in Junos OS Release 14.1X53-D20 for the OCX Series.
Enhanced subscriber management supported in Junos OS Release 15.1R3 on MX Series routers.
accounting-statistics option added in Junos OS Release 15.1R3 and 17.4R1 on MX Series routers.
aggregation-interface-set-name option added in Junos OS Release 18.4R1 on MX Series routers.
Description
1074
Options
detail | extensive | terse—(Optional) Display the specified level of output.
aci-interface-set-name—(Optional) Display all dynamic subscriber sessions that use the specified agent
circuit identifier (ACI) interface set. Use the ACI interface set name generated by the router, such as
aci-1003-ge-1/0/0.4001, and not the actual ACI value found in the DHCP or PPPoE control packets.
address—(Optional) Display subscribers whose IP address matches the specified address. You must specify
the IPv4 or IPv6 address prefix without a netmask (for example, 192.0.2.0). If you specify the IP address
as a prefix with a netmask (for example, 192.0.2.0/32), the router displays a message that the IP address
is invalid, and rejects the command.
agent-circuit-identifier—(Optional) Display all dynamic subscriber sessions whose ACI value matches the
specified string. You can specify either the complete ACI string or a substring. To specify a substring,
you must enter characters that form the beginning of the string, followed by an asterisk (*) as a wildcard
to substitute for the remainder of the string. The wildcard can be used only at the end of the specified
substring; for example:
Starting in Junos OS Release 14.1R1 You must specify the complete ACI string; you cannot specify
a wildcard.
Starting in Junos OS Release 15.1R7, 16.1R7, 16.2R3, You can specify a substring, but you must include the wildcard
17.1R3, 17.2R3, 17.3R3, 17.4R2, 18.1R2, 18.2R1 character at the end of the substring.
agent-remote-identifier—(Optional) Display all dynamic subscriber sessions whose ARI value matches the
specified string. You must specify the complete ACI string; you cannot specify a wildcard.
client-type—(Optional) Display subscribers whose client type matches one of the following client types:
count—(Optional) Display the count of total subscribers and active subscribers for any specified option.
You can use the count option alone or with the address, client-type, interface, logical-system,
mac-address, profile-name, routing-instance, stacked-vlan-id, subscriber-state, or vlan-id options.
id session-id—(Optional) Display a specific subscriber session whose session ID matches the specified
subscriber ID. You can display subscriber IDs by using the show subscribers extensive or the show
subscribers interface extensive commands.
interface accounting-statistics—(Optional) Display subscriber accounting statistics for the specified interface.
Requires the actual-transmit-statistics statement to be configured in the dynamic profile for the
dynamic logical interface.
logical-system—(Optional) Display subscribers whose logical system matches the specified logical system.
mac-address—(Optional) Display subscribers whose MAC address matches the specified MAC address.
physical-interface-name—(M120, M320, and MX Series routers only) (Optional) Display subscribers whose
physical interface matches the specified physical interface.
profile-name—(Optional) Display subscribers whose dynamic profile matches the specified profile name.
1076
routing-instance—(Optional) Display subscribers whose routing instance matches the specified routing
instance.
stacked-vlan-id—(Optional) Display subscribers whose stacked VLAN ID matches the specified stacked
VLAN ID.
subscriber-state—(Optional) Display subscribers whose subscriber state matches the specified subscriber
state (ACTIVE, CONFIGURED, INIT, TERMINATED, or TERMINATING).
user-name—(M120, M320, and MX Series routers only) (Optional) Display subscribers whose username
matches the specified subscriber name.
vci-identifier—(MX Series routers with MPCs and ATM MICs with SFP only) (Optional) Display active ATM
subscribers whose ATM virtual circuit identifier (VCI) matches the specified VCI identifier. The range
of values is 0 through 255.
vpi-identifier—(MX Series routers with MPCs and ATM MICs with SFP only) (Optional) Display active ATM
subscribers whose ATM virtual path identifier (VPI) matches the specified VPI identifier. The range of
values is 0 through 65,535.
vlan-id—(Optional) Display subscribers whose VLAN ID matches the specified VLAN ID, regardless of
whether the subscriber uses a single-tagged or double-tagged VLAN. For subscribers using a
double-tagged VLAN, this option displays subscribers where the inner VLAN tag matches the specified
VLAN ID. To display only subscribers where the specified value matches only double-tagged VLANs,
use the stacked-vlan-id stacked-vlan-id option to match the outer VLAN tag.
NOTE: Because of display limitations, logical system and routing instance output values are
truncated when necessary.
RELATED DOCUMENTATION
show subscribers aci-interface-set-name detail (Subscriber Sessions Using Specified ACI Interface
Set) on page 1113
show subscribers agent-circuit-identifier detail (Subscriber Sessions Using Specified ACI
Substring) on page 1114
show subscribers id accounting-statistics on page 1115
show subscribers interface accounting-statistics on page 1115
show subscribers interface extensive on page 1116
show subscribers logical-system terse on page 1117
show subscribers physical-interface count on page 1117
show subscribers routing-instance inst1 count on page 1118
show subscribers stacked-vlan-id detail on page 1118
show subscribers stacked-vlan-id vlan-id detail (Combined Output) on page 1118
show subscribers stacked-vlan-id vlan-id interface detail (Combined Output for a Specific
Interface) on page 1118
show subscribers user-name detail on page 1119
show subscribers vlan-id on page 1119
show subscribers vlan-id detail on page 1119
show subscribers vpi vci extensive (PPPoE-over-ATM Subscriber Session) on page 1120
show subscribers address detail (Enhanced Subscriber Management) on page 1120
Output Fields
Table 31 on page 1078 lists the output fields for the show subscribers command. Output fields are listed in
the approximate order in which they appear.
Interface Interface associated with the subscriber. The router or switch displays subscribers whose
interface matches or begins with the specified interface.
IP Address/VLAN ID Subscriber IP address or VLAN ID associated with the subscriber in the form tpid.vlan-id
LS:RI Logical system and routing instance associated with the subscriber.
