Broadband Subscriber Services Feature Guide - 14.2
Broadband Subscriber Services Feature Guide - 14.2
Broadband Subscriber Services Feature Guide - 14.2
Release
14.2
Published: 2015-02-02
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS Broadband Subscriber Services Feature Guide
14.2
Copyright © 2015, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.
Part 6 Troubleshooting
Chapter 41 Contacting Juniper Networks Technical Support . . . . . . . . . . . . . . . . . . . . . 439
Collecting Subscriber Access Logs Before Contacting Juniper Networks Technical
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Chapter 42 CoS System Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
COSD_AGGR_CONFIG_INVALID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
COSD_CHASSIS_SCHED_MAP_INVALID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
COSD_CLASSIFIER_NO_SUPPORT_LSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
COSD_CLASS_8021P_UNSUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
COSD_CLASS_NO_SUPPORT_IFD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
COSD_CLASS_NO_SUPPORT_L3_IFL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
COSD_CONF_OPEN_FAILURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
COSD_DB_OPEN_FAILED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
COSD_EXACT_RATE_UNSUPP_INTERFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
COSD_EXACT_RATE_UNSUPP_SESSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
COSD_EXP_RW_L2_IFL_NOT_SUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
COSD_FRAGMENTATION_MAP_CONFLICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
COSD_HIGH_PRIO_QUEUES_INTERFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
COSD_HIGH_PRIO_QUEUES_SESSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
COSD_IFD_OUTPUT_SHAPING_RATE_ERR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
COSD_IFD_SHAPER_ERR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
COSD_INTERFACE_NO_MEDIA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
COSD_L2TP_COS_NOT_CONFIGURED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
COSD_L2TP_COS_NOT_SUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
COSD_L2TP_SHAPING_NOT_CONFIGURED . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
COSD_LARGE_DELAY_BUFFER_INVALID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
COSD_MALLOC_FAILED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
COSD_MAX_FORWARDING_CLASSES_ABC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
COSD_MPLS_DSCP_CLASS_NO_SUPPORT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
COSD_MULTILINK_CLASS_CONFLICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
COSD_NULL_INPUT_ARGUMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
COSD_OUT_OF_DEDICATED_QUEUES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
COSD_RATE_LIMIT_INVALID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
COSD_RATE_LIMIT_NOT_SUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
COSD_REWRITE_RULE_LIMIT_EXCEEDED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
COSD_RL_IFL_NEEDS_SHAPING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
COSD_SCHEDULER_MAP_CONFLICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
COSD_SCHED_AVG_CONST_UNSUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . 454
COSD_SCHED_MAP_GROUP_CONFLICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
COSD_SHAPER_GROUP_CONFLICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
COSD_STREAM_IFD_CREATE_FAILURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
COSD_TIMER_ERROR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
COSD_TRICOLOR_ALWAYS_ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
COSD_TRICOLOR_NOT_SUPPORTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
COSD_TX_QUEUE_RATES_TOO_HIGH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
COSD_UNKNOWN_CLASSIFIER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
COSD_UNKNOWN_REWRITE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
COSD_UNKNOWN_TRAFFIC_CLASS_MAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
COSD_UNKNOWN_TRANSLATION_TABLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
committed-information-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
connection-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
delay-buffer-rate (Dynamic Traffic Shaping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
destination-address (Captive Portal Content Delivery) . . . . . . . . . . . . . . . . . . . . 517
destination-address (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . 517
destination-prefix-list (Captive Portal Content Delivery) . . . . . . . . . . . . . . . . . . . 518
destination-port (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
disable (Dynamic IGMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
disable (Dynamic MLD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
drop-policy (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
drop-profile (Dynamic Schedulers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
drop-profile-map (Dynamic Schedulers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
dscp (Dynamic Classifiers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
dscp (Dynamic Rewrite Rules) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
dscp (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
dscp-ipv6 (Dynamic Classifiers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
dscp-ipv6 (Dynamic Rewrite Rules) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
dynamic-class-of-service-options (Dynamic Traffic Shaping) . . . . . . . . . . . . . . 526
dynamic-profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
effective-shaping-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
enhanced-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
enhanced-mode-override . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
enhanced-policer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
excess-burst-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
excess-priority (Dynamic Schedulers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
excess-rate (Dynamic Schedulers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
excess-rate (Dynamic Traffic Shaping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
excess-rate-high (Dynamic Traffic Shaping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
excess-rate-low (Dynamic Traffic Shaping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
exclude (Dynamic MLD Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
fail-filter (Dynamic Profiles) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
family (Dynamic Firewalls) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
family (Dynamic Standard Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
fast-update-filter (Dynamic Firewalls) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
filter (Configuring) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
filter (Dynamic Firewalls) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
filter (Dynamic Interface Unit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
filter-specific . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
firewall (Dynamic Firewalls) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
flow-tap-dtcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
forwarding-class (Dynamic Scheduler Maps) . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
forwarding-class (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
fpc (MX Series 3D Universal Edge Routers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
frame-mode (Dynamic Traffic Shaping) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
from (Captive Portal Content Delivery) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
from (Subscriber Secure Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
group (Dynamic IGMP Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
group (Dynamic MLD Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
group-count (Dynamic MLD Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Part 8 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• MX Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see the CLI User Guide.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xxix defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
This topic describes class-of-service (CoS) functionality for dynamic subscriber access.
Junos CoS enables you to divide traffic into classes and offer various levels of throughput
and packet loss when congestion occurs. This functionality allows packet loss to happen
according to rules that you configure. The Junos CoS features provide a set of mechanisms
that you can use to provide differentiated services when best-effort traffic delivery is
insufficient.
In a subscriber access environment, service providers want to provide video, voice, and
data services over the same network for subscribers. Subscriber traffic is delivered from
the access network, through a router, through a switched Ethernet network, to an Ethernet
digital subscriber line access multiplexer (DSLAM). The DSLAM forwards the subscriber’s
traffic to the residential gateway over a digital subscriber line (DSL). An MX Series router
that is installed in a subscriber access network as an edge router can perform subscriber
management functions that include subscriber identification and per-subscriber CoS.
You can configure the router to provide hierarchical scheduling or per-unit scheduling for
subscribers:
• Hierarchical CoS enables you to apply traffic scheduling and queuing parameters
(which can include a delay-buffer bandwidth) and packet transmission scheduling
parameters (which can include buffer management parameters) to an individual
subscriber interface rather than to all interfaces configured on the port. Hierarchical
CoS enables you to dynamically modify queues when subscribers require services.
• Per-unit scheduling enables one set of output queues for each logical interface
configured under the physical interface. In per-unit scheduling configurations, each
Layer 3 scheduler node is allocated a dedicated set of queues.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
This topic describes the guidelines for configuring dynamic CoS in a subscriber access
environment.
• For per-unit scheduling configurations, you must enable per-unit scheduling in the
static CLI for the interface referenced in the dynamic profile. If not, the dynamic profile
fails and schedulers are not attached to the interface.
• To improve CoS performance in IPv4, IPv6, and dual-stack networks that use a DHCP
access model, we recommend that you use the aggregate-clients replace statement
rather than the aggregate-clients merge statement.
• You configure the traffic scheduling and shaping parameters in a traffic-control profile
within the dynamic profile. You can configure the scheduler map and schedulers in a
dynamic profile or in the [edit class-of-service] hierarchy. You must statically configure
the remaining CoS parameters, such as hierarchical scheduling, classifiers, drop profiles,
and forwarding classes, in the [edit class-of-service] hierarchy.
• You must define the output-traffic-control-profile that binds the traffic-control profile
to the interface within the same dynamic profile as the interface.
• We recommend that you provide different names for the schedulers defined in dynamic
profiles that are used for access and services. For example, if there are two dynamic
profiles, voice-profile and video-profile, provide unique names for the schedulers
defined under those profiles.
• You must use a service dynamic profile with a different profile name for each RADIUS
CoA request over the same logical interface.
• When you configure scheduler and scheduler map sharing in client profiles, schedulers
and scheduler maps must use the unique ID format. If the client profile uses the unique
ID format and you want to have either scheduler or scheduler map sharing for service
activation, you must configure the service profile in unique ID format.
• To apply classifiers and rewrite rules to a subscriber interface in a dynamic profile, you
must configure the rewrite rule and classifier definitions in the static [edit
class-of-service] hierarchy and reference them in the dynamic profile.
• If a network administrator changes the static classifiers and rewrite rules definitions
that are referenced in a dynamic profile with an active subscriber interface logged
in, the changes are applied to the active subscriber interface immediately.
rule to the configuration while the dynamic interface is active, the addition does not
take effect until the subscriber logs out and then logs in again.
• IP demux interfaces can only instantiate Layer 3 rules (both rewrite rules and classifiers).
• An IP demux subscriber interface can implicitly inherit a classifier from the underlying
interface. If an IP demux interface is created without a classifier and a Layer 2 classifier
is attached to the underlying interface, the IP demux interface also inherits the Layer
2 classifier. The show class-of-service interface interface-name command does not
display this attachment.
Table 3 on page 6 lists the classification rule configuration for an IP demux subscriber
interface with a VLAN underlying interface.
Layer 3 — Default
• An IP demux subscriber interface explicitly inherits Layer 2 rewrite rules from the
underlying interface if a Layer 2 rewrite rule is present. The show class-of-service
interface interface-name command displays the attachment.
Table 4 on page 6 lists the rewrite rule configuration for an IP demux subscriber
interface with a VLAN underlying interface.
Layer 3 — Default
• An L2TP subscriber interface can implicitly inherit a classifier from the underlying
interface.
Table 5 on page 7 lists the classification rule configuration for an L2TP LAC
subscriber interface with a VLAN underlying interface.
• An L2TP LAC subscriber interface explicitly inherits Layer 2 rewrite rules from the
underlying interface if a Layer 2 rewrite rule is present. Table 6 on page 7 lists the
rewrite rule configuration for an L2TP LAC subscriber interface with a VLAN underlying
interface.
You can apply static or dynamic hierarchical CoS to a scheduler node at the aggregated
Ethernet logical interface, its underlying physical interface, or an interface set.
When you configure CoS for aggregated Ethernet interfaces, consider the following
guidelines:
• Configure the aggregated Ethernet logical interface over two physical interfaces capable
of performing hierarchical scheduling.
• For VLAN subscriber interfaces over aggregated Ethernet, you must enable link
protection on the aggregated Ethernet interface for hierarchical CoS to operate.
• Link protection is not required for IP or demux subscriber interfaces over aggregated
Ethernet. We recommend that you enable targeted distribution on the demux interface
to provide accurate hierarchical scheduling for these links.
• Keep the following guidelines in mind when configuring interface sets of aggregated
Ethernet interfaces:
• The supported logical interfaces for aggregated Ethernet in an interface set include
VLAN demux interfaces, IP demux interfaces, and PPPoE logical interfaces over
VLAN demux interfaces.
• The link membership list and scheduler mode of the interface set are inherited from
the underlying aggregated Ethernet interface over which the interface set is
configured.
• If the scheduler mode of the aggregated Ethernet interface is set to scale member
links, the scheduling parameters are scaled based on the number of active member
links and applied to each of the aggregated interface member links.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
• Static and Dynamic VLAN Subscriber Interfaces over Aggregated Ethernet Overview
You can configure CoS functionality for static and dynamic PPPoE subscriber interfaces
configured on Gigabit Ethernet Intelligent Queuing 2 (IQ2) and Ethernet Enhanced IQ2
(IQ2E) PICs on the M120 and M320 routers, and on MPCs on the MX Series 3D Universal
Edge Router.
For all supported hardware platforms, you can attach an output traffic-control profile
that contains basic shaping and scheduling properties directly to a PPPoE interface. In
this type of scenario, you can use each PPPoE interface to represent a household and
shape all of the household traffic to an aggregate rate. Each forwarding class is mapped
to a queue, and represents one type of services provided to a household customer.
Both the IQ2E PIC and MPC Q line cards support hierarchical scheduling functionality
that is not available on the IQ2 PIC. To shape customer or DSLAM traffic at different
levels of the PPPoE interface hierarchy, you can attach traffic-control profiles to interface
sets that contain PPPoE members.
MPCs support subscriber interfaces with PPPoE encapsulation over aggregated Ethernet
interfaces. These PPPoE subscriber interfaces are configured over VLAN demux interfaces,
which are also configured over Aggregated Ethernet interfaces.
You can configure 802.3ad link aggregation group (LAG) stateful port and dense port
concentrator (DPC) redundancy. This provides targeted distribution of non-replicated
(stacked) PPPoE or IP demux links over VLAN demux links, which in turn are over an
aggregated Ethernet (AE) logical interface. Service providers with PPPoE or IP demux
interfaces for CoS configurations can provide DPC and port redundancy to subscribers.
NOTE: For static PPPoE underlying logical interfaces, use PPPoE interface
sets.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
You use traffic-control profiles to configure traffic shaping and scheduling properties.
You can choose to configure static values or dynamic variables for the shaping parameters.
The values for the dynamic variables are obtained from RADIUS when a subscriber logs
in or when a subscriber changes services.
You cannot configure a traffic-control profile that contains a combination of static and
dynamic parameters.
2. Apply a static scheduler map that has been configured in the [edit class-of-service]
hierarchy.
If you do not include this statement, the delay-buffer rate is based on the guaranteed
rate if one is configured, or on the shaping rate if no guaranteed rate is configured.
If you do not include this statement, the delay-buffer rate is based on the guaranteed
rate if one is configured, or the shaping rate if no guaranteed rate is configured.
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
You use schedulers to define the parameters of output queues. These properties include
the amount of interface bandwidth assigned to the queue, the size of the memory buffer
allocated for storing packets, the priority of the queue, and the tail drop profiles associated
with the queue.
Within a dynamic profile, you can choose to define schedulers with static values, dynamic
variables, or a combination of static values and dynamic variables. The dynamic variables
enable RADIUS to provide the value for the scheduler parameter when the subscriber
logs in.
c. Configure the variables for the drop-profile maps and the drop profile.
Combining static and dynamic scheduler parameters enables you to provide subscribers
with unique rate configurations that the RADIUS definitions for predefined variables do
not allow.
To configure a scheduler definition that contains static and dynamic scheduling and
queuing parameters:
• Configure a variable.
c. Configure the drop-profile maps, the drop profile, and the priority.
• Configure variables.
• Configure a variable.
• Configure a variable.
• Configure a variable.
• Configure a variable.
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
The system generates unique identifiers (IDs) in dynamic profiles created for services.
The generated unique IDs enable you to identify and configure separate parameter values
with the same variable name. When applied to CoS, you can configure scheduler and
scheduler map sharing. In client-access profiles, schedulers and scheduler maps must
use the unique ID format. If the client-access profile uses the unique ID format and you
want to have either scheduler or scheduler map sharing for service activation, you must
configure the service profile in unique ID format. Generating unique IDs based on
schedulers and scheduler maps eliminates duplication and improves router performance
and scalability. You can configure scheduler and scheduler map sharing by including the
variables for CoS in the client access or service dynamic profile. All scheduler maps and
schedulers must be in the unique ID format.
Before you configure variables for the client access or service dynamic profile:
2. Configure the CoS parameters for the variables in the scheduler profile.
3. Configure the CoS parameters for the variables in the scheduler maps profile.
For example, you can configure scheduler maps and schedulers for a client access profile:
dynamic-profiles {
cos-para {
variables {
data_smap uid;
data_video_smap uid;
voice_smap uid;
data_sched uid;
video_sched uid;
voice_sched uid;
}
…
class-of-service {
traffic-control-profiles {
tcp1 {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
guaranteed-rate 10m;
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
output-traffic-control-profile tcp1;
}
}
}
scheduler-maps {
"$data_smap" {
forwarding-class be scheduler "$data_sched";
}
"$data_video_smap" {
forwarding-class be scheduler "$data_sched";
forwarding-class af scheduler "$video_sched";
}
“$voice_smap” {
forwarding-class ef scheduler “$voice_sched”;
}
}
schedulers {
"$data_sched" {
transmit-rate "$junos-cos-scheduler-tx";
inactive: buffer-size percent "$junos-cos-scheduler-bs";
priority "$junos-cos-scheduler-pri";
}
"$video_sched" {
transmit-rate "$junos-cos-scheduler-tx";
inactive: buffer-size percent "$junos-cos-scheduler-bs";
priority "$junos-cos-scheduler-pri";
}
“$voice_sched” {
transmit-rate percent 10;
buffer-size remainder;;
priority low;
}
}
}
}
}
Combining static and dynamic schedulers in a dynamic profile enables you to provide
subscribers with services that have unique scheduler definitions.
In this example, the network administrator configures the data service with a transmit-rate
that is rate controlled using the $junos-cos-scheduler-tx predefined variable. RADIUS
dynamically supplies the percentage value for the transmission rate that is specified in
the RADIUS VSA to the data scheduler when the subscriber logs in.
For the best-effort service, the network administrator assigns the remaining transmission
rate that is available.
schedulers {
data-scheduler {
transmit-rate percent rate-limit $junos-cos-scheduler-tx;
buffer-size percent $junos-cos-scheduler-bs;
priority $junos-cos-scheduler-pri;
drop-profile-map loss-priority low protocol any drop-profile d0;
drop-profile-map loss-priority medium-low protocol any drop-profile d1;
drop-profile-map loss-priority medium-high protocol any drop-profile d2;
drop-profile-map loss-priority high protocol any drop-profile d3;
drop-profile-map loss-priority any protocol any drop-profile all;
}
best-effort-scheduler {
transmit-rate remainder;
buffer-size percent $junos-cos-scheduler-bs;
priority medium-high;
drop-profile-map loss-priority low protocol any drop-profile
$junos-cos-scheduler-dropfile-low;
drop-profile-map loss-priority medium-low protocol any drop-profile d1;
drop-profile-map loss-priority medium-high protocol any drop-profile
$junos-cos-scheduler-dropfile-medium-high;
drop-profile-map loss-priority high protocol any drop-profile d3;
drop-profile-map loss-priority any protocol any drop-profile
$junos-cos-scheduler-dropfile-any;
}
[edit]
interfaces {
interface-set demux-set {
interface demux0 {
unit 0;
unit 1;
}
}
ge-2/0/1 {
vlan-tagging;
unit 1 {
per-session-scheduler;
vlan-id 1;
demux-source inet;
family inet {
address 4.4.4.4/24;
}
}
}
demux0 {
unit 0 {
demux-options {
underlying-interface ge-2/0/1.1;
}
family inet {
address 1.1.1.1/24;
demux-source {
1.1.1.0/24;
}
}
}
unit 1 {
demux-options {
underlying-interface ge-2/0/1.1;
}
family inet {
address 1.1.2.1/24;
demux-source {
1.1.2.0/24;
}
}
}
}
}
class-of-service {
traffic-control-profiles {
T1 {
scheduler-map m1;
shaping-rate 5m;
}
T2 {
shaping-rate 60m;
}
}
interfaces {
interface-set demux-set {
output-traffic-control-profile T2;
}
demux0 {
unit 0 {
output-traffic-control-profile T1;
}
unit 1 {
output-traffic-control-profile T1;
}
}
}
scheduler-maps {
m1 {
forwarding-class best-effort scheduler s0;
forwarding-class expedited-forwarding scheduler s1;
forwarding-class assured-forwarding scheduler s2;
forwarding-class network-control scheduler s3;
}
}
schedulers {
s0 {
transmit-rate percent 10;
buffer-size percent 10;
}
s1 {
transmit-rate percent 20;
buffer-size percent 20;
}
s2 {
transmit-rate percent 30;
buffer-size percent 30;
}
s3 {
transmit-rate percent 40;
buffer-size percent 40;
}
}
}
Action • To display the entire CoS configuration, including static and dynamic parameters:
Hierarchical CoS enables you to apply traffic scheduling and queuing parameters and
packet transmission scheduling parameters to an individual subscriber interface rather
than to all interfaces configured on a port. Hierarchical CoS enables you to dynamically
modify queues when subscribers require services.
Interfaces support a four-level CoS scheduling hierarchy that, when fully configured,
consists of the physical interface (level 1), an interface set or underlying interface (level
2), one or more logical interfaces (level 3), and one or more queues (level 4). Although
all CoS scheduling hierarchies are four-level, level 1 is always the physical interface and
level 4 is always the queue. Hierarchical scheduling configurations consist of the type of
interfaces you configure; for example, a logical interface or an interface set and where
those interfaces reside in the scheduling hierarchy, either level 2 or level 3. Because many
hierarchical scheduling configurations are possible, we use the terms two-level hierarchical
scheduling and three-level hierarchical scheduling in this discussion.
g017446
Level 3 Level 2 node
In a two-level scheduling hierarchy, all logical interfaces and interface sets share a single
level 2 node; no hierarchical relationship is formed.
• When the maximum-hierarchy-levels option is not set, interface sets can be at either
level 2 or level 3, depending on whether the member logical interfaces within the
interface set have a traffic-control profile.
• If any member logical interface has a traffic-control profile, then the interface set is
always a level 2 CoS scheduler node.
• If no member logical interface has a traffic-control profile, the interface set is always
a level 3 CoS scheduler node.
• If the maximum-hierarchy-levels option is set, then the interface set can only be at level
3; it cannot be at level 2. In this case, if you configure a level 2 interface set, you generate
Packet Forwarding Engine errors.
Table 7 on page 27 summarizes the interface hierarchy and the CoS scheduler node levels
for two-level hierarchical scheduling.
[edit interfaces]
xe-2/0/0 {
hierarchical-scheduler {
maximum-hierarchy-levels 2;
}
}
When you use three-level hierarchical scheduling, interface sets can reside at either level
2 or level 3. You can also configure an underlying logic interface at level 2 and a logical
interface at level 3. Table 8 on page 27 summarizes the most common cases of the
interface hierarchy and the CoS scheduler node levels for three-level hierarchical
scheduling.
In three-level hierarchical scheduling, the CoS scheduler nodes at level 1, level 2, and
level 3 form a hierarchical relationship; this differs from two-level hierarchical scheduling
where no hierarchical relationship is formed.
With a three-level hierarchical scheduling, logical interfaces can reside at level 2, or they
can reside at level 3, if the logical interface at level 2 is an underlying logical interface.
This is shown in Figure 2 on page 28.
g041450
Level 3
Level 3
[edit interfaces]
xe-2/0/0 {
hierarchical-scheduler {
implicit-hierarchy;
}
}
An interface hierarchy and a CoS scheduling hierarchy are distinctly different. Interface
hierarchy refers to the relationship between the various interfaces; for example, the
relationship between logical interfaces and an interface set, the relationship between a
logical interface and an underlying logical interface, or the relationship between the
physical interface and logical interface. CoS scheduling hierarchy refers to the hierarchical
relationship between the CoS scheduler nodes. In two-level hierarchical scheduling, no
hierarchy is formed between the CoS scheduler nodes; all logical interfaces and interface
sets share a single level 2 scheduler node. However, when you use the implicit-hierarchy
option for three-level hierarchical scheduling, the CoS scheduler nodes form a scheduling
hierarchy.
Figure 4 on page 29 and Figure 5 on page 30 provide two scenarios for this discussion.
Figure 4 on page 29 shows an interface hierarchy where a Gigabit Ethernet interface
(GE-1/0/0) is the physical interface. Two logical interfaces (GE-1/0/0.100 and
GE-1/0/0.101) are configured on the physical interface:
L4
TCP TCP
Pppoe- Demux- Ppp-Demux-
Logical Interface Logical Interface Logical Interface Set Logical Interface Set
L3
Sets Set (home) (demux-and pppoe)
Physical Interface
g041435
L1 GE-1/0/0
of Logical Tunnel
Each interface set has a dedicated queue. The CoS scheduler nodes at level 1 (physical
interface), level 2 (underlying logical interfaces), and level 3 (interface sets) form a
scheduling hierarchy.
To configure this scenario, you must include the implicit-hierarchy option under the
hierarchical-scheduler statement on physical interface GE-1/0/0 and configure and apply
traffic-control profiles on each interface set and underlying logical interface.
• Two logical interfaces (Pp0.100 and Demux0.100) reside on the underlying logical
interface GE-1/0/0.100.
L4
Demux0
L3 Logical Interfaces Pp0.100 TCP TCP Pp0.101
100
Underlying logical
L2 TCP GE-1/0/0.100 GE-1/0/0.101 TCP
interfaces
Physical Interface
g041436
L1 GE-1/0/0
of Logical Tunnel
Each logical interface has a dedicated queue. The CoS scheduler nodes at level 1 (physical
interface), level 2 (underlying logical interfaces), and level 3 (logical interfaces) form a
scheduling hierarchy.
To configure this scenario, you must include the implicit-hierarchy option under the
hierarchical-scheduler statement on physical interface GE-1/0/0 and configure and apply
traffic-control profiles on each logical interface and underlying logical interface.
You can configure many different three-level scheduling hierarchies; Figure 4 on page 29
and Figure 5 on page 30 present just two possible scenarios. Table 8 on page 27
summarizes the possible interface locations and CoS scheduler nodes.
Table 9 on page 31 lists the hardware requirements based on subscriber interface type
for hierarchical scheduling in dynamic CoS configurations.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
You configure static scheduling and queuing in a dynamic profile for subscriber access.
To configure CoS in a dynamic profile for subscriber access using static scheduling and
queuing parameters:
When you configure static scheduling and queuing in a dynamic profile, you
reference the scheduler map in the dynamic profile.
See Junos OS CoS Components for information about configuring the remaining CoS
parameters.
b. Configure traffic shaping and scheduling parameters in the dynamic profile using
a traffic-control profile. Reference the scheduler map you configured in the static
[edit class-of-service] hierarchy.
4. To configure default values for subscribers on login, and enable subscribers to replace
other CoS parameters when replacing services, configure variables in the dynamic
profile.
See “Configuring Static Default Values for Traffic Scheduling and Shaping” on page 170.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• CoS for Subscriber Access Overview on page 3
See Junos OS CoS Components for information about configuring the remaining CoS
parameters.
b. Configure traffic shaping and scheduling parameters in the dynamic profile using
a traffic-control profile.
See “Configuring Traffic Scheduling and Shaping for Subscriber Access” on page 11.
You can configure the schedulers using dynamic variables or a combination of both
static values and dynamic variables.
See “Configuring Schedulers in a Dynamic Profile for Subscriber Access” on page 13.
• For traffic shaping and scheduling, see “Applying Traffic Shaping and Scheduling
to a Subscriber Interface in a Dynamic Profile” on page 217.
See “Configuring Static Default Values for Traffic Scheduling and Shaping” on
page 170
b. (Optional) Enable multiple clients for the same subscriber (logical interface) to
aggregate attributes by configuring the aggregate-clients option for the dynamic
profile attached to a DHCP subscriber interface.
Because you have configured the scheduler map in the dynamic profile, queues
are merged when subscribers change services. Other CoS parameters are replaced.
When multiple subscribers are enabled on a DHCP subscriber interface, and the
dynamic profile referenced by DHCP does not have the replace keyword configured,
the system does not replace the parameters. Instead, it combines the values of
the parameters to their maximum scalar value.
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
You can enable hierarchical CoS on a subscriber interface with an underlying aggregated
Ethernet interface.
Before you begin, configure the subscriber interface with aggregated Ethernet.
• To configure a VLAN interface over aggregated Ethernet with link protection, see
Configuring a Static or Dynamic VLAN Subscriber Interface over Aggregated Ethernet
and Configuring Link Protection for Aggregated Ethernet Interfaces.
For static and dynamic IP demux interfaces, see Configuring a Static or Dynamic IP
Demux Subscriber Interface over Aggregated Ethernet.
For static and dynamic VLAN demux interfaces, see Configuring a Static or Dynamic
VLAN Demux Subscriber Interface over Aggregated Ethernet.
2. Configure the link aggregation (LAG) bundle with hierarchical scheduler mode.
You can then attach static or dynamic traffic shaping and scheduling parameters at the
aggregated Ethernet logical interface or its underlying physical interface. See:
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
[edit]
user@host# edit interfaces interface-set interface-set-name
You can now configure static traffic and scheduling parameters for each traffic-control
profile, and attach each traffic-control profile to the PPPoE interface or the PPPoE
interface set. For more information, see Using the CLI to Modify Traffic-Control Profiles
That Are Currently Applied to Subscribers.
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
This example shows how to configure a static VLAN interface with a dynamic profile
using static schedulers and CoS parameters for subscriber access to maintain a constant
traffic flow. The CoS parameters configure a best-effort data service for subscribers.
• Requirements on page 37
• Overview on page 37
• Configuration on page 38
• Verification on page 47
Requirements
Before you begin, be sure that your environment meets the following requirements:
Overview
In a dynamic profile, you can configure VLAN subscriber interfaces over the following
statically created logical interface types:
• GE—Gigabit Ethernet
• XE—10-Gigabit Ethernet
• AE—Aggregated Ethernet
Topology
You can further separate VLANs on subscriber interfaces by configuring a VLAN interface
as the underlying interface for a set of IP demux interfaces.
Configuration
To configure a static VLAN interface with a dynamic profile for subscriber access, perform
these tasks:
CLI Quick To quickly configure this example, copy the following configuration commands into a
Configuration text file, remove any line breaks, and then paste the commands into the CLI at the [edit]
hierarchy level.
set dynamic-profiles data-service firewall family inet filter filter EF_limit_G=768K term
default then accept
set dynamic-profiles data-service class-of-service schedulers be-scheduler
set dynamic-profiles data-service class-of-service schedulers be-scheduler buffer-size
remainder
set dynamic-profiles data-service class-of-service schedulers be-scheduler
drop-profile-map loss-priority any protocol any
set dynamic-profiles data-service class-of-service schedulers be-scheduler
drop-profile-map loss-priority any protocol any drop-profile drop3
set dynamic-profiles data-service class-of-service schedulers be-scheduler priority low
user@host# set dynamic-profiles data-service class-of-service schedulers be-scheduler
transmit-rate percent 40
set dynamic-profiles data-service class-of-service schedulers be-scheduler excess-rate
percent 90
set dynamic-profiles data-service class-of-service schedulers be-scheduler excess-priority
high
set dynamic-profiles data-service class-of-service scheduler-maps data-service-map
set dynamic-profiles data-service class-of-service scheduler-maps data-service-map
forwarding-class best-effort
set dynamic-profiles data-service class-of-service scheduler-maps data-service-map
forwarding-class best-effort scheduler be-scheduler
set dynamic-profiles data-service class-of-service traffic-control-profiles tcp-data-service
set dynamic-profiles data-service class-of-service traffic-control-profiles tcp-data-service
scheduler-map data-service-map
set dynamic-profiles data-service class-of-service traffic-control-profiles tcp-data-service
shaping-rate 50k
set dynamic-profiles data-service class-of-service traffic-control-profiles tcp-data-service
guaranteed-rate 10k
set dynamic-profiles data-service class-of-service traffic-control-profiles tcp-data-service
delay-buffer-rate 10k
set dynamic-profiles data-service class-of-service interfaces $junos-interface-ifd-name
unit $junos-underlying-interface-unit output-traffic-control-profile tcp-data-service
Step-by-Step After you configure a static VLAN interface, you can reference it in a dynamic profile.
Procedure
1. Configure the static VLAN interface.
[edit]
user@host# set interfaces ge-2/2/0
5. Define the family address type (inet for IPv4) for the VLAN interface.
6. Enable the physical interface to borrow an IP address from the loopback interface
by setting an unnumbered interface address. Configure a secondary IP address on
the loopback interface, lo0.0, and configure it as the preferred source address.
[edit interfaces ge-2/2/0 vlan-tagging unit 100 vlan-id 100 family inet]
user@host# set unnumbered-address lo0.0 preferred-source-address 100.0.0.1
Results Confirm the configuration of the static VLAN interface by entering the show interfaces
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show interfaces
interfaces {
ge-2/2/0 {
hierarchical-scheduler;
vlan-tagging;
unit 100 {
vlan-id 100;
family inet {
unnumbered-address lo0.0 preferred-source-address 100.0.0.1;
}
}
}
}
Step-by-Step A dynamic profile is a set of characteristics, defined in a type of template, that you can
Procedure use to provide dynamic subscriber access and services for broadband applications. When
configuring the interface at the [dynamic-profiles profile-name interfaces] hierarchy level
for a dynamic profile, you use variables to specify the interface name and the logical unit
value. When a DHCP subscriber sends a DHCP request to the interface, the dynamic
profile replaces the interface name variable and logical unit name variable with the actual
interface name and logical unit number of the interface that received the DHCP request.
1. Create the new dynamic profile for data services for subscribers.
[edit]
user@host# set dynamic-profiles data-service
or
4. Define the family address type (inet for IPv4) for the $junos-interface-unit variable.
Results Confirm the configuration of the dynamic profile by entering the show dynamic-profiles
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles
dynamic-profiles {
data-service {
interfaces {
$junos-interface-ifd-name {
unit $junos-underlying-interface-unit {
family inet;
}
}
}
}
}
Step-by-Step To configure a static VLAN interface with a dynamic profile for subscriber access, you
Procedure can configure a firewall filter to provide enhanced security by blocking packets based on
various match criteria, such as subjecting traffic to a policer for rate limiting, assigning
the traffic to a class-of-service (CoS) forwarding class for later queuing and packet
rewrite operations, or directing traffic to a specific routing instance.
1. Configure the family address type (inet for IPv4) for the firewall filter and specify
the filter name.
We recommend that you name the filter something that indicates the filter’s purpose.
In this example, we use the bandwidth limit settings.
2. Specify the term names for the filter. Make each term name unique and represent
what its function is. The first term matches traffic that has been classified into the
Expedited Forwarding (EF) class, and the second term matches all non-EF traffic.
3. In each firewall filter term, specify the conditions used to match components of a
packet. Configure the first term to match all traffic classified as EF class.
4. Specify the actions to take when the packet matches the condition in the first term.
Send the EF traffic to the policer named POL_EF_G=768K.
5. Specify the action to take when the packet matches the condition in the second
term. All non-EF packet traffic is accepted.
Results Confirm the configuration by entering the show dynamic-profiles data-service firewall
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles data-service firewall
family inet {
filter EF_limit_G=768K {
term EF {
from {
forwarding-class EF;
}
then policer POL_EF_G=768K;
}
term default {
then accept;
}
}
}
Step-by-Step You can configure static scheduling and queuing parameters in a dynamic profile for
Procedure subscriber access. Schedulers are part of the basic class-of-service (CoS) infrastructure.
You must define at least one scheduler per forwarding class. Schedulers indicate a
forwarding class’s priority, transmit weight, and buffer size, as well as various shaping
and rate control mechanisms.
1. Specify the best-effort scheduler for which you want to configure parameters.
2. (Optional) Configure the buffer size to use the remaining buffer available.
This parameter allows you to specify an explicit buffer size, either as a percent of
interface speed or as a function of time (specified in microseconds).
3. (Optional) Configure the drop-profile map to associate one or more drop profiles
with a queue.
The default random early detection (RED) drop profile is used when no explicit drop
profile mapping is specified. Specify a packet-loss priority (PLP) level of any, and
for the specified scheduler to accept any protocol type.
4. (Optional) Configure the drop profile to map a fill level (fullness of a queue) to a
drop probability (probability that a packet is dropped).
5. (Optional) Configure the queue’s scheduler priority to a specific level (low) for
guaranteed rate traffic.
6. (Optional) Configure the queue’s transmit weight [in bits per second (bps)] or as
a percentage of transmission capacity.
The transmit rate guarantees the rate for the queue, assuming no priority-based
starvation occurs. When you do not specify a transmit weight, or when the transmit
rate is reached, the queue can only send excess-rate traffic because that queue’s
priority is demoted to the excess region. A percentage of zero (0) drops all packets
in the queue.
Behavior varies based on interface mode, explicit configuration, and whether any
other queues have explicit weight configured. By default, excess bandwidth between
the guaranteed and shaped rate is shared equally among queues.
To prevent the queue from sending any excess rate traffic, set to none.
Results Confirm the configuration of the scheduler with static values in the dynamic profile by
entering the show dynamic-profiles data-service class-of-service configuration command.
If the command output does not display the intended configuration, repeat the instructions
in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles data-service class-of-service
class-of-service {
schedulers {
be-scheduler {
buffer-size remainder;
drop-profile-map loss-priority any protocol any drop-profile drop3;
priority low;
transmit-rate percent 40;
excess-rate percent 90;
excess-priority high;
}
}
}
Step-by-Step After you define your schedulers, you must link them to a set of queues on a logical
Procedure interface using a scheduler map. Applying a scheduler map to an interface places the
related set of schedulers and drop profiles into effect.
3. Associate the scheduler you previously defined (be-scheduler) with the scheduler
map.
Results Confirm the configuration of the scheduler map by entering the show dynamic-profiles
data-service class-of-service scheduler-maps configuration command. If the command
output does not display the intended configuration, repeat the instructions in this
procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles data-service class-of-service scheduler-maps
scheduler-maps {
data-service-map {
forwarding-class best-effort scheduler be-scheduler;
}
}
Step-by-Step Configure static traffic shaping and scheduling parameters in a traffic-control profile. A
Procedure traffic-control profile is a generic class-of-service (CoS) container that you can apply at
all points of a CoS hierarchy to affect the committed information rate (CIR), peak
information rate (PIR), and excess bandwidth handling. You can specify the traffic-control
profile at the port, logical interface, or logical interface-set level. The traffic-control profile
also references the scheduler map.
2. Apply the static scheduler map, data-service-map, that you previously configured.
3. Configure the shaping rate [in bits per second (bps)] to use for the scheduler in the
dynamic profile.
The shaping rate places a maximum limit on a queue’s transmit capacity. By default,
the shaping rate is equal to the interface speed/shaping rate enabling the queue
to send a the full rate of the interface.
4. Configure the guaranteed rate [in bits per second (bps)] to use for the scheduler
in the dynamic profile.
The guaranteed rate is the minimum bandwidth the queue can receive; if excess
physical interface bandwidth is available for use, the logical interface can receive
more than the guaranteed rate provisioned for the interface, depending on how you
choose to manage excess bandwidth and the interface’s mode of PIR compared
to CIR/PIR.
5. Configure the delay-buffer rate [in bits per second (bps)] based on the delay-buffer
calculation.
The delay buffer rate setting at one level of the hierarchy becomes the reference
bandwidth used at the next higher level, and the sum of the reference bandwidth
cannot exceed the value used at a lower level. If you do not include this statement,
the delay-buffer rate is based on the guaranteed rate if one is configured, or on the
shaping rate if no guaranteed rate is configured.
6. After you configure the traffic shaping and scheduling CoS parameters in a dynamic
profile, you apply them to an interface. The output traffic-control profile enables
you to provide traffic scheduling to the interface.
Configure the interface name and logical interface using a variable, and apply the
output traffic-control profile to the interface. Specify the previously defined
traffic-control profile, tcp-data-service.
Results Confirm the configuration and application of the static traffic shaping and scheduling
parameters by entering the show dynamic-profiles configuration command. If the
command output does not display the intended configuration, repeat the instructions in
this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles
dynamic-profiles {
data-service {
class-of-service {
interfaces {
$junos-interface-ifd-name {
unit $junos-underlying-interface-unit {
output-traffic-control-profile tcp-data-service;
}
}
}
traffic-control-profiles {
tcp-data-service {
scheduler-map data-service-map;
shaping-rate 50k;
guaranteed-rate 10k;
delay-buffer-rate 10k;
}
}
}
}
}
Verification
Confirm that the configuration is working properly.
• Verifying Traffic Shaping and Scheduling Profiles for Subscriber Access on page 47
• Verifying the Mapping of Schedulers for Subscriber Access on page 47
Purpose View the class-of-service (CoS) configurations that are referenced in a dynamic profile
for subscriber access.
Meaning The Shaping rate, Delay Buffer rate, and Guaranteed rate fields indicate rates of 50,000
bps, 10,000 bps, and 10,000 bps, respectively, for the traffic-control profile.
Purpose Display the mapping of schedulers to forwarding classes and a summary of scheduler
parameters for each entry.
Meaning The Scheduler map field indicates the parameters are for the best-effort scheduler. The
Transmit rate field shows 40 percent; the Rate Limit field indicates no limit; and the Drop
profiles fields are for drop3.
In this example, subscribers are provided with a data and voice service defined in an
access profile when they initially log in. The RADIUS administrator supplies the initial
values on the RADIUS server, and the service activation is performed at subscriber login.
After the initial login, the subscriber adds an assured forwarding service that is not defined
in the original access profile. A service profile is used to configure the schedulers and a
RADIUS CoA activates the service. The queues defined for the schedulers in the initial
scheduler map and the new scheduler map are merged.
In addition, the values for the initial data and voice service are upgraded by the RADIUS
administrator through a separate RADIUS CoA message.
To configure the initial service and enable the activation through a RADIUS CoA:
[edit]
dynamic-profiles access-profile {
interfaces {
$junos-interface-ifd-name {
unit $junos-underlying-interface-unit {
family inet;
}
}
}
}
b. Configure the class of service parameters in the access profile. In this example,
you configure Junos OS predefined variables that provide the initial scheduler name
and scheduler parameters obtained from the RADIUS authentication server when
the subscriber logs in.
Include the configurations for the interfaces, schedulers, and the scheduler maps.
[edit]
dynamic-profiles access-profile {
class-of-service {
traffic-control-profiles {
tcp1 {
scheduler-map $junos-cos-scheduler-map;
shaping-rate $junos-cos-shaping-rate;
guaranteed-rate $junos-cos-guaranteed-rate;
delay-buffer-rate $junos-cos-delay-buffer-rate;
}
}
interfaces {
$junos-interface-ifd-name {
unit "$junos-underlying-interface-unit" {
classifiers {
ieee-802.1 l2_classifier;
}
rewrite-rules {
ieee-802.1 l2_rewrite;
}
output-traffic-control-profile tcp1;
}
}
}
schedulers {
$junos-cos-scheduler {
buffer-size percent $junos-cos-scheduler-bs;
priority $junos-cos-scheduler-pri;
transmit-rate percent $junos-cos-scheduler-tx;
drop-profile-map loss-priority low protocol any $junos-cos-scheduler-low;
drop-profile-map loss-priority medium-low protocol any
$junos-cos-scheduler-medium-low;
drop-profile-map loss-priority medium-high protocol any
$junos-cos-scheduler-medium-high;
drop-profile-map loss-priority high protocol any $junos-cos-scheduler-high;
}
}
scheduler-maps {
data_voice_smap {
forwarding-class be scheduler be_sch;
forwarding-class ef scheduler ef_sch;
}
}
}
}
Table 10 on page 50 lists the initial values defined by the RADIUS administrator for
the scheduler map and shaping rates.
Table 10: Initial Scheduler Map and Shaping Values at Subscriber Login
Predefined Variable RADIUS Tag Value
$junos-cos-shaping-rate T02 6m
$junos-cos-guaranteed-rate T03 4m
$junos-cos-delay-buffer-rate T04 4m
Table 11 on page 50 lists the initial values defined by the RADIUS administrator for
the voice (expedited forwarding) scheduler.
Table 11: Initial CoS Values for the Voice Scheduler at Subscriber Login
Predefined Variable Tag Value
$junos-cos-scheduler — ef_sch
$junos-cos-scheduler-tx T01 10
$junos-cos-scheduler-bs T02 10
$junos-cos-scheduler-dropfile-low T04 d3
$junos-cos-scheduler-dropfile-medium-low T05 d2
$junos-cos-scheduler-dropfile-medium-high T06 d1
$junos-cos-scheduler-dropfile-high T07 d0
Table 12 on page 50 lists the initial values defined by the RADIUS administrator for
the data (best effort) scheduler.
Table 12: Initial CoS Values for the Data Scheduler at Subscriber Login
Predefined Variable Tag Value
$junos-cos-scheduler — be_sch
$junos-cos-scheduler-tx T01 10
$junos-cos-scheduler-bs T02 10
$junos-cos-scheduler-dropfile-low T04 d0
Table 12: Initial CoS Values for the Data Scheduler at Subscriber
Login (continued)
Predefined Variable Tag Value
$junos-cos-scheduler-dropfile-medium-low T05 d1
$junos-cos-scheduler-dropfile-medium-high T06 d2
$junos-cos-scheduler-dropfile-high T07 d3
2. Configure the classifiers, drop profiles, forwarding classes, and rewrite rules in the
static [edit class-of-service] hierarchy.