Type Subscriber client type (DHCP, FWA, GRE, HAG-BUNDLE, HAG-TUNNEL, L2TP, PPP, PPPoE,
STATIC-INTERFACE, VLAN).
1079
(MX Series) This field displays 255.255.255.255 by default. For tunneled or terminated PPP
subscribers only, this field displays the actual value of Framed-IP-Netmask when the
SDB_FRAMED_PROTOCOL attribute in the session database is equal to
AUTHD_FRAMED_PROTOCOL_PPP. This occurs in the use case where the LNS generates
access-internal routes when it receives Framed-IP-Netmask from RADIUS during authorization.
When it receives Framed-Pool from RADIUS, the pool mask is ignored and the default /32
mask is used.
Domain name server IP addresses for the DNS server, displayed in order of configuration.
inet
This field is displayed with the extensive option only when the addresses are derived from
the access profile or the global access configuration.
Domain name server IPv6 addresses for the DNS server, displayed in order of configuration.
inet6
This field is displayed with the extensive option only when the addresses are derived from
the access profile or the global access configuration.
IPv6 Prefix Subscriber IPv6 prefix. If you are using DHCPv6 prefix delegation, this is the delegated prefix.
IPv6 Address Pool Subscriber IPv6 address pool. The IPv6 address pool is used to allocate IPv6 prefixes to the
DHCPv6 clients.
IPv6 Network Prefix Length of the network portion of the IPv6 address.
Length
Interface (Enhanced subscriber management for MX Series routers) Name of the enhanced subscriber
management logical interface, in the form demux0.nnnn (for example, demux0.3221225472),
to which access-internal and framed subscriber routes are mapped.
Interface Set Internally generated name of the dynamic ACI or ALI interface set used by the subscriber
session. The prefix of the name indicates the string received in DHCP or PPPoE control packets
on which the interface set is based. For ALI interface sets, the prefix indicates that the value
is configured as a trusted option to identify the subscriber line.
The name of the interface set uses one of the following prefixes:
• aci—ACI; for example, aci-1033-demux0.3221225524. This is the only prefix allowed for
ACI interface sets.
• ari—ARI; for example, ari-1033-demux0.3221225524.
• aci+ari—Both the ACI and ARI; for example, aci+ari-1033-demux0.3221225524.
• noids—Neither the ACI nor the ARI were received; for example,
noids-1033-demux0.3221225524.
NOTE: ACI interface sets are configured with the agent-circuit-identifier autoconfiguration
stanza. ALI interface sets are configured with the line-identity autoconfiguration stanza.
Besides dynamic ACI and ALI interface sets, this field can be an interface set based on a
substring of the ARI string. This occurs when the dynamic profile includes the predefined
variable $junos-pon-id-interface-set-name, and the profile is applied for a passive optical
network (PON). The ARI string is inserted by the optical line terminal (OLT). The final substring
in the string, unique for the PON, identifies individual subscriber circuits, and is used as the
name of the interface set.
Interface Set Type Interface type of the ACI interface set: Dynamic. This is the only ACI interface set type currently
supported.
Interface Set Session Identifier of the dynamic ACI interface set entry in the session database.
ID
Underlying Interface Name of the underlying interface for the subscriber session.
Dynamic Profile Version number of the dynamic profile used for the subscriber.
Version
State Current state of the subscriber session (Init, Configured, Active, Terminating, Tunneled).
1082
L2TP State Current state of the L2TP session, Tunneled or Tunnel-switched. When the value is
Tunnel-switched, two entries are displayed for the subscriber; the first entry is at the LNS
interface on the LTS and the second entry is at the LAC interface on the LTS.
Tunnel switch Profile Name of the L2TP tunnel switch profile that initiates tunnel switching.
Name
Stacked VLAN Id Stacked VLAN ID associated with the subscriber in the form tpid.vlan-id.
Agent Circuit ID For the dhcp client type, option 82 agent circuit ID associated with the subscriber. The ID is
displayed as an ASCII string unless the value has nonprintable characters, in which case it is
displayed in hexadecimal format.
For the vlan-oob client type, the agent circuit ID or access-loop circuit identifier that identifies
the subscriber line based on the subscriber-facing DSLAM interface on which the subscriber
request originates.
Agent Remote ID For the dhcp client type, option 82 agent remote ID associated with the subscriber. The ID is
displayed as an ASCII string unless the value has nonprintable characters, in which case it is
displayed in hexadecimal format.
For the vlan-oob client type, the agent remote ID or access-loop remote identifier that identifies
the subscriber line based on the NAS-facing DSLAM interface on which the subscriber request
originates.
1083
Accounting Statistics Actual transmitted subscriber accounting statistics by session ID or interface. Service accounting
statistics are not included. These statistics do not include overhead bytes or dropped packets;
they are the accurate statistics used by RADIUS. The statistics are counted when the
actual-transmit-statistics statement is included in the dynamic profile.
ATM VPI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual path identifier (VPI)
on the subscriber’s physical interface.
ATM VCI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual circuit identifier
(VCI) for each VPI configured on the subscriber interface.
Login Time Date and time at which the subscriber logged in.
DHCPV6 Options len = number of hex values in the message. The hex values specify the type, length, value
(TLV) for DHCPv6 options.
Server DHCP len = number of hex values in the message. The hex values specify the type, length, value
Options (TLV) for DHCP options.
Server DHCPV6 len = number of hex values in the message. The hex values specify the type, length, value
Options (TLV) for DHCPv6 options.
DHCPV6 Header len = number of hex values in the message. The hex values specify the type, length, value
(TLV) for DHCPv6 options.
Effective Actual downstream traffic shaping rate for the subscriber, in kilobits per second.
shaping-rate
1084
Dynamic Values for variables that are passed into the dynamic profile from RADIUS.
configuration
Service activation Time at which the first family in this service became active.
time
IPv4 rpf-check Fail Name of the filter applied by the dynamic profile to IPv4 packets that fail the RPF check.
Filter Name
IPv6 rpf-check Fail Name of the filter applied by the dynamic profile to IPv6 packets that fail the RPF check.
Filter Name
DHCP Options len = number of hex values in the message. The hex values specify the type, length, value
(TLV) for DHCP options, as defined in RFC 2132.
Underlying Session For DHCPv6 subscribers on a PPPoE network, displays the session ID of the underlying PPPoE
ID interface.
Service Sessions Number of service sessions (that is, a service activated using RADIUS CoA) associated with
the subscribers.
Session Timeout Number of seconds of access provided to the subscriber before the session is automatically
(seconds) terminated.
1085
Idle Timeout Number of seconds subscriber can be idle before the session is automatically terminated.
(seconds)
IPv6 Delegated Name of the pool used for DHCPv6 prefix delegation.
Address Pool
IPv6 Delegated Length of the prefix configured for the IPv6 delegated address pool.
Network Prefix
Length
IPv6 Interface Address assigned by the Framed-Ipv6-Prefix AAA attribute. This field is displayed only when
Address the predefined variable $junos-ipv6-address is used in the dynamic profile.
ADF IPv4 Input Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 input filter (client or service
Name session). The filter name is followed by the rules (in hexadecimal format) associated with the
ADF filter and the decoded rule in Junos OS filter style.
ADF IPv4 Output Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 output filter (client or service
Filter Name session). The filter name is followed by the rules (in hexadecimal format) associated with the
ADF filter and the decoded rule in Junos OS filter style.
ADF IPv6 Input Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 input filter (client or service
Name session). The filter name is followed by the rules (in hexadecimal format) associated with the
ADF filter and the decoded rule in Junos OS filter style.
ADF IPv6 Output Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 output filter (client or service
Filter Name session). The filter name is followed by the rules (in hexadecimal format) associated with the
ADF filter and the decoded rule in Junos OS filter style.
IPv4 Input Filter Name assigned to the IPv4 input filter (client or service session).
Name
IPv4 Output Filter Name assigned to the IPv4 output filter (client or service session).
Name
IPv6 Input Filter Name assigned to the IPv6 input filter (client or service session).
Name
1086
IPv6 Output Filter Name assigned to the IPv6 output filter (client or service session).
Name
IFL Input Filter Name Name assigned to the logical interface input filter (client or service session).
IFL Output Filter Name assigned to the logical interface output filter (client or service session).
Name
DSL type PPPoE subscriber’s access line type reported by the PPPoE intermediate agent in a PADI or
PADO packet in the Vendor-Specific-Tags TLV in subattribute DSL-Type (0x0091). The DSL
type is one of the following types: ADSL, ADSL2, ADSL2+, OTHER, SDSL, VDSL, or VDSL2.
Frame/Cell Mode Mode type of the PPPoE subscriber’s access line determined by the PPPoE daemon based on
the received subattribute DSL-Type (0x0091):
• Cell—When the DSL line type is one of the following: ADSL, ADSL2, or ADSL2+.
• Frame—When the DSL line type is one of the following: OTHER, SDSL, VDSL, or VDSL2.
The value is stored in the subscriber session database.
Overhead accounting Number of bytes added to or subtracted from the actual downstream cell or frame overhead
bytes to account for the technology overhead of the DSL line type. The value is determined by the
PPPoE daemon based on the received subattribute DSL-Type (0x0091). The value is stored
in the subscriber session database.
Actual upstream data Unadjusted upstream data rate for the PPPoE subscriber’s access line reported by the PPPoE
rate intermediate agent in a PADI or PADO packet in the Vendor-Specific-Tags TLV in subattribute
Actual-Net-Data-Rate-Upstream (0x0081).
Actual downstream Unadjusted downstream data rate for the PPPoE subscriber’s access line reported by the
data rate PPPoE intermediate agent in a PADI or PADO packet in the Vendor-Specific-Tags TLV in
subattribute Actual-Net-Data-Rate-Downstream (0x0082).
Adjusted Adjusted downstream data rate for the PPPoE subscriber’s access line, calculated by the PPPoE
downstream data daemon and stored in the subscriber session database.
rate
Adjusted upstream Adjusted upstream data rate for the PPPoE subscriber’s access line, calculated by the PPPoE
data rate daemon and stored in the subscriber session database.
1087
Local TEID-U Tunnel endpoint identifier on the BNG for the GTP-U user plane tunnel to the eNodeB. The
identifier is allocated by the BNG.
A fully qualified local TEID-C consists of this identifier and the GTPU Tunnel Local IP address
value.
Local TEID-C Tunnel endpoint identifier on the BNG for the GTP-C control plane tunnel to the MME. The
identifier is allocated by the BNG.
A fully qualified local TEID-C consists of this identifier and the GTPC Local IP address value.
Remote TEID-U Tunnel endpoint identifier on the eNodeB for the GTP-U user plane tunnel to the BNG. The
identifier is allocated by the eNodeB.
A fully qualified remote TEID-U consists of this identifier and the GTPU Tunnel Remote IP
address value.
Remote TEID-C Tunnel endpoint identifier on the MME for the GTP-C control plane tunnel to the BNG. The
identifier is allocated by the MME.
A fully qualified remote TEID-C consists of this identifier and the GTPC Remote IP address
value.
GTPU Tunnel IP address of the S1-U interface on the eNodeB for the GTP-U tunnel endpoint.
Remote IP address
A fully qualified remote TEID-U consists of this address and the Remote TEID-U value.
GTPU Tunnel Local IP address of the S1-U interface on the BNG for the GTP-U tunnel endpoint.
IP address
A fully qualified local TEID-U consists of this address and the Local TEID-U value
GTPC Remote IP IP address of the S11 interface on the MME for the GTP-C tunnel endpoint.
address
A fully qualified remote TEID-C consists of this address and the Remote TEID-C value.
GTPC Local IP IP address of the S11 interface on the BNG for the GTP-C tunnel endpoint.
address
A fully qualified local TEID-C consists of this address and the Local TEID-C value.