[edit]
class-of-service {
classifiers {
dscp dscp_classifier {
forwarding-class be {
loss-priority low code-points 000000;
}
forwarding-class af {
loss-priority medium-low code-points 000001;
}
}
ieee-802.1 l2_classifier {
forwarding-class be {
loss-priority medium-low code-points 000;
}
forwarding-class ef {
loss-priority medium-low code-points 100;
}
forwarding-class af {
loss-priority medium-low code-points 010;
}
}
}
drop-profiles {
d0 {
fill-level 25 drop-probability 100;
fill-level 0 drop-probability 0;
}
d1 {
fill-level 50 drop-probability 100;
fill-level 0 drop-probability 0;
}
d2 {
fill-level 75 drop-probability 100;
fill-level 0 drop-probability 0;
}
d3 {
fill-level 0 drop-probability 0;
fill-level 100 drop-probability 100;
}
}
forwarding-classes {
queue 0 be;
queue 1 ef;
queue 2 af;
queue 3 nc;
}
interfaces {
ge-1/2/9 {
shaping-rate 100m;
}
}
rewrite-rules {
ieee-802.1 l2_rewrite {
forwarding-class be {
loss-priority medium-low code-point 000;
}
forwarding-class ef {
loss-priority medium-low code-point 001;
}
forwarding-class af {
loss-priority medium-low code-point 100;
}
dscp l2_rewrite {
forwarding-class be {
loss-priority medium-low code-points 000;
}
forwarding-class ef {
loss-priority medium-low code-points 001;
}
forwarding-class af {
loss-priority medium-low code-points 001;
}
}
}
3. Configure the service profile enable RADIUS to activate the video service after login.
The video service corresponds to assured forwarding PHB.
In this example, you configure Junos OS predefined variables that provide the initial
scheduler name and scheduler parameters obtained from the RADIUS authentication
server when the subscriber logs in.
[edit]
dynamic-profiles service-af {
variables {
af_fc default-value video;
af_sch default-value af_sch;
sch-drop-any default-value all;
sch-pri-2 default-value strict-high;
sch-bs-2 default-value 40;
sch-tx-2 default-value 3m;
smap default-value any
}
class-of-service {
scheduler-maps {
"$smap" {
forwarding-class “$af_fc” scheduler “$af_sch”;
}
}
schedulers {
"$af_sch" {
transmit-rate percent "$sch-tx-2";
buffer-size percent "$sch-bs-2";
priority "$sch-pri-2";
drop-profile-map loss-priority any protocol any drop-profile “$sch-drop-any”;
}
}
}
}
After the three services are activated, subscribers receive upgraded values for the data
and voice service when RADIUS sends a change of authorization (CoA). In this case, the
CoS parameters are replaced, because multiple subscribers were not enabled on the
logical interface.
Table 13 on page 53 lists the upgraded values defined by the RADIUS administrator.
Table 14 on page 53 lists the values defined by the RADIUS administrator for the video
(assured forwarding) scheduler.
$junos-cos-scheduler — af_sch
$junos-cos-scheduler-tx T01 10
$junos-cos-scheduler-bs T02 10
$junos-cos-scheduler-dropfile-low T04 d3
$junos-cos-scheduler-dropfile-medium-low T05 d2
Table 14: Upgraded CoS Values for the Video Scheduler (continued)
Predefined Variable Tag Value
$junos-cos-scheduler-dropfile-medium-high T06 d1
$junos-cos-scheduler-dropfile-high T07 d0
Table 15 on page 54 lists the values defined by the RADIUS administrator for the expedited
forwarding scheduler in the CoA message. The values are the same as the initial service.
Table 15: Initial CoS Values for the Expedited Forwarding Scheduler at
Subscriber Login
Predefined Variable Tag Value
$junos-cos-scheduler — ef_sch
$junos-cos-scheduler-tx T01 10
$junos-cos-scheduler-bs T02 10
$junos-cos-scheduler-dropfile-low T04 d3
$junos-cos-scheduler-dropfile-medium-low T05 d2
$junos-cos-scheduler-dropfile-medium-high T06 d1
$junos-cos-scheduler-dropfile-high T07 d0
Table 16 on page 54 lists the values defined by the RADIUS administrator for the best
effort scheduler in the CoA message. The values are the same as the initial service.
Table 16: Initial CoS Values for the Best Effort Scheduler at Subscriber
Login
Predefined Variable Tag Value
$junos-cos-scheduler — be_sch
$junos-cos-scheduler-tx T01 10
$junos-cos-scheduler-bs T02 10
$junos-cos-scheduler-dropfile-low T04 d0
$junos-cos-scheduler-dropfile-medium-low T05 d1
Table 16: Initial CoS Values for the Best Effort Scheduler at Subscriber
Login (continued)
Predefined Variable Tag Value
$junos-cos-scheduler-dropfile-medium-high T06 d2
$junos-cos-scheduler-dropfile-high T07 d3
In this example, the network administrator defines hierarchical queuing and scheduler
parameters by configuring traffic-control profile and binding it directly to a PPPoE
subscriber interface.
To use this configuration in a broadband access network, each forwarding class can
represent one type of services provided to a household customer and is mapped to a
queue. Each PPPoE interface represents a household and provides shaping of all
household traffic to an aggregate rate. All of the PPPoE interfaces on the physical
interfaces are shaped to the underlying physical interface rate.
Table 17 on page 55 lists the scheduler and queue mapping for this configuration.
2 Scheduler —
interfaces {
ge-3/0/3 {
hierarchical-scheduler;
vlan-tagging;
unit 0 {
encapsulation ppp-over-ether;
vlan-id 100;
}
}
pp0 {
unit 0 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 120.20.20.20/32 {
destination 120.20.20.21;
}
}
}
unit 1 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 130.30.30.30/32 {
destination 130.30.30.31;
}
}
}
unit 2 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 140.40.40.40/32 {
destination 140.40.40.41;
}
}
}
}
}
class-of-service {
traffic-control-profiles {
tcp {
scheduler-map data_smap;
shaping-rate 50k;
guaranteed-rate 10k;
}
}
interfaces {
pp0 {
unit 0 {
output-traffic-control-profile tcp;
}
unit 1 {
output-traffic-control-profile tcp;
unit 2 {
output-traffic-control-profile tcp;
}
}
}
forwarding-classes {
queue 0 be;
queue 1 ef;
queue 3 nc;
queue 2 af;
}
scheduler-maps {
data_smap {
forwarding-class be scheduler be_sch;
}
voice_data_smap {
forwarding-class be scheduler be_sch;
}
vid_data_smap {
forwarding-class ef scheduler ef_sch;
}
}
schedulers {
be_sch {
transmit-rate percent 10;
buffer-size remainder;
priority low;
}
ef_sch {
transmit-rate percent 10;
buffer-size remainder;
priority low;
}
af_sch {
transmit-rate percent 10;
buffer-size remainder;
priority low;
}
nc_sch {
transmit-rate percent 10;
buffer-size remainder;
priority low;
}
}
In this example, the network administrator defines hierarchical queues and scheduler
parameters by configuring a traffic-control profile and binding it directly to a PPPoE
subscriber interface. The network administrator then configures the traffic-control profile
on the underlying interface where a group of PPPoE interfaces reside.
To use this configuration in a broadband access network, each forwarding class represents
one type of services provided to a household customer and is mapped to a queue. Each
PPPoE interface represents a household and provides shaping of all household traffic
to an aggregate rate. The underlying logical interface where a group of PPPoE interfaces
resides represents a DSLAM and provides shaping to the DSLAM rate.
Table 18 on page 58 lists the scheduler and queue mapping for this configuration.
interfaces {
ge-3/0/3 {
hierarchical-scheduler;
vlan-tagging;
unit 0 {
encapsulation ppp-over-ether;
vlan-id 100;
}
unit 1 {
vlan-id 101;
}
}
pp0 {
hierarchical-scheduler;
unit 0 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 120.20.20.20/32 {
destination 120.20.20.21;
}
}
}
unit 1 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 130.30.30.30/32 {
destination 130.30.30.31;
}
}
}
unit 2 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 140.40.40.40/32 {
destination 140.40.40.41;
}
}
}
}
}
class-of-service {
traffic-control-profiles {
tcp1 {
scheduler-map data_smap;
shaping-rate 50k;
guaranteed-rate 10k;
}
tcp2 {
scheduler-map data_smap;
shaping-rate 50m;
guaranteed-rate 10m;
}
}
interfaces {
pp0 {
unit 0 {
output-traffic-control-profile tcp1;
}
unit 1 {
output-traffic-control-profile tcp1;
}
unit 2 {
output-traffic-control-profile tcp1;
}
}
ge-3/0/3 {
unit 0 {
output-traffic-control-profile tcp2;
}
}
}
...
}
In this example, the network administrator defines hierarchical queues and scheduler
parameters by configuring traffic-control profile and binding it directly to a PPPoE
subscriber interface. The network administrator then configures the traffic-control profile
on a set of PPPoE interfaces.
To use this configuration in a broadband access network, each forwarding class represents
one type of services provided to a household customer and is mapped to a queue. Each
PPPoE interface represents a household and provides shaping of all household traffic
to an aggregate rate. In addition, the PPPoE interface-set configuration provides shaping
of traffic for a group of PPPoE interface on a DSLAM to a DSLAM aggregate rate.
Table 19 on page 60 lists the scheduler and queue mapping for this configuration.
Table 19: Scheduler per Logical Interface with Interface Set Mapping
Level Type Mapping
interfaces {
interface-set iflset1 {
interface pp0 {
unit 0;
unit 1;
unit 2;
}
}
pp0 {
unit 0 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 120.20.20.20/32 {
destination 120.20.20.21;
}
}
}
unit 1 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 130.30.30.30/32 {
destination 130.30.30.31;
}
}
}
unit 2 {
pppoe-options {
underlying-interface ge-3/0/3.0;
server;
}
family inet {
address 140.40.40.40/32 {
destination 140.40.40.41;
}
}
}
}
ge-3/0/3 {
hierarchical-scheduler;
vlan-tagging;
unit 0 {
encapsulation ppp-over-ether;
vlan-id 100;
}
unit 1 {
vlan-id 101;
}
unit 2 {
vlan-id 102;
}
}
}
class-of-service {
traffic-control-profiles {
tcp1 {
scheduler-map data_smap;
shaping-rate 50k;
guaranteed-rate 10k;
}
tcp2 {
scheduler-map data_smap;
shaping-rate 50m;
guaranteed-rate 10m;
}
}
interfaces {
pp0 {
unit 0 {
output-traffic-control-profile tcp1;
}
unit 1 {
output-traffic-control-profile tcp1;
}
unit 2 {
output-traffic-control-profile tcp1;
}
interface-set iflset1 {
output-traffic-control-profile tcp2;
}
...
}
Junos OS supports two aspects of CoS for MPLS pseudowire subscriber interfaces. You
can apply CoS rewrite rules and behavior aggregate (BA) classifiers to MPLS pseudowire
subscriber interfaces. In addition, CoS performs egress hierarchical shaping towards the
subscriber on MPLS pseudowire subscriber interfaces.
Hierarchical CoS enables you to apply traffic scheduling and queuing parameters and
packet transmission scheduling parameters to an individual subscriber interface rather
than to all interfaces configured on the port. Hierarchical CoS is supported on MX Series
routers with either EQ DPCs or MPC/MICs installed.
configure; for example, a logical interface or an interface set and where those interfaces
reside in the scheduling hierarchy, either level 2 or level 3. Because many hierarchical
scheduling configurations are possible, we use the terms two-level hierarchical scheduling
and three-level hierarchical scheduling in this discussion.
Two-level hierarchical scheduling limits the number of hierarchical levels in the scheduling
hierarchy to two. In a two-level scheduling hierarchy, all logical interfaces and interface
sets share a single level 2 node.Table 20 on page 64 summarizes the interface hierarchy
and the CoS scheduler node levels for two-level hierarchical scheduling.
You use the two-level hierarchical scheduling when you have many pseudowires but you
do not require shaping specific to the subscriber logical interface. For example, when
your configuration is one subscriber per pseudowire interface.
Figure 7 on page 65 shows a two-level hierarchical scheduling configuration for the MPLS
pseudowires. In this configuration, level 1 is the physical interface used for the logical
tunnel anchor node. All of the pseudowire transport interfaces share a single level 2 node.
The level 3 nodes are the pseudowire transport logical interfaces (ps0.0, ps1.0, and
ps2.0). In this configuration, interface sets are not configured and only the logical
interfaces have traffic control profiles.
L4
TCP
L2 Dummy
L1 Logical Tunnel
g041325
Physical Interface
Two-level hierarchical scheduling has up to eight class of service queues. For this
configuration, include the maximum-hierarchy-levels 2 option under the [edit interfaces
interface-name hierarchical-scheduler] statement at the physical interface for the anchor
logical tunnel.
NOTE: You cannot configure shaping policies on both the pseudowire logical
interfaces and the subscriber logical interfaces over the same pseudowire.
If a traffic-control profile is configured on a pseudowire logical interface, and
CoS policies are configured on the subscriber logical interface over another
pseudowire, all of the logical interfaces are at level 3 and act as peers.
In three-level hierarchical scheduling, the CoS scheduler nodes at level 1, level 2, and
level 3 form a scheduling hierarchy. You can configure many different three-level
scheduling hierarchies, depending on the location of the interface set and the use of
underlying interfaces. In all variations, the physical interface on which the logical tunnel
resides is a level 1 CoS scheduler node and the queues reside at level 4. Three-level
scheduling hierarchies can have up to eight class of service queues.
Table 21 on page 66summarizes the most common three-level hierarchical scheduling
configurations and shows the interface hierarchy and CoS scheduler nodes.
• Level 3—Pseudowire service logical interfaces (ps0.1 and ps0.2) for subscriber sessions
You apply the traffic-control profiles at the pseudowire transport logical interfaces (level
2) and the pseudowire service logical interfaces (level 3).
L4
TCP
Pseudowire
L2 Transport ps0.0 TCP
Logical Interface
L1 Logical Tunnel
g041326
Physical Interface
You apply the traffic-control profile at the pseudowire service interfaces (level 3) and
at the interface set (level 2). This variation is most useful for subscriber edge deployments.
L4
TCP
Logical Tunnel
L1
g041327
Physical Interface
L4
TCP TCP
ps0.1 ps0.2 ps1.1 ps1.2
L3
Pseudowire service Pseudowire service Pseudowire service Pseudowire service
interface interface interface interface
ps1.0
L2 Interface set Pseudowire transport
interface
L1 Physical interface
g041406
• Level 3—Pseudowire service logical interfaces (ps0.1, ps0.2, ps1.1, and ps1.2)
• Level 2—Service interface set for pseudowire service interfaces (ps0.1 and ps0.2) and
transport logical interface (ps1.0) for the pseudowire service logical interfaces (ps1.1
and ps1.2)
You apply the traffic-control profiles to the interfaces at both level 2 and level 3, as well
as the interface set at level 2.
CoS supports two-level and three-level hierarchies for MPLS pseudowire subscriber
interfaces.
If the implicit-hierarchy option is not set on the logical tunnel anchor point, logical
interfaces behave normally with the hierarchical-scheduler mode configured with or
without the hierarchical-scheduler maximum-hierarchy-levels option under the [edit
interfaces interface-name hierarchical-scheduler] statement. In this case, when you apply
a traffic-control profile to the pseudowire and service logical interfaces, they both reside
in level 3 scheduler nodes and do not form a scheduling hierarchy, which might not be
the desirable behavior. In business edge, where only the pseudowire logical interfaces
need to be shaped, applying the traffic-control profile at just the transport logical interface
may be sufficient.
When configuring the logical tunnel physical interface for the maximum hierarchy level,
all pseudowire logical interfaces operating on the physical interface use the same hierarchy
model. If you want to mix two-level and three-level scheduling hierarchies, you can group
the pseudowires together by hierarchy levels and share the same logical tunnel anchor
point or you can use three-level scheduling for all pseudowires over the anchor point.
To specify rewrite rules and classifiers on pseudowire interfaces, reference the pseudowire
device under the [edit class-of-service interfaces] hierarchy level and specify the rewrite
rules and classifiers for the pseudowire interfaces.
To control all pseudowire traffic using the same logical tunnel interface, apply CoS policies
at the physical interface for the anchor logical tunnel.
Before configuring CoS parameters for MPLS pseudowire subscriber interfaces, you must
first complete these tasks:
2. Configure the pseudowire device count. See Configuring the Maximum Number of
Pseudowire Logical Interface Devices Supported on the Router.
3. Configure the pseudowire device including the logical tunnel anchor point. See
Configuring a Pseudowire Subscriber Logical Interface Device.
4. Configure the pseudowire transport logical interface. See Configuring the Transport
Logical Interface for a Pseudowire Subscriber Logical Interface.
5. Configure the pseudowire signaling (either Layer 2 circuit signaling or Layer 2 VPN
signaling). See Configuring Layer 2 Circuit Signaling for Pseudowire Subscriber Logical
Interfaces or Configuring Layer 2 VPN Signaling for Pseudowire Subscriber Logical
Interfaces.
6. Configure the pseudowire logical interfaces. See Configuring the Service Logical Interface
for a Pseudowire Subscriber Logical Interface.
1. Configure the hierarchical scheduler for the physical interface used for the logical
tunnel (anchor point). For two-level scheduling the hierarchical scheduler must be
set to maximum-scheduler levels 2.
[edit]
user@host#edit interfaces ps ps-anchor-device-name
user@host#set hierarchical-scheduler maximum-hierarchy-levels 2
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#set output-traffic-control-profile profile-name
The available rewrite rule types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit rewrite-rules (dscp | inet-precedence) rewrite-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-point (alias | bits)
The available classifier types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit classifiers (dscp | inet-precedence) classifier-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-points [aliases] [bit-patterns]
2. Configure the pseudowire device count. See Configuring the Maximum Number of
Pseudowire Logical Interface Devices Supported on the Router.
3. Configure the pseudowire device including the logical tunnel anchor point. See
Configuring a Pseudowire Subscriber Logical Interface Device.
4. Configure the pseudowire transport logical interface. See Configuring the Transport
Logical Interface for a Pseudowire Subscriber Logical Interface.
5. Configure the pseudowire signaling (either Layer 2 circuit signaling or Layer 2 VPN
signaling). See Configuring Layer 2 Circuit Signaling for Pseudowire Subscriber Logical
Interfaces or Configuring Layer 2 VPN Signaling for Pseudowire Subscriber Logical
Interfaces.
6. Configure the pseudowire logical interfaces. See Configuring the Service Logical Interface
for a Pseudowire Subscriber Logical Interface.
1. Configure the hierarchical scheduler for the physical interface used for the logical
tunnel (anchor point). For three-level scheduling the hierarchical scheduler must be
set to implicit-hierarchy.
[edit]
user@host#edit interfaces ps-anchor-device-name
user@host#set hierarchical-scheduler implicit-hierarchy
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#set output-traffic-control-profile profile-name
3. Specify the traffic-control profile to use on the pseudowire transport logical interface.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#set output-traffic-control-profile profile-name
The available rewrite rule types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit rewrite-rules (dscp | inet-precedence) rewrite-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-point (alias | bits)
The available classifier types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit classifiers (dscp | inet-precedence) classifier-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-points [aliases] [bit-patterns]
2. Configure the pseudowire device count. See Configuring the Maximum Number of
Pseudowire Logical Interface Devices Supported on the Router.
3. Configure the pseudowire device including the logical tunnel anchor point. See
Configuring a Pseudowire Subscriber Logical Interface Device.
4. Configure the pseudowire transport logical interface. See Configuring the Transport
Logical Interface for a Pseudowire Subscriber Logical Interface.
5. Configure the pseudowire signaling (either Layer 2 circuit signaling or Layer 2 VPN
signaling). See Configuring Layer 2 Circuit Signaling for Pseudowire Subscriber Logical
Interfaces or Configuring Layer 2 VPN Signaling for Pseudowire Subscriber Logical
Interfaces.
6. Configure the pseudowire logical interfaces. See Configuring the Service Logical Interface
for a Pseudowire Subscriber Logical Interface.
1. Configure the hierarchical scheduler for the physical interface used for the logical
tunnel (anchor point). For three-level scheduling the hierarchical scheduler must be
set to implicit-hierarchy.
[edit]
user@host#edit interfaces ps-anchor-device-name
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#set output-traffic-control-profile profile-name
3. Define a pseudowire logical interface set and configure the traffic-control profile used
for the interface set.
[edit class-of-service]
user@host#edit interfaces
user@host#edit interface-set interface-set-name
user@host#edit output-traffic-control-profile profile-name
4. Group the pseudowire logical interfaces in the pseudowire logical interface set.
[edit ]
user@host#edit interfaces
user@host#edit interface-set interface-set-name
user@host#edit interface ps ps-device-name
user@host#edit unit logical-unit-number
The available rewrite rule types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit rewrite-rules (dscp | inet-precedence) rewrite-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-point (alias | bits)
The available classifier types for pseudowire interfaces are dscp and inet-precedence.
[edit class-of-service]
user@host#edit interfaces ps ps-device-name
user@host#edit unit logical-unit-number
user@host#edit classifiers (dscp | inet-precedence) classifier-name
user@host#edit forwarding-class class-name
user@host#set loss-priority class-name code-points [aliases] [bit-patterns]
Table 22 on page 77 lists the hardware requirements based on subscriber interface type
for per-unit scheduling in dynamic CoS configurations.
Table 22: Hardware Required for Per-Unit Scheduling Dynamic CoS Configurations
Subscriber Interface EQ DPCs on MX MPC/MIC Modules IQ2 PICs on M120 and IQ2E PICs on M120
Type Series Routers on MX Series Routers M320 Routers and M320 Routers
Static or dynamic IP No No No No
demux interfaces over
aggregated Ethernet
Static or dynamic No No No No
VLAN demux
interfaces
Table 22: Hardware Required for Per-Unit Scheduling Dynamic CoS Configurations (continued)
Subscriber Interface EQ DPCs on MX MPC/MIC Modules IQ2 PICs on M120 and IQ2E PICs on M120
Type Series Routers on MX Series Routers M320 Routers and M320 Routers
Static or dynamic No No No No
VLAN demux
interfaces over
aggregated Ethernet
Static or dynamic No No No No
PPPoE interfaces over
aggregated Ethernet
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Per-Unit Scheduling in a Dynamic Profile on page 78
Per-unit scheduling enables one set of output queues for each logical interface configured
under the physical interface. In per-unit scheduling configurations, each Layer 3 scheduler
node is allocated a dedicated set of queues.
If you do not explicitly configure CoS parameters, a default traffic profile with queues is
attached to the logical interface.
See Junos OS CoS Components for information about configuring the remaining CoS
parameters.
b. Configure traffic shaping and scheduling parameters in the dynamic profile using
a traffic-control profile.
See “Configuring Traffic Scheduling and Shaping for Subscriber Access” on page 11.
You can configure the schedulers using dynamic variables or a combination of both
static values and dynamic variables.
See “Configuring Schedulers in a Dynamic Profile for Subscriber Access” on page 13.
• For traffic shaping and scheduling, see “Applying Traffic Shaping and Scheduling
to a Subscriber Interface in a Dynamic Profile” on page 217.
• For rewrite rules, see “Applying a Rewrite Rule Definition to a Subscriber Interface
in a Dynamic Profile” on page 219.
Because you have configured the scheduler map in the dynamic profile, queues are
merged when subscribers change services. Other CoS parameters are replaced.
When multiple subscribers are enabled on a DHCP subscriber interface, and the
dynamic profile referenced by DHCP does not have the replace keyword configured,
the system does not replace the parameters. Instead, it combines the values of the
parameters to their maximum scalar value.
See “Configuring Static Default Values for Traffic Scheduling and Shaping” on
page 170
b. (Optional) Enable multiple clients for the same subscriber (logical interface) to
aggregate attributes by configuring the aggregate-clients option for the dynamic
profile attached to a DHCP subscriber interface.
1. The administrator configures the static VLAN interfaces and enables per-unit
scheduling for the interfaces.
[edit]
interfaces {
ge-1/1/0 {
per-unit-scheduler;
vlan-tagging;
unit 100 {
vlan-id 100;
family inet {
unnumbered-address lo0.0 preferred-source-address 192.100.1.1;
}
}
unit 200 {
vlan-id 200;
family inet {
unnumbered-address lo0.0 preferred-source-address 192.100.1.1;
}
}
}
ge-1/1/1 {
per-unit-scheduler;
vlan-tagging;
unit 100 {
vlan-id 100;
family inet {
unnumbered-address lo0.0 preferred-source-address 192.100.1.1;
}
}
unit 200 {
vlan-id 200;
family inet {
unnumbered-address lo0.0 preferred-source-address 192.100.1.1;
}
}
}
ge-1/0/1 {
unit 0 {
family inet {
address 3.1.1.1/24;
}
}
}
ge-1/1/2 {
description "wfce14 eth1 soso ge-1/1/2";
vlan-tagging;
gigether-options {
no-auto-negotiation;
}
unit 100 {
vlan-id 100;
family inet {
address 121.0.0.1/24;
}
}
}
}
[edit]
class-of-service {
classifiers {
inet-precedence 8q-inet {
forwarding-class be {
loss-priority low code-points 000;
}
forwarding-class ef {
loss-priority low code-points 001;
}
forwarding-class af {
loss-priority low code-points 010;
}
forwarding-class nc {
loss-priority low code-points 011;
}
forwarding-class voice {
loss-priority low code-points 100;
}
forwarding-class video {
loss-priority low code-points 101;
}
forwarding-class game {
loss-priority low code-points 110;
}
forwarding-class data {
loss-priority low code-points 111;
}
}
inet-precedence 4q-inet {
forwarding-class be {
loss-priority low code-points [ 000 001 ];
}
forwarding-class ef {
loss-priority low code-points [ 010 011 ];
}
forwarding-class af {
loss-priority low code-points [ 100 101 ];
}
forwarding-class nc {
loss-priority low code-points [ 110 111 ];
}
}
inet-precedence 8q-drop-inet {
forwarding-class be {
loss-priority low code-points 000;
}
forwarding-class ef {
loss-priority medium-low code-points 001;
}
forwarding-class af {
loss-priority medium-high code-points 010;
}
forwarding-class nc {
loss-priority high code-points 011;
}
forwarding-class voice {
loss-priority low code-points 100;
}
forwarding-class video {
loss-priority medium-low code-points 101;
}
forwarding-class game {
loss-priority medium-high code-points 110;
}
forwarding-class data {
loss-priority high code-points 111;
}
}
inet-precedence 4q-drop-inet {
forwarding-class be {
loss-priority low code-points [ 000 001 ];
}
forwarding-class ef {
loss-priority medium-low code-points [ 010 011 ];
}
forwarding-class af {
loss-priority medium-high code-points [ 100 101 ];
}
forwarding-class nc {
loss-priority high code-points [ 110 111 ];
}
}
}
drop-profiles {
d0 {
fill-level 25 drop-probability 100;
fill-level 0 drop-probability 0;
}
d1 {
fill-level 50 drop-probability 100;
fill-level 0 drop-probability 0;
}
d2 {
fill-level 75 drop-probability 100;
fill-level 0 drop-probability 0;
}
d3 {
fill-level 100 drop-probability 100;
fill-level 0 drop-probability 0;
}
all {
fill-level 0 drop-probability 0;
fill-level 100 drop-probability 100;
}
}
forwarding-classes {
queue 0 be;
queue 1 ef;
queue 2 af;
queue 3 nc;
queue 4 voice;
queue 5 video;
queue 6 game;
queue 7 data;
}
interfaces {
ge-1/0/1 {
unit 0 {
classifiers {
inet-precedence 8q-drop-low-high-inet;
}
}
}
}
traceoptions {
flag all;
flag asynch;
flag route-socket;
}
}
3. The administrator configures the access and service dynamic profiles to receive CoS
parameters for the subscriber interfaces through RADIUS.
[edit]
dynamic-profiles {
subscriber {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
class-of-service {
traffic-control-profiles {
zero {
scheduler-map "$junos-cos-scheduler-map";
shaping-rate "$junos-cos-shaping-rate";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
output-traffic-control-profile zero;
}
}
}
scheduler-maps {
be_smap {
forwarding-class be scheduler be_sch;
}
all_smap {
forwarding-class be scheduler be_sch;
forwarding-class ef scheduler ef_sch;
forwarding-class af scheduler af_sch;
forwarding-class nc scheduler nc_sch;
forwarding-class video scheduler video_sch;
forwarding-class data scheduler data_sch;
}
be_ef_smap {
forwarding-class be scheduler be_sch;
forwarding-class ef scheduler ef_sch;
}
af_smap {
forwarding-class af scheduler af_sch;
}
be_ef_af_nc_smap {
forwarding-class be scheduler be_sch;
forwarding-class ef scheduler ef_sch;
forwarding-class af scheduler af_sch;
forwarding-class nc scheduler nc_sch;
}
voice_video_game_data_smap {
forwarding-class voice scheduler voice_sch;
forwarding-class video scheduler video_sch;
forwarding-class game scheduler game_sch;
forwarding-class data scheduler data_sch;
}
}
schedulers {
"$junos-cos-scheduler" {
transmit-rate percent "$junos-cos-scheduler-tx";
buffer-size percent "$junos-cos-scheduler-bs";
priority "$junos-cos-scheduler-pri";
drop-profile-map loss-priority low protocol any drop-profile
"$junos-cos-scheduler-dropfile-low";
drop-profile-map loss-priority medium-low protocol any drop-profile
"$junos-cos-scheduler-dropfile-medium-low";
drop-profile-map loss-priority medium-high protocol any drop-profile
"$junos-cos-scheduler-dropfile-medium-high";
drop-profile-map loss-priority high protocol any drop-profile
"$junos-cos-scheduler-dropfile-high";
}
}
}
}
service {
variables {
fc_1 default-value be;
sch_1 default-value be_sch;
sch-tx_1 default-value 20000000;
sch-bs_1 default-value 10;
sch-pri_1 default-value high;
sch-drop-low_1 default-value d3;
sch-drop-med-low_1 default-value d2;
sch-drop-med-high_1 default-value d1;
sch-drop-high_1 default-value d0;
sch-drop-any_1 default-value d3;
fc_2 default-value af;
sch_2 default-value af_sch;
sch-tx_2 default-value 10;
sch-bs_2 default-value 10;
sch-pri_2 default-value high;
sch-drop-low_2 default-value d3;
sch-drop-med-low_2 default-value d2;
sch-drop-med-high_2 default-value d1;
sch-drop-high_2 default-value d0;
sch-drop-any_2 default-value d3;
fc_3 default-value voice;
sch_3 default-value voice_sch;
sch-tx_3 default-value 20000000;
sch-bs_3 default-value 10;
sch-pri_3 default-value high;
sch-drop-low_3 default-value d3;
sch-drop-med-low_3 default-value d2;
sch-drop-med-high_3 default-value d1;
sch-drop-high_3 default-value d0;
sch-drop-any_3 default-value d3;
fc_4 default-value game;
sch_4 default-value game_sch;
sch-tx_4 default-value 10;
sch-bs_4 default-value 10;
sch-pri_4 default-value high;
"$sch_4" {
transmit-rate percent "$sch-tx_4";
buffer-size percent "$sch-bs_4";
priority "$sch-pri_4";
drop-profile-map loss-priority low protocol any drop-profile
"$sch-drop-low_4";
drop-profile-map loss-priority medium-low protocol any drop-profile
"$sch-drop-med-low_4";
drop-profile-map loss-priority medium-high protocol any drop-profile
"$sch-drop-med-high_4";
drop-profile-map loss-priority high protocol any drop-profile
"$sch-drop-high_4";
}
}
}
}
service_2 {
variables {
fc_1 default-value be;
sch_1 default-value be_sch;
sch-tx_1 default-value 10;
sch-bs_1 default-value 10;
sch-pri_1 default-value high;
sch-drop-low_1 default-value d3;
sch-drop-med-low_1 default-value d2;
sch-drop-med-high_1 default-value d1;
sch-drop-high_1 default-value d0;
sch-drop-any_1 default-value d3;
scheduler-map default-value all_smap;
}
class-of-service {
scheduler-maps {
"$scheduler-map" {
forwarding-class "$fc_1" scheduler "$sch_1";
}
}
schedulers {
"$sch_1" {
transmit-rate percent "$sch-tx_1";
buffer-size percent "$sch-bs_1";
priority "$sch-pri_1";
drop-profile-map loss-priority low protocol any drop-profile
"$sch-drop-low_1";
drop-profile-map loss-priority medium-low protocol any drop-profile
"$sch-drop-med-low_1";
drop-profile-map loss-priority medium-high protocol any drop-profile
"$sch-drop-med-high_1";
drop-profile-map loss-priority high protocol any drop-profile
"$sch-drop-high_1";
}
}
}
}
}
4. The network administrator configures DHCP and RADIUS to grant access and services
to the interfaces referenced by the subscriber dynamic profile.
[edit]
forwarding-options {
dhcp-relay {
traceoptions {
file size 1g;
flag all;
}
dynamic-profile subscriber aggregate-clients replace;
server-group {
subscriber-server {
3.1.1.2;
}
}
active-server-group subscriber-server;
group relay-0 {
authentication {
password pwd0;
username-include {
user-prefix user0;
mac-address;
}
}
interface ge-1/1/0.100;
interface ge-1/1/0.200;
}
}
}
radius-server {
121.0.0.11 secret "$9$mPF/u0Icrv1RvL7V4oik.Pz3/CtOIE"; ## SECRET-DATA
}
profile subscriber-profile {
authentication-order radius;
radius {
authentication-server 121.0.0.11;
accounting-server 121.0.0.11;
}
radius-server {
121.0.0.11 secret "$9$.mz6pu1hyKBIK8xdg4jHqmQF69A01R"; ## SECRET-DATA
}
accounting {
order radius;
statistics time;
}
}
• Dedicated Queue Scaling for CoS Configurations on MIC and MPC Interfaces
Overview on page 89
• Managing Dedicated and Remaining Queues for Dynamic CoS Configurations on MIC
and MPC Interfaces on page 93
• Verifying the Number of Dedicated Queues Configured on MIC and MPC
Interfaces on page 95
Dedicated Queue Scaling for CoS Configurations on MIC and MPC Interfaces Overview
The 30-Gigabit Ethernet Queuing and 60-Gigabit Ethernet Queuing and Enhanced
Queuing Ethernet Modular Port Concentrators (MPCs) provide a set of dedicated queues
for subscriber interfaces configured with hierarchical scheduling or per-unit scheduling.
The dedicated queues offered on these MPCs enable service providers to reduce costs
through different scaling configurations. For example, the 60-Gigabit Ethernet Enhanced
Queuing MPC enables service providers to reduce the cost per subscriber by allowing
many subscriber interfaces to be created with four or eight queues. Alternatively, the
30-Gigabit Ethernet and 60-Gigabit Ethernet Queuing MPCs enable service providers to
reduce hardware costs, but allow fewer subscriber interfaces to be created with four or
eight queues.
This topic describes the overall queue, scheduler node, and logical interface scaling for
subscriber interfaces created on these MIC and MPC combinations.
30-Gigabit 64,000 16,000 16,000 (8000 per PIC) 8000 (4000 per PIC)
Ethernet Queuing
MPC
Table 23: Dedicated Queues for MIC and MPC Interfaces (continued)
Dedicated Egress Supported Subscriber Logical Interfaces with Logical Interfaces with
MPC Queues Interfaces 4 Queues 8 Queues
60-Gigabit 128,000 32,000 32,000 (8000 per PIC) 16,000 (4000 per PIC)
Ethernet Queuing
MPC
MPCs vary in the number of Packet Forwarding Engines on board. MPC1s, such as the
30-Gigabit Ethernet MPC, have one Packet Forwarding Engine. MPC2s, such as the
60-Gigabit Ethernet MPC, have two Packet Forwarding Engines. Each Packet Forwarding
Engine has two schedulers that share the management of the queues.
Each interface-set uses eight queues from total available egress queues.
Figure 11 on page 91 shows the queue distribution on a 30-Gigabit Ethernet Queuing MPC
with only one MIC installed. All 64,000 egress queues on the MPC are available to the
single Packet Forwarding Engine. On the Packet Forwarding Engine, half of these queues
(32,000) are managed by each scheduler. Scheduler 0 contributes all of its 32,000
queues to PIC 0. Scheduler 1 contributes all of its 32,000 queues to PIC 1.
PFE 1
64,000 queues
Scheduler 0 Scheduler 1
32,000 queues 32,000 queues
PIC 0 PIC 1
32,000 queues 32,000 queues
g017871
MIC 0
Figure 12 on page 91 shows the queue distribution on the same MPC with two MICs
installed. In this case, each scheduler can supply two PICS, one on each MIC. Because
the distribution of the queues across the MICs is not hard-partitioned, you can allocate
from 0 to 32,000 queues from each scheduler’s pool across the scheduler’s associated
PICs. For example, you can allocate 32,000 queues from Scheduler 0 to PIC 0, 4000
queues from Scheduler 1 to PIC 1, and 28,000 queues from Scheduler 1 to PIC 3.
Alternatively, you can allocate the queues evenly across the PICs, or allocate them in
other combinations with the limitation of 32,000 queues per PIC and 32,000 queues per
port.
Figure 12: Distribution of Queues on the 30-Gigabit Ethernet Queuing MPC with Two MICs
MX-MPC1-3D-Q
64,000 egress queues
PFE 1
64,000 queues
Scheduler 0 Scheduler 1
32,000 queues 32,000 queues
MIC 0 MIC 1
For example, Figure 13 on page 92 shows how queues are distributed on a 60-Gigabit
Ethernet Enhanced Queuing MPC. Of the 512,000 egress queues on the MPC, half
(256,000) are available to each of the two Packet Forwarding Engines. On each Packet
Forwarding Engine, half of these queues (128,000) are managed by each scheduler. The
complete scheduler complement (128,000) is available to only one PIC in a MIC. Thus
the total number of queues available depends on the number of MICs installed. The MPC
must have 2 MICs to achieve the maximum of 512,000 queues. With a single MIC, the
MPC can achieve only 256,000 queues.
Figure 13: Distribution of Queues on the 60-Gigabit Ethernet Enhanced Queuing MPC
MX-MPC2-3D-EQ
512,000 egress queues
PFE 1 PFE 2
256,000 queues 256,000 queues
g017499
MIC 0 MIC 1
When the maximum number of dedicated queues on the MPCs is reached, a system log
message, COSD_OUT_OF_DEDICATED_QUEUES, is generated. The system does not provide
subsequent subscriber interfaces with a dedicated set of queues. For per-unit scheduling
configurations, there are no configurable queues remaining on the MPC.
For hierarchical scheduling configurations, remaining queues are available when the
maximum number of dedicated queues is reached on the MPC. Traffic from these logical
interfaces are considered unclassified and attached to a common set of queues that are
shared by all subsequent logical interfaces. These common queues are the default port
queues that are created for every port. You can configure a traffic-control profile and
attach that to the interface to provide CoS parameters for the remaining queues.
For example, when the 30-Gigabit Ethernet Queuing MPC is configured with 32,000
subscriber interfaces with four queues per subscriber, the MPC can support 16,000
subscribers with a dedicated set of queues. You can provide CoS shaping and scheduling
parameters to the remaining queues for those subscriber interfaces by attaching a special
traffic-control profile to the interface.
These subscriber interfaces remain with this traffic-control profile, even if dedicated
queues become available.
Related • For information about managing dedicated queues in a static CoS configuration, see
Documentation Managing Dedicated and Remaining Queues for Static CoS Configurations on MIC and
MPC Interfaces
Managing Dedicated and Remaining Queues for Dynamic CoS Configurations on MIC
and MPC Interfaces
This topic describes how to manage dedicated and remaining queues for static and
dynamic subscriber interfaces configured in dynamic profiles.
You manage queues at the chassis and physical port level in the static configuration
hierarchies, then configure dynamic scheduling and shaping parameters for the subscriber
interfaces in the dynamic profile.
• Configuring the Maximum Number of Queues for MIC and MPC Interfaces on page 94
• Configuring Remaining Common Queues on MIC and MPC Interfaces on page 94
Configuring the Maximum Number of Queues for MIC and MPC Interfaces
30-Gigabit Ethernet Queuing MPCs and 60-Gigabit Ethernet Queuing and Enhanced
Queuing MPCs support a dedicated number of queues when configured for hierarchical
scheduling and per-unit scheduling configurations.
To scale the number of subscriber interfaces per queue, you can modify the number of
queues supported on the MIC.
When the number of dedicated queues is reached on the module, there can be queues
remaining. Traffic from these logical interfaces are considered unclassified and attached
to a common set of queues that are shared by all subsequent logical interfaces.
You can configure traffic shaping and scheduling resources for the remaining queues by
attaching a special traffic-control profile to the interface. This feature enables you to
provide the same shaping and scheduling to remaining queues as the dedicated queues.
[edit class-of-service]
user@host# edit traffic-control-profiles profile-name
3. Attach the traffic control profiles for the dedicated and remaining queues to the port
on which you enabled hierarchical scheduling.
To provide the same shaping and scheduling parameters to dedicated and remaining
queues, reference the same traffic-control profile.
a. Attach the traffic-control profile for the dedicated queues on the interface.
b. Attach the traffic-control profile for the remaining queues on the interface.
Related • Verifying the Number of Dedicated Queues Configured on MIC and MPC Interfaces on
Documentation page 95
• Dedicated Queue Scaling for CoS Configurations on MIC and MPC Interfaces Overview
on page 89
Verifying the Number of Dedicated Queues Configured on MIC and MPC Interfaces
Purpose Display the number of dedicated queue resources that are configured for the logical
interfaces on a port.
Related • Managing Dedicated and Remaining Queues for Static CoS Configurations on MIC and
Documentation MPC Interfaces
• Managing Dedicated and Remaining Queues for Dynamic CoS Configurations on MIC
and MPC Interfaces on page 93
This overview describes how MX Series 3D Universal Edge Routers installed in a subscriber
access network can adjust hierarchical class-of-service (CoS) parameters to prevent
bandwidth contention at subscriber interfaces.
Hierarchical CoS is supported only for subscriber interfaces on EQ DPC or MPC interfaces
operating in hierarchical scheduler mode.
The characteristics of voice, data, and video applications vary widely in their requirements
for traffic throughput, bandwidth management, delay and jitter tolerance, and buffer
depth. To prevent bandwidth contention at subscriber interfaces, you can configure
applications such as ANCP and Multicast to perform real-time adjustments to the shaping
rate configured for subscriber interfaces for residential gateways. Enabling shaping-rate
adjustments on the router can prevent bandwidth contention at the interface from causing
degradation of the subscriber’s voice, data, or video services.
The OIF mapping and reverse OIF mapping multicast applications support delta
adjustments that increase or decrease the current shaping rate by a certain value. The
system adjusts traffic destined to the subscriber using reverse OIF mapping enabled on
a specified multicast interface. Reverse OIF mapping is used to determine the subscriber
VLAN interface and the multicast traffic bandwidth on the interface.
Adjustments that occur on the scheduler node can also impact the shaping rates for all
queues. This adjustment can be undesirable for service providers who want to provide
a premium level of service on specific queues.
For delta-based adjustments by multicast applications, you can control the distribution
of shaping rates among queues by assigning the percentage of adjustment allowed for
each queue. In addition, you can set a minimum adjusted shaping rate for each queue.
Figure 14 on page 98 shows a sample multicast network with shaping rates adjusted at
the scheduler node level. The shaping rate is reduced by 4 Mbps (from 41 Mbps to 37
Mbps) at the scheduler node for subscriber interface 1, which reduces the rates of both
the best effort and video on demand (VoD) service queues.
Figure 14: Scheduler Node and Queues with Adjusted Shaping Rates
Queues Level 3 (Logical interface) Level 2 Level 1 (Gigabit Ethernet port)
Figure 15 on page 99 shows the same network with queue-based adjustments enabled
for the best-effort queue on subscriber 1. The shaping rate of the best-effort queue is
reduced by 4 Mbps (from 5 Mbps to 1 Mbps). The VoD service queue is not affected.
g017576
IPTV Multicast VLAN
4 Mbps of multicast destined to subscriber interface 1
Related • Configuring the Minimum Adjusted Shaping Rate on Scheduler Nodes for Subscribers
Documentation on page 101
This overview describes how an MX Series 3D Universal Edge Router installed as an edge
router can adjust hierarchical CoS policy for subscriber interfaces for subscriber local
loops. You can configure the router to throttle the traffic sent to subscriber local loops
so that the traffic does not exceed the current data transmission rate of those lines. This
feature ensures that changes to subscriber local loop speeds do not cause bandwidth
contention at the subscriber’s residential gateway.