Access Point Name Access point name (APN) for the user equipment. The APN corresponds to the connection
and service parameters that the subscriber’s mobile device can use for connecting to the
carrier’s gateway to the Internet.
1088
HAG Session ID ID number for the hybrid access gateway session. Sharing this ID bonds the DSL and LTE
tunnels that make up the bundle.
Sample Output
show subscribers (IPv4)
user@host> show subscribers
Type: DHCP
User Name: dual-stack-retail33
IP Address: 10.10.0.53
IPv6 Address: 2001:db8:3000:0:0:8003::2
IPv6 Prefix: 2001:db8:3ffe:0:4::/64
Logical System: default
Routing Instance: default
Interface: ae0.3221225472
Interface type: Static
Underlying Interface: ae0.3221225472
Dynamic Profile Name: dhcp-retail-18
MAC Address: 00:00:5E:00:53:02
State: Active
DHCP Relay IP Address: 10.10.0.1
Radius Accounting ID: 27
Session ID: 27
PFE Flow ID: 2
Stacked VLAN Id: 2000
VLAN Id: 1
Login Time: 2014-05-15 10:12:10 PDT
DHCP Options: len 60
00 08 00 02 00 00 00 01 00 0a 00 03 00 01 00 00 64 01 01 02
1090
00 06 00 04 00 03 00 19 00 03 00 0c 00 00 00 00 00 00 00 00
00 00 00 00 00 19 00 0c 00 00 00 00 00 00 00 00 00 00 00 00
Type: DHCP
IP Address: 203.0.113.29
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: demux0.1073744127
1091
Type: DHCP
IP Address: 203.0.113.27
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: demux0.1073744383
Interface type: Dynamic
Dynamic Profile Name: dhcp-demux-prof
MAC Address: 00:00:5e:00:53:f3
State: Active
Radius Accounting ID: 1234 :2560
Login Time: 2009-08-25 14:43:56 PDT
Type: DHCP
User Name: DEFAULTUSER
IPv6 Address: 2001:db8::2
IPv6 Prefix: 2001:db8:1::/64
Logical System: default
Routing Instance: default
Interface: demux0.3221225602
Interface type: Static
Underlying Interface: demux0.3221225602
Dynamic Profile Name: client-profile
MAC Address: 00:00:5E:00:53:01
State: Active
Radius Accounting ID: 142
Session ID: 142
PFE Flow ID: 148
Stacked VLAN Id: 1
VLAN Id: 1
Login Time: 2018-03-29 12:27:38 EDT
DHCP Options: len 56
00 08 00 02 00 00 00 01 00 0e 00 01 00 01 22 4f d0 33 00 11
1092
01 00 00 01 00 03 00 0c 00 00 00 0a 00 04 9d 40 00 07 62 00
00 19 00 0c 00 00 00 0b 00 04 9d 40 00 07 62 00
Server DHCPV6 Options: len 94
00 0a 00 06 11 22 33 44 55 66 00 11 00 09 00 00 0c 4c 00 02
00 01 aa 00 11 00 20 00 00 0a 4c 00 02 00 02 32 33 00 03 00
03 34 35 36 00 05 00 06 31 32 33 34 35 36 00 06 00 01 31 00
11 00 09 00 00 0b 4c 00 02 00 01 bb 00 11 00 12 00 00 0d e9
00 01 00 03 aa bb cc 00 02 00 03 dd ee cc
DHCPV6 Header: len 4
01 fc e4 96
Type: DHCP
User Name: user
IP Address: 192.0.2.4
IP Netmask: 255.0.0.0
IPv6 Address: 2001:db8:3::103
IPv6 Prefix: 2001:db8::/68
Domain name server inet6: 2001:db8:1 abcd::2
Logical System: default
Routing Instance: default
Interface: ge-0/0/0.0
Interface type: Static
Underlying Interface: ge-0/0/0.0
MAC Address: 00:00:5e:00:53:01
State: Configured
Radius Accounting ID: 10
Session ID: 10
PFE Flow ID: 2
VLAN Id: 100
Agent Circuit ID: ge-0/0/0:100
Agent Remote ID: ge-0/0/0:100
Login Time: 2017-05-23 12:52:22 IST
DHCPV6 Options: len 69
00 01 00 0e 00 01 00 01 59 23 e3 31 00 10 94 00 00 01 00 08
00 02 00 00 00 19 00 29 00 00 00 00 00 04 9d 40 00 07 62 00
00 1a 00 19 00 09 3a 80 00 27 8d 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00
Server DHCP Options: len 13
3a 04 00 00 00 ff 00 3b 04 00 00 0f 00
Server DHCPV6 Options: len 8
1093
00 0a 00 04 ab cd ef ab
DHCPV6 Header: len 4
01 00 00 04
IP Address Pool: al_pool30
IPv6 Address Pool: ia_na_pool
IPv6 Delegated Address Pool: prefix_delegate_pool
Type: FWA
User Name: 505024101215074
IP Address: 192.0.2.10
IP Netmask: 255.255.0.0
Interface: ps1.3221225472
Interface type: Dynamic
Dynamic Profile Name: fwa-profile
State: Active
Radius Accounting ID: 1
Session ID: 1
PFE Flow ID: 11
Login Time: 2019-04-10 14:10:12 PDT
Local TEID-U: 1
Local TEID-C: 1
Remote TEID-U: 2000000
Remote TEID-C: 1000000
GTPU Tunnel Remote IP Address: 203.0.113.1.3
GTPU Tunnel Local IP Address: 203.0.113.2.5
GTPC Remote IP Address: 203.0.113.1.2
1094
Type: HAG-BUNDLE
User Name: user1
Logical System: default
Routing Instance: default
Interface: ps0.3221225473
Interface type: Dynamic
Dynamic Profile Name: hag-dyn-profile
State: Active
Radius Accounting ID: 2
Session ID: 2
HAG Session ID: 1634170802
PFE Flow ID: 9
Login Time: 2019-08-13 16:36:02 EDT
Type: HAG-TUNNEL
User Name: user1
Logical System: default
Routing Instance: default
Interface: ps0.3221225472