You can configure an MX Series router to adjust the configured shaping rates on scheduler
nodes for subscriber interfaces that represent subscriber local loops. Whenever a DSLAM
resynchronizes a subscriber local loop speed, the router adjusts the configured shaping
rate for that line so that the aggregate egress traffic to those subscribers is shaped to
the local loop speed before the traffic reaches the DSLAM. Unless the maximum amount
of bandwidth allocated to the subscriber interface on the router is throttled to the local
loop speed, bandwidth contention can occur at the subscriber’s residential gateway,
which can cause the DSLAM to drop packets. This type of shaping-rate adjustment
requires the topology discovery and traffic-monitoring features of the Access Node
Control Protocol (ANCP).
You can enable ANCP to communicate the subscriber local loop speed to CoS, which in
turn throttles traffic destined to the associated subscriber interface so that it matches
the subscriber local loop speed. The ANCP agent acquires unadjusted (net) subscriber
line rate information from DSLAMs and then communicates this data transmission rate
for use with CoS. You can also configure percentage and byte adjustments that the ANCP
agent can make to the received net data rate for frame-mode DSL types before
communicating the adjusted rate and overhead to CoS.
• For more information about the ANCP protocol, see the ANCP and the ANCP Agent
Overview.
• Shaping-rate adjustments are supported only for subscriber local loops that terminate
at DSLAMs that you have configured as ANCP neighbors of the MX Series router.
• Shaping-rate adjustments are supported only for scheduler nodes for which you have
configured an initial shaping rate by including the shaping-rate statement in a
traffic-control profile applied to the scheduler node. Specify the initial shaping rate as
a peak rate, in bits per second (bps), and not as a percentage. Other methods of
configuring a shaping rate are not supported with this feature.
• Shaping-rate adjustments are supported only for scheduler nodes that are static logical
interface sets that you have configured to operate at Level 3 of the scheduler hierarchy
on the router. If an interface set is configured with a logical interface (such as unit 0)
and queue, then the interface set is an internal scheduler node (as opposed to a root
node or a leaf node) at Level 2 of the hierarchy. However, if there are no traffic-control
profiles are configured on logical interfaces in an interface set, then the interface set
is an internal scheduler node at Level 3 of the hierarchy.
• Shaping-rate adjustments are supported only for subscriber interfaces over physical
interfaces that you have configured to operate in hierarchical scheduler mode. Only
ports on EQ DPCs in MX Series routers support hierarchical scheduler mode.
• After shaping-rate adjustments are enabled and the router has performed shaping-rate
adjustments on a scheduler node, you can configure a new shaping rate by including
the shaping-rate statement in a traffic-control profile and then applying that profile to
that scheduler node. However, this new shaping-rate value does not immediately result
in shaping traffic at the new rate. The scheduler node continues to be shaped at rate
set by ANCP. Only when the ANCP shaping-rate adjustment feature is disabled is the
scheduler node shaped at the newly configured shaping-rate.
• The Layer 2 Tunneling Protocol (L2TP) is often used to carry traffic securely between
an L2TP Network Server (LNS) and an L2TP Access Concentrator (LAC). The QoS
adjustment feature supports the shaping overhead options that you can use to add a
specified number of bytes to the actual packet length when determining shaped session
packet length. ANCP shaping-rate adjustments are not supported for ingress traffic,
only for egress traffic. To configure the number of bytes to add to the packet at the
egress side of the tunnel, include the egress-shaping-overhead and mode statements
at the [edit chassis fpc slot-number pic pic-number traffic-manager] hierarchy level. Use
the shaping overhead options if you need to account for encapsulation overhead.
For more information about the ANCP protocol, see the ANCP and the ANCP Agent
Overview.
Configuring the Minimum Adjusted Shaping Rate on Scheduler Nodes for Subscribers
Overview
Absolute adjustments and delta adjustments are performed at the scheduler node level.
You can configure a minimum adjusted shaping rate at the scheduler node level using
static or dynamic CoS parameters.
This feature is supported for adjustments performed by the ANCP and multicast
applications on both EQ DPCs and MPC/MIC modules on MX Series routers.
BEST PRACTICE: For multicast traffic, you can configure a minimum adjusted
shaping rate at the queue level. We recommend that you configure the
minimum adjusted value at the scheduler node or the queue, but not both.
When you configure a minimum adjusted value for a node and for a scheduler
that is referenced by a scheduler map in the same traffic-control-profile, the
system uses the minimum value from the scheduler.
This feature is supported for adjustments performed by the ANCP and multicast
applications on both EQ DPCs and MPC/MIC modules on MX Series routers.
Related • Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
Documentation
• Configuring Shaping-Rate Adjustments on Queues on page 102
Overview
By default, the multicast application adjusts the shaping rates at the scheduler node
level. This adjustment also impacts the shaping rates for all queues, which can be
undesirable for service providers who want to provide a premium level of service on
specific queues.
For multicast applications, you can control the distribution of shaping rates among queues
by assigning the percentage of adjustment allowed for each queue. In addition, you can
set a minimum adjusted shaping rate for each queue.
When you configure a minimum adjusted value for a node and for a scheduler
that is referenced by a scheduler map in the same traffic-control-profile, the
system uses the minimum value from the scheduler.
BEST PRACTICE: Ensure that the minimum adjusted value that you
configure does not exceed the shaping rate and is not lower than the
configured transmit rate.
BEST PRACTICE: Ensure that the minimum adjusted value that you
configure does not exceed the shaping rate and is not lower than the
configured transmit rate.
Related • Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
Documentation
• Configuring the Minimum Adjusted Shaping Rate on Scheduler Nodes for Subscribers
on page 101
• Configuring Static Logical Interface Sets to Serve as CoS Hierarchical Scheduler Nodes
for Subscriber Loops on page 105
• Configuring the Logical Interfaces That Compose the Static Logical Interface
Sets on page 105
• Configuring Hierarchical CoS on the Static Logical Interface Sets That Serve as
Hierarchical Scheduler Nodes for Subscriber Local Loops on page 106
• Configuring ANCP Functionality That Supports and Drives Shaping-Rate Adjustments
for Subscriber Local Loops on page 108
Configuring Static Logical Interface Sets to Serve as CoS Hierarchical Scheduler Nodes for
Subscriber Loops
To configure a logical interface set, begin by including the interface-set statement with
the interface-set-name option at the [edit interfaces] hierarchy level.
An interface set is composed of two or more logical interfaces on the same physical
interface. Each logical interface in an interface set corresponds to an individual subscriber
service, such as voice, video, or data. To specify either a list of logical unit numbers or the
single outer VLAN tag used to identify the logical interfaces that compose the interface
set, include statements at the [edit interfaces interface-set interface-set-name] hierarchy
level:
• For an interface set composed of a list of logical interfaces identified by an inner VLAN
tag on Ethernet frames (called the customer VLAN, or C-VLAN, tag), you must specify
each logical interface by including the unit statement with the logical-unit-number
option.
[edit]
interfaces {
interface-set interface-set-name {
interface ethernet-interface-name { # EQ DPC port
unit logical-unit-number;
unit logical-unit-number;
...
}
...
}
}
• For an interface set composed of a set of VLANs grouped at the DSLAM and identified
by the same service VLAN (S-VLAN) tag), you must specify the S-VLAN tag as the
outer VLAN tag for each VLAN by including the vlan-tags-outer statement with the
vlan-tag option.
[edit]
interfaces {
interface-set interface-set-name {
interface ethernet-interface-name { # EQ DPC port
vlan-tags-outer vlan-tag; # Identify the DSLAM
}
...
}
}
Configuring the Logical Interfaces That Compose the Static Logical Interface Sets
Each underlying physical interface must be configured to operate in hierarchical scheduler
mode and to support stacked VLAN tagging on all logical interfaces. To configure, include
the hierarchical-scheduler statement and the stacked-vlan-tagging statement at the [edit
interfaces ethernet-interface-name] hierarchy level.
To associate the individual logical interfaces of an interface set with specific subscriber
services provided by the subscriber local loop, bind an S-VLAN tag and a C-VLAN tag to
each logical interface that belongs to a scheduler node that represents a subscriber local
loop. Ethernet frames sent from the logical interfaces contain an outer VLAN tag that
identifies a DSLAM and an inner VLAN tag that identifies a subscriber port on the DSLAM.
To configure, include the vlan-tags statement at each logical interface:
[edit]
interfaces {
ethernet-interface-name { # EQ DPC port underlying an interface set
hierarchical-scheduler;
stacked-vlan-tagging; # Support 802.1Q VLAN dual-tagged frames
unit logical-unit-number { # Bind S-VLAN and C-VLAN tags to logical interface
vlan-tags inner tpid.vlan-id outer tpid.vlan-id;
}
...
}
}
Configuring Hierarchical CoS on the Static Logical Interface Sets That Serve as Hierarchical
Scheduler Nodes for Subscriber Local Loops
To configure hierarchical CoS on the static logical interface set that serves as the
hierarchical scheduler node for a subscriber local loop:
1. For each scheduler node that represents a subscriber local loop, configure an initial
shaping rate.
• To apply output traffic scheduling and shaping parameters at the logical interface
set level (rather than at the logical unit level), include the
output-traffic-control-profile statement and specify the name of a traffic-control
profile as the profile-name option at the [edit class-of-service interfaces interface-set
interface-set-name] hierarchy level.
• [edit class-of-service]
2. Configure the scheduler maps referenced in the traffic-control profiles applied to the
interface sets, the schedulers referenced in those scheduler maps, and the drop profiles
referenced in those schedulers.
• A scheduler map establishes the traffic output queues (forwarding classes) for a
scheduler node and associates each queue with a specific scheduler map.
• A scheduler defines queue properties (transmit rate, buffer size, priority, and drop
profile) that specify how traffic is treated in the output queue.
• A drop profile specifies how aggressively the MX Series router drops packets that
are managed by a particular scheduler by defining either a segmented or interpolated
graph that maps output queue fullness to packet drop probability.
[edit]
class-of-service {
scheduler-maps { # Assign queuing characteristics to output queues
map-name { # Map output queues to
forwarding-class class-name scheduler scheduler-name;
forwarding-class class-name scheduler scheduler-name;
...
}
...
}
schedulers { # Define queuing characteristics
scheduler-name { # Specify queuing and buffer management
transmit-rate transmit-rate-option;
buffer-size buffer-size-option;
priority priority-level;
drop-profile-map loss-priority loss-priority-option protocol any drop-profile
drop-profile-name;
...
}
}
drop-profiles { # Define random early detection (RED) for the delay buffer
drop-profile–name { # Specify how to drop packets from an output queue
drop-profile-name { # Map a queue fullness to a drop probability
fill-level percentage drop-probability percentage; # Option 1: segmented
fill-level percentage drop-probability percentage;
...
}
interpolate { # Option 2: interpolated
drop-probability [ values ];
fill-level [ values ];
}
}
...
}
}
For more information about configuring scheduler maps, schedulers, and drop profiles,
see Mapping CoS Component Inputs to Outputs Overview.
Configuring ANCP Functionality That Supports and Drives Shaping-Rate Adjustments for
Subscriber Local Loops
To configure the Access Node Control Protocol (ANCP) functionality that supports and
drives the shaping-rate adjustments for subscriber local loops:
• Enable the ANCP agent to monitor subscriber local loop rates at the DSLAMs and
communicate this information to CoS.
• For frame-mode DSL types, optionally configure adjustments that are made to the net
data rates, the frame overhead, or both before the ANCP agent reports the values to
CoS. Rates are adjusted by a percentage. Bytes are added to or subtracted from the
overhead per frame.
• Configure each DSLAM as an ANCP neighbor of the router so that TCP connections
can be established between the router and each DSLAM.
• Identify the subscriber interface sets whose traffic is monitored and shaped by the
ANCP agent, and associate those interface sets with the corresponding identifiers
configured on the access node (DSLAM) to uniquely identify the subscriber local loops
within the access network.
The ANCP agent uses this information to build a mapping of subscribers to subscriber
interfaces. When the ANCP agent receives port management messages from a DSLAM
or other access node, it uses the access identifier contained in the message to determine
which hierarchical scheduler node corresponds to the subscriber.
[edit]
protocols {
ancp {
qos-adjust; # Enable ANCP to monitor and adjust CoS shaping rates
sdsl-bytes bytes; # Specify number of bytes to adjust SDSL rate
sdsl-overhead-adjust percentage; # Specify percentage by which to adjust SDSL
rate
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Shaping-Rate Adjustments for Subscriber Local Loops on page 100
Traffic-shaping parameters for all subscriber local loops revert to their current configured
values.
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Shaping-Rate Adjustments for Subscriber Local Loops on page 100
You can disable hierarchical bandwidth adjustment for all subscriber interfaces with
reverse OIF mapping enabled on a specified multicast interface. Reverse OIF mapping
is used to determine the subscriber VLAN interface and the multicast traffic bandwidth
on the interface.
1. Specify that you want to access the subscriber interfaces with reverse-OIF mapping
enabled.
2. Disable hierarchical bandwidth adjustment for all subscriber interfaces on the interface.
This example shows how you can enable shaping-rate adjustments for static logical
interface sets that represent subscriber local loops:
1. Configure static logical interface sets to serve as CoS hierarchical scheduler nodes
for subscriber local loops.
This example uses a single scheduler node that represents two subscriber local loops.
The scheduler node is a static logical interface composed of two logical interfaces.
The underlying physical interface is port 0 on a Gigabit Ethernet EQ DPC in slot 4, PIC
0:
[edit]
interfaces {
interface-set ifset-of-logical-interfaces {
interface ge-4/0/0 {
unit 1;
unit 2;
}
}
ge-4/0/0 {
description “access interface ge-4/0/0”;
hierarchical-scheduler;
stacked-vlan-tagging;
unit 1 {
description “DSL type ADSL1 = 0x01”;
proxy-arp;
vlan-tags outer 1 inner 1; # S-VLAN tag is ’1’ and C-VLAN tag is ’1’
family inet { # Specify a secondary loopback address
unnumbered-address lo0.0 preferred-source-address 192.168.7.3;
}
}
unit 2 {
description “DSL type ADSL1 = 0x01”;
proxy-arp;
vlan-tags outer 1 inner 2; # S-VLAN tag is ’1’ and C-VLAN tag is ’2’
family inet { # Specify a secondary loopback address
unnumbered-address lo0.0 preferred-source-address 192.168.7.4;
}
}
}
}
2. Begin configuring hierarchical CoS on the static logical interface set that serves as
the hierarchical scheduler node for the group of subscriber local loops.
[edit]
class-of-service {
interfaces {
interface-set ifset-of-logical-interfaces {
output-traffic-control-profile tcp-premium-with-4–queues;
}
}
}
3. Configure the traffic-control profiles that can be applied to the scheduler node:
[edit]
class-of-service {
traffic-control-profiles {
tcp-basic-rate { # Specify a scheduler map and traffic controls
shaping-rate 10m;
}
tcp-premium-with-4-queues { # Specify a scheduler map and traffic controls
scheduler-map smap-premium-4q;
shaping-rate 20m;
guaranteed-rate 10m;
delay-buffer-rate 5m;
}
}
}
[edit]
class-of-service {
scheduler-maps { # Define the queues that comprise each scheduler node
smap-premium-4q { # Map each queue in the scheduler node to a scheduler
forwarding-class be scheduler be_sch;
forwarding-class af scheduler af_sch;
forwarding-class ef scheduler ef_sch;
forwarding-class nc scheduler nc_sch;
}
}
}
5. Configure the four schedulers (referenced in the scheduler map) that define the four
output queues for the scheduler node:
[edit]
class-of-service {
schedulers { # Define scheduling characteristics of each queue
be_sch { # Transmit rate and buffer management parameters
transmit-rate percent 10;
buffer-size remainder;
priority low;
}
ef_sch { # Transmit rate and buffer management parameters
...
}
af_sch { # Transmit rate and buffer management parameters
...
}
nc_sch { # Transmit rate and buffer management parameters
...
}
}
}
6. Enable ANCP to communicate with the DSLAM to adjust the CoS shaping rate for the
scheduler node.
You must enable the ANCP feature for performing CoS traffic shaping adjustments,
configure the DSLAM as an ANCP neighbor, and specify the DSLAM-assigned identifier
for the subscriber local loop represented by the scheduler node Optionally specify
byte or percentage adjustments for frame-mode DSL types.
[edit]
protocols {
ancp {
qos-adjust; # Enable ANCP to adjust CoS shaping rates and specify rate adjustments
sdsl-bytes 30;
sdsl-overhead-adjust 87;
vdsl-bytes 20;
vdsl-overhead-adjust 95;
vdsl2-bytes 20;
vdsl2-overhead-adjust 87;
}
NOTE: If ANCP is not yet enabled, the process starts when you commit a
configuration that contains the protocols ancp stanza.
7. You can display the configured shaping rate and the adjusted shaping rate for each
logical interface set configured for hierarchical CoS, issue the show class-of-service
interface-set operational command.
NOTE: After shaping-rate adjustments are enabled and the router has
performed shaping-rate adjustments on a scheduler node, you can configure
a new shaping rate by including the shaping-rate statement in a traffic-control
profile and then applying that profile to that scheduler node. However, this
new shaping-rate value does not immediately result in shaping traffic at the
new rate. The scheduler node continues to be shaped at rate set by ANCP.
Only when the ANCP shaping-rate adjustment feature is disabled is the
scheduler node shaped at the newly configured shaping-rate.
Related • Enabling Shaping-Rate Adjustments for Subscriber Local Loops on page 104
Documentation
Action • To display ANCP neighbor information, issue the show ancp neighbor operational
command.
• To clear ANCP neighbors, issue the clear ancp neighbor operational command.
• To display ANCP subscriber information, issue the show ancp subscriber operational
command.
• To display ANCP class-of-service information, issue the show ancp cos operational
command.
If ANCP is not yet enabled, the process starts when you commit a configuration that
contains the protocols ancp stanza.
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• Configuring Dynamic Shaping Parameters to Account for Overhead in Downstream
Traffic Rates on page 117
• Example: Configuring Dynamic Shaping Parameters to Account for Overhead in
Downstream Traffic Rates on page 118
• Configuring Static Shaping Parameters to Account for Overhead in Downstream Traffic
Rates on page 122
• Example: Configuring Static Shaping Parameters to Account for Overhead in
Downstream Traffic Rates on page 123
• Setting Shaping Rate and Overhead Accounting Based on PPPoE Vendor-Specific
Tags on page 125
• Configuring the Shaping Rate and Overhead Accounting Based on PPPoE
Vendor-Specific Tags on Dynamic Subscriber Interfaces on page 127
• Reporting the Effective Shaping Rate for Subscribers on page 127
• Verifying the Effective Shaping Rate Reporting Configuration on page 128
The downstream network is not necessarily the directly attached network. In typical
broadband network gateway (BNG) configurations, the directly attached network is an
Ethernet access network, which provides access to either another frame-based network,
or a cell-based network.
The overhead accounting feature enables you to shape traffic based on whether the
downstream network is a frame-based network, like Ethernet, or a cell-based network,
like ATM. It assigns a byte adjustment value to account for different encapsulations.
• The shaping-rate in effect for the subscriber’s household, in bits per second.
• Number of bytes in each frame that are accounted for by the shaper.
Shaping Modes
There are two modes used for adjusting downstream traffic:
• Frame shaping mode is useful for adjusting downstream traffic with different
encapsulations. Shaping is based on the number of bytes in the frame, without regard
to cell encapsulation or padding overhead. Frame is the default shaping mode on the
router.
• Cell shaping mode is useful for adjusting downstream cell-based traffic. In cell shaping
mode, shaping is based on the number of bytes in cells, and accounts for the cell
encapsulation and padding overhead.
When you specify cell mode, the resulting traffic stream conforms to the policing rates
configured in downstream ATM switches, reducing the number of packet drops in the
Ethernet network.
To account for ATM segmentation, the router adjusts all of the rates by 48/53 to
account for 5-byte ATM AAL5 encapsulation. In addition, the router accounts for cell
padding, and internally adjusts each frame by 8 bytes to account for the ATM trailer.
Byte Adjustments
When the downstream traffic has different byte sizes per encapsulation, it is useful to
configure a byte adjustment value to adjust the number of bytes per packet to be included
in or excluded from the shaping mechanism. This value represents the number of bytes
that are encapsulated and decapsulated by the downstream equipment. For example,
to properly account for a 4-byte header stripped by the downstream network, set the
overhead-accounting bytes to -4. To properly account for a 12-byte header added by the
downstream network, set the overhead-accounting bytes to 12.
We recommend that you specify a byte adjustment value that represents the difference
between the CPE protocol overhead and B-RAS protocol overhead.
The system rounds up the byte adjustment value to the nearest multiple of 4. For example,
a value of 6 is rounded to 8, and a value of –10 is rounded to –8.
You do not need to configure a byte adjustment value to account for the downstream
ATM network. However, you can specify the byte value to account for additional
encapsulations or decapsulations in the downstream network.
The overhead accounting feature also affects the egress shaping overhead feature that
you can configure at the chassis level. We recommend that you use the egress
shaping-overhead feature to account for the Layer 2 overhead of the outgoing interface,
and use the overhead-accounting feature to account for downstream traffic with different
encapsulations and cell-based networks.
When both features are configured, the total byte adjustment value is equal to the
adjusted value of the overhead-accounting feature plus the value of the
egress-shaping-overhead feature. For example, if the configured byte adjustment value
is 40, and the router internally adjusts the size of each frame by 8, the adjusted overhead
accounting value is 48. That value is added to the egress shaping overhead of 24 for a
total byte adjustment value of 72.
Related • To configure overhead accounting for static Ethernet interfaces, see Configuring Static
Documentation Shaping Parameters to Account for Overhead in Downstream Traffic Rates on page 122
You can configure the overhead accounting feature to shape downstream traffic based
on either frames or cells.
You can also account for the different byte sizes per encapsulation by configuring a byte
adjustment value for the shaping mode.
The available range is –120 through 124 bytes. The system rounds up
the byte adjustment value to the nearest multiple of 4. For example, a
value of 6 is rounded to 8, and a value of -10 is rounded to -8.
Related • Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
Documentation
• Example: Configuring Dynamic Shaping Parameters to Account for Overhead in
Downstream Traffic Rates on page 118
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
This topic describes two scenarios for which you can configure dynamic shaping
parameters to account for packet overhead in a downstream network.
The RADIUS administrator supplies the initial values on the RADIUS server, and the service
activation is performed at subscriber login.
Figure 16 on page 119 shows the sample network that the examples reference.
g017442
Residential DSLAM
AF
Gateway 2 subscriber 2
EF
To accurately shape traffic at the residential gateway, the MX Series router must account
for the different frame sizes. The difference between the stacked VLAN (S-VLAN) frames
sent by the router and the single-tagged VLAN frames received at the residential gateway
is a 4-byte VLAN tag. The residential gateway receives frames that are 4 bytes less.
To account for the different frame sizes, you configure the frame shaping mode with -4
byte adjustment:
1. Configure the traffic shaping parameters in the dynamic profile and attach them to
the interface.
Enabling the overhead accounting feature affects the resulting shaping rate,
guaranteed rate, and excess rate parameters, if they are configured.
[edit]
dynamic-profiles {
ethernet-downstream-network {
interfaces {
$junos-interface-ifd-name {
unit $junos-underlying-interface-unit {
family inet;
}
}
}
class-of-service {
traffic-control-profiles {
tcp-example-overhead-accounting-frame-mode {
excess-rate percent $junos-cos-excess-rate
guaranteed-rate $junos-cos-guaranteed-rate
overhead-accounting $junos-cos-shaping-mode bytes $junos-cos-byte-adjust
shaping-rate $junos-cos-shaping-rate;
}
}
interfaces {
$junos-interface-ifd-name {
unit "$junos-underlying-interface-unit" {
output-traffic-control-profile tcp1;
}
}
}
}
}
}
Table 24 on page 120 lists the initial values defined by the RADIUS administrator for
the shaping rates.
Table 24: Initial Shaping Values at Subscriber Login For Traffic With
Different Encapsulations
Predefined Variable RADIUS Tag Value
$junos-cos-guaranteed-rate T03 2m
$junos-cos-excess-rate T05 50
$junos-cos-byte-adjust T08 –4
To accurately shape traffic at the residential gateway, the MX Series router must account
for the different physical network characteristics.
The administrator does not need to configure a byte adjustment value to account for the
downstream ATM network, but has the option of configuring a byte adjustment value to
account for different encapsulations or decapsulations.
To account for the different frame sizes, configure cell shaping mode:
1. Configure the traffic shaping parameters in the dynamic profile and attach them to
the interface.
Enabling the overhead accounting feature affects the resulting shaping rate,
guaranteed rate, and excess rate parameters, if they are configured.
[edit]
dynamic-profiles {
atm-downstream-network {
interfaces {
$junos-interface-ifd-name {
unit $junos-underlying-interface-unit {
family inet;
}
}
}
class-of-service {
traffic-control-profiles {
tcp-example-overhead-accounting-cell-mode {
excess-rate percent $junos-cos-excess-rate
guaranteed-rate $junos-cos-guaranteed-rate
overhead-accounting $junos-cos-shaping-mode
shaping-rate $junos-cos-shaping-rate
}
}
interfaces {
$junos-interface-ifd-name {
unit "$junos-underlying-interface-unit" {
output-traffic-control-profile tcp1;
}
}
}
}
}
}
Table 25 on page 121 lists the initial values defined by the RADIUS administrator for
the shaping rates.
$junos-cos-guaranteed-rate T03 2m
$junos-cos-excess-rate T05 50
To account for ATM segmentation, the MX Series router adjusts all of the rates by
48/53 to account for ATM AAL5 encapsulation. In addition, the router accounts for
cell padding, and internally adjusts each frame by 8 bytes to account for the ATM
trailer.
The overhead accounting feature enables you to account for downstream traffic that
has different encapsulations or downstream traffic from cell-based equipment, such as
ATM switches.
You can configure the overhead accounting feature to shape downstream traffic based
on frames or cell shaping mode.
You can also account for the different byte sizes per encapsulation by configuring a byte
adjustment value for the shaping mode.
To configure the shaping mode and byte adjustment value for static CoS configurations:
The available range is –120 through 124 bytes. The system rounds up the
byte adjustment value to the nearest multiple of 4. For example, a value
of 6 is rounded to 8, and a value of –10 is rounded to –8.
Related • Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
Documentation
This topic describes two scenarios for which you can configure static shaping parameters
to account for packet overhead in a downstream network.
Figure 16 on page 119 shows the sample network that the examples reference.
g017442
Residential DSLAM
AF
Gateway 2 subscriber 2
EF
To accurately shape traffic at the residential gateway, the MX Series router must account
for the different frame sizes. The difference between the stacked VLAN (S-VLAN) frames
sent by the router and the single-tagged VLAN frames received at the residential gateway
is a 4-byte VLAN tag. The residential gateway receives frames that are 4 bytes less.
To account for the different frame sizes, the network administrator configures the frame
shaping mode with –4 byte adjustment:
1. The network administrator configure the traffic shaping parameters and attaches
them to the interface.
Enabling the overhead accounting feature affects the resulting shaping rate,
guaranteed rate, and excess rate parameters, if they are configured.
[edit]
class-of-service {
traffic-control-profiles {
tcp-example-overhead-accounting-frame-mode {
shaping-rate 10m;
shaping-rate-priority-high 4m;
guaranteed-rate 2m;
excess-rate percent 50;
overhead-accounting frame-mode bytes -4;
}
}
interfaces {
ge-1/0/0 {
output-traffic-control-profile tcp-example-overhead-accounting-frame-mode;
}
}
}
}
To accurately shape traffic at the residential gateway, the MX Series router must account
for the different physical network characteristics.
To account for the different frame sizes, the network administrator configures the cell
shaping mode with –4 byte adjustment:
1. Configure the traffic shaping parameters and attach them to the interface.
Enabling the overhead accounting feature affects the resulting shaping rate,
guaranteed rate, and excess rate parameters, if they are configured.
[edit]
class-of-service {
traffic-control-profiles {
tcp-example-overhead-accounting-cell-mode {
shaping-rate 10m;
shaping-rate-priority-high 4m;
guaranteed-rate 2m;
excess-rate percent 50;
overhead-accounting cell-mode;
}
}
interfaces {
ge-1/0/0 {
output-traffic-control-profile tcp-example-overhead-accounting-cell-mode;
}
}
}
}
To account for ATM segmentation, the MX Series router adjusts all of the rates by
48/53 to account for ATM AAL5 encapsulation. In addition, the router accounts for
cell padding, and internally adjusts each frame by 8 bytes to account for the ATM
trailer.
Related • Configuring Static Shaping Parameters to Account for Overhead in Downstream Traffic
Documentation Rates on page 122
You can use access line parameters in PPPoE discovery packets to set the shaping-rate
and overhead-accounting class-of-service attributes on dynamic subscriber interfaces
in a broadband access network. This feature is supported on MPC/MIC interfaces on MX
Series routers.
You can configure class-of-service attributes, for example the shaping-rate, using the
CLI, RADIUS vendor-specific attributes, ANCP, multicast, or in this case, PPPoE
vendor-specific tags.
vendor-specific attributes. The shaping-rate value is only overridden if the vs-tag value
is less than the RADIUS value.
RADIUS CoA can overwrite the existing values. Upon receipt of a RADIUS CoA, the RADIUS
value overrides the value set from the PPPoE vendor-specific tags.
PPPoE vendor-specific tags can override the RADIUS values, but a later RADIUS CoA
request can then override that value.
• If the downstream-rate is less than the configured shaping-rate (as set in the CLI or
using RADIUS attributes) then it is applied, subject to other restrictions. If the
downstream-rate is greater than or equal to the configured shaping-rate, no changes
are performed.
• The downstream-rate cannot be less than 1000 bps. If it is, the downstream-rate is
set to 1000 bps.
• The downstream-rate cannot be less than the sum of the transmit-rates of all queues.
Related • Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
Documentation
• Configuring the Shaping Rate and Overhead Accounting Based on PPPoE
Vendor-Specific Tags on Dynamic Subscriber Interfaces on page 127
NOTE: When you enable this feature, the values supplied by the PPPoE
vendor-specific tags override the parameters that you have configured for
shaping-rate and overhead-accounting statements at the [edit
dynamic-profiles profile-name class-of-service traffic-control-profile] hierarchy
level.
Related • Setting Shaping Rate and Overhead Accounting Based on PPPoE Vendor-Specific
Documentation Tags on page 125
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
The Effective-Shaping-Rate VSA [26–177] provides the best estimate for a subscriber’s
downstream traffic rate for accounting purposes. The VSA is included in RADIUS
Acct-Start, Acct-Stop, and Interim-Acct messages. The reported rate is the rate enforced
on the L3, L2, or L1 node according to local policy. The value of the VSA varies depending
on your configuration:
• Advisory rate—When the advisory rate is configured and effective shaping rate reporting
is not enabled.
• Port speed—When the advisory rate is not configured and effective shaping rate
reporting is not enabled.
When you disable reporting, the VSA reports either the advisory rate or port speed for
both existing subscribers and new subscribers that log in after reporting is disabled.
• Enable reporting.
[edit chassis]
user@host1# set effective-shaping-rate
NOTE: When the traffic control profile for the subscriber specifies cell-mode,
the effective shaping rate does not account for cell padding according to the
encapsulation type. The rate includes the 48/53 cell tax.
Related • Verifying the Effective Shaping Rate Reporting Configuration on page 128
Documentation
• Hierarchical CoS Shaping-Rate Adjustments Overview on page 97
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• AAA Accounting Messages and Supported RADIUS Attributes and Juniper Networks VSAs
for Junos OS
[edit]
user@host# show chassis
...
effective-shaping-rate;
...
• To display the effective shaping rate in kilobits per second when reporting is enabled:
Related • Reporting the Effective Shaping Rate for Subscribers on page 127
Documentation
A router in a subscriber access network ensures class of service (CoS) for dynamic
subscriber interfaces. An MX Series router with Modular Port Concentrator/Modular
Interface Card (MPC/MIC) interfaces ensures that subscribers receive an adequate
minimum bandwidth, referred to as the guaranteed rate, and maximum bandwidth,
referred to as the shaping rate. For dynamic VLAN subscriber interfaces based on agent
circuit identifier (ACI) information, you can shape the bandwidth either at a per-household
level for a dynamic ACI interface set, or at a per-subscriber level for a dynamic VLAN
subscriber interface associated with an ACI interface set.
To help you manage bandwidth more efficiently and economically for ACI-based dynamic
VLAN subscriber interfaces for PPPoE subscribers, you can configure the router to use
specific PPPoE vendor-specific attributes (VSAs) found in PPPoE control packets to
adjust the CoS shaping-rate and overhead-accounting attributes for dynamic ACI interface
sets and their associated ACI-based dynamic VLAN subscriber interfaces.
To configure the router to use the Actual-Data-Rate-Downstream VSA to adjust the CoS
shaping-rate attribute, include the vendor-specific-tags statement with the
actual-data-rate-downstream option at the [edit dynamic-profiles profile-name
class-of-service dynamic-class-of-service-options] hierarchy level in either the dynamic
profile that defines the ACI interface set or the dynamic profile that configures the
associated dynamic PPPoE (pp0) subscriber interface.
When you enable this feature, the value of the Actual-Data-Rate-Downstream VSA
overrides the shaping-rate value configured at the [edit dynamic-profiles profile-name
class-of-service traffic-control-profiles] hierarchy level only if the
Actual-Data-Rate-Downstream VSA value is less than the shaping-rate value configured
with the CLI.
The value of the Data Link subfield in the Access-Loop-Encapsulation VSA determines
the overhead accounting mode in use on the access loop. If the Data Link subfield value
is 0 (ATM Adaptation Layer 5, or AAL5), the access loop uses cell-mode encapsulation.
If the Data Link subfield value is 1 (Ethernet), the access loop uses frame-mode
encapsulation.
In subscriber access networks where the router passes downstream ATM traffic to
Ethernet interfaces, the different Layer 2 encapsulations between the router and the
PPPoE Intermediate Agent on the DSLAM make managing the bandwidth of downstream
ATM traffic difficult. Using the Access-Loop-Encapsulation VSA to shape traffic based
on frames or cells enables the router to adjust the overhead-accounting attribute in order
to apply the correct downstream rate for the subscriber.
To configure the router to use the Access-Loop-Encapsulation VSA to adjust the CoS
overhead-accounting attribute, include the vendor-specific-tags statement with the
access-loop-encapsulation option at the [edit dynamic-profiles profile-name
class-of-service dynamic-class-of-service-options] hierarchy level in either the dynamic
profile that defines the ACI interface set or the dynamic profile that configures the
associated dynamic PPPoE (pp0) subscriber interface.
When you enable this feature, the value of the Access-Loop-Encapsulation VSA always
overrides the overhead-accounting value configured at the [edit dynamic-profiles
profile-name class-of-service traffic-control-profiles] hierarchy level.
Dynamic Profiles and Adjustment of CoS Shaping Rate and Overhead Accounting
When you configure the router to use one or both of the Actual-Data-Rate-Downstream
VSA value and Access-Loop-Encapsulation VSA value to adjust the CoS shaping rate
and overhead accounting attributes, respectively, the router adjusts these attributes
when the dynamic ACI interface set is created and the router receives the PADI and PADR
packets from the first subscriber interface belonging to the ACI interface set.
You can configure CoS adjustment based on either or both VSAs in either or both of the
following dynamic profiles:
Table 26 on page 131 summarizes how the dynamic profile in which you configure CoS
adjustment for ACI-based dynamic VLANs using one or both VSAs affects the router
behavior.
Table 26: CoS Adjustment in Dynamic Profiles for ACI Interface Sets and
ACI-Based Subscriber Interfaces
VSAs Specified in ACI VSAs Specified in PPPoE
Interface Set Dynamic Subscriber Interface
Profile Dynamic Profile Result
Guidelines for Configuring Adjustment of CoS Shaping Rate and Overhead Accounting
You can also configure the router to use the Actual-Data-Rate-Downstream VSA and
Access-Loop-Encapsulation VSA values in PPPoE control packets to adjust the CoS
shaping rate and overhead accounting attributes, respectively, for dynamic subscriber
interfaces not associated with dynamic ACI interface sets.
With the exception of the constraints described in “Restrictions for Configuring Adjustment
of CoS Shaping Rate and Overhead Accounting for Dynamic ACI Interface Sets” on
page 132, most of the guidelines and restrictions that apply to this feature for use with
non–ACI-based dynamic subscriber interfaces also apply to its use for dynamic ACI
interface sets and their associated ACI-based dynamic VLAN subscriber interfaces.
Related • Setting Shaping Rate and Overhead Accounting Based on PPPoE Vendor-Specific
Documentation Tags on page 125
• Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Agent Circuit
Identifier-Based Dynamic VLANs on page 133
• Restrictions for Configuring Adjustment of CoS Shaping Rate and Overhead Accounting
for Dynamic ACI Interface Sets on page 132
Restrictions for Configuring Adjustment of CoS Shaping Rate and Overhead Accounting
for Dynamic ACI Interface Sets
The following restrictions apply when you configure the router to use the
Actual-Data-Rate-Downstream VSA and Access-Loop-Encapsulation vendor-specific
attribute (VSA) values in PPPoE control packets to adjust the CoS shaping rate and
overhead accounting attributes, respectively, for dynamic ACI interface sets and their
associated agent circuit identifier (ACI)-based dynamic VLAN subscriber interfaces:
• You cannot configure adjustment of CoS shaping rate and overhead accounting
attributes based on Actual-Data-Rate-Downstream VSA and
Access-Loop-Encapsulation VSA values that the router receives from the following
sources:
• RADIUS servers
• You cannot use this feature to report information about the PPPoE VSA values to
RADIUS.
• You cannot use this feature to configure CoS adjustment of upstream data traffic on
a dynamic ACI interface set.
• Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Agent Circuit
Identifier-Based Dynamic VLANs on page 133
Adjusting the CoS Shaping Rate and Overhead Accounting Parameters for Agent Circuit
Identifier-Based Dynamic VLANs
You can configure the router to use either or both of the Actual-Data-Rate-Downstream
[26-130] or Access-Loop-Encapsulation [26-144] DSL Forum vendor-specific attribute
(VSA) values in PPPoE control packets to adjust the CoS shaping-rate and
overhead-accounting attributes, respectively, for dynamic agent circuit identifier (ACI)
interface sets and their associated ACI-based dynamic VLAN subscriber interfaces.
• To configure adjustment of the CoS shaping rate and overhead accounting attributes
on a per-household basis, create a dynamic profile that defines the dynamic ACI
interface set.
• To configure adjustment of the CoS shaping rate and overhead accounting attributes
on a per-subscriber basis, create a dynamic profile that defines the ACI-based dynamic
PPPoE (pp0) subscriber interface associated with the ACI interface set.
See Configuring Dynamic VLAN Subscriber Interfaces Based on Agent Circuit Identifier
Information.
• In a dynamic profile for an ACI interface set or a dynamic profile for an ACI-based
PPPoE subscriber interface, configure adjustment of the CoS shaping-rate attribute
based on the value of the Actual-Data-Rate-Downstream VSA.
• In a dynamic profile for an ACI interface set or a dynamic profile for an ACI-based
PPPoE subscriber interface, configure adjustment of the CoS overhead-accounting
attribute based on the value of the Access-Loop-Encapsulation VSA.
• Restrictions for Configuring Adjustment of CoS Shaping Rate and Overhead Accounting
for Dynamic ACI Interface Sets on page 132
• Excess Bandwidth Distribution on MIC and MPC Interfaces Overview on page 135
• Traffic Burst Management on MIC and MPC Interfaces Overview on page 136
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC
Interfaces on page 138
Service providers often used tiered services to provide bandwidth for excess traffic as
traffic patterns vary. By default, excess bandwidth between a configured guaranteed
rate and shaping rate is shared equally among all queues on MIC and MPC interfaces,
which might not be optimal for all subscribers to a service.
You can adjust this distribution by configuring the rates and priorities for the excess
bandwidth.
By default, when traffic exceeds the shaping or guaranteed rates, the system demotes
traffic with guaranteed high (GH) priority and guaranteed medium (GM) priority. You can
disable this priority demotion for the MIC and MPC interfaces in your router.
Related • Managing Excess Bandwidth Distribution on Static Interfaces on MICs and MPCs
Documentation
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
on page 138
• Traffic Burst Management on MIC and MPC Interfaces Overview on page 136
You can manage the impact of bursts of traffic on your network by configuring a burst-size
value with the shaping rate or the guaranteed rate. The value is the maximum bytes of
rate credit that can accrue for an idle queue or scheduler node. When a queue or node
becomes active, the accrued rate credits enable the queue or node to catch up to the
configured rate.
30,000,000
20,000,000
10,000,000
g017567
0
03:38:30 03:39:00 03:39:30 03:40:00
Time elapsed
In Figure 18 on page 136, the network administrator configures a large burst-size value for
the shaping rate, then configures a small burst-size value. The larger burst size is subject
to a maximum value. The smaller burst size is subject to a minimum value that enables
the system to achieve the configured rates.
In both configurations, the scheduler node can burst beyond its shaping rate for a brief
interval. The burst of traffic beyond the shaping rate is more noticeable with the larger
burst size than the smaller burst size.
Use caution when selecting a different burst size for your network. A burst size that is too
high can overwhelm downstream networking equipment, causing dropped packets and
inefficient network operation. Similarly, a burst size that is too low can prevent the network
from achieving your configured rate.
• The system uses an algorithm to determine the actual burst size that is implemented
for a node or queue. For example, to reach a shaping rate of 8 Mbps, you must allocate
1Mb of rate credits every second. A shaping rate of 8 Mbps with a burst size of 500,000
bytes of rate-credit per seconds enables the system to transmit at most 500,000
bytes, or 4 Mbps. The system cannot implement a burst size that prevents the rate
from being achieved.
For more information, see “How the System Calculates the Burst Size” on page 137.
• There are minimum and maximum burst sizes for each platform, and different nodes
and queue types have different scaling factors. For example, the system ensures the
burst cannot be set lower than 1 Mbps for a shaping rate of 8 Mbps. To smoothly shape
traffic, rate credits are sent much faster than once per second. The interval at which
rate credits are sent varies depending on the platform, the type of rate, and the
scheduler level.
• When you have configured adjustments for the shaping rate (either by percentage or
through an application such as ANCP or Multicast OIF), the system bases the default
and minimum burst-size calculations on the adjusted shaping rate.
• When you have configured cell shaping mode to account for ATM cell tax, the system
bases the default and minimum burst-size calculations on the post-tax shaping rate.
• The guaranteed rate and shaping rate share the value specified for the burst size. If
the guaranteed rate has a burst size specified, that burst size is used for the shaping
rate; if the shaping rate has a burst size specified, that bursts size is used for the
guaranteed rate. If you have specified a burst size for both rates, the system uses the
lesser of the two values.
• The burst size configured for the guaranteed rate cannot exceed the burst-size
configured for the shaping rate. The system generates a commit error.
• If you have not configured a guaranteed rate, logical interfaces and interface sets
receive a default guaranteed rate from the port speed. Queues receive a default
guaranteed rate from the parent logical interface or interface set.
The system then rounds this value up. For example, the system uses the following
calculation to determine the burst size for a scheduler node with a shaping rate of 150
Mbps:
Max (Shaping rate, Guaranteed rate) bps * 100 ms / (8 bits/byte * 1000 ms/s) = 1,875,000
bytes
Rounded up to the next higher power of two = 2,097,150 (which is 2**21, or 0x200000)
The system assigns a single burst size to each of the following rate pairs:
• Uses the lesser of the two burst sizes if both values are configured.
• To calculate the minimum burst size, the system uses the greater of the two rates.
Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
Service providers often used tiered services that must utilize excess bandwidth as traffic
patterns vary. By default, excess bandwidth between a configured guaranteed rate and
shaping rate is shared equally among all queues with the same excess priority value,
which might not be optimal for all subscribers to a service.
This feature is supported for MIC and MPC interfaces on MX Series routers.
TIP: On MPC/MIC interfaces, the guaranteed rate and the shaping rate
share the value specified for the burst size. If the guaranteed rate has
a burst size specified, it is used for the shaping rate; if the shaping rate
has a burst size specified, it is used for the guaranteed rate. If you have
specified a burst for both rates, the system uses the lesser of the two
values.
Optionally, you can configure an excess rate specifically for high- and low-priority
traffic. When you configure the excess-rate statement for an interface, you cannot
also configure the excess-rate-low and excess-rate-high statements.
TIP:
For queues, you cannot configure the excess rate or excess priority in
these cases:
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
This topic describes the distribution options available for demux subscriber interfaces
over aggregated Ethernet.
Distribution Models
By default, the system supports hash-based distribution for all subscriber interface types
in an aggregated Ethernet bundle configured without link protection. In this model, traffic
for a logical interface can be distributed over multiple links in the bundle. This model is
desirable when there are many flows through the logical interface and you need to load
balance those flows.
Note that if the distribution flows are not even, egress CoS scheduling can be inaccurate.
In addition, scheduler resources are required on every link of the aggregated Ethernet
interface. For example, if subscriber traffic is allocated 10 MB for a triple-play service over
four links in a bundle, each of the links could receive 2.5 MB of traffic. High-density services
such as video could be limited by the bandwidth on one of the links.
Targeted distribution enables you to target the egress traffic for an IP or VLAN demux
subscriber on a single member link, using a single scheduler resource. To achieve load
balancing over the member links, the system distributes the subscriber interfaces equally
among the links. This enables the subscriber that is allocated 10 MB to be accurately
scheduled as the traffic flows through.
AE bundle
g017525
represents the primary. Access Node
For example, if link GE-x went down, subscriber 1 can begin forwarding over the backup,
which is link Ge-y. When link GE-y comes back up, subscriber 1 switches back to its primary
link, GE-x.
In the event that both GE-x and GE-y go down, subscriber 3 starts forwarding through its
backup, GE-z. Subscriber 1 will have lost its primary and backup links, and will also begin
forwarding out the GE-z link. A new level 3 scheduler is assigned for this subscriber on
link GE-z. If there is a momentary lapse between the time that a new scheduler is allocated
and forwarding switches to GE-z, the traffic will be forwarding through to the remaining
scheduler. Subscriber 2 continues to forward through its primarily link, GE-z.
The module redundancy option enables you to provide redundancy if a module or a link
fails. Backup links for a subscriber are chosen on a different DPC or MPC from the primary
link, based on the link with the least number of subscribers among the links on different
modules. You can enable this for the aggregated Ethernet interface.
When links are removed, affected subscribers are redistributed among the active remaining
backup links. When links are added to the system, no automatic redistribution occurs.
New subscribers are assigned to the links with the fewest subscribers (which are typically
the new links).
• You can manage subscribers with both hash-based and targeted distribution models
in the same network. For example, you can allocate subscribers with interface types
such as PPPoE with hash-based distribution, and enable demux subscribers with
targeted distribution.
• During normal network operations, the system maintains an even balance of subscribers
among the links in a bundle, even as subscribers log in and out. However, if the
distribution of a bundle becomes uneven (for example, when a link goes down and
new subscribers are logging in), you can perform a manual rebalance of the bundle. In
addition, you can configure periodic rebalancing of the bundle with a specific time
interval.
• When you anticipate that a link will be down for an extended time, and you want to
ensure that backup links are provisioned for all subscribers, we recommend that you
remove the failed link from the bundle. This forces the affected subscribers to
redistribute to other links.
• We recommend that you apply a remaining traffic-control profile to the logical interface
to ensure that minimal scheduling parameters are applied to the remaining subscriber
traffic. This provides scheduling for subscribers that do not have schedulers allocated
because they have not been configured or they have been over-provisioned, or because
of scheduler transitions on multiple link failures.
• If you perform a cold restart on the router when it is forwarding active subscribers, the
subscriber interfaces with targeted distribution are assigned to the first links that
become available when the system is initializing so forwarding can begin. To rebalance
the system following a cold restart, perform a manual rebalance of the bundle. In
addition, we recommend that you configure Graceful Routing Engine switchover (GRES)
on the router to enable nonstop forwarding during switchover, and avoid performing
cold restarts.
• To ensure appropriate and predictable targeted distribution, you must configure chassis
network services to use enhanced-ip mode.
• Unless specifically separated, multicast traffic egresses in parallel with unicast traffic,
sharing the CoS hierarchy and aggregated Ethernet flow distribution.
Related • Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Documentation Interfaces on page 145
Unlike VLAN subscriber interfaces, enabling link protection is not required for configuring
hierarchical CoS on demux interfaces. Instead, we recommend that you enable targeted
distribution on the demux interface to provide accurate scheduling for the aggregated
Ethernet links.
Before you begin, configure the subscriber interface with aggregated Ethernet:
• For static and dynamic IP demux interfaces, see Configuring a Static or Dynamic IP
Demux Subscriber Interface over Aggregated Ethernet.
• For static and dynamic VLAN demux interfaces, see Configuring a Static or Dynamic
VLAN Demux Subscriber Interface over Aggregated Ethernet.
See “Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Interfaces” on page 145.
3. (Optional) Enable module redundancy to ensure that CoS resources are provisioned
for the aggregated Ethernet links if a module or a link fails. By default, link redundancy
is supported.
See “Configuring Link and Module Redundancy for Demux Subscribers in an Aggregated
Ethernet Interface” on page 146.
5. Attach static or dynamic traffic shaping and scheduling parameters at the aggregated
Ethernet logical interface or its underlying physical interface. See:
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Verifying the Distribution of Demux Subscribers in an Aggregated Ethernet Interface
on page 157
[edit]
user@host#edit chassis
[edit chassis]
user@host#set network-services enhanced-ip
[edit]
user@host#edit interfaces demux0 unit logical-unit-number
By default, an aggregated Ethernet bundle with targeted distribution is enabled with link
redundancy. Backup links for a subscriber are chosen based on the link with the fewest
subscribers, which provides redundancy if a link fails.
We recommend that you configure the module redundancy option to provide redundancy
if a module or a link fails. Backup links for a subscriber are chosen on a different DPC or
MPC from the primary link, based on the link with the fewest subscribers among the links
on different modules.
1. Access the aggregated Ethernet bundle for which you want to configure module
redundancy.
edit
user@host# edit interfaces aex aggregated-ether-options
Related • Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Documentation Interfaces on page 145
In a targeted distribution model, the system allocates demux subscriber interfaces equally
among the member links in the aggregated Ethernet interface. When links are removed,
affected subscribers are redistributed among the active remaining backup links. When
links are added to the system, no automatic redistribution occurs. New subscribers are
assigned to the links with the fewest subscribers (which are typically the new links).
During normal network operations, the system maintains an even balance of traffic
among the links in a bundle, even as subscribers log in and out. However, if the distribution
of a bundle becomes uneven (for example, when a link goes down for a period of time
and new subscribers are logging in), you can perform a manual rebalance of the bundle.
In addition, you can configure periodic rebalancing of the bundle with a specific interval.
1. Access the aggregated Ethernet interface for which you want to configure periodic
rebalancing.
edit
user@host# edit interfaces aenumber aggregated-ether-options
2. Configure the rebalancing parameters for the interface, including the time and the
interval between rebalancing actions.
This example shows how to separate targeted multicast traffic from targeted unicast
traffic and send that multicast traffic to a different interface through the use of OIF maps.
Requirements
Before configuring this example, make sure to configure the distribution type for the
interface. See “Configuring the Distribution Type for Demux Subscribers on Aggregated
Ethernet Interfaces” on page 145 for instructions.
Overview
In this example, targeted traffic distribution is already configured on the router.
Dynamically created interfaces each carry their unicast traffic but all multicast traffic is
sent to the GE-5/3/9.0 interface.
Targeted Data
Dynamic
Demux GE-5/3/9.0
Interface
AE bundle
g017850
Configuration
• Configure an OIF Map Policy on page 149
• Configure a DHCP VLAN Dynamic Profile on page 150
• Configure a VLAN Demux Dynamic Profile on page 151
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set policy-options policy-statement OIF-v4-all term oif539 from route-filter 224 .0.0.0/4
orlonger
set policy-options policy-statement OIF-v4-all term oif539 then map-to-interface
ge-5/3/9.0
set policy-options policy-statement OIF-v4-all term oif539 then accept
set dynamic-profiles dhcp-vlan-prof interfaces "$junos-interface-ifd-name" unit
"$junos-underlying-interface-unit" family inet unnumbered-address lo0.0
set dynamic-profiles dhcp-vlan-prof interfaces "$junos-interface-ifd-name" unit
"$junos-underlying-interface-unit" family inet unnumbered-address preferred-sour
ce-address 100.20.0.2
set dynamic-profiles demux-vlan-prof interfaces demux0 unit "$junos-interface-un it"
vlan-id "$junos-vlan-id"
set dynamic-profiles demux-vlan-prof interfaces demux0 unit "$junos-interface-un it"
demux-options underlying-interface "$junos-interface-ifd-name"
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy.
[edit]
user@host#edit policy-options
[edit policy-options]
user@host edit policy-statement OIF-v4-all
4. Define the match condition for the term. In this case, the term matches any route
prefix of 224/4 or longer (all multicast traffic).
5. Define the action for the term. In this case, when a match occurs, the term accepts
the traffic and maps it to interface GE-5/3/9.0.
Results Confirm your configuration by issuing the show policy-options commands. If the output
does not display the intended configuration, repeat the instructions in this example to
correct the configuration.
[edit]
user@host# show policy-options
policy-statement OIF-v4-all {
term oif539 {
from {
route-filter 224.0.0.0/4 orlonger;
}
then {
map-to-interface ge-5/3/9.0;
accept;
}
}
}
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy.
[edit]
user@host#edit dynamic-profiles dhcp-vlan-prof
Results Confirm your configuration by issuing the show dynamic-profiles command. If the output
for the dhcp-vlan-prof dynamic profile does not display the intended configuration, repeat
the instructions in this example to correct the configuration.
[edit]
user@host# show dynamic-profiles
dhcp-vlan-prof {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet {
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy.
[edit]
user@host#edit dynamic-profiles demux-vlan-prof
12. Specify the IGMP version that you want dynamically created interfaces to use.
13. Specify the OIF map that you want dynamically created IGMP interfaces to use.
14. Specify that IGMP selectively sends and receives control traffic such as IGMP reports,
queries, and leaves.
15. Specify that the interface accepts IGMP reports from hosts on any subnetwork.
Results Confirm your configuration by issuing the show dynamic-profiles commands. If the output
for the dhcp-vlan-prof dynamic profile does not display the intended configuration, repeat
the instructions in this example to correct the configuration.
[edit]
user@host# show dynamic-profiles
demux-vlan-prof {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
targetted-distribution;
family inet {
unnumbered-address lo0.0 preferred-source-address 100.20.0.2;
}
}
}
}
protocols {
igmp {
interface "$junos-interface-name" {
version 2;
promiscuous-mode;
passive allow-receive send-group-query;
oif-map OIF-v4-all;
}
}
}
}
...
Verification
Confirm that the configuration is working properly.
Purpose Locate the dynamic interface and ensure that it is associated with the appropriate IGMP
group.
Meaning The first Interface field shows the dynamically created demux interface,
demux0.1073741824, and the Group field immediately below the first Interface field shows
the group, 225.0.0.1, to which the subscriber belongs.
Purpose Use the dynamic subscriber interface value to ensure that the targeting aggregated
interface is functional.
Meaning The Targeting summary field shows that the primary interface, ge-5/3/7, is up.
Purpose Verify that packet traffic sent to targeted interface GE-5/3/9 consists only of multicast
packets.
0 best-effort 0 0 0
1 expedited-fo 0 0 0
2 assured-forw 0 0 0
3 network-cont 0 0 0
Broadcast packets 0 0
Multicast packets 0 889620
CRC/Align errors 0 0
FIFO errors 0 0
MAC control frames 0 0
MAC pause frames 0 0
Oversized frames 0
Jabber frames 0
Fragment frames 0
VLAN tagged frames 0
Code violations 0
Total errors 0 0
Filter statistics:
Input packet count 0
Input packet rejects 0
Input DA rejects 0
Input SA rejects 0
Output packet count 889620
Output packet pad count 0
Output packet error count 0
CAM destination filters: 0, CAM source filters: 0
Autonegotiation information:
Negotiation status: Complete
Link partner:
Link mode: Full-duplex, Flow control: Symmetric, Remote fault: OK
Local resolution:
Flow control: None, Remote fault: Link OK
Packet Forwarding Engine configuration:
Destination slot: 0 (0x00)
CoS information:
Direction : Output
CoS transmit queue Bandwidth Buffer Priority Limit
% bps % usec
0 best-effort 95 950000000 95 0 low none
Logical interface ge-5/3/9.0 (Index 818) (SNMP ifIndex 1597) (Generation 149)
Flags: SNMP-Traps 0x4004000 Encapsulation: ENET2
Traffic statistics:
Input bytes : 0
Output bytes : 97857650
Input packets: 0
Output packets: 889620
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 97857650 1320 bps
Input packets: 0 0 pps
Output packets: 889615 1 pps
Protocol aenet, AE bundle: ae4.0, Generation: 180, Route table: 0
Meaning The MAC statistics Unicast packet field shows that the interface is not transmitting any
unicast packet traffic and the Multicast packet field shows that the total number of
packets being transmitted from the interface are multicast packets.
Related • Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Documentation Interfaces on page 145
Related • Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Documentation Interfaces on page 145
[edit]
user@host#edit chassis
[edit chassis]
user@host#set network-services enhanced-ip
[edit]
user@host#edit interfaces pp0 unit logical-unit-number
• Subscriber Interfaces That Provide Initial CoS Parameters Dynamically Obtained from
RADIUS on page 159
• Changing CoS Services Overview on page 163
• CoS Traffic Shaping Attributes for Dynamic Interface Sets and Member Subscriber
Sessions Overview on page 166
• Guidelines for Configuring CoS Traffic Shaping Attributes for Dynamic Interface Sets
and Member Subscriber Sessions on page 168
• Configuring Initial CoS Parameters Dynamically Obtained from RADIUS on page 169
• Configuring Static Default Values for Traffic Scheduling and Shaping on page 170
• Applying CoS Traffic-Shaping Attributes to Dynamic Interface Sets and Member
Subscriber Sessions on page 171
• CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets on page 174
• Example: Configuring Initial CoS Parameters Dynamically Obtained from
RADIUS on page 179
Subscriber Interfaces That Provide Initial CoS Parameters Dynamically Obtained from
RADIUS
You can configure interface-specific CoS parameters that the router obtains when
subscribers log in at appropriately configured static or dynamic subscriber interfaces.
This feature is supported only for interfaces on Enhanced Queuing Dense Port
Concentrators (EQ DPCs) in MX Series 3D Universal Edge Routers.
To configure a dynamic profile to provide initial CoS Services, make sure you understand
the following concepts:
The Junos OS supports predefined variables for obtaining a scheduler-map name and
traffic-shaping parameters from the RADIUS authentication server and predefined
variables for obtaining a scheduler name and scheduler parameters from the RADIUS
authentication server. When a client authenticates over a router interface associated
with the access dynamic profile, the router replaces the predefined variables with
interface-specific values obtained from the RADIUS server.
If you define the Juniper Networks authentication and authorization VSA for CoS
traffic-shaping parameter values (attribute number 26–108) on the RADIUS
authentication server, the RADIUS server includes the values in RADIUS Access-Accept
messages it sends to the router when a subscriber successfully authenticates over the
interface.
To provide an initial scheduler map name and traffic shaping parameters obtained from
the RADIUS authentication server when a subscriber logs in, reference the Junos OS
predefined variables for CoS listed in Table 27 on page 160 in an access dynamic profile
associated with the subscriber interface.
Table 27: CoS Predefined Variables for Scheduler Map and Traffic Shaping
Variable Description
NOTE: The scheduler map referenced by the scheduler-map statement can be defined
dynamically (at the [edit dynamic-profiles profile-name class-of-service scheduler-maps]
hierarchy level) or statically (at the [edit class-of-service scheduler-maps] hierarchy level).
Table 27: CoS Predefined Variables for Scheduler Map and Traffic Shaping (continued)
Variable Description
$junos-cos-shaping-rate Shaping rate to be dynamically configured in a traffic-control profile in the access dynamic
profile when a subscriber logs in. You can configure a RADIUS authentication server to include
this information in the Accept-Accept message when a subscriber successfully authenticates
over the static or dynamic subscriber interface to which the access dynamic profile is attached.
$junos-cos-guaranteed-rate Guaranteed rate to be dynamically configured in a traffic-control profile in the access dynamic
profile when a subscriber logs in. You can configure a RADIUS authentication server to include
this information in the Accept-Accept message when a subscriber successfully authenticates
over the static or dynamic subscriber interface to which the access dynamic profile is attached.
$junos-cos-delay-buffer-rate Delay-buffer rate to be dynamically configured in a traffic-control profile in the access dynamic
profile when a subscriber logs in. You can configure a RADIUS authentication server to include
this information in the Accept-Accept message when a subscriber successfully authenticates
over the static or dynamic subscriber interface to which the access dynamic profile is attached.
If you define the Juniper Networks authentication and authorization VSA for CoS
scheduling and queuing parameter values (attribute number 26–146) on the RADIUS
authentication server, the RADIUS server includes the values in RADIUS Access-Accept
messages it sends to the router when a subscriber successfully authenticates over the
interface.
To provide an initial scheduler name and scheduler and queuing parameters obtained
from the RADIUS authentication server when a subscriber logs in, reference the Junos
OS predefined variables listed in Table 28 on page 161 in an access dynamic profile
associated with the subscriber interface.
$junos-cos-scheduler-transmit-rate Transmit rate to be dynamically configured for the scheduler in the access
dynamic profile. You can configure a RADIUS authentication server to include
this information in the Accept-Accept message when a subscriber successfully
authenticates over the static or dynamic subscriber interface to which the
access dynamic profile is attached.
Table 28: CoS Predefined Variables for Scheduling and Queuing (continued)
Variable Description
$junos-cos-scheduler-dropfile-low Name of the drop profile for RED for loss-priority level low to be dynamically
configured for the scheduler in the access dynamic profile. You can configure
a RADIUS authentication server to include this information in the Accept-Accept
message when a subscriber successfully authenticates over the static or
dynamic subscriber interface to which the access dynamic profile is attached.
NOTE: The drop profile must be configured statically (at the [edit
class-of-service schedulers scheduler-name drop-profiles] hierarchy level) for
loss-priority low.
$junos-cos-scheduler-dropfile-medium-low Name of the drop profile for RED for loss-priority level medium-low to be
dynamically configured for the scheduler in the access dynamic profile. The
Junos OS obtains this information from the RADIUS server when a subscriber
authenticates over the static or dynamic subscriber interface to which the
access dynamic profile is attached.
NOTE: The drop profile must be configured statically (at the [edit
class-of-service schedulers scheduler-name drop-profiles] hierarchy level).
$junos-cos-scheduler-dropfile-medium-high Name of the drop profile for RED for loss-priority level medium-high to be
dynamically configured for the scheduler in the access dynamic profile. You
can configure a RADIUS authentication server to include this information in
the Accept-Accept message when a subscriber successfully authenticates
over the static or dynamic subscriber interface to which the access dynamic
profile is attached.
NOTE: The drop profile must be configured statically (at the [edit
class-of-service schedulers scheduler-name drop-profiles] hierarchy level).
$junos-cos-scheduler-dropfile-high Name of the drop profile for RED for loss-priority level high to be dynamically
configured for the scheduler in the access dynamic profile. You can configure
a RADIUS authentication server to include this information in the Accept-Accept
message when a subscriber successfully authenticates over the static or
dynamic subscriber interface to which the access dynamic profile is attached.
NOTE: The drop profile must be configured statically (at the [edit
class-of-service schedulers scheduler-name drop-profiles] hierarchy level).
Table 28: CoS Predefined Variables for Scheduling and Queuing (continued)
Variable Description
$junos-cos-scheduler-dropfile-any Name of the drop profile for RED for loss-priority level any to be dynamically
configured for the scheduler in the access dynamic profile. You can configure
a RADIUS authentication server to include this information in the Accept-Accept
message when a subscriber successfully authenticates over the static or
dynamic subscriber interface to which the access dynamic profile is attached.
NOTE: The drop profile must be configured statically (at the [edit
class-of-service schedulers scheduler-name drop-profiles] hierarchy level).
• Configuring Initial CoS Parameters Dynamically Obtained from RADIUS on page 169
This topic describes how to provide CoS when subscribers dynamically upgrade or
downgrade services in an access environment.
You can configure your network with an access profile that provides all subscribers with
default CoS parameters when they log in. For example, all subscribers can receive a basic
data service. By configuring the access profile with Junos OS predefined variables for
RADIUS-provided CoS parameters, you also enable the service to be activated for those
subscribers at login.
• Shaping rate
• Guaranteed rate
• Scheduler map
For each CoS parameter, you must associate a RADIUS vendor ID. For each vendor ID,
you must assign an attribute number and a tag. The tag is used to differentiate between
values for different CoS variables when you specify the same attribute number for those
variables. These values are matched with the values supplied by RADIUS during subscriber
authentication. All of the values in the dynamic profile must be defined in RADIUS or
none of the values are passed.
Optionally, you can configure default values for each parameter. Configuring default
values is beneficial if you do not configure RADIUS to enable service changes. During
service changes, RADIUS takes precedence over the default value that is configured.
Static configuration is when you configure the scheduler map and schedulers in the static
[edit class-of-service] hierarchy and reference the scheduler map in the dynamic profile.
Dynamic configuration is when you configure the scheduler map and schedulers within
the dynamic profile.
The CoS configuration also depends on whether you have enabled multiple subscribers
on the same logical interface using the aggregate-clients statements in the dynamic
profile referenced by DHCP. When you specify the aggregate-clients replace statement,
the scheduler map names are replaced. In both cases, if the length of the scheduler map
name exceeds 128 characters, subscribers cannot log in. When you specify the
aggregate-clients merge statement, the scheduler map names specified in the dynamic
profile are appended.
Subscriber login • Configure RADIUS • Configure RADIUS • Configure RADIUS • Configure RADIUS
values or default values or default values or default values or default
values for all values for all values for all values for all
parameters in parameters in parameters in parameters in
access profile access profile access profile access profile
• Configure scheduler • Configure scheduler • Configure scheduler • Configure scheduler
map in edit map and schedulers map and schedulers map and schedulers
class-of-service in access profile in access profile in access profile
hierarchy and
reference in access
profile
RADIUS CoA for service Replaces the following Replaces the following Combines the values of Replaces the following
or variable change parameters: parameters: the following parameters:
parameters to their
• Delay buffer rate • Delay buffer rate maximum scalar value: • Delay buffer rate
• Guaranteed rate • Guaranteed rate • Guaranteed rate
• Delay buffer rate
• Scheduler map • Shaping rate • Shaping rate
• Guaranteed rate
• Shaping rate • Scheduler map • Scheduler map
• Shaping rate
RADIUS CoA for service Does not merge Merge queues if the Merge queues if the Merge queues if the
activation queues queue specified in the queue specified in the queue specified in the
service profile is not service profile is not service profile is not
NOTE:In this case, use already in use for the already in use for the already in use for the
a similar configuration subscriber subscriber subscriber
to the access profile,
including the same NOTE: Do not NOTE: Do not NOTE: Do not
name for the instantiate a CoA instantiate a CoA instantiate a CoA
traffic-control-profile. request using a service request using a service request using a service
During service dynamic profile that is dynamic profile that is dynamic profile that is
activation, this already in use on the already in use on the already in use on the
configuration replaces same logical interface. same logical interface. same logical interface.
the original
configuration in the
access profile.
• RADIUS Attributes and Juniper Networks VSAs Supported by the AAA Service Framework
CoS Traffic Shaping Attributes for Dynamic Interface Sets and Member Subscriber
Sessions Overview
To control bandwidth at a household level in a subscriber access network, you can apply
RADIUS dynamic class of service (CoS) traffic-shaping attributes to a dynamic interface
set and its member subscriber sessions when the subscriber sessions are authenticated.
(The dynamic interface set itself does not go through the authentication process.)
The subscriber sessions, also referred to as subscriber interfaces or client sessions, can be
dynamic VLAN, PPPoE, or IP demultiplexing (IP demux) subscriber interfaces. The
subscriber interfaces are mapped to Level 3 of the Junos OS CoS scheduler hierarchy.
• Dynamic IP demux subscriber interfaces (for DHCP subscribers) over either a dynamic
interface set or a dynamic ACI interface set
• Dynamic PPPoE subscriber interfaces over either a dynamic interface set or a dynamic
ACI interface set
• Traffic-control profile for the dynamic VLAN, PPPoE, or IP demux subscriber interfaces
• Traffic-control profile for the dynamic interface set or dynamic ACI interface set to
which the subscriber interfaces belong
RADIUS tag values for the Junos OS CoS traffic shaping predefined variables used in
both traffic-control profiles must be in the 100s range, as described in “CoS Traffic Shaping
Predefined Variables for Dynamic Interface Sets” on page 174.
At the [edit dynamic-profiles profile-name interfaces] hierarchy level in the dynamic profile,
use the output-traffic-control-profile statement to apply the traffic-control profiles to
the dynamic subscriber interface and the dynamic interface set or dynamic ACI interface
set.
CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets and Member Subscriber
Sessions
The set of $junos-cos-parameter predefined dynamic variables has been duplicated and
assigned a RADIUS tag value in the 100s range for use with this feature. The RADIUS tag
value is the only difference between the existing CoS traffic-shaping predefined dynamic
variables and the predefined dynamic variables that you must use with this feature.
Related • Guidelines for Configuring CoS Traffic Shaping Attributes for Dynamic Interface Sets
Documentation and Member Subscriber Sessions on page 168
• CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets on page 174
Guidelines for Configuring CoS Traffic Shaping Attributes for Dynamic Interface Sets
and Member Subscriber Sessions
Observe the following guidelines when you apply dynamic CoS traffic-shaping attributes
to a dynamic interface set or a dynamic ACI interface set and its member subscriber
sessions. For complete information about the Junos OS CoS traffic-shaping predefined
dynamic variables and RADIUS tag values used with this feature, see “CoS Traffic Shaping
Predefined Variables for Dynamic Interface Sets” on page 174.
• This feature is supported only for dynamically configured and instantiated subscriber
interfaces.
Related • Applying CoS Traffic-Shaping Attributes to Dynamic Interface Sets and Member
Documentation Subscriber Sessions on page 171
• CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets on page 174
• CoS Traffic Shaping Attributes for Dynamic Interface Sets and Member Subscriber
Sessions Overview on page 166
You can configure a subscriber interface so that subscribers receive initial CoS parameters
that the router obtains from the RADIUS authentication server when subscribers log in
using that logical interface on the router.
1. Configure external RADIUS server VSAs with values that you expect subscribers to
log in with.
See Configuring Router or Switch Interaction with RADIUS Servers and Configuring
RADIUS Server Parameters for Subscriber Access.
See “Configuring Dynamic Schedulers with Variables in a Dynamic Profile” on page 15.
Related • Subscriber Interfaces That Provide Initial CoS Parameters Dynamically Obtained from
Documentation RADIUS on page 159
To provide subscribers with default values for CoS parameters, configure user-defined
variables for CoS parameters and assign static default values to the variables. If you have
configured values to be supplied by a RADIUS CoA, subscribers receive the default value
when deactivating a service.
To configure user-defined variables with default values for CoS in a dynamic profile:
6. Configure the variables for the CoS parameters in the traffic-control profile.
Either the shaping rate or the guaranteed rate is required in the traffic-control profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Changing CoS Services Overview on page 163
To control bandwidth at a household level in a subscriber access network, you can apply
RADIUS dynamic class of service (CoS) traffic-shaping attributes to a dynamic interface
set or agent-circuit-identifer (ACI) interface set and its member subscriber sessions when
the member sessions are authenticated. The dynamic interface set or ACI interface set
represents the household from which the subscriber sessions originate. The subscriber
sessions, also referred to as client sessions or subscriber interfaces, can be dynamic VLAN,
PPPoE, or IP demultiplexing (IP demux, for DHCP) subscriber interfaces.
To apply RADIUS dynamic CoS traffic-shaping attributes to both the dynamic interface
set and its member subscriber sessions, you must configure two traffic-control profiles
in the dynamic profile for the subscriber interface: one traffic-control profile for the
“parent” dynamic interface set, and a second traffic-control profile for the dynamic
subscriber interfaces. RADIUS tag values for the Junos OS CoS traffic shaping predefined
variables used in both traffic-control profiles must be in the 100s range.
• Create a dynamic profile that defines the VLAN, PPPoE, or IP demux logical subscriber
interface.
• Traffic-control profile for the dynamic interface set or dynamic ACI interface set to
which the subscriber interfaces belong
2. In the traffic-control profiles configured for the dynamic interface set and the subscriber
interfaces, reference Junos OS CoS traffic-shaping predefined variables with RADIUS
tag values in the 100s range.
See “CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets” on page 174
for a complete list of the Junos OS predefined variables and RADIUS tag values that
you must use in the traffic-control profiles for the dynamic subscriber interfaces and
the dynamic interface set.
Example: Dynamic
PPPoE Subscriber
Interface over Dynamic
ACI Interface Set
The following example shows a dynamic profile named pppoe-subscriber that configures
a dynamic PPPoE (pp0) subscriber interface over a dynamic ACI interface set.
[edit dynamic-profiles]
pppoe-subscriber {
interfaces {
interface-set "$junos-interface-set-name" {
interface pp0 {
unit "$junos-interface-unit";
}
}
pp0 {
unit "$junos-interface-unit" {
ppp-options {
pap;
}
pppoe-options {
underlying-interface "$junos-underlying-interface";
server;
}
no-keepalives;
family inet {
unnumbered-address lo0.0;
}
}
}
}
class-of-service {
traffic-control-profiles {
tcp-pppoe-session {
scheduler-map smap-1;
shaping-rate $junos-cos-shaping-rate;
overhead-accounting $junos-cos-shaping-mode frame-mode-bytes -4
cell-mode-bytes 12;
}
tcp-parent-aci-set {
shaping-rate $junos-cos-shaping-rate;
overhead-accounting $junos-cos-shaping-mode frame-mode-bytes -4
cell-mode-bytes 12;
}
}
interfaces {
pp0 {
unit "$junos-interface-unit" {
output-traffic-control-profile tcp-pppoe-session;
}
}
interface-set $junos-interface-set-name {
output-traffic-control-profile tcp-parent-aci-set;
}
}
}
}
}
Related • CoS Traffic Shaping Predefined Variables for Dynamic Interface Sets on page 174
Documentation
• CoS Traffic Shaping Attributes for Dynamic Interface Sets and Member Subscriber
Sessions Overview on page 166
• Guidelines for Configuring CoS Traffic Shaping Attributes for Dynamic Interface Sets
and Member Subscriber Sessions on page 168
To control bandwidth at a household level in a subscriber access network, you can apply
RADIUS CoS traffic-shaping attributes to a dynamic interface set and its member
subscriber sessions when the member sessions are authenticated. The dynamic interface
set, which represents the household level in a subscriber access network, can be either
a dynamic agent-circuit-identifier (ACI) interface set or a non-ACI–based dynamic
interface set. The subscriber sessions belonging to the interface set can be dynamic
VLAN, DHCP, or PPPoE subscriber interfaces.
To apply RADIUS CoS traffic-shaping attributes to both the dynamic interface set and
its member subscriber sessions, you must configure two traffic-control profiles in the
dynamic profile for the subscriber interface: one traffic-control profile for the “parent”
dynamic interface set, and a second traffic-control profile for the dynamic subscriber
interfaces. RADIUS tag values for the Junos OS CoS traffic-shaping predefined variables
used in these traffic-control-profiles must be in the 100s range, as described in
Table 30 on page 174.
Table 30 on page 174 describes the Junos OS predefined dynamic variables and RADIUS
tag values that you can use in a dynamic profile to apply RADIUS CoS traffic-shaping
attributes to the dynamic interface set and its member subscriber sessions. The table
lists the predefined dynamic variables in ascending order by tag value.
NOTE: All of the predefined variables listed in Table 30 on page 174 use
RADIUS vendor ID 4874 and RADIUS attribute value 108.
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets
RADIUS Tag
Predefined Variable Value Description
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets (continued)
RADIUS Tag
Predefined Variable Value Description
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets (continued)
RADIUS Tag
Predefined Variable Value Description
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets (continued)
RADIUS Tag
Predefined Variable Value Description
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets (continued)
RADIUS Tag
Predefined Variable Value Description
Table 30: Junos OS CoS Traffic Shaping Predefined Variables for Dynamic
Interface Sets (continued)
RADIUS Tag
Predefined Variable Value Description
Related • Applying CoS Traffic-Shaping Attributes to Dynamic Interface Sets and Member
Documentation Subscriber Sessions on page 171
• CoS Traffic Shaping Attributes for Dynamic Interface Sets and Member Subscriber
Sessions Overview on page 166
• Guidelines for Configuring CoS Traffic Shaping Attributes for Dynamic Interface Sets
and Member Subscriber Sessions on page 168
The following configuration is an example of a client dynamic profile in which initial CoS
parameters are dynamically obtained from the RADIUS server when a subscriber
authenticates over the interface to which the dynamic profile is applied.
For this example, assume that the RADIUS authentication server has been configured
with traffic-shaping parameters (at Juniper Networks VSA 26-108) and CoS scheduling
and queuing parameters (at Juniper Networks VSA 26–146).
[edit]
interfaces {
ge-9/0/3 {
hierarchical-scheduler;
vlan-tagging;
unit 100 {
vlan-id 100;
family inet {
address 192.168.32.2/24;
}
}
}
}
The client dynamic profile residential_silver attaches the traffic-control profile tcp_1 to
the subscriber interface that is defined in the dynamic profile using the
$junos-interface-ifd-name predefined variable.
[edit]
dynamic-profiles {
residential_silver {
interfaces {
“$junos-interface-ifd-name” {
unit “$junos-underlying-interface-unit” {
family inet;
}
}
}
class-of-service {
interfaces {
“$junos-interface-ifd-name” {
unit “$junos-underlying-interface-unit” {
output-traffic-control-profile tcp_1;
}
}
}
}
}
}
[edit]
dynamic-profiles {
residential_silver {
class-of-service {
traffic-control-profiles {
tcp_1 {
scheduler-map “$junos-cos-scheduler-map”; # ’business_smap_1’
shaping-rate "$junos-cos-shaping-rate";
guaranteed-rate "$junos-cos-guaranteed-rate";
delay-buffer-rate "$junos-cos-delay-buffer-rate";
}
}
scheduler-maps {
business_smap_1 {
forwarding-class best-effort scheduler be_sched;
forwarding-class ef scheduler home_sched
}
}
}
}
}
[edit]
dynamic-profiles {
residential_silver {
class-of-service {
schedulers {
“$junos-cos-scheduler” { # ’be_sched’ and ’home_sched’
transmit-rate "$junos-cos-scheduler-tx";
buffer-size "$junos-cos-scheduler-bs";
priority "$junos-cos-scheduler-pri";
drop-profile-map loss-priority low protocol any drop-profile
“$junos-cos-scheduler-dropfile-low“;
drop-profile-map loss-priority medium-low protocol any drop-profile
“$junos-cos-scheduler-dropfile-medium-low“;
drop-profile-map loss-priority medium-high protocol any drop-profile
“$junos-cos-scheduler-dropfile-medium-high“;
drop-profile-map loss-priority high protocol any drop-profile
“$junos-cos-scheduler-dropfile-high“;
}
}
}
}
}
Static configurations for CoS consist of configurations for the forwarding classes used
in the scheduler map business_smap_1 and configurations for drop-profile names provided
by RADIUS for as part of the scheduler configurations provided (for be_sched and
home_sched) when a subscriber logs in:
[edit]
class-of-service {
forwarding-classes {
queue 0 best-effort;
queue 1 ef;
}
drop-profiles {
. . . configurations_for_drop_profile_names_provided_by_RADIUS . . .
}
}
}
• Subscriber Interfaces That Provide Initial CoS Parameters Dynamically Obtained from
RADIUS on page 159
• Configuring Initial CoS Parameters Dynamically Obtained from RADIUS on page 169
CoS adjustment control profiles control which applications and algorithms can modify
a subscriber’s shaping characteristics after a subscriber is instantiated. Subscriber shaping
characteristics are configured using the Junos OS CLI or by RADIUS messages. Adjustment
control profiles enable subscriber shaping characteristics by to be adjusted by other
applications like ANCP, PPPoE tags, and RADIUS Change of Authorization (CoA) after
a subscriber is instantiated. Adjustment control profiles are router-wide and apply to
both static and dynamic interfaces.
Table 31 on page 183 describes the applications and their associated default algorithms
that can be configured to perform rate adjustments after the subscriber is instantiated.
ANCP 1 Adjust-always The ANCP application can modify the existing shaping
rate for both static and dynamic logical interfaces, and
static interface sets. By default, ANCP can override all
other applications. The shaping rate must be specified
in order to override it.
NOTE: The lower the priority value, the higher the priority.
• You can configure a maximum of one adjustment control profile; a commit error occurs
if you configure more than one adjustment control profile.
• Adjust-never
• Adjust-always
• Adjust less
• Adjust greater
• When you modify an adjustment control profile, the changes take effect immediately
and the modified profile is used for all further adjustments. However, existing
adjustments are not reevaluated when you modify the adjustment control profile.
For example, if you have an ANCP adjustment that overrides a PPPoE adjustment on
interface ge-1/1/0.100, and then you use the adjustment control profile to change the
priority so that the ANCP priority is now lower than the PPPoE priority, Junos OS does
not go back and reevaluate the adjustment on ge-1/1/0.100.
[edit]
user@host# edit class-of-service adjustment-control-profiles profile-name
2. (Optional) Configure the adjustment controls for the Access Node Control Protocol
(ANCP) application:
3. (Optional) Configure the adjustment controls for the RADIUS CoA application:
user@host>
You can apply CoS to the Layer 2 Tunnel Protocol (L2TP) access concentrator (LAC)
component.
In Layer 2 Tunnel Protocol (L2TP) configurations, IP and L2TP headers are added to
packets arriving at a PPP subscriber interface on the L2TP access concentrator (LAC)
before being tunneled to the L2TP network server (LNS). You can manage the IP header
by configuring classifiers and rewrite-rules that transfer the ToS (Type of Service) value
or the 802.1p value from the inner IP header to the outer IP header of the L2TP packet.
Figure 21 on page 187 shows the classifier and rewrite rules that you can configure from
the LAC to the LNS, and from the LNS to the LAC.
RADIUS
server
CLEC network
ISP network
Table 32 on page 188 lists the configuration options for applying classifiers to a subscriber
interface on an ingress LAC tunnel.
• PPP interface
• Underlying VLAN interface
• PPP interface
• Underlying VLAN interface
The behavior of the Layer 2 and Layer 3 classifiers depends on the configuration. For
example, a Layer 3 classifier for a family of PPP interfaces overrides a Layer 2 classifier
configured at the PPP interface, except for the unknown packets and control packets.
If you do not configure a classifier for Layer 2, the system applies the default Layer 3
classifier so that tunneled and terminated subscribers have the same behavior. To prevent
unknown packets and control packets from being discarded, the system assigns them
to the best-effort forwarding class.
For egress tunnels, you configure rewrite rules at the PPP interface to set the ToS or
802.1p value of the outer IP header. Rewrite rules are applied accordingly to the forwarding
class, packet loss priority (PLP), and code point.
Table 33: Sample Result for the Classifier and Rewrite Rules for a VLAN Interface
Inner .1p Value Forwarding Class Loss Priority Code Point Outer ToS Value
Related • Configuring Dynamic CoS for an L2TP LAC Tunnel on page 190
Documentation
You can apply hierarchical scheduling and per-session shaping to Layer 2 Tunnel Protocol
(L2TP) network server (LNS) inline services using a static or dynamic CoS configuration.
This feature is supported on MIC and MPC interfaces on MX240, MX480, and MX960
routers.
When a service interface is configured for an L2TP LNS session, it has an inner IP header
and an outer IP header. You can configure CoS for an LNS session that corresponds to
the inner IP header only. The outer IP header is used for L2TP tunnel processing only.
However, we recommend that you configure classifiers and rewrite-rules to transfer the
ToS (type of service) value from the inner IP header to the outer IP header of the L2TP
packet.
Figure 22 on page 190 shows the classifier and rewrite rules that you can configure on an
LNS inline service.
Fixed or BA Multifield
IP/UDP/L2TP decapsulation
classification classification
LAC
peer Core / Internet
interface
Multifield
Shaping IP/UDP/L2TP capsulation Rewrite rule
classification
g017575
Ingress tunnel (from Uplink to LAC)
By default, the shaping calculation on the service interface includes the L2TP
encapsulation. If necessary, you can configure additional adjustments for downstream
ATM traffic from the LAC or differences in Layer 2 protocols.
MX-MPC1-3D No Yes
MX-MPC2-3D
MX-MPC2-3D-Q
MX-MPC2-3D-EQ
MX80
MPC-3D-16XGE-SFPP No No
In L2TP configurations, IP and L2TP headers are added to packets arriving at a PPP
subscriber interface on the LAC before being tunneled to the L2TP network server (LNS).
Classifiers and rewrite rules enable you to properly transfer the ToS (Type of Service)
value or the 802.1p value from the inner IP header to the outer IP header of the L2TP
packet.
Before you begin, configure the L2TP LAC. See Configuring an L2TP LAC.
• To configure a BA classifier:
[edit class-of-service]
user@host#set classifiers (ieee-802.1 | inet-precedence) classifier-name
forwarding-class class-name loss-priority level code-points [ aliases ] [
bit-patterns]
b. Apply the classifier to the Layer 2 interface or Layer 3 interface. For Layer 2, you
can apply the classifier at the PPP interface or an underlying VLAN interface. For
Layer 3, you can apply classifiers to a family of PPP interfaces.
a. Configure the rewrite rule with the forwarding class and the loss priority value.
[edit class-of-service]
user@host# set rewrite-rules (ieee-802.1 | inet-precedence) rewrite-name
forwarding-class class-name loss-priority level code-point (alias | bits)
b. Apply the rewrite rule to the PPP interface for which the L2TP tunnel is configured.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• CoS for L2TP LAC Subscriber Interfaces Overview on page 187
You can configure hierarchical scheduling for an L2TP LNS inline service and manage
the IP header values using rewrite rules and classifiers.
Before you begin, configure the L2TP LNS inline service interface. See Configuring an L2TP
LNS with Inline Service Interfaces.
1. Configure the hierarchical scheduler for the service interface (si) interface.
2. Configure the LNS to reflect the IP ToS value in the inner IP header to the outer IP
header.
• To configure a BA classifier:
[edit class-of-service]
user@host# set classifiers (dscp | dscp-ipv6 | inet-precedence) classifier-name
forwarding-class class-name loss-priority level code-points [ aliases ] [
bit-patterns]
a. Configure the rewrite rule with the forwarding class and the loss priority value.
[edit class-of-service]
user@host# set rewrite-rules (dscp | dscp-ipv6 | inet-precedence) rewrite-name
forwarding-class class-name loss-priority level code-point (alias | bits)
• To apply the rewrite rule for the DSCP or DSCP IPv6 value:
By default, the shaping calculation on the service interface includes the L2TP
encapsulation. If necessary, you can configure additional adjustments for downstream
ATM traffic from the LAC or differences in Layer 2 protocols.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• CoS for L2TP LNS Inline Services Overview on page 189
Interface sets enable service providers to group logical interfaces so they can apply CoS
parameters to all of the traffic in the group.
Interface sets are beneficial for various scenarios in a subscriber access network. For
example, you can use an interface set to configure a local loop with a small number of
subscribers. Interface sets are also useful for grouping a large number of subscribers into
a particular service class or for defining traffic engineering aggregates for DSLAMs.
Interface sets are beneficial for various scenarios in a subscriber access network. For
example, you can use an interface set to configure a local loop with a small number of
subscribers. Interface sets are also useful for grouping a large number of subscribers into
a particular service class or for defining traffic engineering aggregates for DSLAMs.
When configuring interface sets for subscriber access, keep the following guidelines in
mind:
• You can configure interface sets of VLAN demux, PPPoE, or demux interfaces over
aggregated Ethernet interfaces.
• An interface can only belong to one interface set. If you try to add the same interface
to different interface sets, the commit operation fails.
• You configure the interface set and the traffic scheduling and shaping parameters in
a dynamic profile. However, you must apply the traffic-control profile to the interface
set in the static [edit class-of-service] hierarchy.
NOTE: This rule applies to all interface sets except ACI sets.
VLAN interface that has an outer tag of “111” and an inner tag of “200,” results in a
$junos-tagged-vlan-interface-set-name dynamic variable of “ge-1/1/0-200-111”.