Interface type: Dynamic
Dynamic Profile Name: hag-access-line-profile
State: Active
Session ID: 1
Bundle Session ID: 2
HAG Session ID: 1634170802
HAG Tunnel Type: LTE
PFE Flow ID: 7
Login Time: 2019-08-13 16:36:02 EDT
Type: HAG-TUNNEL
User Name: user1
Logical System: default
Routing Instance: default
Interface: ps0.3221225474
Interface type: Dynamic
Dynamic Profile Name: hag-access-line-profile
State: Active
Session ID: 3
Bundle Session ID: 2
HAG Session ID: 1634170802
HAG Tunnel Type: DSL
PFE Flow ID: 10
Login Time: 2019-08-13 16:36:02 EDT
Type: VLAN-OOB
User Name: L2WS.line-aci-1.line-ari-1
Logical System: default
Routing Instance: ISP1
Interface: demux0.1073744127
Interface type: Dynamic
Underlying Interface: ge-1/0/0
1096
Type: PPPoE
User Name: pppoeTerV6User1Svc
IP Address: 203.0.113.137
IP Netmask: 255.0.0.0
IPv6 User Prefix: 2001:db8:0:c88::/32
Logical System: default
Routing Instance: default
Interface: pp0.1073745151
Interface type: Dynamic
Underlying Interface: demux0.8201
Dynamic Profile Name: pppoe-client-profile
MAC Address: 00:00:5e:00:53:53
Session Timeout (seconds): 31622400
Idle Timeout (seconds): 86400
State: Active
Radius Accounting ID: example demux0.8201:6544
Session ID: 6544
Agent Circuit ID: ifl3720
Agent Remote ID: ifl3720
1097
Type: DHCP
IP Address: 203.0.113.29
IP Netmask: 255.255.0.0
Primary DNS Address: 192.0.2.0
Secondary DNS Address: 192.0.2.1
Primary WINS Address: 192.0.2.3
Secondary WINS Address: 192.0.2.4
Logical System: default
Routing Instance: default
Interface: demux0.1073744127
Interface type: Dynamic
Dynamic Profile Name: dhcp-demux-prof
MAC Address: 00:00:5e:00:53:98
State: Active
Radius Accounting ID: example :2304
Idle Timeout (seconds): 600
Login Time: 2009-08-25 14:43:52 PDT
DHCP Options: len 52
35 01 01 39 02 02 40 3d 07 01 00 10 94 00 00 08 33 04 00 00
00 3c 0c 15 63 6c 69 65 6e 74 5f 50 6f 72 74 20 2f 2f 36 2f
33 2d 37 2d 30 37 05 01 06 0f 21 2c
Service Sessions: 2
Type: DHCP
User Name: pd-user1
IPv6 Prefix: 2001:db8:ffff:1::/32
Logical System: default
Routing Instance: default
Interface: ge-3/1/3.2
Interface type: Static
MAC Address: 00:00:5e:00:53:03
State: Active
1098
demux0.3221225487 1 default:default
Type: STATIC-INTERFACE
User Name: [email protected]
IPv6 Prefix: 2001:db8:3:4:5:6:7:aa/32
Logical System: default
Routing Instance: default
Interface: demux0.1
Interface type: Static
Dynamic Profile Name: junos-default-profile
State: Active
Radius Accounting ID: 185
Login Time: 2010-05-18 14:33:56 EDT
Type: L2TP
User Name: [email protected]
IP Address: 203.0.113.58
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: si-5/2/0.1073749824
Interface type: Dynamic
Dynamic Profile Name: dyn-lns-profile2
Dynamic Profile Version: 1
State: Active
Radius Accounting ID: 8001
Session ID: 8001
Login Time: 2011-04-25 20:27:50 IST
Type: L2TP
User Name: [email protected]
Logical System: default
Routing Instance: default
Interface: si-2/1/0.1073741842
Interface type: Dynamic
Dynamic Profile Name: dyn-lts-profile
State: Active
L2TP State: Tunnel-switched
Tunnel switch Profile Name: ce-lts-profile
Local IP Address: 203.0.113.51
Remote IP Address: 192.0.2.0
Radius Accounting ID: 21
Session ID: 21
Login Time: 2013-01-18 03:01:11 PST
Type: L2TP
User Name: [email protected]
Logical System: default
Routing Instance: default
Interface: si-2/1/0.1073741843
Interface type: Dynamic
Dynamic Profile Name: dyn-lts-profile
State: Active
L2TP State: Tunnel-switched
1100
Type: PPPoE
User Name: [email protected]
Logical System: default
Routing Instance: default
Interface: pp0.1
State: Active, Tunneled
Radius Accounting ID: 512
Type: VLAN
Logical System: default
Routing Instance: default
Interface: demux0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlanProfile
State: Active
Session ID: 1
Stacked VLAN Id: 0x8100.1001
VLAN Id: 0x8100.1
Login Time: 2011-11-30 00:18:04 PST
Type: PPPoE
User Name: [email protected]
IP Address: 203.0.113.13
IPv6 Prefix: 2001:db8:1::/32
IPv6 User Prefix: 2001:db8:1:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
1101
Type: DHCP
IPv6 Prefix: 2001:db8:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: test :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ge-1/0/0
Interface Set: aci-1001-ge-1/0/0.2800
Interface Set Session ID: 0
Underlying Interface: ge-1/0/0.2800
Dynamic Profile Name: aci-vlan-set-profile-2
Dynamic Profile Version: 1
State: Active
Session ID: 1
Agent Circuit ID: aci-ppp-dhcp-20