• All dynamic demux, dual-tagged VLAN logical interfaces with the same outer VLAN
tag and physical interface are assigned to the same interface set and all CoS values
provisioned with the dynamic profile are applied to the interfaces that are part of the
set.
• The interface set name must be explicitly referenced in the CoS configuration as part
of the static configuration outside of the dynamic profile. The CoS configuration is
static and the interface set name must be statically referenced.
NOTE: This rule applies to all interface sets except ACI sets.
• The supported interface stacks for aggregated Ethernet in an interface set include
VLAN demux interfaces, IP demux interfaces, and PPPoE logical interfaces over VLAN
demux interfaces.
• The link membership list and scheduler mode of the interface set are inherited from
the underlying aggregated Ethernet interface over which the interface set is configured.
• If the scheduler mode of the aggregated Ethernet interface is set to scale member
links, the scheduling parameters are scaled based on the number of active member
links and applied to each of the aggregated interface member links.
Before you begin, configure the subscriber interfaces that you intend to include in the
interface set.
TIP: You must configure the interface set in the static [edit class-of-service]
hierarchy, not in the [edit dynamic-profiles] hierarchy.
Requirements
This example uses the following software and hardware components:
Overview
In this example, the network administrator groups dynamic VLAN interfaces in an interface
set. The interface set is configured in a dynamic profile, and enables hierarchical scheduling
for the VLAN interfaces for a multiplay service.
DHCP is used as the access method, and RADIUS is used as the authentication method
for the interfaces associated with the interface set.
[edit]
edit dynamic-profiles vlan-prof
edit interfaces $junos-interface-ifd-name unit $junos-interface-unit
set vlan-id $junos-vlan-id
set demux-source inet
set family inet unnumbered-address lo0.0 preferred-source-address 100.20.32.2
top
edit interfaces ge-1/0/0
set hierarchical-scheduler
set vlan-tagging
edit auto-configure vlan-ranges dynamic-profile vlan-prof
set ranges any
set accept inet
top
set interfaces lo0 unit 0 family inet address 100.20.32.2/32
Step-by-Step In this section, you create a dynamic profile for the VLAN IDs to be automatically assigned
Procedure when subscribers log in.
[edit]
user@host#edit dynamic-profile vlan-prof
[edit]
user@host# edit interfaces ge-1/0/0
[edit]
[edit]
edit dynamic-profiles multiplay class-of-service schedulers be_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit ef_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit af_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit nc_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit voice_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit video_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit game_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up
edit data_sch
set transmit-rate percent 12
set buffer-size percent 12
set priority low
up 2
edit scheduler-maps all_smap
set forwarding-class be scheduler be_sch
set forwarding-class ef scheduler ef_sch
Step-by-Step In this section, you create a dynamic profile for the multiplay service and configure
Procedure scheduling and shaping.
[edit]
user@host# edit dynamic-profiles multiplay class-of-service schedulers
2. Configure the forwarding classes for each service in the scheduler map.
[edit]
edit dynamic-profiles multiplay
edit interfaces interface-set $junos-interface-set-name
set interface $junos-interface-ifd-name unit $junos-underlying-interface-unit
top
edit class-of-service interfaces interface-set
set output-traffic-control-profile multiplay
[edit]
user@host#edit dynamic-profiles multiplay
Step-by-Step You apply the traffic-control profile outside of the dynamic profile in the [edit
Procedure class-of-service] hierarchy.
1. Specify the interface set to which you want to apply the traffic-control profile.
[edit class-of-service]
user@host#edit interfaces interface-set dynamic-set
2. Attach the output traffic-control profile defined in the dynamic profile to the interface
set.
[edit]
edit system services dhcp-local-server authentication
set password multiplay
set username-include user-prefix multiplay
up 1
set dynamic-profile dhcp-vlan-prof aggregate-clients replace
set group vlans interface ge-1/0/0
top
edit access address-assignment pool v4 family inet
set network 100.20.0.0/16
set range limited low 100.20.0.10
set range limited high 100.20.128.250
set dhcp-attributes maximum-lease-time 84600
[edit system]
user@host# edit services dhcp-local-server authentication
[edit access]
user@host#edit address-assignment pool v4 family inet
4. Configure the maximum length of time in seconds for which a subscriber can request
and hold a lease.
[edit]
edit access radius-server 172.28.30.108
set secret $9$1u5ErvW87bwgSr4Zji5T
set timeout 5
set retry 5
up 2
edit profile acc-prof
set authentication-order radius
set radius authentication-server 172.28.30.108
[edit access]
user@host#edit radius-server 172.28.30.108
2. Configure the required secret (password) that the local router or switch passes to
the RADIUS client.
3. Configure the length of time that the local router or switch waits to receive a
response from a RADIUS server.
4. Configure the number of times that the router or switch attempts to contact a
RADIUS accounting server.
[edit access]
user@host#edit profile acc-prof
Results
dynamic-profiles {
vlan-prof {
interfaces {
“$junos-interface-ifd-name” {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-source inet;
family inet {
unnumbered-address lo0.0 preferred-source-address 100.20.32.2;
}
}
}
}
}
multiplay {
class-of-service {
traffic-control-profiles {
multiplay {
scheduler-map all_smap;
shaping-rate 100m;
guaranteed-rate 20m;
}
}
interfaces {
interface-set “$junos-interface-set-name” {
interface “$junos-interface-ifd-name” {
unit “$junos-underlying-interface-unit”;
}
}
“$junos-interface-ifd-name” {
unit "$junos-interface-unit" {
output-traffic-control-profile multiplay;
}
}
}
scheduler-maps {
all_smap {
forwarding-class be scheduler be_sch;
forwarding-class ef scheduler ef_sch;
forwarding-class af scheduler af_sch;
forwarding-class nc scheduler nc_sch;
forwarding-class voice scheduler voice_sch;
forwarding-class video scheduler video_sch;
forwarding-class game scheduler game_sch;
forwarding-class data scheduler data_sch;
}
}
schedulers {
be_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
ef_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
af_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
nc_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
voice_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
video_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
game_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
data_sch {
transmit-rate percent 12;
buffer-size percent 12;
priority low;
}
}
}
}
access {
radius-server {
172.28.30.108 {
secret "$9$1u5ErvW87bwgSr4Zji5T"; ## SECRET-DATA
timeout 5;
retry 5;
}
}
profile acc-prof {
authentication-order radius;
radius {
authentication-server 172.28.30.108;
}
}
address-assignment {
pool v4 {
family inet {
network 100.20.0.0/16;
range limited {
low 100.20.0.10;
high 100.20.128.250;
}
dhcp-attributes {
maximum-lease-time 84600;
}
}
}
}
}
class-of-service {
interfaces {
interface-set dynamic-set {
output-traffic-control-profile multiplay;
}
}
}
interfaces {
interface-set “$junos-interface-set-name” {
interface "$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit";
}
}
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet {
unnumbered-address lo0.0 preferred-source-address 100.20.32.2;
}
}
}
}
}
}
interfaces {
ge-1/0/0 {
hierarchical-scheduler;
vlan-tagging;
auto-configure {
vlan-ranges {
dynamic-profile vlan-prof {
accept inet;
ranges {
any;
}
}
}
}
}
lo0 {
unit 0 {
family inet {
address 100.20.32.2/32;
}
}
}
}
system {
services {
dhcp-local-server {
authentication {
password multiplay;
username-include {
user-prefix multiplay;
}
}
dynamic-profile multiplay aggregate-clients replace;
group vlans {
interface ge-1/0/0.0;
}
}
}
}
Verification
To confirm that the configuration is correct, perform these tasks:
• Verifying the Interfaces that are Included in the Interface Set on page 211
• Verifying the Traffic Scheduling and Shaping Parameters for the Interface
Set on page 211
Verifying the Traffic Scheduling and Shaping Parameters for the Interface Set
Purpose Verify that the traffic scheduling and shaping parameters are applied properly to an
interface included in the interface set.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
Requirements
Before you begin, configure the subscriber interfaces that you intend to include in the
interface set. You can find general configuration instructions for the supported dynamic
interface configuration in DHCP Subscriber Interface Overviewand in the following:
• For dynamic VLAN interfaces, see Configuring a Static or Dynamic VLAN Subscriber
Interface over Aggregated Ethernet.
• For dynamic IP demux interfaces, see Configuring Dynamic Subscriber Interfaces Using
IP Demux Interfaces in Dynamic Profiles and Configuring a Static or Dynamic IP Demux
Subscriber Interface over Aggregated Ethernet.
• For dynamic VLAN demux interfaces, see Configuring Dynamic Subscriber Interfaces
Using VLAN Demux Interfaces in Dynamic Profiles.
Overview
Interface sets enable you to provide hierarchical scheduling to a group of subscriber
interfaces. By using the $junos-svlan-interface-set-name internal dynamic variable when
specifying the interface set name, you can locally generate an interface set name for use
by SVLAN interfaces based on the outer tag of the dual-tagged VLAN. The format of the
generated variable is physical_interface_name - outer_VLAN_tag.
• interface-set—Configures the name of the scheduler for dynamic CoS. In this example,
you use the $junos-svlan-interface-set-name variable to obtain the locally generated
interface set name for use by SVLAN interfaces based on the outer tag of the
dual-tagged VLAN.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
[edit]
set dynamic-profiles profile-dhcp-ipdemux interfaces interface-set
$junos-svlan-interface-set-name interface $junos-interface-ifd-name unit
$junos-underlying-interface-unit
set dynamic-profiles profile-dhcp-ipdemux interfaces $junos-interface-ifd-name unit
$junos-underlying-interface-unit
set class-of-service traffic-control-profiles tcp1 scheduler-map schedMap
set class-of-service traffic-control-profiles tcp1 shaping-rate 50m
set class-of-service traffic-control-profiles tcp1 guaranteed-rate 200k
set class-of-service traffic-control-profiles tcp3 scheduler-map ss1q0q1
set class-of-service traffic-control-profiles tcp3 shaping-rate 20m
set class-of-service traffic-control-profiles tcp3 guaranteed-rate 5m
set class-of-service interfaces interface-set ae0-111 output-traffic-control-profile tcp1
set class-of-service interfaces interface-set ae0-111
output-traffic-control-profile-remaining tcp3
[edit]
user@host# edit dynamic-profiles profile-dhcp-ipdemux
The interface set is created dynamically when the subscriber logs in.
4. Include dynamic IP demux interface creation within the dynamic interface set.
6. Apply traffic shaping and queuing parameters to the SVLAN interface set.
TIP: You must configure the interface set in the static [edit
class-of-service] hierarchy, not in the [edit dynamic-profiles] hierarchy.
7. Apply traffic shaping and queuing parameters to any remaining traffic on the SVLAN
interface set.
Results
interface "$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit";
}
}
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit";
}
}
}
}
Verification
To confirm that the configuration is correct, perform these tasks:
Purpose Verify the interfaces that are included in the interface set.
After you configure the traffic shaping and scheduling CoS parameters in a dynamic
profile, you apply them to an interface. The output traffic-control profile enables you to
provide traffic scheduling to the interface.
1. Specify that you want to apply CoS attributes to an interface in the dynamic profile.
2. Configure the interface name and logical interface using a variable, and apply the
output traffic-control profile to the interface.
You can use one of the following methods to specify the output traffic-control profile
you want to use:
a. If RADIUS is being used and it returns a value for the traffic-control profile,
subscriber management uses the RADIUS value.
For example:
For example:
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
2. Apply the remaining traffic-control profile to the port on which you enabled hierarchical
scheduling.
Related • Applying Traffic Shaping and Scheduling to a Subscriber Interface in a Dynamic Profile
Documentation on page 217
Rewrite rules define the marking for various CoS values, including DSCP, DSCP IPv6, IP
precedence, and IEEE 802.1 CoS values. Rewrite rules have an associated forwarding
class and code-point alias or bit set.
NOTE: By default, subscriber lawful intercept does not intercept DHCP control
packets that are generated by the routing engine. To ensure that a DHCP
control packet generated by the routing engine is intercepted, you need to
configure the ieee-802.1 rewrite-rule for VLAN demux.
For dynamic CoS, you define the rewrite rules mapping for the CoS values statically, then
reference the rewrite rule configuration in the dynamic profile for the subscriber interface.
1. Define the rewrite-rules mapping for the traffic that passes through all queues on the
interface. The available rewrite-rules types for dynamic CoS are dscp, dscpv6,
ieee-802.1 and inet-precedence.
2. Apply the rewrite-rules definition to the subscriber interface in the dynamic profile.
• For DSCP:
• For DSCPv6:
• For inet-precedence:
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
You can apply the classification map to a subscriber interface in a dynamic profile.
For dynamic CoS, you define the classification map for the CoS values statically, then
reference the classifier configuration in the dynamic profile for the subscriber interface.
The available classifier types for dynamic CoS are dscp, dscp-ipv6, ieee-802.1, and
inet-precedence.
2. Apply the classifier definition to the subscriber interface in the dynamic profile.
• For DSCP:
• For DSCPv6:
• For inet-precedence:
Related • For hardware requirements and configuration guidelines, see Guidelines for Configuring
Documentation Dynamic CoS for Subscriber Access on page 4
• Verifying the Scheduling and Shaping Configuration for Subscriber Access on page 23
To apply CoS attributes, such as shaping, at the household level, you must set and define
the CoS policy for the agent-circuit-identifier VLAN interface set using the dynamic profile
for the agent-circuit-identifier interface set (not the subscriber profile). You can also
configure a traffic-control profile and a remaining traffic-control profile for a dynamic
interface set.
The following example is a CoS profile for an ACI set using a unique-ID based dynamic
scheduler map:
Configure a CoS dynamic profile with a simple traffic-control profile that is applied to
the dynamic interface set that represents the ACI VLAN.
[edit class-of-service]
user@host# edit traffic-control-profiles traffic-control-profile-name
user@host# set shaping-rate rate
user@host# set guaranteed-rate rate
The following example is a CoS profile for an ACI set using a unique ID-based dynamic
scheduler map:
aci-set-profile {
variables {
ds1q0q2DP uid;
ds1q1q2DP uid;
be1_dp uid;
ef1_dp uid;
af1_dp uid;
nc1_dp uid;
}
interfaces {
interface-set "$junos-interface-set-name" {
interface "$junos-interface-ifd-name";
}
}
class-of-service {
traffic-control-profiles {
tcp2 {
inactive: scheduler-map ss1q0q1DP;
shaping-rate 50m;
guaranteed-rate 30m;
overhead-accounting bytes -20;
}
tcp3 {
scheduler-map "$ds1q1q2DP";
shaping-rate 30m;
guaranteed-rate 10m;
overhead-accounting bytes -20;
}
}
interfaces {
interface-set "$junos-interface-set-name" {
output-traffic-control-profile tcp2;
output-traffic-control-profile-remaining tcp3;
}
}
scheduler-maps {
"$ds1q0q2DP" {
forwarding-class be scheduler "$be1_dp";
forwarding-class af scheduler "$af1_dp";
forwarding-class nc scheduler "$nc1_dp";
}
"$ds1q1q2DP" {
forwarding-class ef scheduler "$ef1_dp";
forwarding-class af scheduler "$af1_dp";
forwarding-class nc scheduler "$nc1_dp";
}
}
schedulers {
"$be1_dp" {
transmit-rate percent 25;
priority low;
drop-profile-map loss-priority low protocol any drop-profile d3;
drop-profile-map loss-priority medium-low protocol any drop-profile d2;
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Changing CoS Services Overview on page 163
Firewall filters provide rules that define whether to accept or reject packets that are
transiting an interface on a router. The subscriber management feature supports four
categories of firewall filters:
• Classic filters are static filters that are applied to an interface dynamically. They are
compiled at commit time and then, when a service is activated, an interface-specific
filter is created and attached to a logical interface. This dynamic application is
performed by associating input or output filters with a dynamic profile. When triggered,
a dynamic profile applies the filter to an interface. Because classic filters are static,
they cannot contain subscriber-specific terms (also called rules).
• Parameterized filters allow you to implement customized filters for each subscriber
session. In parameterized filters, you use variables to define a filter. When services are
activated for a subscriber, actual values such as policing rates, destination addresses,
or ports are substituted for the variables and are used to create filters.
• Ascend-Data-Filters allow you to create dynamic filters based on values received from
the RADIUS server in the Ascend-Data-Filter attribute (RADIUS attribute 242). The
filter is configured on the RADIUS server and contains rules that specifically match
conditions for traffic and define an action for the router to perform. When services are
activated for a subscriber, a filter is created based on the values in the RADIUS attribute.
You can also use Ascend-Data-Filters to create static filters by configuring the
Ascend-Data-Filter attribute in a dynamic profile.
• Fast update filters are similar to classic filters. However, fast update filters support
subscriber-specific, rather than interface-specific, filter values. Fast update filters also
allow individual filter terms to be incrementally added or removed from filters without
requiring that the entire filter be recompiled for each modification. Fast update filters
are essential for networking environments in which multiple subscribers share the same
logical interface.
You configure firewall filters to determine whether to accept or reject traffic before it
enters or exits an interface to which the firewall filter is applied. An input (or ingress)
firewall filter is applied to packets that are entering a network. An output (or egress)
firewall filter is applied to packets that are exiting a network. You can configure firewall
filters to subject packets to filtering or class-of-service (CoS) marking (grouping similar
types of traffic together and treating each type of traffic as a class with its own level of
service priority).
• Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
• Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
on page 245
You can force filter processing to occur in a particular order by using the precedence
statement. You specify a precedence for input and output filters within a dynamic profile
at the [edit dynamic-profiles profile-name interfaces (interface-name | demux0) unit
logical-unit-number family family] hierarchy level.
The precedence range is from 0 through 250. Setting a lower precedence value for a
filter gives it a higher precedence within the dynamic profile. A precedence of zero (the
default) gives the filter the highest precedence. If no precedence is specified, the filter
receives a precedence of zero (highest precedence). Filters with matching precedence
(zero or otherwise) are applied in random order.
See Firewall Filters Overview for information about firewall filters and how to create
them.
See “Dynamically Attaching Statically Created Filters for Any Interface Type” on
page 246, “Dynamically Attaching Statically Created Filters for a Specific Interface
Family Type” on page 245, or Dynamically Attaching Filters Using RADIUS Variables.
The dynamic firewall feature supports classic filters, which are static filters that are
applied to an interface dynamically. They are compiled at commit time and then, when
a service is activated, an interface-specific clone of the filter is created and attached to
a logical interface. This dynamic application is performed by associating input or output
filters with a dynamic profile.
• Port (Layer 2) firewall filter—Port firewall filters apply to Layer 2 switch ports. You can
apply port firewall filters only in the ingress direction on a physical port.
• VLAN firewall filter—VLAN firewall filters provide access control for packets that enter
a VLAN, are bridged within a VLAN, and leave a VLAN. You can apply VLAN firewall
filters in both ingress and egress directions on a VLAN. VLAN firewall filters are applied
to all packets that are forwarded to or forwarded from the VLAN.
• Router (Layer 3) firewall filter—You can apply a router firewall filter in both ingress and
egress directions on Layer 3 (routed) interfaces.
• Match conditions—Specifies values or fields that the packet must contain. You can
define various match conditions, including:
• Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source port
field
• IP protocol field
• TCP flags
• interfaces
You can also specify a precedence (from 0 through 255) for input and output filters
within a dynamic profile to force filter processing in a particular order. Setting a lower
precedence value for a filter gives it a higher precedence within the dynamic profile. Filters
with lower precedence values are applied to interfaces before filters with higher
precedence values. A precedence of zero (the default) gives the filter the highest
precedence. If no precedence is specified, the filter receives a precedence of zero (highest
precedence). Filters with matching precedence (zero or otherwise) are applied in random
order.
NOTE: Dynamic filters do not process outbound packets that are sourced
from the routing engine. To filter outbound packets that are sourced from
the routing engine, you can create static outbound filters for each interface.
Guidelines for Creating and Applying Classic Filters for Subscriber Interfaces
Dynamic configuration of firewall filters is supported. However, you can also continue to
create static firewall filters for interfaces as you do normally, and then dynamically apply
those filters to statically created interfaces using dynamic profiles. You can also use
dynamic profiles to attach input and output filters through RADIUS.
• You can create interface-specific filters at the unit level that apply to any family type
(inet or inet6) configured on the interface.
• You can add or remove both IPv4 and IPv6 filters with the same service activation or
deactivation.
• You can remove one filter type without impacting the other type of filter. For example,
you can remove IPv6 filters and leave the current IPv4 filters active.
• You can chain up to five input filters and four output filters together.
• If you do not configure and apply a filter, the interface uses the default group filter
configuration.
• You cannot modify or delete a firewall filter while subscribers on the same logical
interface are bound.
• Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
• Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
on page 245
This section provides the basic classic filter CLI statement syntax. The first part of this
syntax provides the CLI statements to associate an input and output filter with a dynamic
profile. The second part of this syntax represents the configured input and output filters
applied to the dynamic profile. When a DHCP event occurs, the dynamic profile applies
the specified filters to the DHCP client interface on the router.
[edit]
dynamic-profiles [profile-name] {
interfaces {
[$junos-interface-ifd-name] {
unit [$junos-underlying-interface-unit] {
family family] {
filter {
input {
[filter-name];
precedence [precedence];
}
output {
[filter-name];
precedence [precedence];
}
}
}
}
}
}
[edit]
firewall {
family [family] {
filter [filter-name] {
[desired filter configuration]
}
filter [filter-name] {
[desired filter configuration]
}
}
}
Related • Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
Documentation on page 245
firewall {
policer p1 {
if-exceeding {
bandwidth-limit 5m;
burst-size-limit 10m;
}
then discard;
}
family inet {
filter dfwd {
interface-specific;
term 1 {
from {
source-address {
192.1.1.0/24;
}
}
then {
count c1;
next term;
}
}
term 2 {
from {
source-address {
192.2.1.0/24;
}
}
then count c2;
}
term 3 {
then accept;
}
}
filter dfwd1 {
interface-specific;
term 1 {
from {
address {
192.1.1.0/24;
}
}
then {
discard;
}
}
}
filter tos {
interface-specific;
term 1 {
from {
precedence priority;
}
then forwarding-class assured-forwarding;
}
term 2 {
then {
log;
accept;
}
}
}
filter dfwd2 {
interface-specific;
term 1 {
from {
forwarding-class best-effort;
}
then {
sample;
forwarding-class expedited-forwarding;
}
}
term 2 {
then accept;
}
}
filter nodhcp {
term dhcpdiscover {
from {
protocol udp;
source-port 68;
destination-port 67;
}
then {
discard;
}
}
term others {
then accept;
}
}
filter p1 {
interface-specific;
term 1 {
from {
precedence priority;
}
then {
policer p1;
log;
}
}
term 2 {
then accept;
}
}
filter dscp {
interface-specific;
term 1 {
from {
dscp af11;
}
then log;
}
term 2 {
then accept;
}
}
filter tcm {
interface-specific;
term 1 {
from {
dscp af11;
}
then policer p1;
}
term 2 {
then accept;
}
}
}
traceoptions {
flag dynamic;
}
}
Related • Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
Documentation
• Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
on page 245
You can streamline the filter process, decrease the amount of packet handling for each
filter in a chain, and effectively bypass unnecessary filters by using the service-filter-hit
match/action combination at the [edit firewall family family-name filter filter-name term
term-name] hierarchy level.
When the match conditions for the filter are met, the service-filter-hit action is set to
indicate to subsequent filters that further processing is unnecessary.
2. Specify the service-filter-hit match condition in any filters with a lower precedence
(that is, a higher precedence statement value) that you want to detect service-filter-hit
actions applied from previous filters in the chain.
3. Configure the filter to pass (accept) any packet that has a service-filter-hit action
applied from any previous filters.
This example describes how to configure multiple filters using the service-filter-hit
match/action combination and contains the following sections:
• The order in which the filters are applied is important. You can ensure the order in which
the filters are processed by specifying a filter precedence value for the interface. See
“Defining Dynamic Filter Processing Order” on page 228 for more information about
dynamic filter processing and how to use the precedence statement.
• The following example uses policers to further define the match conditions each filter
uses. These filters are not described here. To better understand how to configure
policers, see Statement Hierarchy for Configuring Policers.
Figure 23 on page 241 shows the logical processing flow through a chain of three filters
(voice, video, and data) where only processing for a specific data type is desired. This
configuration example shows an ingress filter flow. Though subsequent ingress filters in
a chain can detect whether the service-filter-hit action is set, egress filters do not. To
bypass egress filters, you must also configure the service-filter-hit match/action
combination on those filters.
g017470
Voice, Video, and Data Packets Data Packets
Step-by-Step To configure the voice filter for the logical flow in Figure 23 on page 241:
Procedure
1. Configure the filter to apply the assured forwarding class and set the service-filter-hit
action for traffic from a specific address and port range (over which voice traffic is
expected).
[edit]
set firewall filter voice term T1 from address 1.1.1.1/32
set firewall filter voice term T1 from source-port 5004-5005
set firewall filter voice term T1 then forwarding-class assured-forwarding
service-filter-hit accept
2. Configure the filter default action to pass (accept) packet traffic from any other
address or port range.
[edit]
set firewall filter voice term default then accept
Step-by-Step To configure the video filter for the logical flow in Figure 23 on page 241:
Procedure
1. Configure the filter to pass (accept) incoming packets that are tagged by the
service-filter-hit action.
[edit]
set firewall filter video term T1 from service-filter-hit
set firewall filter video term T1 then accept
2. Configure the filter to apply a video policer and set the service-filter-hit action for
traffic from a specific address (over which video traffic is expected).
[edit]
set firewall filter video term T2 from source-address 10.10.10.10/32
set firewall filter video term T2 then policer video-policer service-filter-hit accept
3. Configure the filter default action to pass (accept) packet traffic from any other
address or port range.
[edit]
set firewall filter video term default then accept
Step-by-Step To configure the data filter for the logical flow in Figure 23 on page 241:
Procedure
1. Configure the filter to pass (accept) incoming packets that are tagged by the
service-filter-hit action.
[edit]
set firewall filter data term T1 from service-filter-hit
set firewall filter data term T1 then accept
2. Configure the filter to apply a data policer and set the service-filter-hit action for
traffic from a specific address (over which video traffic is expected).
[edit]
set firewall filter data term T2 then policer data-policer service-filter-hit accept
Results
[edit firewall]
user@host# show
filter voice {
term T1 {
from {
address {
1.1.1.1/32;
}
source-port 5004-5005;
}
then {
forwarding-class assured-forwarding;
service-filter-hit;
accept;
}
}
term default {
then accept;
}
}
filter video {
term T1 {
from {
service-filter-hit;
}
then accept;
}
term T2 {
from {
source-address {
10.10.10.10/32;
}
}
then {
policer video_policer;
service-filter-hit;
accept;
}
}
term default {
then accept;
}
}
filter data {
term T1 {
from {
service-filter-hit;
}
then accept;
}
term T2 {
then {
policer data_policer;
service-filter-hit;
accept;
}
}
}
Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
You can dynamically attach statically created filters for either IPv4 (inet) or IPv6 (inet6)
interface types. These filters apply only to interfaces of the specified type.
Before you can attach a statically created filter using a dynamic profile.
See Firewall Filters Overview for information about classic firewall filters and how to
create them. See “Configuring Fast Update Filters” on page 288 for information about
creating fast update filters.
1. Specify the unit family type you want to use when dynamically attaching the filters.
• Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
You can dynamically attach statically created filters for any interface type. These filters
apply to any interfaces that are created using the dynamic profile.
NOTE: For an L2TP LNS on MX Series routers, you can attach firewall for
static LNS sessions by configuring these at logical interfaces directly on the
inline services device (si-fpc/pic/port). RADIUS-configured firewall
attachments are not supported.
Before you can attach a statically created filter using a dynamic profile.
See Firewall Filters Overview for information about classic firewall filters and how to
create them. See “Configuring Fast Update Filters” on page 288 for information about
creating fast update filters.
To dynamically attach statically created input and output filters for all interfaces created
dynamically using the dynamic profile:
1. Access the dynamic profile, interface, and unit that you want to use when applying
the static filters.
[edit]
user@host# edit dynamic-profiles access-profile interfaces ge-1/1/1 unit 1
• Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
on page 245
Parameterized filters allow you to implement customized filters for each subscriber
session. In parameterized filters, you use variables called unique identifiers (UIDs) to
define your filter. When services are activated for a subscriber, actual values are
substituted for the variables and are used to create filters.
Parameterized filters are configured under a dynamic profile. You can configure a general
baseline filter under a dynamic profile and then provide specific variables of that filter
when a dynamic session is activated. These variables can include policing rates,
destination addresses, ports, and other items.
To provide better scaling, the system analyzes a dynamic profile, and then determines
whether the set of variables for one session is the same as for a previous session. If a
matching filter already exists, the session creates an interface-specific filter copy of that
filter template. If the filter does not already exist, the session reads the configuration and
compiles a new filter. This filter is installed as a template with an interface-specific filter
copy for the current session pointing to it.
• Dynamic Profile After UID Substitutions for Parameterized Filters on page 255
The system uses unique identifiers (UIDs) to aid with scaling. The UID enables the system
to determine when configuration objects from multiple subscribers are identical and can
be shared. In many situations, such as a filter definition, sharing a single filter among
multiple subscribers instead of creating a new filter for every subscriber helps to conserve
system resources.
Within a dynamic profile a UID is used to name a configuration object. The system assigns
the value of the UID (the object's name) based upon all the variables contained within
that configuration stanza along with the dynamic profile's name. The assigned UID value
consists of the UID name combined with the string_UID and a unique number. For instance,
the UID $my-filter might be given the value my-filter_UID1022.
You must first define a UID under the variable stanza using the option uid. The UID must
be defined at the end, after all the variables that are assigned values externally.
dynamic-profile test-profile {
[variables] {
... [other variables] ...
[my-filter] {
uid;
}
}
}
After a UID has been defined, it can then be used to name an object:
dynamic-profile test-profile {
firewall {
family inet {
filter [$my-filter] {
... [filter definition that makes use of other variables] ...
}
}
}
}
As previously described, the system assigns the value of $my-filter depending on the
values of the variables used within that filter's definition.
The UID is also used in any other place that the object's name is used. For example, here
is an interface stanza to use $my-filter as an input filter:
dynamic-profile [test-profile] {
interfaces {
[$junos-interface-ifd-name]" {
unit [$junos-interface-unit] {
family inet {
filter {
input [$my-filter];
}
}
}
}
}
}
You can define multiple configuration objects of the same type (that is, multiple filters)
as long as each one uses its own, individual, UID. To ensure that the system selects the
correct object when assigning a name, use the uid-reference variable.
When the uid-reference is used, it is effectively evaluated twice. First, the value of the
uid-reference variable is retrieved. Second, that value is used as the name of a UID and
that UID value is retrieved. A uid-reference with a value that is not the name of a UID is
considered an error.
dynamic-profile [test-profile] {
variables {
[my-filter-selector] {
uid-reference;
}
}
}
A uid-reference is used wherever the name of the object is needed. One example is the
name of the input filter in the following interface stanza:
dynamic-profile [test-profile] {
interfaces {
[$junos-interface-ifd-name] {
unit [$junos-interface-unit] {
family inet {
filter {
input [$my-filter-selector];
}
}
}
}
}
}
Consider the case where two parameterized filters are defined: $my-filter-1 and
$my-filter-2. The $my-filter-selector variable might be assigned the value my-filter-1 or
my-filter-2, depending upon which filter is appropriate.
This topic discusses how to configure unique identifiers (UIDs) that can then be used in
parameterized filters. The dynamic profile obtains and replaces data for these variables
from an incoming client data packet.
[edit]
user@host# edit dynamic-profiles Profile1
[edit dynamic-profiles Profile1]
If the value for the variable UID comes from RADIUS, configure the variable as a UID
reference.
dynamic profile {
Profile1 {
variables {
policer1 uid;
filter1 uid;
policer2 uid;
filter2 uid;
in-filter {
uid-reference;
}
}
}
In the following sample configuration, the my-svc-prof profile provides two different
filters: my-filt-1gw and my-filt-2gw. These filters match on either one or two gateway
addresses and apply a policer for that traffic. The name of the filter to apply, the gateway
addresses, and the bandwidth for the policer are passed into the service profile from the
RADIUS service activation. The uid-reference type supports selection of a particular UID
generated object out of multiple objects in the profile. The UID type indicates that a
variable is used for UID generation.
dynamic-profile {
[my-svc-prof] {
variable {
[my-in-filter] {
mandatory;
uid-reference;
}
gw1 {
mandatory;
}
gw2 {
mandatory;
}
bw {
mandatory;
}
my-filt-1gw {
uid;
}
my-filt-2gw {
uid;
}
[my-policer] {
uid;
}
}
interfaces {
[$junos-interface-ifd-name] {
unit [$junos-underlying-interface-unit] {
family inet {
filter {
input [$my-in-filter];
}
}
}
}
}
firewall {
policer [$my-policer] {
if-exceeding {
bandwidth-limit $bw;
burst-size-limit 15000;
}
then discard;
}
family inet {
filter [$my-filt-1gw] {
interface-specific;
term t0 {
from {
destination-address $gw1;
}
then {
policer [$my-policer];
}
}
term last {
then {
count drops;
discard;
}
}
}
filter [$my-file-2gw] {
interface-specific;
term t0 {
from {
destination-address {
$gw1;
$gw2;
}
}
then {
policer [$my-policer];
}
}
term last {
then {
count drops;
discard;
}
}
}
}
}
}
}
Related • Dynamic Profile After UID Substitutions for Parameterized Filters on page 255
Documentation
• Example: Dynamic-Profile Parsing on page 264
In the following example, the client session is created on the ge-1/0/0.7 interface and
this service is activated:
A dynamic profile is created by the process. The UIDs assigned by the process are based
on the parameters being passed in as well as the sessions previously created.
dynamic-profile {
[my-svc-prof] {
interfaces {
ge-1/0/0 {
unit 7 {
family inet {
filter {
input my-filt-1gw_UID1022;
}
}
}
}
}
firewall {
policer my-policer_UID1005 {
if-exceeding {
bandwidth-limit 5m;
burst-size-limit 15000;
}
then discard;
}
family inet {
filter my-filt-1gw_UID1022 {
interface-specific;
term t0 {
from {
destination-address 207.17.137.239/32;
}
then {
policer my-policer_UID1005;
}
}
term last {
then {
count drops;
discard;
}
}
}
filter my-filt-2gw_UID11018 {
interface-specific;
term t0 {
from {
destination-address {
207.17.137.239/32;
0;
}
}
then {
policer my-policer_UID1005;
}
}
term last {
then {
count drops;
discard;
}
}
}
}
}
}
}
Differing filter match conditions can be achieved by allowing the filter that is being
attached to be selected by the unique-identifier--reference capabilities of parameterized
filters. If a variable number of terms or varying match conditions are needed, multiple
filters are defined. When the service is activated, that activation will select the particular
filter that should be applied in the stanza specifying the interface, unit, family and
input/output filter:
interfaces {
ge-1/0/0 {
unit 7 {
family inet {
filter {
input my-filt-1gw-uid1022;
}
}
}
}
}
When creating a parameterized filter, you first define the family address type (inet or
inet6) and then you define one or more terms that specify the filtering criteria and the
action to take when a match occurs.
• Match conditions—Specifies values or fields that the packet must contain. You can
define various match conditions, including:
• Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source port
field
• IP protocol field
• TCP flags
• interfaces
The processing of parameterized filters is the same as classic filters. The order of the
terms within a parameterized filter is important. Packets are tested against each term
in the order in which the terms are listed in the firewall filter configuration. When a firewall
filter contains multiple terms, the router takes a top-down approach and compares a
packet against the first term in the firewall filter. If the packet matches the first term, the
router executes the action defined by that term to either accept or reject the packet, and
no other terms are evaluated. If the router does not find a match between the packet
and first term, it then compares the packet to the next term in the firewall filter by using
the same match process. If no match occurs between the packet and the second term,
the router continues to compare the packet to each successive term defined in the firewall
filter until a match is found. If a packet does not match any terms in a firewall filter, the
default action is to discard the packet.
You can also specify a precedence (from 0 through 255) for input and output filters
within a dynamic profile to force filter processing in a particular order. Setting a lower
precedence value for a filter gives it a higher precedence within the dynamic profile. Filters
with lower precedence values are applied to interfaces before filters with higher
precedence values. A precedence of zero (the default) gives the filter the highest
precedence. If no precedence is specified, the filter receives a precedence of zero (highest
precedence). Filters with matching precedence (zero or otherwise) are applied in an
unspecified order.
Subscriber IP Address
In most deployment scenarios, the interface is based on the subscriber’s IP address.
Because subscribers may not be unique, they cannot be used in determining similar filters
and policers. Do not use the junos-subscriber-ip-address IP address as a match candidate.
Doing so causes unique filters per subscriber, which inhibits scaling.
2. Fast update filter within the current dynamic profile. For example, dynamic-profile
[profile-name] firewall family inet fast-update-filter my-filter.
3. Parameterized filter within the current dynamic profile. For example, dynamic-profile
[profile-name] firewall family inet filter.
• firewall policer
• firewall hierarchical-policer
• three-color policer
• policy-options prefix-list
If an object in the static configuration is being used by an active parameterized filter, you
cannot delete that object from the configuration while the subscriber is logged in.
Guidelines for Creating and Applying Parameterized Filters for Subscriber Interfaces
Dynamic configuration of firewall filters is supported. However, you can also continue to
create static firewall filters for interfaces as you do normally, and then dynamically apply
those filters to statically created interfaces using dynamic profiles. You can also use
dynamic profiles to attach input and output filters through RADIUS.
• You can create interface-specific filters at the unit level that apply to any family type
(inet or inet6) configured on the interface.
• You can add or remove both IPv4 and IPv6 filters with the same service activation or
deactivation.
• You can remove one filter type without impacting the other type of filter. For example,
you can remove IPv6 filters and leave the current IPv4 filters active.
• You can chain up to five input filters and four output filters together.
• If you do not configure and apply a filter, the interface uses the default group filter
configuration.
• You cannot modify a firewall filter while subscribers on the same logical interface are
bound.
The following IPv4 match conditions are supported for parameterized filters. Their syntax
is the same as the static filter syntax.
address
destination-address
destination-port
destination-port-except
destination-prefix-list
dscp
dscp-except
forwarding-class
forwarding-class-except
icmp-code
icmp-code-except
icmp-type
icmp-type-except
loss-priority
loss-priority-except
packet-length
packet-length-except
port
port-except
precedence
precedence-except
prefix-list
protocol
protocol-except
service-filter-hit
source-address
source-class
source-port
source-port-except
source-prefix-list
ttl
ttl-except
The following IPv6 match conditions are supported for parameterized filters. Their syntax
is the same as the static filter syntax.
address
destination-address
destination-port
destination-port-except
destination-prefix-list
forwarding-class
forwarding-class-except
icmp-code
icmp-code-except
icmp-type
icmp-type-except
loss-priority
loss-priority-except
packet-length
packet-length-except
port
port-except
prefix-list
service-filter-hit
source-address
source-class
source-port
source-port-except
source-prefix-list
traffic-class
traffic-class-except
The following actions and modifiers are supported for parameterized filters. Their syntax
is the same as the static filter syntax.
accept
count
discard
forwarding-class
hierarchical-policer
log
loss-priority
next
policer
port-mirror
port-mirror-instance
reject
routing-instance
sample
service-accounting
service-accounting-deferred
service-filter-hit
three-color-policer
The following policer actions are supported for parameterized filters. Their syntax is the
same as the existing static policer syntax.
discard
forwarding-class
loss-priority
Interface-shared filters can be defined statically or dynamically, but can only be applied
using dynamic profiles, and are supported for both client and service sessions. The same
interface-shared instance can be attached to multiple interfaces only if these interfaces
reference the same interface-shared filter name and have the same shared name.
The shared name can be taken from either the $junos-interface-set-name variable or the
$junos-svlan-interface-set-name variable, where the values of the variables are provided
by the related client session or service session. For example, if the
$junos-interface-set-name variable is defined as the shared name, the same
interface-shared filter instance is attached to all logical interfaces that belong to the
interface set defined by the variable of that session. Similarly, if
$junos-svlan-interface-set-name is defined for the shared name, all logical interfaces
that belong to the VLAN interfaces set defined by the session's variable share the same
interface-shared instance.
With VLAN subscriber interfaces that use the agent-circuit-identifier information, many
subscribers share the same underlying logical interface. Because some of these
subscribers are related to each other as part of the same household, you must apply an
interface-shared filter to the subscriber logical interfaces that make up the household
to be able to filter and police these related subscribers at a household level. All interfaces
that share the same interface-shared filter instance share the same set of counters and
policer actions.
The base filter name of a parameterized filter is assigned depending upon the profile
name and the contents of the filter definition. Therefore, when an interface-shared filter
is used with parameterized filters, all service sessions that want to share the same instance
of an interface-shared filter must have the exact same parameterized filter and profile.
A service session uses a different instance of the interface-shared filter if either the
parameterized filter or the profile is different.
Related • Example: Implementing a Filter for Households That Use ACI-Based VLANs on page 263
Documentation
In the following example using an interface-shared filter, you configure a dynamic profile
that is used to implement agent-circuit-identifier VLAN household filtering. If
$junos-input-filter is FILTER1 and $junos-interface-set-name is ACI1, then a filter with the
name FILTER1-ACI1-in is created and attached to the demux0 unit. When a subsequent
login from the same household occurs, it is in the same VLAN. If $junos-input-filter is also
FILTER1, the next demux0 interface also has the FILTER1-ACI1-in filter attached. A low
value precedence was used with the interface-shared filter. If you want to have the
interface-shared filter applied first, give a higher precedence to any other filters that are
attached to the same interfaces.
[edit]
user@host# edit dynamic-profiles client-profile
4. Specify the input filter and the filter terms for the interface unit.
5. Specify the output filter and the filter terms for the interface unit.
6. Specify that you want to configure a firewall, and specify the family.
[edit]
dynamic-profile {
client-profile {
interfaces {
demux0 {
unit $junos-interface-unit {
family inet {
filter {
input $junos-input-filter shared-name $junos-interface-set-name precedence
10;
}
}
}
}
}
}
}
firewall {
family inet {
filter FILTER1 {
interface-shared;
term… # the filter’s terms
}
}
}
Related • Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
Documentation on page 245
The following example shows the basic dynamic-profile parsing steps for parameterized
filters.
1. Read dynamic-profiles my-svc-prof interface ge-1/0/0 unit 7 family inet filter input
and get the value my-filt-1gw_UID1022. The my-in-filter variable received the name
of the UID (my-filt-1gw) from the first service parameter. The name
my-filt-1gw_UID1022 comes from the value of the my-filt-1gw UID.
2. Determine whether a static filter called my-filt-1gw_UID1022 exists. If so, this is the
existing classic filter case and not a parameterized filter.
a. Read the parameterized filter configuration. This adds the match destination
address 207.17.137.239 and the policer my-policer_UID1005 as the action.
When subsequent sessions are created with the same parameters, the system returns
the same my-filt-1gw_UID1022 filter name. In this case, Step 5 finds the existing filter
template and proceeds directly to Step 6.
In this example, dynamic firewall is configured for subscriber access using Junos IPv4
predefined variables.
dynamic-profiles {
DynamicFilterProfile {
interfaces {
“$junos-interface-ifd-name” {
unit “$junos-underlying-interface-unit” {
family inet {
filter {
input “$junos-input-filter”;
output “$junos-output-filter”;
}
}
}
}
}
}
}
You can also configure a static Ascend-Data-Filter by manually entering the required
binary data as a hexadecimal string in a dynamic profile. A statically configured
Ascend-Data-Filter in a dynamic profile takes precedence over an Ascend-Data-Filter
attribute that is received from RADIUS. The static method is time-consuming to configure;
it is typically used only for testing purposes.
CoA updates existing filters based on the Ascend-Data-Filter Type field, as shown in the
following list:
• If the Type field is 1, IPv4 rules are updated and IPv6 rules are unchanged. The opposite
is true if the Type field is 3.
• If both Type 1 and 3 are specified, then all rules are updated.
• If the CoA has no Ascend-Data-Filter rules, then the existing rules are unchanged.
__junos_adf_session#-interfacename-family-direction
For example:
__junos_adf_33847-ge/1/0/4.53-init-in
Each Ascend-Data-Filter rule maps to a single term, and the term names are simply t0,
t1, ..., tn. If you configure the counter option, the router adds a count action to each term
that is created. The counter names are a combination of the the term names with -cnt
appended. For example t0-cnt and t1-cnt.
Because the filter list can be a combination of several rules, you must consider how the
multiple filters coexist. You must ensure that the filters are designed and applied correctly
in order to provide the desired filtering and resulting action. For example, a session might
have a filter that accepts traffic from Subscriber-A and discards all other traffic. However,
a second session on the same interface might have a filter that accepts traffic from
Subscriber-B only and discards other traffic. When the two filters are combined in the
filter list, traffic from Subscriber-B is discarded by the first filter, and traffic from
Subscriber-A is discarded by the second filter. As a result, no traffic is accepted on the
interface because the two filters essentially cancel out each other and discard all traffic.
A service provider might apply the same dynamic profile to a mixed pool of subscribers,
such that the attribute is included by RADIUS for some of the subscribers and is not
included for others. By default, the router returns an error for each of the subscribers
without the attribute, consuming system resources. You can configure the dynamic profile
to accommodate such a mixture of subscribers by making the attribute requirement
optional. To do so, and to suppress attribute error reporting, specify the not-mandatory
option with the adf statement at the [edit dynamic-profiles profile-name interfaces
interface-name unit logical-unit-number family family filter] hierarchy level. With this
configuration, the Ascend-Data-filter is simply not created when the Ascend-Data-Filter
attribute is not present.
Table 35 on page 269 provides information about the fields used in the Ascend-Data-Filter
attribute (RADIUS attribute 242) and how the fields map to Junos OS filter functions.
The table lists the fields in the order in which they occur in the Ascend-Data-Filter attribute.
Spare 1 byte – –
Source port 2 bytes Port number of the source From source-port x - y entry
port added to term
Subscriber management dynamic profiles use the following Junos OS predefined variables
to map family-specific Ascend-Data-Filter rules to Junos OS filter functionality:
1. Specify the dynamic profile in which you want to include the Ascend-Data-Filter.
Specify the interface, the logical unit number, and the family type.
[edit]
user@host# edit dynamic-profiles profile-name interfaces interface-name unit
logical-unit-number family family
3. Specify the Junos OS predefined variable that maps the Ascend-Data-Filter actions
to Junos OS filter functionality. Use the variable that corresponds to the specified
family type.
4. (Optional) Suppress error-reporting in the event the RADIUS reply messages do not
include the Ascend-Data-Filter attribute.
5. (Optional) Enable the counter feature. The counter increments each time a packet
matches the rule.
6. (Optional) Specify the input precedence used to establish the order in which filters
on the interface are applied. A lower precedence value equals a higher precedence.
The precedence relates to other dynamic filters configured on the same interface.
7. (Optional) Specify the output precedence used to establish the order in which filters
on the interface are applied. A lower precedence value equals a higher precedence.
The precedence relates to other dynamic filters configured on the same interface.
This example shows how to configure support for dynamic Ascend-Data-Filter policies.
Requirements
• Ensure that the Ascend-Data-Filter has been configured on the RADIUS server.
• Configure RADIUS support. See Configuring RADIUS Server Parameters for Subscriber
Access.
Overview
Ascend-Data-Filters are configured on a RADIUS server, and contain rules that create
policies. Subscriber management uses a dynamic profile to obtain the Ascend-Data-Filter
attribute (RADIUS attribute 242) from the RADIUS server and apply the policy to a
subscriber session.
• Specify the dynamic profile to use to apply the Ascend-Data-Filter policy to the
subscriber session.
• Specify the Junos OS predefined variable that maps the Ascend-Data-Filter rules to
Junos OS filter functionality.
• Configure optional settings, which include counting the rule usage and setting the
precedence order for the filter.
Configuration
Step-by-Step To configure dynamic Ascend-Data-Filter support:
Procedure
1. Specify the dynamic profile in which you want to include the Ascend-Data-Filter,
and configure the interface, the logical unit number, and the family type.
[edit]
user@host# edit dynamic-profiles adf-profile-v4 interfaces
$junos-interface-ifd-name unit $junos-underlying-interface-unit family inet
2. Specify that you want to include an Ascend-Data-Filter in the dynamic profile and
provide the Junos OS predefined variable as the rule that maps the
Ascend-Data-Filter actions to Junos OS filter functionality.
Results From configuration mode, confirm your configuration by entering the show
dynamic-profiles command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show dynamic-profiles
...
adf-profile-v4 {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet {
filter {
adf {
rule "$junos-adf-rule-v4";
counter;
input-precedence 75;
output-precedence 80;
...
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform these tasks:
Purpose Verify that the Ascend-Data-Filter rules were attached to the subscriber.
Action From operational mode, enter the show subscribers extensive command.
Meaning The output shows the information for the dynamic profile, including Ascend-Data-Filter
rules. Verify the following information:
• The correct Ascend-Data-Filter rules are applied to the subscriber. The display shows
the rules that are configured on the RADIUS server.
Purpose Verify usage of the dynamic Ascend-Data-Filter. Counter statistics are displayed when
the counter option is configured for the adf command in the dynamic profile.
Filter: __junos_adf_5-ge-1/0/0.0-inet-in
Counters:
Name Bytes Packets
t0-cnt 32758 22
t1-cnt 22199 15
t2-cnt 21723 14
Meaning The output shows the name of the filter and lists the counter activity. If the counter option
is not configured, the output displays only the filter name.
This example shows how to configure support for static Ascend-Data-Filter policies. In
a static configuration, you manually configure the Ascend-Data-Filter as part of the
dynamic profile configuration. This procedure differs from dynamic configuration, in which
the Ascend-Data-Filter is defined on the RADIUS server and then subscriber management
uses a predefined variable to map the Ascend-Data-Filter rules to Junos OS filter
functionality. Because creating a static Ascend-Data-Filter configuration can be
labor-intensive, you might typically use this method for testing purposes.
Requirements
• Create the dynamic profile. See Dynamic Profiles Overview.
• Configure RADIUS support. See Configuring RADIUS Server Parameters for Subscriber
Access.
Overview
Ascend-Data-Filters contain rules that create policies. Subscriber management uses a
dynamic profile to apply the policy to a subscriber session. You manually configure the
Ascend-Data-Filter as part of the dynamic policy.
• Specify the dynamic profile to use to apply the Ascend-Data-Filter policy to the
subscriber session.
• Configure optional settings, which include counting the rule usage and setting the
precedence for received and transmitted traffic.
Configuration
Step-by-Step To configure static Ascend-Data-Filter support:
Procedure
1. Specify the dynamic profile in which you want to create the Ascend-Data-Filter,
and configure the interface, the logical unit number, and the family type.
[edit]
user@host# edit dynamic-profiles adf-profile-v4 interfaces
$junos-interface-ifd-name unit $junos-underlying-interface-unit family inet
2. Configure the Ascend-Data-Filter. Enclose the filter values within quotation marks.
You can configure multiple Ascend-Data-Filter rules in the same dynamic profile.
Results From configuration mode, confirm your configuration by entering the show
dynamic-profiles command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show dynamic-profiles
...
adf-profile-v4 {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet {
filter {
adf {
rule "01000100 0A020100 00000000 18000000 00000000 00000000";
counter;
input-precedence 80;
output-precedence 85;
...
If you are done configuring the device, enter commit from configuration mode.
Results
The Ascend-Data-Filter rule defined in Step 2 of the procedure configures an input policy
that filters all packets from network 10.2.1.0 with wildcard mask 255.255.255.0 to any
destination.
Table 36 on page 279 lists the values specified in the Ascend-Data-Filter rule.
Type 01 IPv4
Forward 00 Forward
Indirection 01 Ingress
Spare 00 None
Protocol 00 None
Established 00 None
Verification
To confirm that the configuration is working properly, perform these tasks:
Purpose Verify that the Ascend-Data-Filter rules you manually configured were attached to the
subscriber.
Action From operational mode, enter the show subscribers extensive command.
Meaning The output shows the information for the dynamic profile, including Ascend-Data-Filter
rules. Verify the following information:
Purpose Verify usage of the static Ascend-Data-Filter. Counter statistics are displayed when the
counter option is configured for the adf command in the dynamic profile.
Filter: __junos_adf_5-ge-1/0/0.0-inet-in
Counters:
Name Bytes Packets
t0-cnt 32758 22
Meaning The output shows the name of the filter and the lists counter activity. If the counter option
is not configured, the output displays only the filter name.
Fast update filters provide more efficient filter processing over classic static filters when
dynamic services are implemented for multiple subscribers that share the same logical
interface.
Fast update filters support subscriber-specific filter values, as opposed to classic filters,
which are interface-specific. Fast update filters allow individual filter terms, or rules, to
be added or removed from filters without requiring the router to recompile the filter after
each modification—terms are added and removed when subscriber services are added
and removed.
Using the fast update filters feature involves three distinct operations:
1. Creating the filter—You define fast update filters under the [edit dynamic-profiles
profile-name firewall family family] hierarchy. The dynamic-profiles stanza enables
you to use dynamic variables to create subscriber-specific configurations for the filter’s
match terms. See “Configuring Fast Update Filters” on page 288.
2. Associating the filter with a dynamic profile—You use the [edit dynamic-profiles
profile-name interface interface-name unit unit-number family family hierarchy to
associate the filter with a dynamic profile. This is the same procedure used for classic
filters. See “Associating Fast Update Filters with Interfaces in a Dynamic Profile” on
page 300.
3. Attaching the filter to an interface—When a subscriber logs in, the dynamic profile
instantiates the subscriber session and applies the properties of the profile, including
the fast update filter, to the session interface. This is the same procedure used for
classic filters. Also, similar to classic filters, the name of fast update filters can be
provided in a user’s RADIUS file.
When a dynamic profile instantiates a subscriber session and applies a fast update filter,
the router verifies that the filter is not already present on the session interface. If the filter
is not present, the router adds the filter. If the filter is already present on the interface,
the router simply adds any new terms that are not in the existing filter. This procedure is
reversed when subscriber sessions are deleted. Any terms that were added by a session
are then removed when the session is deleted. The filter is deleted when the last subscriber
session is deleted.
NOTE: You can optionally specify that a term can be added only once and
cannot be modified. See “Match Conditions and Actions in Fast Update Filters”
on page 290.
• Match condition—Specifies values or fields that the packet must contain. You can
match a maximum of five fields in a fast update filter. A match condition can contain
a single value or range. This differs from classic filters, in which terms can have multiple
values. However, you can use additional terms to specify multiple ranges. “Fast Update
Filter Match Conditions” on page 292 lists the supported match conditions for fast
update filters. The order in which the terms appear in a fast update filter is not important,
because the router examines the most specific term first. (Classic filters examine the
terms in the order in which the terms are listed.)
Terms that are added to the filter during session instantiation must have a unique set of
match conditions. Two terms overlap, or conflict, if a packet can match both sets of
conditions—as a result, there are two different actions for the packet. You can ensure
that terms are unique by using the $junos-subscriber-ip-address variable as the
source-address (for an input filter) or destination-address (for an output filter) in the from
statement. You must then supply the source-address or destination-address condition,
as appropriate, as the first condition in the match-order statement.
Related • Fast Update Filter Actions and Action Modifiers on page 293
Documentation
• Fast Update Filter Match Conditions on page 292
You can specify a precedence (from 0 through 255) for input and output filters within a
dynamic profile to force filter processing in a particular order. Setting a lower precedence
value for a filter gives it a higher precedence within the dynamic profile. Filters with lower
precedence values are applied to interfaces before filters with higher precedence values.
A precedence of zero (the default) gives the filter the highest precedence. If no precedence
is specified, the filter receives a precedence of zero (highest precedence). Filters with
matching precedence (zero or otherwise) are applied in random order.
If two different dynamic profiles include a fast update filter with the same name, the
match-order specification of the two filters must be identical. If the two filters are activated
on the same interface, the terms are added together.
The router includes the filter name in show firewall command results. The router also
creates unique names for filter terms and counters for the show firewall command.
When a fast update filter is created by the activation of a dynamic profile, the router
creates an interface-specific name for the filter. The name uses the following format,
which is also used for classic filters:
<filter-name>-<interface-name>.<subunit>-<direction>
For example, an input filter named httpFilter on interface ge-1/0/0.5 is named as follows
(in indicates an input filter and out indicates an output filter):
http-filter-ge-1/0/0.5–in
The router creates unique names for the filter terms and counters by appending the
session ID to all term and counter names. Terms that use the only-at-create statement
have a session-id of 0. Terms and counters use the following format:
<term-name>-<session-id>
<counter-name>-<session-id>
When creating and applying fast update filters, keep the following in mind:
• You cannot use the same fast update filter as both an input and output filter in the
same dynamic profile attached to an interface.
• Fast update filters must always include terms that permit DHCP traffic to pass. See
“Configuring Filters to Permit Expected Traffic” on page 294.
• You can add or remove both IPv4 and IPv6 filters with the same service activation or
deactivation.
• You can remove one filter type without impacting the other type of filter. For example,
you can remove IPv6 filters and leave the current IPv4 filters active.
• The match-order statement is required—you must explicitly state the order of the match
fields in a fast update filter. See “Configuring the Match Order for Fast Update Filters”
on page 291.
• The match-order statement uses an implied wildcard for conditions that you specify
in the statement. If you specify a condition that is not also configured in the from
specification of a filter term, the router considers that a wildcard for that condition.
• A filter term can have only a single value or range; however, you can configure multiple
terms to specify multiple ranges.
• Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
• Dynamically Attaching Statically Created Filters for a Specific Interface Family Type
on page 245
This section shows the basic fast update filter statement syntax. The first part of this
syntax provides the CLI statements to associate an input and output filter with a dynamic
profile. The second part of this syntax represents the configured input and output filters
associated to the dynamic profile. When a DHCP event occurs, the dynamic profile applies
the specified filters to the DHCP client interface on the router.
}
}
}
}
[edit dynamic-profiles profile-name]
firewall {
family family {
fast-update-filter filter-name {
[desired filter configuration]
}
fast-update-filter filter-name {
[desired filter configuration]
}
}
}
You configure a fast update filter in a dynamic profile—this enables you to use dynamic
variables in the filter configuration. After you configure fast update filters, you then use
the dynamic-profiles syntax to associate the filter with the subscriber interface.
[edit]
user@host# edit dynamic-profiles myProfile
2. Specify that you want to configure a firewall, and specify the family.
3. Specify that you want to configure a fast update filter and assign a name to the filter.
See “Configuring the Match Order for Fast Update Filters” on page 291.
6. Specify that you want to configure a term for the filter and assign the name to the
term. Configure the match conditions and actions for the term.
Related • Configuring the Match Order for Fast Update Filters on page 291
Documentation
• Configuring Terms for Fast Update Filters on page 293
• Associating Fast Update Filters with Interfaces in a Dynamic Profile on page 300
This example shows you how to configure a fast update filter that is an input filter that
counts the HTTP and non-HTTP packets from a subscriber. In the example, you use the
firewall stanza to create the filter and the interfaces stanza to attach the filter.
}
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet {
filter {
input httpFilter;
}
}
}
}
}
To create a fast update filter, you use the term statement to specify conditions that a
packet must have, and to specify the action the router performs when those conditions
exist in the packet.
Match Conditions
Match conditions specify characteristics that a packet must have—if the conditions exist
in the packet, the router then performs the specified action. You use the from keyword
in the term statement to specify match conditions for the filter. The packet must match
all conditions in the from specification for the action to be performed, which also means
that their order in the from specification is not important.
An individual condition in a from specification can contain a single value or range. You
can match a maximum of five match conditions in a filter.
“Fast Update Filter Match Conditions” on page 292 lists the match conditions you can use
in fast update filters.
NOTE: The router uses an implied wildcard for conditions that you include
in the match-order statement. If you include a condition that is not configured
in the from specification of a filter term, the router considers that a wildcard
for the condition.
For example, if you include the dscp condition in the match-order statement,
but do not configure a dscp value in the from specification of the filter term,
the router performs the action configured in the then specification of the filter
on all DSCP values.
Actions
Actions and action modifiers specify the operation the router performs when a particular
match condition exists in a packet. You use the then keyword in the term statement to
specify the actions to perform on packets whose characteristics match the conditions
specified in the preceding from specification.
Action modifiers are actions taken in addition to the specified action. You can configure
any combination of action modifiers. For the action or action modifier to take effect, all
conditions in the from specification must match. If you specify log as one of the actions
in a term, this constitutes a termination action; whether any additional terms in the filter
are processed depends on the traffic through the filter. The action modifier operations
carry a default accept action. For example, if you specify an action modifier and do not
specify an action, the specified action modifier is implemented and the packet is accepted.
“Fast Update Filter Actions and Action Modifiers” on page 293 lists the actions and action
modifiers you can use in fast update filters.
You must include the match-order statement to explicitly specify the order in which router
examines the match conditions. The router examines only those match conditions that
you include in the statement. You can match a maximum of five conditions.
If you use the same fast update filter in multiple dynamic profiles, you must
configure the same match order for all profiles.
To configure the order in which the router examines the match conditions of a fast update
filter:
3. Configure the match order for the match conditions in the filter. Use brackets to enclose
multiple match conditions.
destination-port number TCP or UDP destination port field. Can be a single number, a single
range, or one of the standard port synonyms.
dscp number Differentiated services code point. Can be a single number, a single
range, or the standard synonyms. IPv4 only.
protocol number IP protocol field. Can be a single number, a single range, or one of
the standard protocol synonyms. IPv4 only.
source-port number TCP or UDP source port field. Can be a single number, a single
range, or one of the standard protocol synonyms.
Actions
accept Accept the packet.
ignore-term Do not add this term to the filter. All match conditions and
actions are ignored.
Action Modifiers
count counter-name Increment the specified counter.
forwarding-class class Classify the packet into one of the following forwarding
classes: as, assured-forwarding, best-effort,
expedited-forwarding, or network-control.
loss-priority (high | medium-high | Set the loss priority level for packets.
medium-low| low)
A fast update filter consists of one or more terms. A term is made up of one or more
match conditions and the action to take when a packet matches the specified conditions.
3. Configure the match condition for the term. See “Fast Update Filter Match Conditions”
on page 292 for the supported match conditions for fast update filters.
4. Configure the action that the router takes when the match conditions are met. See
“Fast Update Filter Actions and Action Modifiers” on page 293 for the supported actions
for fast update filters.
5. (Optional) Configure the action modifiers that you want the router to take when the
match conditions are met. See “Fast Update Filter Actions and Action Modifiers” on
page 293 for the supported action-modifiers for fast update filters.
6. (Optional) Configure the term to be added only once, when the fast update filter is
first created.
You must explicitly configure your firewall filter to permit expected traffic, such as DHCP
traffic, to pass. Otherwise, the expected traffic is denied when the filter is applied to the
interface. This requirement applies to both classic and fast update filters.
The following example shows a fast update filter that might be used to accept DHCP
traffic. The actual filter you use depends on the expected traffic in your network.
In the example, the term allow-dhcp accepts all DHCP traffic from all source addresses.
The term also includes the only-at-create option to specify that the term is applied only
when the filter is first applied. The term sub-allow-dhcp includes the Junos OS predefined
variable $junos-subscriber-ip-address, which permits all subscriber-specific DHCP traffic.
firewall {
family inet {
fast-update-filter psf1 {
interface-specific;
match-order [ source-address destination-address protocol destination-port ];
term allow-dhcp {
only-at-create;
from {
source-address 0.0.0.0/32;
destination-address 255.255.255.255/32;
destination-port 67;
protocol udp;
}
then accept;
}
term sub-allow-dhcp {
from {
source-address $junos-subscriber-ip-address;
destination-address 192.168.1.2/32;
destination-port 67;
protocol udp;
}
then accept;
}
}
}
}
Related • Configuring the Match Order for Fast Update Filters on page 291
Documentation
• Configuring Terms for Fast Update Filters on page 293
A fast update filter can contain multiple terms, each with a variety of match conditions.
However, when you configure multiple terms in a filter, you must ensure that the terms
do not overlap, or conflict with each other. Two terms are considered to overlap when it
is possible for a packet to match all conditions of both terms. Because each term specifies
a different action for matches, the router cannot determine which action to take. When
terms overlap, a conflict error occurs and the session fails when the dynamic profile
attempts to apply the filter. The error log indicates the overlapping terms.
For example, using the sample configuration in the following Match-Order Example, the
router first examines the packet’s source-address, then the destination-address, and
finally the destination-port. As shown in the following table, the two terms in the filter do
not overlap because each term has a different destination-port specification. The router
then takes the appropriate filter action for the term that matches the destination-port
value of the packet.
NOTE: When you use ranges (for example, a range of values or a wildcard)
in terms, the ranges must not overlap—overlapping ranges create a conflict
error. However, you can configure a range in one term and an exact match in
another term. For example, in the following filter table, the wildcard
destination port value in term t3 does not overlap the destination port
specifications in terms t55 and t999 because the http and https values are
exact matches.
In the Implied Wildcard Example configuration, the router views the destination-port
condition in the match-order statement as an implied wildcard for term t3, because there
is no destination-port value configured in that term. As a result, the wildcard specifies
that for term t3 any destination-port value is accepted. The filter table appears as follows:
In the following filter configuration, traffic with a destination port of http matches term
t55 and traffic with a destination port of https matches term t999. Traffic with a
destination port other than http or https matches term t3, which is the implied wildcard.
count t3_cntr;
accept;
}
}
term t55 {
from {
source-address $junos-subscriber-ip-address;
destination-address 3.1.1.2/32;
destination-port http;
}
then {
count t55_cntr;
accept;
}
}
term t999 {
from {
source-address $junos-subscriber-ip-address;
destination-address 3.1.1.2/32;
destination-port https;
}
then {
count t999_cntr;
accept;
}
}
}
}
}
In the following filter configuration, the destination-port ranges in the two terms overlap.
Ports in the range from 50 through 80 match both term src0 and term src1, which each
specify different actions to take.
NOTE: You can configure a range in one term and an exact match in another
term. See the section, Using Implied Wildcards, for an example that uses a
wildcard for a match condition in one term and an exact match for the
condition in a second term.
In this filter configuration, the protocol specification in terms src21 and src22 use the
implied wildcard, which configures a range for each term. Because overlapping ranges
are not allowed, a conflict error results.
accept
accept
accept
• Configuring the Match Order for Fast Update Filters on page 291
After you configure the fast update filter, you reference the filter in the interfaces stanza
of a dynamic profile. When the dynamic profile instantiates a subscriber session, the
router applies the terms of the filter to the interface.
[edit]
user@host# edit dynamic-profiles myProfile
2. Specify the interface for the dynamic profile—use the dynamic interface variable.
4. Specify the family. Use inet if you are using IPv4 filters or inet6 for IPv6 filters.
Unicast RPF has two behavioral modes, strict and loose. When you configure unicast
RPF in a dynamic profile, strict mode is the default. In strict mode, unicast RPF checks
whether the source address of the incoming packet matches a prefix in the routing table,
and whether the interface expects to receive a packet with this source address prefix. In
loose mode, unicast RPF checks only whether the source address has a match in the
routing table. It does not check whether the interface expects to receive a packet from
a specific source address.
For both modes, when an incoming packet fails the unicast RPF check, the packet is not
accepted on the interface. Instead, unicast RPF counts the packet and sends it to an
optional fail filter, if present. The fail filter determines what further action is taken on the
packet. In the absence of a fail filter, the packet is silently discarded.
Related • Configuring Unicast RPF and Fail Filters in Dynamic Profiles for Subscriber Interfaces
Documentation on page 304
• For more detailed information about unicast RPF in general, see Configuring Unicast
RPF
This topic describes how to configure unicast RPF for subscriber interfaces in dynamic
profiles on MX Series routers.
[edit]
user@host# edit dynamic-profiles profile-name
Related • Configuring Unicast RPF and Fail Filters in Dynamic Profiles for Subscriber Interfaces
Documentation on page 304
• Example: Configuring Unicast RPF in a Dynamic Profile on MX Series Routers on page 305
Configuring Unicast RPF and Fail Filters in Dynamic Profiles for Subscriber Interfaces
This topic provides a summary of unicast RPF configuration for subscriber interfaces in
dynamic profiles on MX Series routers. Unicast RPF provides a way to reduce the effect
of denial-of-service attacks on IPv4 and IPv6 interfaces by checking the source IP address
against the routing table. Packets that do not match are silently discarded, unless an
optional fail filter is configured. The fail filter performs an additional check and directs
some action be taken on certain packets. Typical actions include logging the packets or
passing them even though they failed the RPF check.
NOTE: Although the fail filter is technically optional, for dynamic profiles in
a DHCP environment you must configure a filter to pass DHCP packets. By
default, the RPF check prevents DHCP packets from being accepted on
interfaces protected by the RPF check. The fail filter identifies the DHCP
packets and passes them on.
See “Configuring Unicast RPF in Dynamic Profiles for Subscriber Interfaces” on page 304.
2. (Optional) Create a fail filter to evaluate failed packets and perform further actions.
See “Configuring a Fail Filter for Unicast RPF in Dynamic Profiles for Subscriber
Interfaces” on page 305.
Related • Unicast RPF in Dynamic Profiles for Subscriber Interfaces on page 303
Documentation
• Example: Configuring Unicast RPF in a Dynamic Profile on MX Series Routers on page 305
Configuring a Fail Filter for Unicast RPF in Dynamic Profiles for Subscriber Interfaces
This topic describes how to configure a fail filter at the [edit firewall] hierarchy level that
can be optionally applied by unicast RPF for subscriber interfaces in dynamic profiles on
MX Series routers.
[edit]
user@host# edit firewall family inet filter filter-name
Related • Configuring Unicast RPF and Fail Filters in Dynamic Profiles for Subscriber Interfaces
Documentation on page 304
• Example: Configuring Unicast RPF in a Dynamic Profile on MX Series Routers on page 305
This example shows how to help defend the router ingress interfaces against
denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks by configuring
unicast reverse-path forwarding (RPF) on a customer-edge interface to filter incoming
traffic. Unicast RPF verifies the unicast source address of each packet that arrives on an
ingress interface where unicast RPF is enabled. Packets that fail verification are silently
discarded unless a fail filter performs some other action on them.
Requirements
This example uses the following software and hardware components:
• Configure the dynamic profile that you intend to use to apply the RPF check.
Overview
Large amounts of unauthorized traffic—such as attempts to flood a network with fake
service requests in a denial-of-service (DoS) attack—can consume network resources
and deny service to legitimate users. One way to help prevent DoS and distributed
denial-of-service (DDoS) attacks is to verify that incoming traffic originates from
legitimate network sources.
Unicast RPF helps ensure that a traffic source is legitimate (authorized) by comparing
the source address of each packet that arrives on an interface to the forwarding-table
entry for its source address. If the router uses the same interface that the packet arrived
on to reply to the packet's source, this verifies that the packet originated from an
authorized source, and the router forwards the packet. If the router does not use the
same interface that the packet arrived on to reply to the packet's source, the packet
might have originated from an unauthorized source, and the router discards the packet,
or passes it to a fail filter.
The fail filter enables you to set criteria for packets you want to be passed in spite of
failing the RPF check, such as DHCP packets, which are dropped by default.
On MX Series routers, you can configure unicast RPF in a dynamic profile to apply the
configuration to one or more subscriber interfaces. See Configuring Unicast RPF for more
information about the behavior and limitations of unicast RPF on MX Series routers.
In this example, you configure the router to protect against potential DoS and DDoS
attacks from the Internet perpetrated through IPv4 packets arriving on dynamically
created VLAN demux interfaces. The dynamic profile, vlan-demux-prof, establishes that
VLAN demux interfaces are automatically created for subscribers. Unicast RPF is enabled
on the dynamic interfaces by the rpf-check term.
By default, unicast RPF prevents Dynamic Host Configuration Protocol (DHCP) packets
from being accepted on interfaces to which it applies. When DHCP packets are discarded,
no new subscribers can be created by the dynamic profile. To enable interfaces to accept
DHCP packets, you must apply a fail filter that properly sorts through the packets that
fail the check and identifies the DHCP packets. In this example, you configure the
allow-dhcp term in the filter rpf-pass-dhcp. This term matches, counts, and accepts IPv4
packets that are destined for the DHCP port and any address. The default term drops all
other packets that fail the RPF check.
Configuration
To enable unicast RPF with a fail filter in a dynamic profile, perform these tasks:
• Configuring the Dynamic Profile to Apply RPF Checking to Dynamic VLAN Demux
Interfaces on page 307
• Configuring the RPF-Check Fail Filter on page 308
Configuring the Dynamic Profile to Apply RPF Checking to Dynamic VLAN Demux
Interfaces
CLI Quick To quickly configure the dynamic profile to apply unicast RPF to dynamically created
Configuration VLAN demux interfaces, copy the following commands, paste them in a text file, remove
any line breaks, and then copy and paste the commands into the CLI.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit dynamic-profiles vlan-demux-prof
2. Specify that the dynamic VLAN profile use the demux interface.
3. Specify that the dynamic profile applies the demux interface unit value to the
dynamic VLANs.
8. Configure unicast RPF and specify the fail filter that is applied to incoming packets
that fail the check.
CLI Quick To quickly configure the unicast RPF-check fail filter, copy the following commands,
Configuration paste them in a text file, remove any line breaks, and then copy and paste the commands
into the CLI.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit firewall]
user@host# edit family inet filter rpf-pass-dhcp
2. Define the filter term that identifies DHCP packets based on the DHCP destination
port, then counts and passes the packets.
3. Define the filter term that drops all other failed packets.
Results From configuration mode, confirm the unicast RPF configuration by entering the show
dynamic-profiles command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show dynamic-profiles
vlan-demux-prof {
interfaces {
demux0 {
unit "$junos-interface-unit" {
vlan-id "$junos-vlan-id";
demux-options {
underlying-interface "$junos-interface-ifd-name";
}
family inet {
unnumbered-address lo0.0;
rpf-check {
fail-filter rpf-pass-dhcp;
}
}
}
}
}
}
From configuration mode, confirm the fail filter configuration by entering the show firewall
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show firewall
family inet {
filter rpf-pass-dhcp {
term allow-dhcp {
from {
destination-address {
255.255.255.255/32;
}
destination-port dhcp;
}
then {
count rpf-dhcp-traffic;
accept;
}
}
term default {
then {
discard;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is correct, perform these tasks:
Action Verify that unicast RPF is enabled by using the show subscribers extensive command.
Meaning The IPv4 rpf-check Fail Filter Name field displays rpf-pass-dhcp, the name of the fail filter
applied by the dynamic profile for IPv4 packets failing the RPF check.
Related • Unicast RPF in Dynamic Profiles for Subscriber Interfaces on page 303
Documentation
• Configuring Unicast RPF and Fail Filters in Dynamic Profiles for Subscriber Interfaces
on page 304
• Firewall Filters and Enhanced Network Services Mode Overview on page 311
• Configuring a Filter for Use with Enhanced Network Services Mode on page 313
Under normal conditions, every firewall filter is generated in two different formats --
compiled and term-based. The compiled format is used by the routing engine (RE) kernel,
FPCs, and MS-DPs. The term-based format is used by MPCs. Compiled firewall filters
are duplicated for each interface or logical interface to which they are applied. Term-based
filters, instead of being duplicated, are referenced by each interface or logical interface.
When a combination of MPCs and any other cards populate a chassis, the creation of
both firewall filter file formats is necessary. In most networks, the creation of both filter
formats and any amount of duplication for compiled firewall filters has no effect on the
router. However, in subscriber management networks that include thousands of statically
configured subscriber interfaces, creating filters in multiple formats and duplicating those
filters for each interface can utilize a large portion of router memory resources. You can
use either Enhanced IP Network Services mode or Enhanced Ethernet Network Services
mode to improve the scaling and performance specific to routing filters in a subscriber
access network that uses statically configured subscriber interfaces.
In configurations where interfaces are created either statically or dynamically and firewall
filters are applied dynamically, you must configure the chassis network services to run
in enhanced mode. In configurations where interfaces are created statically and firewall
filters are applied statically, you must configure chassis network services to run in
enhanced mode and also configure each firewall filter for enhanced mode.
NOTE: Do not use enhanced mode for firewall filters that are intended for
control plane traffic. Control plane filtering is handled by the Routing Engine
kernel, which cannot use the term-based format of the enhanced mode filters.
Table 39 on page 312 shows the configuration options when determining enhanced
network services mode usage.
Table 39: Enhanced Network Services Mode and Firewall Filter Use Case Determination
Chassis Enhanced Mode Firewall Filter Enhanced
Interface and Filter Configuration Required Mode Required
To achieve significant resource savings for the router, combine chassis and filter enhanced
mode configuration as follows:
• When configuring static interfaces on the router, configure chassis network services
to run either Enhanced IP Network Services mode or Enhanced Ethernet Network
Services mode.
NOTE: Any firewall filters that are not configured for enhanced mode are
created in both compiled and term-based format, even if the chassis is
running one of the enhanced network services modes. Only term-based
(enhanced) firewall filters will be generated, regardless of the setting of
the enhanced-mode statement at the [edit chassis network-services]
hierarchy level, if any of the following are true:
• Flexible filter match conditions are configured at the [edit firewall family
family-name filter filter-name term term-name from] or [edit firewall filter
filter-name term term-name from] hierarchy levels.
• A match condition is configured that only works with MPC cards, such
as firewall bridge filters for IPv6 traffic.
WARNING: Any firewall filter meeting the previous criteria will not be
applied to the loopback, lo0, interface of DPC based FPCs. This means
that term-based (enhanced) filters configured for use on the loopback
interface of a DPC based FPC will not be applied. This will leave the RE
unprotected by that filter.
• Configuring a Filter for Use with Enhanced Network Services Mode on page 313
NOTE: You can configure enhanced mode firewall filters for only inet and
inet6 filter families.
For IPv4:
[edit]
user@host# edit firewall family inet filter filter-name
For IPv6:
[edit]
user@host# edit firewall family inet6 filter filter-name
See Example: Configuring and Applying a Simple Filter for a filter configuration example.
• Firewall Filters and Enhanced Network Services Mode Overview on page 311
To dynamically associate a service set to interfaces you include the service-set statement
with the input or output statement at the [edit dynamic-profiles profile-name interfaces
interface-name unit logical-unit-number family family service] hierarchy level.
To statically associate a defined service set with an interface, you include the service-set
statement with the input or output statement at the [edit interfaces interface-name unit
logical-unit-number family family service] hierarchy level.
Related • Associating Service Sets with Interfaces in a Dynamic Profile on page 315
Documentation
• Verifying and Managing Service Sets Information on page 316
After you configure a service set, you use a dynamic profile to dynamically associate the
service set with interfaces. You reference the filter in the interfaces stanza of a dynamic
profile. When the dynamic profile instantiates a subscriber session, the router applies
the terms of the filter to the interface.
[edit]
2. Specify the interface for the dynamic profile—use the dynamic interface variable.
4. Specify the family. Dynamic service sets are supported only on family inet (IPv4).
5. Specify the input and output service sets that you want to apply to the interface.
• CLI Explorer
You can deploy policers to enforce service level agreements limiting the input rate at the
edge, and at the boundary between domains, to guarantee an equitable deployment of
the service among the different domains. Policers determine whether each packet
conforms (falls within the traffic contract), exceeds (using up the excess burst capacity),
or violates (totally out of the traffic contract rate) the configured traffic policies, and
then sets the prescribed action.
Hierarchical policers rate-limit premium traffic separately from the aggregate traffic on
an interface as determined by different configured rates. You can use a hierarchical policer
to rate-limit ingress Layer 2 traffic at a physical or logical interface and apply different
policing actions based on whether the traffic or packets are classified for expedited
forwarding (EF) or for a lower priority, such as non-expedited forwarding (non-EF).
Hierarchical policing uses two token buckets, one for premium (EF) traffic and one for
aggregate (non-EF) traffic, as shown in Figure 24 on page 318.
g017301
non-EF Traffic
Aggregate Policer
• Premium policer—You configure the premium policer with traffic limits for high-priority
EF traffic only: a guaranteed bandwidth and a corresponding burst-size limit. EF traffic
is categorized as nonconforming when its average arrival rate exceeds the guaranteed
bandwidth and its average packet size exceeds the premium burst-size limit. For a
premium policer, the only configurable action for nonconforming traffic is to discard
the packets.
NOTE: You must configure the bandwidth limit of the premium policer at or
below the bandwidth limit of the aggregate policer. If the two bandwidth
limits are equal, then only non-EF traffic passes through the interface
unrestricted; no EF traffic arrives at the interface.
Ingress traffic is first classified into EF and non-EF traffic prior to applying a policer. EF
traffic is guaranteed the bandwidth specified as the premium bandwidth limit, while
non-EF traffic is rate-limited to the amount of aggregate bandwidth not currently
consumed by the EF traffic. Non-EF traffic is rate-limited to the entire aggregate
bandwidth only while no EF traffic is present.
Hierarchical policing uses two token buckets, one for aggregate (non-EF) traffic and one
for premium (EF) traffic. In Figure 24 on page 318, the premium policer policies EF traffic
and the aggregate policer polices non-EF traffic. In the sample configuration that follows,
the hierarchical policer is configured with the following components:
• Premium policer has a bandwidth limit set to 2 Mbps, burst-size limit set to 50 KB, and
nonconforming action set to discard packets.
• Aggregate policer has a bandwidth limit set to 10 Mbps, burst-size limit set to 100 KB,
and nonconforming action set to mark high PLP.
[edit]
user@host# show dynamic-profiles firewall
hierarchical-policer policer-agg-prem {
aggregate {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 100k;
}
then {
loss-priority high;
}
}
premium {
if-exceeding {
bandwidth-limit 2m;
burst-size-limit 50k;
}
then {
discard;
}
}
}
Non-EF traffic is metered to a bandwidth limit that ranges between 8 Mbps and 10 Mbps,
depending on the average arrival rate of the EF traffic. Bursts of non-EF traffic—non-EF
traffic that arrives at the interface at rates above the current limit for non-EF traffic—also
pass through the interface, provided that sufficient tokens are available in the 100 KB
bandwidth bucket. Aggregate traffic in excess of the currently configured bandwidth or
burst size are rate-limited using the action specified for the aggregate policer, which in
this example is set to a high PLP.
The premium traffic is policed by both the premium policer and aggregate policer.
Although the premium policer rate-limits the premium traffic, the aggregate policer
decrements the credits but does not drop the packets. The aggregate policer rate-limits
the non-premium traffic. Therefore, the premium traffic is assured to have the bandwidth
configured for premium, and the non-premium traffic is policed to the remaining
bandwidth.
After you define firewall filters and policers, you must apply them to take effect.
• You can apply the same firewall filter to multiple interfaces at the same time. By default
on MX Series routers, these filters aggregate their counters and policing actions when
those interfaces share a Packet Forwarding Engine. To override this behavior and make
each counter or policer function specific to each interface application, include the
interface-specific statement in the firewall filter.
Interface-specific filters are particularly useful for IPTV services where television services
are delivered using the IP suite over a packet-switched network instead of being
delivered through traditional satellite signal and cable television formats.
NOTE: When you define an interface-specific filter, you must limit the filter
name to no more than 52 bytes. Firewall filter names are restricted to 64
bytes in length and interface-specific filters have the specific-name
appended to them to differentiate their counters and policing actions. If
the automatically generated filter instance name exceeds this maximum
length, the system may reject the filter’s instance name.
• Alternatively, you can apply a policer to a logical interface either directly or indirectly
through a filter that references the policer function. By default, policers are term-specific.
Junos OS creates a separate policer instance when the same policer is referenced in
multiple terms of a firewall filter.
A logical interface policer (also known as an aggregate policer) can police the traffic
from multiple protocol families without requiring a separate instantiation of a policer for
each such family on the logical interface. You define a logical interface policer by including
the logical-interface-policer statement when defining the policer.
Related • Methods for Regulating Traffic by Applying Hierarchical Policers on page 317
Documentation
• Example: Configuring Hierarchical Policers to Limit Rates of Services in a Static
Environment on page 321
This example shows how to configure a hierarchical policer and apply the policer to
ingress Layer 2 traffic at a logical interface on an MX Series router.
Requirements
Before you begin, be sure that your environment meets the following requirements:
• The interface on which you apply the hierarchical policer is an interface hosted on an
MX Series router.
• No other policer is applied to the input of the interface on which you apply the
hierarchical policer.
• You are aware that, if you apply the hierarchical policer to logical interface on which
an input filter is also applied, the policer is executed first.
Overview
In this example, you configure a hierarchical policer and apply the policer to ingress Layer 2
traffic at a logical interface. Table 40 on page 322 describes the hierarchy levels at which
you can configure and apply hierarchical policers on logical and physical interfaces.
Hierarchical Policer
Hierarchically rate-limits Layer 2 ingress traffic for all protocol families. Cannot be applied to egress traffic, Layer 3 traffic, or at
a specific protocol level of the interface hierarchy. Supported on interfaces on Dense Port Concentrators (DPCs) in MX Series
routers.
Aggregate and premium policing Option A (physical interface)—Apply directly to Hierarchically rate-limit Layer 2
components of a hierarchical policer: Layer 2 input traffic on a physical interface: ingress traffic for all protocol
families and logical interfaces
[edit dynamic-profiles profile-name [edit dynamic-profiles profile-name interfaces] configured on a physical
firewall] interface-name { interface.
hierarchical-policer policer-name { layer2-policer {
aggregate { input-hierarchical-policer policer-name; Include the layer2-policer
if-exceeding { } configuration statement at the
bandwidth-limit bps; } [edit dynamic-profiles
burst-size-limit bytes; profile-name interfaces
} interface-name] hierarchy level.
then {
discard; NOTE: If you apply a
forwarding-class class-name; hierarchical policer at a physical
loss-priority supported-value; interface, you cannot also apply
} a hierarchical policer to any of
} the member logical interfaces.
premium {
if-exceeding { Option B (logical interface)—Apply directly to Hierarchically rate-limit Layer 2
bandwidth-limit bps; Layer 2 input traffic on a logical interface: ingress traffic for all protocol
burst-size-limit bytes; families configured on a specific
} [edit dynamic-profiles profile-name interfaces] logical interface.
then { interface-name {
discard; unit unit-number { Include the layer2-policer
} layer2-policer { configuration statement at the
} input-hierarchical-policer policer-name; [edit dynamic-profiles
} } profile-name interfaces
} interface-name unit unit-number]
} hierarchy level.
You apply the policer to the Gigabit Ethernet logical interface ge-1/2/0.0, which you
configure for IPv4 traffic. When you apply the hierarchical policer to the logical interface,
IPv4 traffic is hierarchically rate-limited. If you choose to apply the hierarchical policer
to physical interface ge-1/2/0, hierarchical policing applies to IPv4 traffic across the
logical interface as well.
Configuration
The following example requires you to navigate various levels in the configuration
hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode.
CLI Quick To quickly configure this example, copy the following configuration commands into a
Configuration text file, remove any line breaks, and then paste the commands into the CLI at the [edit]
hierarchy level.
Step-by-Step A dynamic profile is a set of characteristics, defined in a type of template, that you can
Procedure use to provide dynamic subscriber access and services for broadband applications. These
services are assigned dynamically to interfaces. A basic profile must contain a profile
name and have both an interface variable name (such as $junos-interface-ifd-name)
included at the [edit dynamic-profiles profile-name interfaces hierarchy level and logical
interface variable name (such as $junos-underlying-interface-unit or
$junos-interface-unit) at the [edit dynamic-profiles profile-name interfaces
variable-interface-name unit] hierarchy level.
[edit]
user@host# set dynamic-profiles basic-profile
or
4. Define the family address type (inet for IPv4) for the $junos-interface-unit variable.
Results Confirm the configuration of the dynamic profile by entering the show dynamic-profiles
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles
dynamic-profiles {
basic-profile {
interfaces {
"$junos-interface-ifd-name" {
unit "$junos-underlying-interface-unit" {
family inet;
}
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Step-by-Step Define the physical and logical interfaces for this hierarchical policer example.
Procedure
1. Configure the physical interface.
2. Configure the logical interface as unit 0 with its IPv4 (inet) protocol family interface.
NOTE: If you apply a Layer 2 policer to this logical interface, you must
configure at least one protocol family.
Results Confirm the configuration by entering the show dynamic-profiles basic-profile interfaces
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles basic-profile interfaces
ge-1/2/0 {
unit 0 {
family inet {
address 10.8.0.0/31;
}
}
}
Step-by-Step To configure a hierarchical policer as a filter action, you must first configure a firewall
Procedure filter.
1. Configure the family address type (inet for IPv4) for the firewall filter and specify
the filter name.