Login Time: 2012-05-26 01:54:08 PDT
1102
show subscribers detail (PPPoE Subscriber Session with ACI Interface Set)
user@host> show subscribers detail
Type: PPPoE
User Name: ppphint2
IP Address: 203.0.113.15
Logical System: default
Routing Instance: default
Interface: pp0.1073741825
Interface type: Dynamic
Interface Set: aci-1001-demux0.1073741824
Interface Set Type: Dynamic
Interface Set Session ID: 2
Underlying Interface: demux0.1073741824
Dynamic Profile Name: aci-vlan-pppoe-profile
Dynamic Profile Version: 1
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 3
Session ID: 3
Agent Circuit ID: aci-ppp-dhcp-dvlan-50
Login Time: 2012-03-07 13:46:53 PST
Type: DHCP
User Name: pd-user1
IPv6 Prefix: 2001:db8:ffff:1::/32
Logical System: default
Routing Instance: default
Interface: ge-3/1/3.2
Interface type: Static
MAC Address: 00:00:5e:00:53:03
State: Active
Radius Accounting ID: 1
Session ID: 1
Login Time: 2011-08-25 12:12:26 PDT
DHCP Options: len 42
00 08 00 02 00 00 00 01 00 0a 00 03 00 01 00 51 ff ff 00 03
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
1103
show subscribers extensive (Aggregation Node Interface Set and DSL Forum Attributes)
user@host> show subscribers extensive
Type: VLAN-OOB
User Name: ancp
Logical System: default
Routing Instance: isp1-subscriber
Interface: ge-1/0/0.3221225472
Interface type: Dynamic
Interface Set: FRA-DPU-C-100
Underlying Interface: ge-1/0/0
Core IFL Name: ge-1/0/4.0
Dynamic Profile Name: Prof_L2BSA
State: Active
Radius Accounting ID: 1
Session ID: 1
PFE Flow ID: 13
VLAN Id: 50
VLAN Map Id: 20
Inner VLAN Map Id: 1
Inner VLAN Tag Protocol Id: 0x88a8
Agent Circuit ID: circuit 201
Agent Remote ID: remote-id
Aggregation Interface-set Name: FRA-DPU-C-100
Login Time: 2018-05-29 08:43:42 EDT
Accounting interval: 72000
Dynamic configuration:
junos-cos-scheduler-map: 100m
junos-inner-vlan-tag-protocol-id: 0x88a8
junos-vlan-map-id: 20
Type: PPPoE
IP Address: 192.85.128.1
IP Netmask: 255.255.255.255
Logical System: default
Routing Instance: default
Interface: pp0.3221225474
Interface type: Dynamic
Interface Set: ge-1/0/0
Underlying Interface: demux0.3221225473
1104
Type: DHCP
IP Address: 192.0.2.136
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: demux0.1073741842
Interface type: Dynamic
1105
show subscribers extensive (DNS Addresses from Access Profile or Global Configuration)
user@host> show subscribers extensive
Type: DHCP
User Name: test-user@example-com
IP Address: 192.0.2.119
IP Netmask: 255.255.255.255
Domain name server inet: 198.51.100.1 198.51.100.2
IPv6 Address: 2001:db8::1:11
Domain name server inet6: 2001:db8:5001::12 2001:db8:3001::12
Logical System: default
Routing Instance: default
Interface: ge-2/0/3.0
Interface type: Static
Underlying Interface: ge-2/0/3.0
MAC Address: 00:00:5E:00:53:00
State: Active
Radius Accounting ID: 5
Session ID: 5
Login Time: 2017-01-31 11:16:21 IST
DHCP Options: len 53
35 01 01 39 02 02 40 3d 07 01 00 10 94 00 00 03 33 04 00 00
00 3c 0c 16 63 6c 69 65 6e 74 5f 50 6f 72 74 20 2f 2f 35 2f
1106
31 32 2d 30 2d 30 37 05 01 06 0f 21 2c
IP Address Pool: v4-pool
Type: DHCP
User Name: test-user@example-com
IP Address: 192.0.2.119
IP Netmask: 255.255.255.255
Primary DNS Address: 198.51.100.1
Secondary DNS Address: 198.51.100.2
IPv6 Address: 2001:db8::1:11
IPv6 Primary DNS Address: 2001:db8:5001::12
IPv6 Secondary DNS Address: 2001:db8:3001::12
Logical System: default
Routing Instance: default
Interface: ge-2/0/3.0
Interface type: Static
Underlying Interface: ge-2/0/3.0
MAC Address: 00:00:5E:00:53:00
State: Active
Radius Accounting ID: 5
Session ID: 5
Login Time: 2017-01-31 11:16:21 IST
DHCP Options: len 53
35 01 01 39 02 02 40 3d 07 01 00 10 94 00 00 03 33 04 00 00
00 3c 0c 16 63 6c 69 65 6e 74 5f 50 6f 72 74 20 2f 2f 35 2f
31 32 2d 30 2d 30 37 05 01 06 0f 21 2c
IP Address Pool: v4-pool
show subscribers extensive (IPv4 DNS Addresses from RADIUS, IPv6 from Access Profile or Global
Configuration)
user@host> show subscribers extensive
Type: DHCP
User Name: test-user@example-com
IP Address: 192.0.2.119
IP Netmask: 255.255.255.255
Primary DNS Address: 198.51.100.1
Secondary DNS Address: 198.51.100.2
1107
...
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ae0.1073741824
Interface type: Dynamic
Dynamic Profile Name: vlan-prof
State: Active
Session ID: 9
VLAN Id: 100
Login Time: 2011-08-26 08:17:00 PDT
IPv4 rpf-check Fail Filter Name: rpf-allow-dhcp
IPv6 rpf-check Fail Filter Name: rpf-allow-dhcpv6
...
Type: L2TP
User Name: [email protected]
1108
IP Address: 203.0.113.58
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: si-5/2/0.1073749824
Interface type: Dynamic
Dynamic Profile Name: dyn-lns-profile2
Dynamic Profile Version: 1
State: Active
Radius Accounting ID: 8001
Session ID: 8001
Login Time: 2011-04-25 20:27:50 IST
IPv4 Input Filter Name: classify-si-5/2/0.1073749824-in
IPv4 Output Filter Name: classify-si-5/2/0.1073749824-out
Type: VLAN
Logical System: default
Routing Instance: default
Interface: demux0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlanProfile
State: Active
Session ID: 1
Stacked VLAN Id: 0x8100.1001
VLAN Id: 0x8100.1
Login Time: 2011-11-30 00:18:04 PST
Type: PPPoE
User Name: [email protected]
IP Address: 203.0.113.13
IPv6 Prefix: 2001:db8:1::/32
IPv6 User Prefix: 2001:db8:1:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
Dynamic Profile Name: dualStack-Profile1
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 2
1109
Session ID: 2
Login Time: 2011-11-30 00:18:05 PST
IPv6 Delegated Network Prefix Length: 48
IPv6 Interface Address: 2001:db8:2016:1:1::1/64
IPv6 Framed Interface Id: 1:1:2:2
IPv4 Input Filter Name: FILTER-IN-pp0.1073741825-in
IPv4 Output Filter Name: FILTER-OUT-pp0.1073741825-out
IPv6 Input Filter Name: FILTER-IN6-pp0.1073741825-in
IPv6 Output Filter Name: FILTER-OUT6-pp0.1073741825-out
Type: DHCP
IPv6 Prefix: 2001:db8:1::/32
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: test :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
IPv6 Delegated Network Prefix Length: 48
...
Service Session ID: 12
Service Session Name: SERVICE-PROFILE
State: Active
Family: inet
ADF IPv4 Input Filter Name: __junos_adf_12-demux0.3221225474-inet-in
Rule 0: 010101000b0101020b020200201811
from {
source-address 203.0.113.232;
destination-address 198.51.100.0/24;
protocol 17;
1110
}
then {
accept;
}
Type: VLAN
Logical System: default
Routing Instance: default
Interface: demux0.1073741837
Interface type: Dynamic
Interface Set: ifset-1
Underlying Interface: ae1
Dynamic Profile Name: svlan-dhcp-test
State: Active
Session ID: 1
Stacked VLAN Id: 0x8100.201
VLAN Id: 0x8100.201
Login Time: 2011-11-30 00:18:04 PST
Effective shaping-rate: 31000000k
...
Type: PPPoE
IP Address: 198.51.100.1
IP Netmask: 255.255.255.255
Logical System: default
Routing Instance: default
Interface: pp0.3221225475
Interface type: Dynamic
Underlying Interface: demux0.3221225474
Dynamic Profile Name: pppoe-client-profile-with-cos
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 4
Session ID: 4
PFE Flow ID: 14
1111
Type: VLAN
Logical System: default
Routing Instance: default
Interface: demux0.3221225517
Interface type: Dynamic
Underlying Interface: ge-1/0/3
Dynamic Profile Name: svlan-dhcp
State: Active
Session ID: 59
PFE Flow ID: 71
Stacked VLAN Id: 0x8100.1
VLAN Id: 0x8100.2
Login Time: 2017-03-28 08:23:08 PDT
Type: DHCP
User Name: pcefuser
IP Address: 192.0.2.26
IP Netmask: 255.0.0.0
Logical System: default
Routing Instance: default
Interface: demux0.3221225518
Interface type: Dynamic
Underlying Interface: demux0.3221225517
Dynamic Profile Name: dhcp-client-prof
MAC Address: 00:00:5e:00:53:01
State: Active
Radius Accounting ID: 60
Session ID: 60
PFE Flow ID: 73
Stacked VLAN Id: 1
VLAN Id: 2
Login Time: 2017-03-28 08:23:08 PDT
Service Sessions: 1
1113
show subscribers aci-interface-set-name detail (Subscriber Sessions Using Specified ACI Interface Set)
user@host> show subscribers aci-interface-set-name aci-1003-ge-1/0/0.4001 detail
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-set-profile
Dynamic Profile Version: 1
State: Active
Session ID: 13
Agent Circuit ID: aci-ppp-vlan-10
1114
Type: PPPoE
User Name: ppphint2
IP Address: 203.0.113.17
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
Interface type: Dynamic
Interface Set: aci-1003-ge-1/0/0.4001
Interface Set Type: Dynamic
Interface Set Session ID: 13
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-pppoe-profile
Dynamic Profile Version: 1
MAC Address:
State: Active
Radius Accounting ID: 14
Session ID: 14
Agent Circuit ID: aci-ppp-vlan-10
Login Time: 2012-03-12 10:41:57 PDT
show subscribers agent-circuit-identifier detail (Subscriber Sessions Using Specified ACI Substring)
user@host> show subscribers agent-circuit-identifier aci-ppp-vlan detail
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-set-profile
Dynamic Profile Version: 1
State: Active
Session ID: 13
Agent Circuit ID: aci-ppp-vlan-10
Login Time: 2012-03-12 10:41:56 PDT
Type: PPPoE
User Name: ppphint2
IP Address: 203.0.113.17
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
1115
Input packets: 0
Output packets: 0
Type: VLAN
User Name: [email protected]
Logical System: default
Routing Instance: testnet
Interface: demux0.1073741826
Interface type: Dynamic
Dynamic Profile Name: profile-vdemux-relay-23qos
MAC Address: 00:00:5e:00:53:04
State: Active
Radius Accounting ID: 12
Session ID: 12
Stacked VLAN Id: 0x8100.1500
VLAN Id: 0x8100.2902
1117
Type: DHCP
User Name: [email protected]
IP Address: 192.0.2.0
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: testnet
Interface: demux0.1073741826
Interface type: Static
MAC Address: 00:00:5e:00:53:04
State: Active
Radius Accounting ID: 21
Session ID: 21
Login Time: 2011-10-20 16:24:33 EST
Service Sessions: 2
Type: VLAN
Interface: ge-1/2/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlan-prof
State: Active
Stacked VLAN Id: 0x8100.101
VLAN Id: 0x8100.100
Login Time: 2009-03-27 11:57:19 PDT
Type: VLAN
Interface: ge-1/2/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlan-prof
State: Active
Stacked VLAN Id: 0x8100.101
VLAN Id: 0x8100.100
Login Time: 2009-03-27 11:57:19 PDT