We recommend that you name the filter something that indicates the filter’s purpose.
2. To override the aggregation of the counters and policing actions and make each
counter or policy function specific to each interface application, include the
interface-specific statement in the filter.
Make each term name unique and represent what its function is.
4. In each firewall filter term, specify the conditions used to match components of a
packet.
Configure the first term to match IPv4 packets received through TCP with the IP
precedence field critical-ecp (0xa0) protocol, and apply the hierarchical policer as
a filter action.
5. Specify the actions to take when the packet matches all of the conditions in the
first term. Enable all hierarchical policers in one filter to share the same policer
instance in the Packet Forward Engine.
6. Configure the second term to match IPv4 packets received through TCP with the
IP precedence field internet-control (0xc0), and apply the hierarchical policer as a
filter action.
7. Specify the actions to take when the packet matches all of the conditions in the
second term.
[edit dynamic-profiles basic-profile firewall family inet filter inet-filter term match-ip2]
user@host# set then hierarchical-policer hp2-share
Results Confirm the configuration by entering the show dynamic-profiles basic-profile firewall
configuration command. If the command output does not display the intended
configuration, repeat the instructions in this procedure to correct the configuration.
[edit]
user@host# show dynamic-profiles basic-profile firewall
family inet {
filter hierarch-filter {
interface-specific;
term match-ip1 {
from {
precedence critical-ecp protocol;
protocol tcp;
}
then hierarchical-policer hp1-share;
}
term match-ip2 {
from {
precedence internet-control;
protocol tcp;
}
then hierarchical-policer hp2-share;
}
}
}
Step-by-Step Define forwarding classes referenced as aggregate policer actions. For hierarchical policers
Procedure to work, ingress traffic must be correctly classified into premium and non-premium
buckets. Some class-of-service (CoS) configuration is required because the hierarchical
policer must be able to separate premium/expedited forwarding (EF) traffic from
non-premium/non-EF traffic.
[edit]
user@host# set class-of-service forwarding-classes
2. Define CoS forwarding classes to include the designation of which forwarding class
is premium. This defaults to the forwarding class associated with EF traffic.
Results Confirm the configuration of the forwarding classes referenced as aggregate policer
actions by entering the show class-of-service configuration command. If the command
output does not display the intended configuration, repeat the instructions in this
procedure to correct the configuration.
[edit]
user@host# show class-of-service
forwarding-classes {
class fc0 queue-num 0 priority high policing-priority premium;
class fc1 queue-num 1 priority low policing-priority normal;
class fc2 queue-num 2 priority low policing-priority normal;
class fc3 queue-num 3 priority low policing-priority normal;
}
Step-by-Step Configure the aggregate and premium policing components of a hierarchical policer.
Procedure
1. Enable configuration of the hierarchical policer.
2. Configure the aggregate policer to have a bandwidth limit set to 10 Mbps, burst-size
limit set to 100 KB, and nonconforming action set to change the forwarding class
to fc1.
3. Configure the premium policer to have a bandwidth limit set to 2 Mbps, burst-size
limit set to 50 KB, and nonconforming action set to discard packets.
NOTE: The bandwidth limit for the premium policer must not be greater
than that of the aggregate policer. For the premium policers, the only
configurable action for a packet in a nonconforming traffic flow is to
discard the packet.
Results Confirm the configuration of the hierarchical policer by entering the show dynamic-profiles
basic-profile firewall configuration command. If the command output does not display
the intended configuration, repeat the instructions in this procedure to correct the
configuration.
[edit]
user@host# show dynamic-profiles basic-profile firewall
hierarchical-policer policer-agg-prem {
aggregate {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 100k;
}
then {
forwarding-class fc1;
}
}
premium {
if-exceeding {
bandwidth-limit 2m;
burst-size-limit 50k;
}
then {
discard;
}
}
}
Step-by-Step You can apply policers directly to an interface or applied through a filter to affect only
Procedure matching traffic. In most cases, you can invoke a policing function at ingress, egress, or
in both directions.
• For physical interfaces, a hierarchical policer uses a single policer instance to rate-limit
all logical interfaces and protocol families configured on a physical interface, even if
the logical interfaces have mutually exclusive families such as inet or bridge.
• For logical interfaces, a hierarchical policer can police the traffic from multiple protocol
families without requiring a separate instantiation of a policer for each such family on
the logical interface.
To hierarchically rate-limit Layer 2 ingress traffic for IPv4 traffic on logical interface
ge-1/2/0.0, reference the policer from the logical interface configuration.
When you apply a policer to Layer 2 traffic at a logical interface, you must define at
least one protocol family for the logical interface.
Alternatively, to hierarchically rate-limit Layer 2 ingress traffic for all protocol families
and for all logical interfaces configured on physical interface ge-1/2/0, reference
the policer from the physical interface configuration.
Results Confirm the configuration of the hierarchical policer by entering the show dynamic-profiles
basic-profile interfaces configuration command. If the command output does not display
the intended configuration, repeat the instructions in this procedure to correct the
configuration.
[edit]
user@host# show dynamic-profiles basic-profile interfaces
ge-1/2/0 {
unit 0 {
layer2-policer {
input-hierarchical-policer policer-agg-prem;
}
family inet {
address 10.8.0.0/31;
}
}
}
Verification
Confirm that the configuration is working properly.
Action Use the show interfaces operational mode command for physical interface ge-1/2/0, and
include the detail or extensive option.
0 0 0 0
1 0 0 0
2 0 0 0
3 0 0 0
4 0 0 0
5 0 0 0
6 0 0 0
7 0 0 0
Autonegotiation information:
Negotiation status: Incomplete
Packet Forwarding Engine configuration:
Destination slot: 0 (0x00)
CoS information:
Direction : Output
CoS transmit queue Bandwidth Buffer Priority
Limit
% bps % usec
0 best-effort 95 950000000 95 0 low
none
3 network-control 5 50000000 5 0 low
none
Interface transmit statistics: Disabled
Meaning The command output section for Traffic statistics lists the number of bytes and packets
received and transmitted on the interface.
Purpose Verify the number of packets evaluated by the policer. Premium policer counters are not
supported.
Action Use the show policer operational mode command and optionally specify the name of
the policer policer-agg-prem. The command output displays the number of packets
evaluated by the specified policer in each direction.
The -inet-i suffix denotes a policer applied to IPv4 input traffic. In this example, the policer
is applied to input traffic only.
Meaning The command output displays the number of packets evaluated by the specified policer
in each direction.
Related • Methods for Regulating Traffic by Applying Hierarchical Policers on page 317
Documentation
• Hierarchical Policer Applied as Filter Action on page 320
NOTE: The router creates unique names for fast update filters and for filter
terms and counters. See Naming Fast Update Filters in “Fast Update Filters
Overview” on page 284 for information.
• CLI Explorer
You can use the enhanced policer statistics to analyze traffic for debugging purposes on
MPC/MIC interfaces on MX Series routers and Multi-Rate Ethernet Enhanced Queuing
IP Services DPC with SFP and XFP.
• OOS packet statistics for packets that are marked out-of-specification by the policer.
Changes to all packets that have out-of-specification actions, such as discard, color
marking, or forwarding-class, are included in this counter.
• Transmitted packet statistics for traffic that is not discarded by the policer. When the
policer action is discard, the statistics are the same as the within-specification statistics;
when the policer action is non-discard (loss-priority or forwarding-class), the statistics
are included in this counter.
The Internet Group Management Protocol (IGMP) is a host to router signaling protocol
for IPv4 used to support IP multicasting. This protocol manages the membership of hosts
and routers in multicast groups. IP hosts use IGMP to report their multicast group
memberships to any immediately neighboring multicast routers. Multicast routers use
IGMP to learn, for each of their attached physical networks, which groups have members.
Subscriber access supports the configuration of IGMP within the dynamic profiles hierarchy.
By specifying IGMP statements within a dynamic profile, you can dynamically apply IGMP
configuration when a subscriber connects to an interface using a particular access
technology (DHCP), enabling the subscriber to access a carrier (multicast) network.
• Configuring IGMP
In an IPTV network, channel changes occur when a set-top box (STB) sends IGMP
commands that inform an upstream device (for example, a multiservice access node
[MSAN] or services router) whether to start or stop sending multicast groups to the
subscriber. In addition, IGMP hosts periodically request notification from the STB about
which channels (multicast groups) are being received.
You can implement IGMP in the subscriber management network in the following ways:
• Static IGMP—All multicast channels are sent to the MSAN. When the MSAN receives
an IGMP request to start or stop sending a channel, it adds the subscriber to the
multicast group and then discards the IGMP packet.
• IGMP Proxy—Only multicast channels currently being viewed are sent to the MSAN.
If the MSAN receives a request to view a channel that is not currently being forwarded
to the MSAN, it forwards the request upstream. However, the upstream device does
not see all channel change requests from each subscriber, limiting bandwidth control
options.
• IGMP Snooping—Only multicast channels currently being viewed are sent to the MSAN.
The MSAN forwards all IGMP requests upstream, unaltered, even if it is already receiving
the channel. The upstream device sees all channel change requests from each
subscriber. Using IGMP snooping enables the broadband services router to determine
the mix of services and the bandwidth requirements of each subscriber and adjust the
bandwidth made available to each service.
IGMP hosts (sources) also periodically verify that they are sending the correct traffic by
requesting that each client send information about what multicast groups it wants to
receive. The responses to this IGMP query can result in a substantial upstream traffic
burst.
IGMPv2 is the minimum level required to support IPTV, and is the most widely deployed.
Emerging standards specify IGMPv3.
This topic describes how to create a basic dynamic profile that enables DHCP clients to
dynamically access the multicast network.
2. Configure the necessary router interfaces that you want accessing DHCP clients to
use.
See DHCP Subscriber Interface Overview for information about the types of interfaces
you can use with dynamic profiles and how to configure them.
3. Ensure that the router is configured to enable communication between the client and
the RADIUS server.
See Specifying the Authentication and Accounting Methods for Subscriber Access.
4. Configure all RADIUS values that you want the profiles to use when validating DHCP
clients for access to the multicast network.
NOTE: The variable value is replaced by the name of the interface over
which the router received the DHCP message.
or
7. (Optional) Set the IGMP interface to obtain the IGMP version from RADIUS.
In this example, IGMP is configured for subscriber access using Junos OS predefined
variables.
Related • Configuring Dynamic DHCP Client Access to a Multicast Network on page 338
Documentation
The Multicast Listener Discovery (MLD) Protocol manages the membership of hosts and
routers in multicast groups. IP version 6 (IPv6) multicast routers use MLD to learn, for
each of their attached physical networks, which groups have interested listeners. Each
router maintains a list of host multicast addresses that have listeners for each subnet,
as well as a timer for each address. However, the router does not need to know the
address of the listeners—just the address of the hosts. The router provides addresses to
the multicast routing protocol it uses; this ensures that multicast packets are delivered
to all subnets where there are interested listeners. In this way, MLD is used as the transport
for the Protocol Independent Multicast (PIM) protocol.
Subscriber access supports the configuration of MLD within the dynamic profiles hierarchy
for dynamically created interfaces. By specifying MLD statements within a dynamic
profile, you can dynamically apply MLD configuration when a subscriber connects to an
interface using a particular access technology (DHCP), enabling the subscriber to access
a carrier (multicast) network.
HTTP request traffic from subscribers is aggregated from access networks onto a
Broadband Remote Access Server (B-RAS) router, where HTTP traffic can be intercepted
and redirected to a captive portal. A captive portal provides authentication and
authorization services for redirected subscribers before granting access to protected
servers outside of a walled garden. A walled garden defines a group of servers where
access is provided to subscribers without reauthorization through a captive portal. You
can use a captive portal page as the initial page a subscriber sees after logging in to a
subscriber session and as a page used to receive and manage HTTP requests to
unauthorized Web resources.
The HTTP redirect service implements a data handler and a control handler and registers
them with service rules applicable to the HTTP applications. These rules are parsed by
the captive-portal-content-delivery process on the routing engine. The data handler
applies the rules to HTTP data flows and handles rewriting the IP destination address
or sending an HTTP 302 response with a preconfigured redirect URL. In addition, the
control handler maintains a connection with the captive-portal-content-delivery process
on the routing engine to learn configuration changes, such as the redirect URL and the
rewrite IP destination and port pair. To achieve faster performance, the control handler
maintains a cache of relevant configured entities, such as URLs on Multiservices DPC.
• Walled garden as a service filter–HTTP traffic destined to servers within the walled
garden does not flow to Multiservices DPC. However, any HTTP traffic destined outside
of the walled garden flows to the Multiservices DPC.
• Walled garden as an HTTP policy term–All HTTP traffic flows to the Multiservices
DPC. The HTTP service handler determines whether traffic is allowed to go to a walled
garden.
• HTTP request packet–If the flow is destined to servers within the walled garden, no
action is taken.
An HTTP redirect service can be attached to either a static or dynamic interface. For
dynamic subscriber management, HTTP services can be attached dynamically at
subscriber login or by using a change of authorization (CoA).
Redundant multiservice PIC and DPC support for HTTP redirect distributes captive portal
content delivery rules to both PICs to leverage all framework support (for IPv4 only).
Data traffic is sent only to the active PIC and rule processing is performed on the active
PIC.
You can use the remote HTTP redirect feature in configurations where the redirect server
resides outside of the router and on a policy server, such as Session and Resource Control
(SRC).
An HTTP redirect remote server that resides in a walled garden behind routers processes
HTTP requests redirected to it and responds with a redirect URL to a captive portal. When
you use a remote HTTP redirect server, you need to configure an HTTP service rule to
rewrite the IP-DA of the incoming HTTP requests on the service router so that the requests
reach the remote HTTP redirect server before being redirected to a captive portal.
The following general sequence occurs during access configuration for a remote HTTP
redirect server deployment:
2. RADIUS authenticates the subscriber and sends a service activate (IP-DA rewrite),
which redirects traffic to the redirect policy server in a walled garden.
4. The router first redirects the HTTP traffic to SRC, which redirects it to the captive
portal.
9. SRC checks the subscriber database and formulates a policy to allow the subscriber
access to the content server.
10. SRC sends the policy directly to the router or notifies the RADIUS server, which in turn
sends a change of authorization (CoA) to the router.
11. The router attaches the new policy, overriding the initial IP-DA write.
You can use the local HTTP redirect feature in configurations where the redirect server
resides locally on the router.
An HTTP redirect local server that resides locally on a router processes HTTP requests
redirected to it and responds with a redirect URL to a captive portal. You can implement
the local server as a service within a service set, which provides more scalability and
better performance. When you use a local HTTP redirect server, you need to configure
an HTTP service rule to redirect HTTP requests to a captive portal within a walled garden.
The following general sequence occurs during access configuration for a local HTTP
redirect server deployment:
2. RADIUS authenticates the subscriber and sends a service activate (HTTP redirect),
which redirects HTTP traffic to the captive portal in a walled garden.
4. The subscriber’s HTTP traffic is redirected to the captive portal by the router.
Requirements
Before you begin:
1. Configure the connection between the redirect server and the JUNOS router by
configuring policies on the controller.
2. On the controller, configure a policy that includes the following policy actions to define
which traffic to send to the redirect server:
• An HTTP redirect policy action to specify the URL to receive packets identified in
the exception application action.
Overview
In this example, you configure a walled garden with services and policies.
Configuration
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit chassis]
fpc 1 {
pic 0 {
adaptive-services {
service-package {
extension-provider {
control-cores 1;
data-cores 7;
object-cache-size 1024;
policy-db-size 64;
package jservices-cpcd;
syslog {
daemon any;
external any;
}
}
}
}
}
}
[edit interfaces]
ge-0/0/1 {
vlan-tagging;
unit 1 {
vlan-id 100;
family inet {
address 100.20.1.1/24;
}
}
}
policy-options {
prefix-list google {
74.125.19.0/24;
}
}
firewall {
family inet {
service-filter walled {
term google {
from {
destination-prefix-list {
google;
}
}
then skip;
}
term http {
from {
destination-port [ 80 8080 ];
}
then service;
}
term skip {
then skip;
}
}
service-filter fromSRC {
term SRC {
from {
source-address {
10.1.2.3/32;
}
source-port 8800;
}
then service;
}
term skip {
then skip;
}
}
}
}
services {
captive-portal-content-delivery {
rule test {
match-direction input;
term t1 {
then {
rewrite;
}
}
}
profile ipda-rewrite {
cpcd-rules test;
ipda-rewrite-options {
destination-address 10.1.2.3;
destination-port 8800;
}
}
traceoptions {
file cpcdd;
flag all;
}
}
service-set sset1 {
captive-portal-content-delivery-profile ipda-rewrite;
interface-service {
service-interface ms-1/0/0;
}
}
stateful-firewall {
rule Rule1 {
match-direction input-output;
term 1 {
from {
applications [ junos-icmp-all junos-dhcp-server junos-tftp junos-http ];
}
then {
accept;
}
}
term 2 {
from {
applications SRC;
}
then {
accept;
}
}
}
}
}
applications {
application SRC {
protocol tcp;
destination-port 8800;
}
}
Results From configuration mode, confirm your configuration by entering the show services
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
For brevity, this show services command output includes only the configuration that is
relevant to this example. Any other configuration on the system has been replaced with
ellipses (...).
[edit]
user@host# show services captive-content-delivery
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Purpose View information and statistics for the HTTP redirect configuration.
Service filters are configured under the firewall and are not specific to captive portal
content delivery. The following example shows a walled garden with one server, which
is the captive portal:
service-filter walled-net {
term 2 {
from {
destination-prefix-list {
100.20.2.0/24; ## '100.20.2.0/24' is not defined
}
}
then skip;
}
}
HTTP service rule configuration resides under the services hierarchy and uses the captive
portal and content delivery (captive-portal-content-delivery) service. The following
example shows a walled garden configured as an HTTP service rule:
When a remote HTTP redirect server is used, you need to configure an HTTP service rule
to rewrite the IP-DA of incoming HTTP requests on the service router so that the requests
reach the remote HTTP redirect server before being redirected to a captive portal. If the
destination port is not specified, the default behavior is determined by the rewrite
configuration. If no rewrite configuration is available, the destination port is not rewritten.
The following example shows a configuration for IP-DA rewrite:
This example shows how to configure an HTTP redirect service and attach it to a static
interface.
Requirements
Before you begin:
• Configure the connection between the redirect server and the JUNOS router.
Overview
You can configure an HTTP redirect service set and attach it to a static interface using
either of these examples:
Configuration
• Configuring HTTP Redirect Service Using an Interface-Specific Filter on page 357
• Configuring HTTP Redirect Service Using a Next-Hop Method on page 360
• Results on page 363
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit chassis]
fpc 11 {
pic 1 {
adaptive-services {
service-package {
extension-provider {
control-cores 1;
data-cores 7;
object-cache-size 1024;
policy-db-size 64;
package jservices-cpcd;
syslog {
daemon none;
external none;
kernel none;
pfe none;
}
}
}
}
}
}
2. Configure the static interface, unit, and assign the VLAN ID. Also, define the redirect
filter and HTTP input and output service sets, and service filters.
[edit interfaces]
xe-0/0/1 {
unit 900 {
vlan-id 900;
family inet {
filter {
input redirect-in;
}
service {
input {
service-set http-redirect-sset service-filter http-redirect-sfilter;
}
output {
service-set http-redirect-sset;
}
}
}
}
}
3. Configure the service options by defining the interface-specific filter using multiple
walled garden destination addresses to direct traffic, and the service filter to redirect
HTTP traffic to servers inside the walled garden.
[edit firewall]
family inet {
filter redirect-in {
interface-specific;
term DNS {
from {
destination-port 53;
}
then {
accept;
}
}
term Wall-Garden {
from {
destination-address {
50.18.115.82/32;
108.162.204.216/32;
108.162.203.216/32;
54.241.3.103/32;
54.241.8.247/32;
198.41.186.31/32;
198.41.187.31/32;
}
}
then {
count Wall-Garden;
forwarding-class best-effort;
accept;
}
}
term HTTP {
from {
protocol tcp;
destination-port http;
}
then {
count HTTP;
forwarding-class best-effort;
accept;
}
}
term DROP_ALL {
then {
discard;
}
}
}
service-filter http-redirect-sfilter {
term 1 {
from {
source-address {
10.0.0.0/24;
}
destination-address {
A1.B1.C1.D1/32; # replace with your own IP address (server inside the walled
garden)
A2.B2.C2.D2/32; # replace with your own IP address (server inside the walled
garden)
A3.B3.C3.D3/32; # replace with your own IP address (server inside the walled
garden)
}
}
then skip;
}
term 2 {
from {
source-address {
10.0.0.0/24;
}
protocol tcp;
destination-port [ http 8080 ];
}
then {
count SVC-HTTP;
service;
}
}
term 3 { # this term will make the remaining traffic to be accept and not serviced
(not redirected)
then skip; # if the intention is to drop the remaining traffic, then this term must be
changed to discard.
}
4. Configure the service filter as a walled garden by defining a rule named redirect,
referencing the rule in a profile named http-redirect, configuring a service set named
http-redirect-sset that references the http-redirect captive portal content delivery
profile, and attaching the http-redirect service set to static interface ms-11/1/0.
[edit services]
captive-portal-content-delivery {
rule redirect {
match-direction input;
term 1 {
then {
redirect http://redirection-portal/redirection/;
}
}
}
profile http-redirect {
cpcd-rules redirect;
}
}
service-set http-redirect-sset {
captive-portal-content-delivery-profile http-redirect;
interface-service {
service-interface ms-11/1/0;
}
}
}
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Configure the service filter by defining a rule named redirect, referencing the rule in
a profile named http-redirect, configuring a service set named http-redirect-sset
that references the http-redirect captive portal content delivery profile, and attaching
the next-hop service set to inside-service-interface ms-11/1/0.1, and to
outside-service-interface ms-11/1/0.2.
[edit services]
captive-portal-content-delivery {
rule redirect {
match-direction input;
term REDIRECT {
then {
redirect http://redirection-portal/redirection/;
}
}
}
profile http-redirect {
cpcd-rules redirect;
}
}
service-set http-redirect-sset {
captive-portal-content-delivery-profile http-redirect;
next-hop-service {
inside-service-interface ms-11/1/0.1;
outside-service-interface ms-11/1/0.2;
}
}
[edit chassis]
fpc 11 {
pic 0 {
adaptive-services {
service-package layer-3;
}
}
pic 1 {
adaptive-services {
service-package {
extension-provider {
control-cores 1;
data-cores 7;
object-cache-size 1024;
policy-db-size 64;
package jservices-cpcd;
syslog {
daemon none;
external none;
kernel none;
pfe none;
}
}
}
}
}
}
3. Configure the interfaces used for subscriber traffic and define the interface VLAN
where any redirected traffic will arrive. Also, define the service options for redirect
filter, and inside and outside service domains.
NOTE: The values configured for the service options are shown for
example only. You must configure and provision appropriate values as
per the requirement.
[edit interfaces]
xe-0/0/1 {
unit 900 { <<<<<<<<<<< interface.vlan where the traffic that must be redirected
will arrive
[edit firewall]
family inet {
filter FF_CPCD_REDIRECT_OUTPUT {
interface-specific;
term One {
then {
count back-to-default;
}
}
}
filter FF_HTTP_REDIR_IN {
interface-specific;
term ACCEPTED_PREFIXES {
from {
prefix-list {
User-PRIVATE-Blocks-01;
}
}
then next term;
}
term HTTP {
from {
protocol tcp;
destination-port http;
}
then {
count http;
forwarding-class best-effort;
}
}
}
}
5. Configure the policy option and statement to use a private blocks prefix list for the
source address, for example, 10.0.0.0/24.
[edit policy-options]
policy-statement User-PRIVATE-Blocks-01 {
10.0.0.0/24;
}
Results
From configuration mode, confirm your configuration and display the current operational
state of all captive portal interfaces by entering the show services captive-content-delivery
command using various options. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that HTTP redirect services have been configured correctly, perform these
tasks:
Purpose View information and statistics for the HTTP redirect configuration.
A dynamic service attachment uses a dynamic profile. In the following dynamic profile
example, the name of the service set can be populated dynamically for each subscriber
at instantiation time. This dynamic profile encapsulates a service attachment point
associated with a statically preprovisioned service set sset-1.
dynamic-profiles {
profile prof-2 { # parameterized service attachment
interfaces {
$junos-interface-ifd-name {
unit $junos-interface-unit {
family inet {
service {
input {
service-set $junos-service-set service-filter $junos-service-filter;
post-input-filter $junos-post-input-filter ;
}
output {
service-set $junos-service-set;
}
}
}
}
}
}
}
}
To handle scalability more efficiently, in the following example the name of the service
set can be populated dynamically for each subscriber at instantiation time.
dynamic-profiles {
profile prof-2 { # parameterized service attachment
interfaces {
$junos-interface-ifd-name {
unit $junos-interface-unit {
family inet {
service {
input {
service-set $junos-service-set service-filter $junos-service-filter;
post-input-filter $junos-post-input-filter ;
}
output {
service-set $junos-service-set;
}
}
}
}
}
}
}
}
dynamic-profiles {
profile prof-1 {
interfaces {
$junos-interface-ifd-name {
unit $junos-interface-unit {
family inet6 {
service {
input {
service-set sset-1 service-filter fltr-1;
post-input-filter pfltr-1 ;
}
output {
service-set sset-1 service-filter fltr-1;
}
}
}
}
}
}
}
}
Requirements
• Multiservices DPC PIC
Overview
This procedure shows how to configure an DA rewrite rule. The destination port is not
specified and the default behavior is determined by the rewrite configuration. If no rewrite
configuration is available, the destination port is not rewritten.
Configuration
4. Specify the actions to take if the packet matches all the conditions in that term:
Results Confirm the configuration by entering the show services configuration command. If the
command output does not display the intended configuration, repeat the instructions in
this procedure to correct the configuration.
match-direction input-output
term 1 {
from {
applications junos-http;
}
then {
rewrite destination-address 2001:2002::1; # this is the remote redirect server.
}
}
}
The following example shows the configuration for an IPv6-DA rewrite service rule.
Because the destination port is not specified, the default behavior is determined by the
rewrite configuration. If no rewrite configuration is available, the destination port is not
rewritten.
Verification
Requirements
• Multiservices DPC PIC
Overview
This procedure shows how to configure redundant multiservice support.
Configuration
[edit services]
user@host# set service-interface rms0
[edit interfaces]
user@host# set ge-1/0/0 unit 100
show redundancy-options
redundancy-options {
primary ms-2/1/0;
secondary ms-3/1/0;
hot-standby;
}
unit 0 {
family inet;
}
Confirm the service set attachment by entering the show show vlan-id configuration
command.
output {
service-set sset10;
}
}
address 192.1.4.1/24;
}
Verification
Subscriber secure policy enables you to mirror traffic on a per-subscriber basis. You can
mirror the content of subscriber traffic as well as monitor events related to the subscriber
session that is being mirrored.
Subscriber secure policy mirroring can be based on information provided by either RADIUS
or Dynamic Tasking Control Protocol (DTCP), and can mirror both IPv4 and IPv6 traffic.
Configuration of subscriber secure policy mirroring is independent of the actual mirroring
session—you can configure the mirroring parameters at any time. Also, you can use a
single RADIUS or DTCP server to provision mirroring operations on multiple routers in a
service provider’s network. To provide security, the ability to configure, access, and view
the subscriber secure policy components and configuration is restricted to authorized
users.
After subscriber secure policy is triggered, both the subscriber incoming and outgoing
traffic are mirrored. The original traffic is sent to its intended destination and the mirrored
traffic is sent to a mediation device for analysis. The actual mirroring operation is
transparent to subscribers whose traffic is being mirrored. A special UDP/IP header is
prepended to each mirrored packet sent to the mediation device. The mediation device
uses the header to differentiate multiple mirrored streams that arrive from different
sources.
To enable and use subscriber secure policy, you must install and properly configure the
Subscriber Secure Policy license.
• License Enforcement
Subscriber secure policy runs on the radius-flow-tap service. This topic describes the
steps to configure radius-flow-tap support for RADIUS-initiated and DTCP-initiated
subscriber secure policy mirroring.
1. Configure the flow-tap service used for subscriber secure policy mirroring.
[edit services]
user@host# edit radius-flow-tap
If a currently used tunnel interface is deleted from the pool of interfaces, the active
mirroring sessions are redistributed from the deleted interface to other tunnel interfaces
in the pool. Also, when a new tunnel interface is added into the pool, the service adds
the new interface to the list of interfaces available for new mirroring sessions or for
existing sessions transferred from a failed interface.
3. Specify the source IP address that the radius-flow-tap service uses for mirroring. This
address is used in the IP header prepended to mirrored packets that are sent to the
content destination device.
4. (Optional) Specify the forwarding class that is applied to the mirrored packets sent
to the mediation device.
If you do not specify a forwarding class, mirrored packets inherit the forwarding class
from the original packet (which is the forwarding class set by default classification
that CoS applies to the packet on the ingress interface).
5. (Optional) Specify the lawful intercept policy that determines what traffic, if any, is
not sent to the mediation device.
You can add or change a lawful intercept policy any time, but a changed policy does
not apply to a currently enabled policy. To change a policy, add a policy with a new
name, use DTCP DISABLE to turn off the current policy, and use DTCP ENABLE to
point to the new policy name.
RADIUS-initiated mirroring creates secure policies based on RADIUS VSAs and uses
RADIUS attributes to identify the subscriber whose traffic is to be mirrored. Mirroring is
initiated without regard to the subscriber location, router, interface, or type of traffic.
• Subscriber login—Mirroring starts when the subscriber logs in and the router receives
the trigger in a RADIUS Access-Accept message. Using triggers in RADIUS
Access-Accept messages enables you to mirror per-subscriber traffic without regard
to how often the subscriber logs in or out, or which router or interface the subscriber
uses.
• In-session—Mirroring starts when the router receives the trigger in a RADIUS change
of authorization request (CoA-Request) message. Using triggers in CoA-Request
messages enables you to immediately mirror traffic of a subscriber who is already
logged in.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using RADIUS on page 384
Documentation
• Configuring RADIUS-Initiated Subscriber Secure Policy Mirroring Overview on page 382
Before you configure subscriber secure policy traffic mirroring, note the following:
• The subscriber secure policy feature requires some system resources while mirroring,
encrypting, and sending traffic to the mediation device. For example, you might elect
to use a 10-Gigabit Ethernet interface for the tunnel to the mediation device if you
expect the amount of traffic you plan to mirror to approach 1 Gbps of actual user data.
1. Configure tunnel interfaces (vt interfaces) that are used to send mirrored content to
the mediation device.
See “Configuring Tunnel Interfaces for Subscriber Secure Policy Mirroring” on page 390.
2. Configure radius-flow-tap service support for secure subscriber policy. This support
includes optional forwarding-class information that the subscriber secure policy
service uses to send mirrored traffic to the content destination device.
See “Configuring Support for Subscriber Secure Policy Mirroring” on page 376.
3. Configure an access profile that specifies the RADIUS-related support for subscriber
secure policy on the router, including a list of one or more RADIUS authentication
servers. The router uses the list of specified servers for both authentication and dynamic
request operations. You must also configure the RADIUS dynamic request feature,
which provides the CoA message support used in-session traffic mirroring.
See “Configuring RADIUS Server Support for Subscriber Secure Policy Mirroring” on
page 383.
• The RADIUS record of the mirrored subscriber must include the RADIUS attributes
and VSAs required for subscriber secure policy mirroring. See “RADIUS Attributes
Used for Subscriber Secure Policy” on page 392 for descriptions of the supported
attributes used in RADIUS Accept-Accept and CoA messages.
See “Enabling Subscriber Secure Policy Mirroring for IPv4 Multicast Traffic” on page 396.
See “Configuring SNMPv3 Traps for Subscriber Secure Policy Mirroring” on page 411.
Related • RADIUS Attributes Used for Subscriber Secure Policy on page 392
Documentation
• Guidelines for Configuring Subscriber Secure Policy Mirroring on page 383
The subscriber secure policy service uses the radius-flow-tap service infrastructure.
When configuring subscriber secure policy mirroring, consider the following guidelines
regarding the relationship between subscriber secure policy service and the
radius-flow-tap service:
• The radius-flow-tap service [edit services radius-flow-tap] and the flow-tap service
[edit services flow-tap] cannot run simultaneously on the router. Therefore, flow-tap
and subscriber secure policy mirroring cannot run simultaneously on the same router.
• You can configure one instance of the radius-flow-tap service on the router. Subscriber
secure policy RADIUS-initiated mirroring and DTCP-initiated mirroring use the
radius-flow-tap service.
• If you delete the radius-flow-tap service all subscriber secure policy mirroring stops.
This topic describes how to configure support for the RADIUS server that initiates
subscriber-based traffic mirroring. You create an access profile to specify the RADIUS
server support.
To configure the router’s interaction with the RADIUS server in support of subscriber
secure policy mirroring:
[edit access]
user@host# edit profile profile-name
3. Specify the IP address of the RADIUS server that performs authentication. This server
also performs dynamic request (CoA) functions.
4. Specify the secret to use when communicating with the RADIUS server.
Figure 25 on page 384 shows the architecture of the RADIUS-initiated subscriber secure
policy mirroring environment.
Content Content
Intercept
Access Law
Point Enforcement
Agency
Service Law
g017564
Provider Enforcement
Domain Domain
Figure 26 on page 386 shows the interfaces involved in RADIUS-initiated secure subscriber
policy traffic mirroring.
Handover
Internal Network Interfaces (INI) Interfaces (HI)
RADIUS
server INI-1 HI-1
Mediation
INI-2 Device HI-2
INI-3 HI-3 Law
Intercept Enforcement
Access Agency
Point
Destination
Service Law
g017578
Provider Enforcement
Domain Domain
HI-1 Handover Interface 1—Administrative interface between the LEA and the service provider mediation device.
The LEA sends provisioning information to the mediation device on this interface.
HI-2 Handover Interface 2—Intercept-related information interface between the LEA and the mediation device
that is used to deliver intercept-related events to the LEA. These events can be subscriber session events
such as login, logout, and authentication.
HI-3 Handover Interface 3—Intercepted content Interface between the mediation device and LEA that is used
to deliver intercepted content to the LEA.
INI-1 Internal network Interface 1—Interface used to send intercept provisioning information from the mediation
device to the RADIUS server.
INI-2 Internal network interface 2—Interface used to send intercept-related events from the router to the
mediation device. This information is sent in SNMP traps.
INI-3 Internal network interface 3—Interface used to send intercepted content from the router to the mediation
device.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using RADIUS on page 384
Documentation
• RADIUS-Initiated Traffic Mirroring Process at Subscriber Login on page 388
Figure 27 on page 388 shows the process for a RADIUS-initiated subscriber mirroring
operation that is initiated when the mirrored subscriber logs in.
Handover
Internal Network Interfaces (INI) Interfaces (HI)
Destination
Service Law
g017566
Provider Enforcement
Domain Domain
1— The LEA sends provisioning information for 6—The IAP sends the original subscriber traffic
a subscriber whose traffic is to be mirrored to its intended destination.
over the HI-1 interface to the mediation
device.
2— The mediation device sends the provisioning 7— As subscriber-related events occur, the IAP
information over the INI-1 interface to the sends the events in SNMP traps over the
RADIUS server. INI-2 interface to the mediation device.
3— The subscriber logs in, requesting 8—The mediation device provides the events
authentication by the RADIUS server. over the HI-2 interface to the LEA.
4— The RADIUS server authenticates the 9—The IAP encapsulates the mirrored content
subscriber and sends an Access-Accept in a packet header and sends it over the
message containing mirroring-related INI-3 interface to the mediation device. The
RADIUS attributes in Juniper Networks VSAs IAP uses the destination IP address of the
to the IAP (the router). mediation device that it received in the
Access-Accept messaged from the RADIUS
server.
5— The IAP creates a subscriber secure policy 10—The mediation device sends mirrored
based on the mirroring VSAs and begins content over the HI-3 interface to the LEA.
mirroring the subscriber’s traffic.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using RADIUS on page 384
Documentation
• RADIUS-Initiated Traffic Mirroring Interfaces on page 386
Figure 28 on page 389 shows the process for a RADIUS-initiated subscriber mirroring
operation that is initiated after the subscriber has logged in.
Destination
Service Law
g017574
Provider Enforcement
Domain Domain
1— The subscriber logs in, requesting 6—The IAP sends the original subscriber traffic
authentication by the RADIUS server. The to its intended destination.
RADIUS server authenticates the subscriber
(no mirroring activity occurs).
2— The LEA sends provisioning information for 7— As subscriber-related events occur, the IAP
a subscriber whose traffic is to be mirrored sends the events in SNMP traps over the
over the HI-1 interface to the mediation INI-2 interface to the mediation device.
device.
3— The mediation device sends the provisioning 8—The mediation device provides events over
information over the INI-1 interface to the the HI-2 interface to the LEA.
RADIUS server.
4— The RADIUS server sends a CoA message 9—The IAP encapsulates the mirrored
containing the mirroring-related RADIUS subscriber content in a packet header and
attributes and VSAs to the IAP (the router). sends it to the mediation device over the
INI-3 interface. The IAP uses the destination
IP address that it received in the
Access-Accept messaged from the RADIUS
server.
5— The RADIUS CoA message initiates the 10—The mediation device sends mirrored
mirroring operation. The IAP creates the content over the HI-3 interface to the LEA.
subscriber secure policy based on the
mirroring VSAs and immediately begins
mirroring subscriber traffic.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using RADIUS on page 384
Documentation
• RADIUS-Initiated Traffic Mirroring Interfaces on page 386
The router, acting as the IAP, uses tunnel interfaces (vt interfaces) to send mirrored traffic
to the mediation device. The IAP equally distributes the mirrored traffic across the
available tunnel interfaces.
Because the MX Series 3D Universal Edge Routers do not support Tunnel Services PICs,
you create a pool tunnel interfaces on MX Series routers at the [edit chassis] hierarchy
level.
To configure a pool of tunnel interfaces for use by subscriber secure policy mirroring:
1. Access the chassis configuration, and specify the slot number of the DPC, MPC, or
MIC.
• On other MX Series routers, if two System Control Boards (SCBs), are installed, the
range is 0 through 11. If three SCBs are installed, the range is 0 through 5 and 7
through 11.
[edit chassis]
user@host# edit fpc 1
• On MX80 routers, if the FPC is 0, the PIC number can only be 0. If the FPC is 1, the
PIC range is 0 through 3.
3. Specify that the FPC and PIC are to be used for tunnel interfaces.
4. Specify the amount of bandwidth to reserve for tunnel traffic on each Packet
Forwarding Engine.
If you specify a bandwidth that is not compatible, tunnel services are not activated.
For example, you cannot specify a bandwidth of 1 Gbps for a Packet Forwarding Engine
on a 10-Gigabit Ethernet 4-port DPC.
To configure subscriber secure policy mirroring for IPv6 traffic, configure the tunnel
interfaces for both the inet and inet6 families.
[edit interfaces]
user@host# set vt-1/1/0 unit 0 family inet
user@host# set vt-1/1/0 unit 0 family inet6
Related • Configuring RADIUS-Initiated Subscriber Secure Policy Mirroring Overview on page 382
Documentation
• Configuring DTCP-Initiated Subscriber Secure Policy Mirroring Overview on page 398
Table 43 on page 392 lists the RADIUS VSAs that are associated with subscriber secure
policy. If these VSAs are present in the RADIUS Access-Accept message for a subscriber,
the action specified in the LI-Action attribute takes effect.
Mirroring VSAs that the RADIUS server sends to the router are salt-encrypted. Salt
encryption is a random string of data used to modify a password hash.
• 0 = stop mirroring
• 1 = start mirroring
• 2 = no action
Med-Dev-Handle
includes:
• Intercept-Identifier
• Acct-Session-ID
(optional)
If a subscriber is already logged in, Table 44 on page 393 lists the RADIUS attributes that
can be present in RADIUS CoA messages to identify the subscriber whose traffic is to
have a mirroring action applied (activation or deactivation).
[1] User-Name
[44] Acct-Session-ID
You can terminate RADIUS-initiated traffic mirroring sessions by the following action:
• RADIUS CoA message receipt—Terminated upon receipt of a CoA message with the
VSA 26-58 (LI-Action) value of 0. The RADIUS administrator configures the LI-Action
of 0 in the mirrored subscriber’s RADIUS record.
• Subscriber Secure Policy Support for IPv4 Multicast Traffic on page 395
• Enabling Subscriber Secure Policy Mirroring for IPv4 Multicast Traffic on page 396
IP multicast traffic is used for applications such as audio or video streaming, IPTV, video
conferencing, or online gaming. Multicast traffic is sent to multiple subscribers who have
joined a multicast group.
Secure subscriber policy allows for the mirroring of IPv4 multicast traffic sent to a specific
subscriber. If multiple subscribers whose traffic requires mirroring join the same multicast
session, the subscriber secure policy feature mirrors each subscriber’s traffic and forwards
it separately to the mediation device with the proper prepended header.
Mirroring of multicast traffic is supported only for subscribers in the default logical system.
You can enable and disable the mirroring of multicast traffic on a per-chassis basis. You
cannot enable or disable it on a per-subscriber basis.
To join a multicast group, a subscriber sends an IGMP join request, and it receives a reply.
The reply contains the multicast groups to which the subscriber is registered. Triggering
the mirroring of multicast traffic is based on the sending of the IGMP join request and the
information in the IGMP reply. If the subscriber’s unicast traffic is already being mirrored
either through DTCP-initiated or RADIUS-initiated traffic mirroring, and the subscriber
sends an IGMP join request, mirroring of multicast traffic sent to the subscriber is initiated.
The traffic being mirrored is based on the groups contained in the IGMP reply.
Related • Enabling Subscriber Secure Policy Mirroring for IPv4 Multicast Traffic on page 396
Documentation
This topic describes the steps to enable subscriber secure policy mirroring of IPv4 multicast
traffic. You can enable and disable IPv4 multicast intercept on a per chassis basis.
1. Configure the flow-tap service used for subscriber secure policy mirroring.
[edit services]
user@host# edit radius-flow-tap
Related • Subscriber Secure Policy Support for IPv4 Multicast Traffic on page 395
Documentation
• Configuring RADIUS-Initiated Subscriber Secure Policy Mirroring Overview on page 382
• Subscriber login—Mirroring starts on the specified interface when the subscriber logs
in. The DTCP ADD message must be sent to the router before the subscriber logs in.
• In-session—Mirroring starts for all subscribers that match the trigger supplied in the
DTCP ADD message when the router receives a DTCP ADD message.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using DTCP on page 400
Documentation
• Configuring DTCP-Initiated Subscriber Secure Policy Mirroring Overview on page 398
Before you configure subscriber secure policy traffic mirroring, note the following:
• The subscriber secure policy feature requires some system resources while mirroring,
encrypting, and sending traffic to the mediation device. For example, you might elect
to use a 10-Gigabit Ethernet interface for the tunnel and mediation device if you expect
the amount of traffic you plan to mirror to approach 1 Gbps of actual user data.
1. Configure tunnel interfaces that are used to send mirrored content to the mediation
device.
See “Configuring Tunnel Interfaces for Subscriber Secure Policy Mirroring” on page 390.
2. Configure the radius-flow-tap service support for secure subscriber policy. This support
includes configuring the tunnels and optional forwarding-class information that the
subscriber secure policy service uses to send mirrored traffic to the content destination
device.
See “Configuring Support for Subscriber Secure Policy Mirroring” on page 376.
3. Configure the mediation device as a user on the router. This user account allows the
router to receive DTCP messages from the mediation device.
See “Configuring the Mediation Device as a User on the Router” on page 420.
See “Configuring the Mediation Device to Provision Traffic Mirroring” on page 421.
See “Enabling Subscriber Secure Policy Mirroring for IPv4 Multicast Traffic” on page 396
See “Configuring SNMPv3 Traps for Subscriber Secure Policy Mirroring” on page 411.
This example shows how to configure traffic that is mirrored using DTCP-initiated
subscriber secure policy.
Requirements
• Juniper Networks MX Series routers.
Overview
This example drops all video on demand TCP traffic from subnet 10.0.0.0/8 to any
subscriber on which the policy named vod is enabled.
1. Create a policy.
2. Set up the policy to filter IPv4 or IPv6 traffic by source or destination address, or port,
protocol, or DSCP value.
4. Use the X-Drop-Policy with the ADD DTCP command to begin filtering traffic when
mirroring is triggered.