show subscribers stacked-vlan-id vlan-id interface detail (Combined Output for a Specific Interface)
user@host> show subscribers stacked-vlan-id 101 vlan-id 100 interface ge-1/2/0.* detail
Type: VLAN
Interface: ge-1/2/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlan-prof
State: Active
Stacked VLAN Id: 0x8100.101
1119
Type: DHCP
User Name: larry1
IP Address: 203.0.113.37
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.1
Interface type: Static
Dynamic Profile Name: foo
MAC Address: 00:00:5e:00:53:01
State: Active
Radius Accounting ID: 1
Session ID: 1
Login Time: 2011-11-07 08:25:59 PST
DHCP Options: len 52
35 01 01 39 02 02 40 3d 07 01 00 10 94 00 00 01 33 04 00 00
00 3c 0c 15 63 6c 69 65 6e 74 5f 50 6f 72 74 20 2f 2f 32 2f
37 2d 30 2d 30 37 05 01 06 0f 21 2c
Type: VLAN
Interface: ge-1/0/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: vlan-prof-tpid
1120
State: Active
VLAN Id: 100
Login Time: 2009-03-11 06:48:54 PDT
Type: VLAN
Interface: ge-1/2/0.1073741825
Interface type: Dynamic
Dynamic Profile Name: vlan-prof-tpid
State: Active
VLAN Id: 100
Login Time: 2009-03-11 06:48:54 PDT
Type: PPPoE
User Name: testuser
IP Address: 203.0.113.2
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: pp0.0
Interface type: Static
MAC Address: 00:00:5e:00:53:02
State: Active
Radius Accounting ID: 2
Session ID: 2
ATM VPI: 40
ATM VCI: 50
Login Time: 2012-12-03 07:49:26 PST
IP Address Pool: pool_1
IPv6 Framed Interface Id: 200:65ff:fe23:102
Type: DHCP
User Name: simple_filters_service
IP Address: 203.0.113.111
IP Netmask: 255.0.0.0
Logical System: default
1121
Release Information
Command introduced in Junos OS Release 10.2.
Description
Display summary information for subscribers.
Options
none—Display summary information by state and client type for all subscribers.
detail | extensive | terse—(Not supported on MX Series routers) (Optional) Display the specified level of
output.
count—(Not supported on MX Series routers) (Optional) Display the count of total subscribers and active
subscribers for any specified option.
logical-system logical-system—(Optional) Display subscribers whose logical system matches the specified
logical system.
pic—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers by PIC number
and the total number of subscribers.
port—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers by port number
and the total number of subscribers.
slot—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers by FPC slot
number and the total number of subscribers.
1123
NOTE: Due to display limitations, logical system and routing instance output values are truncated
when necessary.
RELATED DOCUMENTATION
Output Fields
Table 32 on page 1124 lists the output fields for the show subscribers summary command. Output fields
are listed in the approximate order in which they appear.
1124
Subscribers by State Number of subscribers summarized by state. The summary information detail none
includes the following:
Subscribers by Client Number of subscribers summarized by client type. Client types can detail extensive none
Type include DHCP, GRE, HAG-BUNDLE, HAG-TUNNEL, L2TP, PPP,
PPPoE, STATIC-INTERFACE, VLAN, and VLAN-OOB. Also displays
the total number of subscribers for all client types (Total).
Subscribers by LS:RI Number of subscribers summarized by logical system:routing instance detail none
(LS:RI) combination. Also displays the total number of subscribers for
all LS:RI combinations (Total).
Interface Interface associated with the subscriber. The router or switch displays All levels
subscribers whose interface matches or begins with the specified
interface.
For pseudowire IFDs, this field displays both the pseudowire and the
associated logical tunnel (LT) and redundant logical tunnel (RLT) anchor
interface. For example:
ps0: lt-2/1/0
ps1: rlt0: lt-4/0/0
1125
Count Count of subscribers displayed for each PIC, port, or slot when those detail extensive none
options are specified with the summary option. For an aggregated
Ethernet configuration, the total subscriber count does not equal the
sum of the individual PIC, port, or slot counts, because each subscriber
can be in more than one aggregated Ethernet link.
Total Subscribers Total number of subscribers for all physical interfaces, all PICs, all detail extensive none
ports, or all LS:RI slots.
LS:RI Logical system and routing instance associated with the subscriber. terse
Sample Output
show subscribers summary
user@host> show subscribers summary
Subscribers by State
Init 3
Configured 2
Active 188
Terminating 2
Terminated 1
TOTAL 191
1126
Subscribers by State
Init 3
Configured 2
Active 183
Terminating 2
Terminated 1
TOTAL 191
TOTAL 191
Subscribers by LS:RI
default:default 1
default:ri1 28
default:ri2 16
ls1:default 22
ls1:riA 38
ls1:riB 44
logsysX:routinstY 42
TOTAL 191
Subscribers by State
Active: 3998
Total: 3998
Subscribers by LS:RI
default:default: 3998
Total: 3998
Subscribers by State
Active: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Subscribers by State
Active: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
1128
Subscribers by State
Active: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Interface Count
ge-1/0 1000
ge-1/3 1000
Interface Count
ae0: ge-1/0 801
ae0: ge-1/3 801
Interface Count
ge-5/0/1 201
ge-5/0/2 301
1129
ps0: lt-2/1/0 10
ps1: lt-2/1/0 20
Total Subscribers: 30
Interface: ge-5/0/1
Count: 201
Detail:
Subscribers by Client Type
DHCP: 100
PPPoE: 100
VLAN-OOB: 1
Subscribers by Connection Type
Terminated: 200
Cross-connected: 1
Interface: ge-5/0/2
Count: 301
Detail:
Subscribers by Client Type
DHCP: 200
PPPoE: 100
VLAN-OOB: 1
Subscribers by Connection Type
Terminated: 300
Cross-connected: 1
Interface Count
ge-1 2000