NOTE: To begin filtering traffic that is currently being mirrored, use the
X-Drop-Policy attribute with the new ENABLE DTCP command. To stop
filtering traffic that is currently being mirrored, use the X-Drop-Policy attribute
with the new DISABLE DTCP command.
Configuration
Step-by-Step To configure filtering mirrored traffic before it is sent to a mediation device:
Procedure
1. Specify that you want to configure radius-flow-tap.
[edit services]
user@host# edit radius-flow-tap
Results From configuration mode, confirm your configuration by entering the show services
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Figure 29 on page 401 shows the architecture of the DTCP-initiated subscriber secure
policy mirroring environment.
Provisioning Provisioning
Service Law
g017563
Provider Enforcement
Domain Domain
Collection The collection function is responsible for collecting intercepted content and
function identifying information from the delivery function.
Delivery function The delivery function delivers information that it receives from the access
function to the collection function.
Access function The access function has access to the intercept target’s traffic content and
intercept-related events. It is responsible for collecting this information and
sending it to the delivery function.
LEA Law enforcement agency. The LEA provides intercept targets to the service
provider who provisions the mediation device.
Mediation device The mediation device receives provisioning information from the LEA, and it
uses the information to send provisioning information to the IAP (the router).
IAP Intercept access point. In a subscriber access network the Juniper Networks
router is the IAP.
Using subscriber secure policies, the IAP intercepts traffic to and from the
subscriber whose traffic is being mirrored. It encapsulates the intercepted
content in a packet header and delivers it to the mediation device, while also
sending the traffic to the intended destination.
The IAP also sends intercept-related events to the mediation device using
SNMP traps.
Figure 30 on page 402 shows the interfaces involved in DTCP-initiated secure subscriber
policy traffic mirroring.
Handover
Internal Network Interfaces (INI) Interfaces (HI)
INI-1 HI-1
Mediation HI-2
INI-2 Device IRI
INI-3 HI-3 Law
Intercept Enforcement
Access Agency
Point
Destination
Service Law
g017577
Provider Enforcement
Domain Domain
Table 46 on page 403 describes the interfaces involved in DTCP-initiated secure subscriber
policy traffic mirroring.
HI-1 Handover Interface 1—Administrative interface between the LEA and the service provider mediation device.
The LEA sends provisioning information to the mediation device on this interface.
HI-2 Handover Interface 2—Intercept-related information interface between the LEA and the mediation device
that is used to deliver intercept-related events to the LEA. These events can be subscriber session events
such as login, logout, and authentication.
HI-3 Handover Interface 3—Intercepted content Interface between the mediation device and LEA that is used
to deliver intercepted content to the LEA.
INI-1 Internal network Interface 1—Interface used to send DTCP messages containing intercept provisioning
information from the mediation device to the router.
INI-2 Internal network interface 2—Interface used to send intercept-related events from the router to the mediation
device. This information is sent in SNMP traps.
INI-3 Internal network interface 3—Interface used to send intercepted content from the router to the mediation
device.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using DTCP on page 400
Documentation
• DTCP-Initiated Traffic Mirroring Process on page 404
Figure 31 on page 404 shows the process for a DTCP-initiated subscriber mirroring operation.
Handover
Internal Network Interfaces (INI) Interfaces (HI)
DTCP-over-SSH HI-1
2 1
INI-1 HI-2
5 Mediation 6
INI-2 Device HI-3
7 8
3 INI-3 Law
Intercept Enforcement
4 Agency
Access
Point
Destination
Service Law
g017565
Provider Enforcement
Domain Domain
1— The LEA sends provisioning information for 5— As intercept-related events occur, the IAP
a subscriber whose traffic is to be mirrored sends the events in SNMP traps over the
over the HI-1 interface to the mediation INI-2 interface to the mediation device.
device.
2— The mediation device sends a DTCP ADD 6—The mediation device provides the
message that contains provisioning intercept-related events over the HI-2
information over the INI-1 interface to the interface to the LEA.
IAP (the router).
3— The IAP creates a subscriber secure policy 7— The IAP sends the mirrored content to the
based on information in the DTCP ADD mediation device over the INI-3 interface.
message. If the IAP receives the DTCP ADD
before the subscriber logs in, mirroring
begins when the subscriber logs in. If the
router receives the DTCP ADD after the
subscriber logs in, mirroring begins when the
ADD message is received.
4— The IAP sends the original subscriber traffic 8—The mediation device sends mirrored
to its intended destination. content over the HI-3 interface to the LEA.
Related • Subscriber Secure Policy Traffic Mirroring Architecture Using DTCP on page 400
Documentation
• DTCP-Initiated Traffic Mirroring Interfaces on page 402
You can use DTCP to provision traffic mirroring on the router by sending DTCP messages
from the mediation device to the router.
• LIST—Requests information about sessions that are currently being mirrored. This
information is returned in a LIST response.
Table 47 on page 405 lists the DTCP attributes that you can use in DTCP ADD messages
to trigger traffic mirroring.
Table 47: DTCP Mirroring Triggers for Use in ADD Messages (continued)
Attribute Name DTCP Message Semantic Description
Table 47: DTCP Mirroring Triggers for Use in ADD Messages (continued)
Attribute Name DTCP Message Semantic Description
subscriber secure policy is not triggered. You need to select a traffic mirroring
trigger that matches only one of these sessions.
1. Account Session ID
2. Calling Station ID
3. IP Address
4. Interface Identifier
5. NAS Port ID
6. Remote Agent ID
Related • Packet Header for Mirrored Traffic Sent to Mediation Device on page 418
Documentation
• ADD DTCP on page 428
• Example: Using DTCP Messages to Trigger, Verify, and Disable Traffic Mirroring for
Subscribers on page 423
You can terminate DTCP-initiated traffic mirroring sessions by the following action:
You can use SNMPv3 traps to report intercept-related events to the mediation device.
These events include identifying information for subscribers, such as username or IP
address, and subscriber session events, such as login or logout events or mirroring session
activation or deactivation. The router sends the events to the mediation device in SNMP
traps. Using SNMPv3 provides secure traps that are visible only to authorized individuals
on the intended secure mediation device. The traps help support compliance with the
Communications Assistance for Law Enforcement Act (CALEA), which defines electronic
surveillance guidelines for telecommunications companies.
The supported SNMPv3 traps map to messages defined by the Lawfully Authorized
Electronic Surveillance (LAES) for IP Network Access, American Nation Standard For
Telecommunications. “SNMP Traps for Subscriber Secure Policy LAES Compliance” on
page 409 describes the supported SNMPv3 traps and their related LAES messages.
• SNMP Traps for Subscriber Secure Policy LAES Compliance on page 409
• Example: SNMPv3 Traps Configuration for Subscriber Secure Policy Mirroring on page 411
Table 48 on page 410 describes the SNMPv3 traps that subscriber secure policy mirroring
uses to provide information that maps to messages defined in the Lawfully Authorized
Electronic Surveillance (LAES) for IP Network Access, American National Standard for
Table 48: Subscriber Secure Policy SNMPv3 Traps for LAES Messages
SNMPv3 Trap LAES Message Description
To configure SNMPv3 trap support for subscriber secure policy and to send the trap
information to the mediation device:
2. Configure the trap notification and trap notification filter. See the following topics:
3. Configure the target device. The target device is the mediation device that receives
the trap information.
4. Configure the SNMPv3 user, authentication method and password, and privacy method
and password. See the following topics:
• SNMP Traps for Subscriber Secure Policy LAES Compliance on page 409
• Example: SNMPv3 Traps Configuration for Subscriber Secure Policy Mirroring on page 411
This example shows an SNMP configuration that provides SNMPv3 trap support.
Configure the SNMPv3 trap support at the [edit snmp] hierarchy level.
[edit snmp]
v3 {
usm {
local-engine {
user mediation-device1 { ## Name of the mediation device
authentication-md5 {
authentication-key "yourAuthentictaionKey"; ## SECRET-DATA
}
privacy-des {
privacy-key "YourPrivacyKey"; ## SECRET-DATA
}
}
}
}
target-address london-1 {
address 172.19.87.240; ## Address of the mediation device receiving the traps
port 162;
tag-list mediation-8;
target-parameters tp1;
}
target-parameters tpi {
parameters {
message-processing-model v3;
security-model usm;
security-level authentication;
security-name mediation-device1; ## Name of the mediation device
}
notify-filter nf1;
}
notify n1 {
type trap;
tag mediation-8;
}
notify-filter nf1 {
oid .1 include;
}
}
view system {
oid 1.3.6.1.2.1.1 include;
}
view all {
oid .1 include;
}
• SNMPv3 Overview
• Using the Packet Header to Track Subscribers on the Mediation Device on page 413
• Packet Header for Mirrored Traffic Sent to Mediation Device on page 418
• Configuring the Mediation Device as a User on the Router on page 420
• Configuring the Mediation Device to Provision Traffic Mirroring on page 421
• Configuring a DTCP-over-SSH Connection to the Mediation Device on page 421
When the router sends mirrored traffic to the mediation device, it encapsulates it in a
packet header. Figure 32 on page 413 is the mirrored packet header and payload that the
router sends to the mediation device.
g017764
Table 49 on page 414 describes the fields in the packet header of mirrored packets.
Table 49: Mirrored Packet Header and Payload Field Descriptions For the
Mediation Device
Field Value Length (Bits)
IP Header
Version 4 4
IHL 5 4
Type of Service 0 8
Protocol 17 8
UDP Header
Checksum 0 16
Table 49: Mirrored Packet Header and Payload Field Descriptions For the
Mediation Device (continued)
Field Value Length (Bits)
Mirror Header
Format of the Mirror Header Values Used to Track Subscribers and Subscriber Sessions
The packet header includes mirror header attributes that the mediation device can use
to track subscribers and subscriber sessions. The router creates values for these attributes
based on information that it receives from RADIUS. There are three mirror header
attributes in the packet header:
• V (mirror header value)—Used by the router to specify how the values of the Session
ID and Intercept ID are determined. The value received from RADIUS can be a 0 or a 1.
However, the value is always 0 in the packet header sent to the mediation device.
• Session ID—Used by the mediation device to identify the session of the mirrored
subscriber. The value is assigned to a subscriber session by the Junos OS. The Session
ID changes with each new session for a subscriber.
• Intercept ID—Used along with the Session ID by the mediation device to track a
subscriber across multiple login and logout events. The value is assigned to a subscriber
whose traffic is being intercepted. The Intercept ID is constant; it does not change as
a subscriber logs in and logs out of sessions.
The values of the Intercept ID and the Session ID are determined by the value that the
router receives in VSA 26-59. VSA 26-59 is declared as a hexadecimal string that can
be either 4 bytes or 8 bytes long. The mirror header value specifies whether a 4-byte
value or an 8-byte value is used to form the Intercept ID and the Session ID.
4-Byte Format
The 4-byte format allows you to manually specify the Intercept ID. The Session ID value
is automatically created based on the least significant 32 bits of the Acct-Session-ID
(RADIUS attribute 44).
To use the 4-byte format of VSA 26-59, you configure the first two most significant bits
of the VSA to a value of 1, which indicates a single word in the VSA. The remaining 30
bits of the word form the Intercept ID value.
For example, a value of 40000010 for VSA 26-59 configures the following fields in the
mirror header, as shown in Figure 33 on page 416:
• V=1
• Intercept ID = 0x10
8-Byte Format
The 8-byte format of VSA 26-59 enables you to manually specify the both the Session-ID
value and the Intercept ID value.
To use the 8-byte format, you configure the first two most significant bits of the first
word of the VSA to a value of 0, which indicates two words in the VSA. The remaining
30 bits of the first word form the Intercept ID value, and the second word is the Session-ID
field. You cannot change the order of these two words.
• V=0
• Intercept-ID = 0x300
• Session-ID = 0x90
g017765
Related • RADIUS-Initiated Subscriber Secure Policy Overview on page 381
Documentation
• Subscriber Secure Policy Traffic Mirroring Architecture Using RADIUS on page 384
When the router sends mirrored traffic to the mediation device, it encapsulates the
mirrored payload in a packet header before it sends the mirrored traffic to the mediation
device.
Figure 35 on page 418 is the mirrored packet header that the router sends to the mediation
device.
g017868
Table 50 on page 418 describes the fields in the packet header of mirrored packets.
IP Header
Version 4 4
IHL 5 4
Type of Service 0 8
Protocol 17 8
UDP Header
Checksum 0 16
Mirror Header
• Example: Using DTCP Messages to Trigger, Verify, and Disable Traffic Mirroring for
Subscribers on page 423
In order for the router to receive DTCP messages from the mediation device, you need
to configure the mediation device as a user on the router. To do so, create a login class
that provides flow-tap operation permission and then create a login account that uses
the login class.
1. Create the login class and configure flow-tap-operation permissions for the class.
[edit system]
user@host# edit login
To set up the mediation device to provision traffic mirroring on the router, use the following
DTCP messages:
For an example of how to use the DTCP messages, see “Example: Using DTCP Messages
to Trigger, Verify, and Disable Traffic Mirroring for Subscribers” on page 423.
Related • Configuring DTCP-Initiated Subscriber Secure Policy Mirroring Overview on page 398
Documentation
Related • Configuring DTCP-Initiated Subscriber Secure Policy Mirroring Overview on page 398
Documentation
• Example: Using DTCP Messages to Trigger, Verify, and Disable Traffic Mirroring for
Subscribers on page 423
• ADD DTCP
• DELETE DTCP
• DISABLE DTCP
• ENABLE DTCP
• LIST DTCP
Example: Using DTCP Messages to Trigger, Verify, and Disable Traffic Mirroring for
Subscribers
• Verify that traffic mirroring was stopped on the two subscriber interfaces.
X-JTap-Cdest-TTL: 64
X-Interface-Id: demux0.30010002 /*Used as trigger*/
X-MD-Intercept-Id: 0x0101010130010002
Flags: BOTH
Seq: 7
Authentication-Info: c16d2d9d1679facf0c4a66683af6114d341e4033
DTCP/0.7 200 OK
SEQ: 7
CRITERIA-ID: 2
TIMESTAMP: 2011-02-13 15:56:49.609
AUTHENTICATION-INFO: 4880de4b8cead98c95813fd9b95e240b107d4693
ADD DTCP/0.7
Csource-ID: dtcp1
Cdest-ID: cd1
Priority: 2
X-JTap-Cdest-Dest-Address: 192.0.40.168
X-JTap-Cdest-Dest-Port: 65535
X-JTap-Cdest-Source-Address: 198.15.0.10
X-JTap-Cdest-Source-Port: 50000
X-JTap-Cdest-TTL: 64
X-Interface-Id: demux0.30010001 /*Used as trigger*/
X-MD-Intercept-Id: 0x0101010130010001
Flags: STATIC
Seq: 8
Authentication-Info: dc3c55481a3810c7dd29fdc1b4681d978ff4e7c4
DTCP/0.7 200 OK
SEQ: 8
CRITERIA-ID: 3
TIMESTAMP: 2011-02-13 15:57:20.640
AUTHENTICATION-INFO: 4b31ef1311647e5ba52d2d5d4237b9e5beaa47b7
ADD DTCP/0.7
Csource-ID: ft-user1
Cdest-ID: cd1
Priority: 2
X-JTap-Cdest-Dest-Address: 1.1.1.2
X-JTap-Cdest-Dest-Port: 7899
X-JTap-Cdest-Source-Address: 2.2.2.9
X-JTap-Cdest-Source-Port: 12321
X-Username: testuser
X-MD-Intercept-Id: 55667789
Flags: STATIC
DTCP/0.7 200 OK
SEQ: 100
CRITERIA-ID: 1
DISABLE DTCP/0.8
Csource-ID: ft-user1
Cdest-ID: cd1
X-Drop-Policy: vod
Flags: STATIC
DTCP/0.7 200 OK
SEQ: 9
TIMESTAMP: 2011-02-13 15:57:47.667
CRITERIA-ID: 2
CSOURCE-ID: dtcp1
CDEST-ID: cd1
CSOURCE-ADDRESS: 10.10.4.224
FLAGS: BOTH
X-JTAP-CDEST-DEST-ADDRESS: 192.0.40.168
X-JTAP-CDEST-DEST-PORT: 65535
X-JTAP-CDEST-SOURCE-ADDRESS: 198.15.0.10
X-JTAP-CDEST-SOURCE-PORT: 50000
X-JTAP-CDEST-TTL: 64
X-INTERFACE-ID: demux0.30010002 /*subscriber interface*/
X-MD-INTERCEPT-ID: 0x0101010130010002
CRITERIA-NUM: 1
CRITERIA-COUNT: 0
CRITERIA-ID: 3
CSOURCE-ID: dtcp1
CDEST-ID: cd1
CSOURCE-ADDRESS: 10.10.4.224
FLAGS: BOTH
X-JTAP-CDEST-DEST-ADDRESS: 192.0.40.168
X-JTAP-CDEST-DEST-PORT: 65535
X-JTAP-CDEST-SOURCE-ADDRESS: 198.15.0.10
X-JTAP-CDEST-SOURCE-PORT: 50000
X-JTAP-CDEST-TTL: 64
X-INTERFACE-ID: demux0.30010001 /*subscriber interface*/
X-MD-INTERCEPT-ID: 0x0101010130010001
CRITERIA-NUM: 2
CRITERIA-COUNT: 2
AUTHENTICATION-INFO: 361171ccb24dde6afe8ef66021287f9b8ac16028
DTCP/0.7 200 OK
SEQ: 10
CRITERIA-COUNT: 1
TIMESTAMP: 2011-02-13 16:00:02.802
AUTHENTICATION-INFO: 2834ff32ec07d84753a046cfb552e072cc27d50b
DELETE DTCP/0.7
Csource-ID: dtcp1
CRITERIA-ID: 3
Flags: STATIC
Seq: 12
Authentication-Info: 7653fd94659a7183a990bdea654a1b97c0895348
DTCP/0.7 200 OK
SEQ: 12
CRITERIA-COUNT: 1
TIMESTAMP: 2011-02-13 16:01:35.895
AUTHENTICATION-INFO: 7cd8171057a327434e1b2d9b35f43b88305f9a74
ADD DTCP
Description Specify the DTCP attributes used in ADD messages to cause the router to trigger traffic
mirroring and provide instructions to populate fields in the encapsulation header for
packets sent to the mediation device.
The DTCP ADD message can be sent either before or after subscribers log in through the
interface.
The following attributes are added to the packet header of mirrored packets that the
router sends to the mediation device. These attributes are required in the DTCP ADD
message.
• X-JTap-Cdest-Dest-Address
• X-JTap-Cdest-Dest-Port
• X-MD-Intercept-Id
Priority: priority-number—This implementation of DTCP does not use the priority number.
Sample Output
ADD DTCP/0.7
Csource-ID: ft-user1
Cdest-ID: cd1
Priority: 2
X-JTap-Cdest-Dest-Address: 10.10.2.50
X-JTap-Cdest-Dest-Port: 7890
X-JTap-Cdest-Source-Address: 10.10.2.9
X-JTap-Cdest-Source-Port: 12321
X-Interface-Id: ge-0/0/2.1
X-MD-Intercept-Id: 55667788
Flags: STATIC
Seq: 1
Authentication-Info: c16d2d9d1679facf0c4a66683af6114d341e4033
DTCP/0.7 200 OK
SEQ: 7
CRITERIA-ID: 2
TIMESTAMP: 2011-02-13 15:56:49.609
DELETE DTCP
Description Disable traffic mirroring for a subscriber. Mirroring of the existing subscriber is stopped.
Options Csource-ID: user-name—Username on the router. This name must be configured on the
router.
CRITERIA-ID: criteria-id—ID that DTCP assigns for the mirrored session when you create
a DTCP ADD message. Use this ID in your DELETE messages to disable the intercept
for a specific subscriber. To view the ID, use the DTCP LIST message. The CRITERIA-ID
and the Cdest-ID are mutually exclusive in DELETE messages.
Cdest-ID: variable—ID of the mediation device. Use this ID in your DELETE messages to
remove all mirroring sessions associated with a mediation device. The Cdest-ID and
the CRITERIA-ID are mutually exclusive in DELETE messages.
Sample Output
The following sample shows how to disable mirroring for a specific subscriber by using
the CRITERIA-ID.
DELETE DTCP
DELETE DTCP/0.7
Csource-ID: dtcp1
CRITERIA-ID: 2
Flags: STATIC
Seq: 10
Authentication-Info: 7e84ae871b12f2da023b038774115bb8d955f17e
DTCP/0.7 200 OK
SEQ: 10
CRITERIA-COUNT: 1
TIMESTAMP: 2011-02-13 16:00:02.802
AUTHENTICATION-INFO: 2834ff32ec07d84753a046cfb552e072cc27d50b
DISABLE DTCP
Description Specify the DTCP ENABLE message to remove a drop policy that exists because of a
prior DTCP ADD or DTCP ENABLE command
The DTCP DISABLE message can only be issued on a Criteria-ID that was returned in a
response to a previous DTCP ADD. The policy applies to any new subscribers that match
the trigger corresponding to the Criteria-ID. Any existing mirroring remains in place, the
policy is not be applied to them.
X-Drop-Policy: variable—Name of the policy that determines which mirrored packets are
no longer sent to the mediation device.
Sample Output
DISABLE DTCP/0.7
Csource-ID: ft-user1
Criteria-ID: 1
X-Drop: T1
Flags: STATIC
Seq: 1
Authentication-Info: c16d2d9d1679facf0c4a66683af6114d341e4033
DTCP/0.7 200 OK
SEQ: 7
CRITERIA-ID: 2
TIMESTAMP: 2011-02-13 15:56:49.609
ENABLE DTCP
Description Specify the DTCP attributes used in ENABLE messages to cause the router to trigger a
drop policy if one does not already exist from a prior DTCP ADD or DTCP ENABLE
command.
The DTCP ENABLE message can only be issued on a Criteria-ID that was returned in a
response to a previous DTCP ADD command. The policy applies to any new subscribers
who match the trigger corresponding to the Criteria-ID. Any existing mirroring remains in
place and the policy is not be applied to them. The DTCP ENABLE command stops only
the traffic that is identified by the specified policy from being sent to the mediation device.
Criteria-ID: variable—Value returned from a prior DTCP ADD that identifies the trigger on
which to disable this drop policy.
X-Drop-Policy: variable—Name of the policy that determines which mirrored packets are
no longer sent to the mediation device.
Sample Output
ENABLE DTCP/0.7
Csource-ID: ft-user1
Criteria-ID: 1
X-Drop: T1
Flags: STATIC
Seq: 1
Authentication-Info: c16d2d9d1679facf0c4a66683af6114d341e4033
DTCP/0.7 200 OK
SEQ: 7
CRITERIA-ID: 2
TIMESTAMP: 2011-02-13 15:56:49.609
LIST DTCP
Description Request information that is returned in a LIST response. The response lists triggers only.
It does not return sessions that are being mirrored.
Options Csource-ID: user-name—Username on the router. This name must be configured on the
router.
Flags: flag—BOTH is the only flag supported. This field must be included in the LIST
message.
Sample Output
LIST DTCP
LIST DTCP/0.7
Csource-ID: dtcp1
Cdest-ID: cd1
Flags: BOTH
Seq: 9
Authentication-Info: f6dd64643021debb167ce2fb2d3c7b6622a87e09
DTCP/0.7 200 OK
SEQ: 9
CRITERIA-ID: 3
CSOURCE-ID: dtcp1
CDEST-ID: cd1
CSOURCE-ADDRESS: 10.10.4.224
FLAGS: BOTH
X-JTAP-CDEST-DEST-ADDRESS: 192.0.40.168
X-JTAP-CDEST-DEST-PORT: 65535
X-JTAP-CDEST-SOURCE-ADDRESS: 198.15.0.10
X-JTAP-CDEST-SOURCE-PORT: 50000
X-JTAP-CDEST-TTL: 64
X-INTERFACE-ID: demux0.30010001
X-MD-INTERCEPT-ID: 0x0101010130010001
CRITERIA-NUM: 2
CRITERIA-COUNT: 2
AUTHENTICATION-INFO: 361171ccb24dde6afe8ef66021287f9b8ac16028
Troubleshooting
• Contacting Juniper Networks Technical Support on page 439
• CoS System Log Messages on page 443
3. Copy the statements from the text file and paste them into the CLI on your router to
configure logging.
NOTE: The maximum file size for DHCP local server and DHCP relay log files
is 1 GB. The maximum number of log files for DHCP local server and DHCP
relay is 1000.
Related • Compressing Troubleshooting Logs from /var/logs to Send to Juniper Networks Technical
Documentation Support
This chapter describes messages with the COSD prefix. They are generated by the
class-of-service (CoS) process (cosd), which enables the routing platform to provide
different levels of service to applications based on packet classifications.
COSD_AGGR_CONFIG_INVALID
System Log Message Error: Cannot have config error-message interface-name
Description The class-of-service (CoS) process (cosd) did not apply the config on this interface
because it was not valid in this case.
Severity error
Facility LOG_DAEMON
Cause One possible cause is if any Class-of-Service is configured on an interface which is a part
of an aggregated interface
COSD_CHASSIS_SCHED_MAP_INVALID
System Log Message Chassis scheduler map incorrectly applied to interface interface-name: error-message
Description The class-of-service (CoS) process (cosd) did not apply a chassis scheduler map to the
indicated interface, because the configuration used to apply the scheduler map was
invalid.
Severity error
Facility LOG_DAEMON
Cause One possible cause is that the chassis scheduler map is applied to a specific interface.
For most interface types, a scheduler map must be applied to all interfaces on the PIC;
therefore, a wildcard must be used to specify the interfaces. One exception to this rule
is the Gigabit Ethernet IQ PIC.
Action Correct the configuration used to apply the chassis scheduler map to the interface.
COSD_CLASSIFIER_NO_SUPPORT_LSI
System Log Message Cannot support classifier type classifier-type on lsi interface interface-name
Description The Differentiated Services code point (DSCP) classifier and the 802.1p classifier are
only supported on I-Chip based Flexible PIC Concentrators (FPCs).
Severity error
Facility LOG_DAEMON
Action Remove the DSCP or the 802.1p classifier configuration from the routing instance
COSD_CLASS_8021P_UNSUPPORTED
System Log Message ieee-802.1 classifier is not valid on interface interface-name
Description The IEEE 802.1p classifier is not supported on the indicated interface.
Severity warning
Facility LOG_DAEMON
Action Remove the 802.1p classifier configuration from the interface, or configure an interface
encapsulation type that supports 802.1p classifiers.
COSD_CLASS_NO_SUPPORT_IFD
System Log Message BA/Fixed Classifier or Rewrite on Physical Interface is not allowed when ethernet switching
family is configured: interace interface-name
Description The Rewrite is not supported on this interface when ethernet switching is enabled
Severity error
Facility LOG_DAEMON
Action Remove the classifier configuration from the interface, instead apply it on the logical
interface where ethernet switching family is enabled
Action Remove the Rewrite configuration from the interface, instead apply it on the logical
interface where ethernet switching family is enabled
COSD_CLASS_NO_SUPPORT_L3_IFL
System Log Message BA/Fixed Classifier or Rewrite config is not allowed on logical interface (interface-name)
with inet/inet6 family
Severity error
Facility LOG_DAEMON
Action Remove the classifier configuration from the logical interface, instead apply it on the
main interface if inet/inet6 is configured on one of its logical interfaces
Action Remove the Rewrite configuration from the logical interface, instead apply it on the main
interface if inet/inet6 is configured on one of its logical interfaces
COSD_CONF_OPEN_FAILURE
System Log Message Unable to open: filename, using default CoS forwarding classes, do 'commit full' in cli to
avoid this message
Description The class-of-service (CoS) process (cosd) could not read configuration data.
Severity error
Facility ANY
Cause All of the following resons: mgd -I fails after upgrade-the file cosd.conf does not exist
and is not created because of the mgd -I failure The first commit is 'commit' and not
'commit full'-the file cosd.conf does not commit and is not created automatically
[class-of-service forwarding-classes] does not exist-the file cosd.conf does not get
exported with plain 'commit'
COSD_DB_OPEN_FAILED
System Log Message Unable to open configuration database: error-message(name)
Description The class-of-service (CoS) process (cosd) could not read configuration data for the
indicated reason.
Severity error
Facility LOG_DAEMON
COSD_EXACT_RATE_UNSUPP_INTERFACE
System Log Message Unable to apply scheduler map scheduler-map to interface interface-name because it
does not support exact-rate transmission
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because a scheduler named in the scheduler map specifies
exact transmission rate. The interface is housed on a type of PIC that does not support
exact transmission rate, such as an IQ2 PIC. In terms of configuration, the 'exact' statement
is included in the scheduler definition at the [edit class-of-service schedulers
<scheduler-name> transmit-rate (<rate> | percent <percentage>)] hierarchy level. The
scheduler is included in the scheduler map that is applied to the interface.
Severity error
Facility LOG_DAEMON
Action Remove the 'exact' statement from the scheduler in the scheduler map applied to the
interface.
COSD_EXACT_RATE_UNSUPP_SESSION
System Log Message Unable to apply CoS to L2TP session session-id, because scheduler map scheduler-map
specifies exact rate transmission
Description The class-of-service (CoS) process (cosd) did not apply CoS settings to the indicated
Layer 2 Tunneling Protocol (L2TP) session, because the scheduler map specified by the
RADIUS server for the session is configured for exact transmission rate. Exact transmission
rate is not supported for L2TP sessions on the type of PIC that houses the interface, such
as an IQ2 PIC. In terms of configuration, the 'exact' statement is included in a scheduler
definition at the [edit class-of-service schedulers <scheduler-name> transmit-rate
(<rate> | percent <percentage>)] hierarchy level. The scheduler is included in a scheduler
map that is associated with a traffic control profile. The traffic control profile is named
by an attribute in the RADIUS server's configuration file, which makes the profile apply
to the session.
Severity error
Facility LOG_DAEMON
Action Remove the 'exact' statement from the scheduler in the scheduler map applied to the
session.
COSD_EXP_RW_L2_IFL_NOT_SUPPORTED
System Log Message EXP Rewrite on IFL is not allowed when ethernet switching family is configured: interace
interface-name
Severity error
Facility LOG_DAEMON
Action Remove the exp rewrite configuration from the logical interface.
COSD_FRAGMENTATION_MAP_CONFLICT
System Log Message Interface compression-device matches wildcard wildcard-interface-name, but
fragmentation map fragmentation-map was not applied because interface is compression
device for link interface link-interface-name
Description The indicated fragmentation map is normally applied to interfaces that match the
indicated wildcard. The class-of-service (CoS) process (cosd) did not apply the
fragmentation map to the indicated interface, even though it matches the wildcard,
because the interface is acting as a compression device for the indicated link interface.
Severity warning
Facility LOG_DAEMON
COSD_HIGH_PRIO_QUEUES_INTERFACE
System Log Message Unable to apply scheduler map scheduler-map to interface interface-name, because
multiple schedulers in map have "high,""medium-high," or "strict-high" priority
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because the map includes more than one scheduler that has
high, medium-high, or strict-high priority. For interfaces that are housed by certain PICs,
such as an IQ2 PIC, the scheduler map can include only one scheduler that specifies one
of those three priority levels. In terms of configuration, the 'priority' statement at the [edit
class-of-service schedulers <scheduler-name>] hierarchy level has the value 'high, '
'medium-high, ' or 'strict-high' for more than one of the schedulers in the map.
Severity error
Facility LOG_DAEMON
Action Correct the configuration so that the scheduler map includes only one scheduler with
high, medium-high, or strict-high priority.
COSD_HIGH_PRIO_QUEUES_SESSION
System Log Message Unable to apply CoS to L2TP session session-id, because multiple schedulers in scheduler
map scheduler-map have "high,""medium-high," or "strict-high" priority
Description The class-of-service (CoS) process (cosd) did not apply CoS settings to the indicated
Layer 2 Tunneling Protocol (L2TP) session because the scheduler map specified by the
RADIUS server for the session includes more than one scheduler that has high,
medium-high, or strict-high priority. For interfaces that are housed by certain Physical
Interface Cards (PICs), such as an IQ2 PIC, the scheduler map can include only one
scheduler that specifies one of those three priority levels. In terms of configuration, the
'priority' statement at the [edit class-of-service schedulers <scheduler-name>] hierarchy
level has the value 'high, ' 'medium-high, ' or 'strict-high' for more than one of the
schedulers in the map. The map is associated with a traffic control profile that is named
by an attribute in the RADIUS server's configuration file, which makes the profile apply
to the session.
Severity error
Facility LOG_DAEMON
Action Correct the configuration so that the scheduler map includes only one scheduler with
high, medium-high, or strict-high priority.
COSD_IFD_OUTPUT_SHAPING_RATE_ERR
System Log Message Traffic shaping not supported on interface device interface-name
Description The class-of-service (CoS) process (cosd) did not apply the shaping rate that is configured
for the indicated interface.
Severity error
Facility LOG_DAEMON
Cause Shaping rate is valid only for interfaces housed by IQ and IQ2 PICs, and the interface is
on a different type of PIC.
COSD_IFD_SHAPER_ERR
System Log Message port shaper not allowed on interface interface-name
Description The non-queuing dense port concentrators (DPCs) did not support the specified shaping
rate.
Severity error
Facility LOG_DAEMON
Cause The port shaper was not supported on the non-queuing DPCs.
COSD_INTERFACE_NO_MEDIA
System Log Message Unable to obtain media information for interface interface-name
Description The message sent by the kernel for the indicated interface did not include required media
information.
Severity error
Facility LOG_DAEMON
COSD_L2TP_COS_NOT_CONFIGURED
System Log Message Unable to apply CoS to L2TP session session-id because session-aware CoS is not enabled
for interface interface-name
Description The class-of-service (CoS) process (cosd) did not apply CoS settings to the indicated
Layer 2 Tunneling Protocol (L2TP) session on the indicated interface, because the
interface is not configured to support session-aware CoS for L2TP. In terms of
configuration, the 'per-session-scheduler' statement is not included at the [edit interfaces
<interface-name> unit <logical-unit-number>] hierarchy level.
Severity error
Facility LOG_DAEMON
Action Include the 'per-session-scheduler' statement in the configuration for the interface.
COSD_L2TP_COS_NOT_SUPPORTED
System Log Message Unable to apply CoS to L2TP session session-id on interface interface-name: it does not
support CoS
Description The class-of-service (CoS) process (cosd) did not apply CoS settings to the indicated
Layer 2 Tunneling Protocol (L2TP) session on the indicated interface. The interface is
configured to support session-aware CoS for L2TP, but is not on a PIC that supports that
feature, such as an IQ2 PIC. In terms of configuration, the 'per-session-scheduler'
Severity error
Facility LOG_DAEMON
Action Determine whether the interface is on an PIC that supports session-aware CoS; if not,
remove the 'per-session-scheduler' statement.
COSD_L2TP_SHAPING_NOT_CONFIGURED
System Log Message Unable to apply CoS to L2TP session session-id because session-aware shaping is not
enabled for interface interface-name
Description The class-of-service (CoS) process (cosd) did not apply CoS settings to the indicated
Layer 2 Tunneling Protocol (L2TP) session on the indicated interface, because
session-aware traffic shaping for L2TP is not configured on the PIC that houses the
interface. In terms of configuration, the 'session-shaping' statement is not included at
the [edit chassis fpc <slot-number> pic <pic-number> traffic-manager mode] hierarchy
level.
Severity error
Facility LOG_DAEMON
Action Include the 'session-shaping' statement in the configuration for the PIC.
COSD_LARGE_DELAY_BUFFER_INVALID
System Log Message Error for interface interface-name error-message
Description The class-of-service (CoS) process (cosd) did not apply the large delay buffer setting
that is configured for the indicated interface.
Severity error
Facility LOG_DAEMON
Cause The interface is not housed on one of the PIC types that support large delay buffer.
Action Remove the large delay buffer configuration from the interface.
COSD_MALLOC_FAILED
System Log Message malloc failed: error-message
Description The class-of-service (CoS) process (cosd) could not dynamically allocate memory for
the indicated reason.
Severity error
Facility LOG_DAEMON
Cause A software bug caused a memory leak or the Routing Engine did not have sufficient
memory.
Action Contact your technical support representative. For more information, see
http://kb.juniper.net/InfoCenter/index?page=content&id=KB18862.
COSD_MAX_FORWARDING_CLASSES_ABC
System Log Message exceeding max 4 forwarding-class support.
Description User configuration exceeds the maximum number of forwarding class that is supported.
Severity warning
Facility LOG_DAEMON
COSD_MPLS_DSCP_CLASS_NO_SUPPORT
System Log Message Cannot support MPLS DSCP classifier on ifl interface-name
Description The MPLS Differentiated Services code point (DSCP) classifier is only supported on I-Chip
based Flexible PIC Concentrators (FPCs). It is not supported on Q2 PICs.
Severity error
Facility LOG_DAEMON
Action Remove the MPLS DSCP classifier configuration from the logical interface.
COSD_MULTILINK_CLASS_CONFLICT
System Log Message Fragmentation map fragmentation-map for wildcard wildcard-interface-name specified
multilink class class-name for queue queue-number on interface interface-name, which
exceeds configured limit of limit
Description The indicated fragmentation map is normally applied to interfaces that match the
indicated wildcard, and specifies the indicated multilink class setting for queues on those
interfaces. The class-of-service (CoS) process (cosd) did not apply the fragmentation
map to the indicated interface, even though it matches the wildcard, because the setting
in the map exceeds the indicated class limit, which is configured on the interface itself.
Severity warning
Facility LOG_DAEMON
Action Correct the configuration so that the multilink class setting in the fragmentation map
does not exceed the class limit for the interface.
COSD_NULL_INPUT_ARGUMENT
System Log Message NULL input argument : error-message
Description The pointer that was passed to this function was NULL.
Severity error
Facility LOG_DAEMON
COSD_OUT_OF_DEDICATED_QUEUES
System Log Message Queue usage count for interface interface-name is at percentage-value percent
Description The class-of-service (CoS) process (cosd) is running out of dedicated queues.
Severity warning
Facility LOG_DAEMON
COSD_RATE_LIMIT_INVALID
System Log Message Unable to apply scheduler map scheduler-map to interface interface-name. description.
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because the number of rate limited queues in the scheduler
map exceeded the limit supported by this interface or the priority is not supported. The
interface is housed in a type of PIC that does not support the number of configured rate
limited queues or the priority is not supported. In terms of configuration, the 'rate-limit'
statement is included in the scheduler definition at the [edit class-of-service schedulers
<scheduler-name> transmit-rate <rate> | percent <percentage>] hierarchy level. The
scheduler is included in the scheduler map applied to the interface.
Severity error
Facility LOG_DAEMON
Action Either limit the number of rate-limited schedulers in this scheduler map to the allowed
maximum for this PIC and interface type or check the allowed priority for rate-limited
queues
COSD_RATE_LIMIT_NOT_SUPPORTED
System Log Message Unable to apply scheduler map scheduler-map to interface interface-name because it
does not support rate limiting
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because a scheduler named in the scheduler map is configured
for rate limiting. The interface is housed in a type of PIC that does not support rate limiting.
In terms of configuration, the 'rate-limit' statement is included in the scheduler definition
at the [edit class-of-service schedulers <scheduler-name> transmit-rate <rate> | percent
<percentage>] hierarchy level. The scheduler is included in the scheduler map applied
to the interface.
Severity error
Facility LOG_DAEMON
Action Remove the 'rate-limit' statement from the scheduler in the scheduler map applied to
the interface.
COSD_REWRITE_RULE_LIMIT_EXCEEDED
System Log Message Number of rewrite rules applied to interface interface-name exceeds limit
(maximum-value)
Description The class-of-service (CoS) process (cosd) determined that the number of rewrite rules
applied to the indicated interface exceeds the indicated limit for the interface. In terms
of configuration, too many rewrite rules are included at the [edit class-of-service interfaces
<interface-name> unit <logical-unit-number> rewrite-rules] hierarchy level.
Severity error
Facility LOG_DAEMON
Action Remove rewrite rules from the configuration for the interface.
COSD_RL_IFL_NEEDS_SHAPING
System Log Message "rate-limit" configured in scheduler-map, but ifl interface-name does not have output
shaper configured. It will use the ifd-shaping rate/ifd-transmit rate for implementation
of rate-limit.
Description The 'rate-limit' statement is configured in one or more schedulers that are part of the
indicated scheduler map. In order to apply this scheduler map to the indicated interface,
output shaping rate should be configured on the interface. Since no output shaping rate
is configured, the transmit rate or shaping rate of the parent interface will be used instead.
Severity warning
Facility LOG_DAEMON
COSD_SCHEDULER_MAP_CONFLICT
System Log Message Forwarding classes "first-forwarding-class" and "second-forwarding-class" in scheduler
map scheduler-map both map to queue queue-number
Description Both of the indicated forwarding classes, which are defined in the indicated scheduler
map, map to the same indicated queue. The double mapping is invalid.
Severity error
Facility LOG_DAEMON
COSD_SCHED_AVG_CONST_UNSUPPORTED
System Log Message Averaging constant not supported on interface interface-name. Value set in scheduler-map
scheduler-map (scheduler name) will be ignored.
Description Configuring averaging constant is not supported on the indicated interface. Value set in
the indicated scheduler will be ignored.
Severity warning
Facility LOG_DAEMON
COSD_SCHED_MAP_GROUP_CONFLICT
System Log Message Interface interface-name cannot be bound to scheduler-map scheduler-map. It will be
bound to default scheduler-map
Description Interfaces belonging to a group cannot be bound to different scheduler maps. They will
be bound to the default scheduler map.
Severity error
Facility LOG_DAEMON
Action Map only one scheduler map to all the interfaces of a group.
COSD_SHAPER_GROUP_CONFLICT
System Log Message Interface interface-name cannot be bound to configured shaping-rate. It will be bound
to default rate
Description Interfaces belonging to a group cannot be bound to different shaping rates. They will be
bound to the default shaping rate.
Severity error
Facility LOG_DAEMON
COSD_STREAM_IFD_CREATE_FAILURE
System Log Message Unable to create special master interface device for interface-name
Description The class-of-service (CoS) process (cosd) could not create the indicated internal interface
device, which it needs for application of a chassis scheduler map.
Severity error
Facility LOG_DAEMON
COSD_TIMER_ERROR
System Log Message Unable to set retry timer for rtsock write operation: error-message
Description The class-of-service (CoS) process (cosd) used a routine from the rtsock library to write
to the kernel, but the kernel did not accept the request. The cosd process could not set
the retry timer for the request, for the indicated reason.
Severity error
Facility LOG_DAEMON
COSD_TRICOLOR_ALWAYS_ON
System Log Message tri-color is always enabled in this platform. There is no need to explicitly set it.
Description Tri-color marking is always enabled on this platform. There is no need to explicitly set it.
Severity warning
Facility LOG_DAEMON
COSD_TRICOLOR_NOT_SUPPORTED
System Log Message Unable to apply scheduler scheduler-map to interface interface-name, because it does
not support tricolor marking
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because a scheduler included in the map specifies a packet
loss priority (PLP) that is supported only with tricolor marking (TCM). The interface does
not support TCM, either because TCM is not enabled or the interface is on a router that
does not support TCM. In terms of configuration, the value 'medium-high' or 'medium-low'
is specified for the 'loss-priority' statement in a scheduler definition at the [edit
class-of-service schedulers <scheduler-name> drop-profile-map] hierarchy level. The
scheduler is included in the scheduler map applied to the interface, but the 'tri-color'
statement is either not included at the [edit class-of-service] hierarchy level, or is not
supported.
Severity error
Facility LOG_DAEMON
Action Change the value of the 'loss-priority' statement in the scheduler or include the 'tri-color'
statement to enable TCM on the router.
COSD_TX_QUEUE_RATES_TOO_HIGH
System Log Message Unable to apply scheduler map scheduler-map to interface interface-name: sum of
scheduler transmission rates exceeds interface shaping or transmission rate
Description The class-of-service (CoS) process (cosd) did not apply the indicated scheduler map
to the indicated interface, because the sum of the queue transmission rates defined in
the schedulers in the scheduler map exceeds the shaping or transmission rate for the
interface. In terms of configuration, the 'transmit-rate' statement is specified for each
scheduler at the [edit class-of-service schedulers <scheduler-name>] hierarchy level.
The sum of the configured transmission rates exceeds the transmission or shaping rate
of the interface.
Severity error
Facility LOG_DAEMON
Action Decrease the value of one or more 'transmit-rate' statements so that the sum is less
than the interface transmission or shaping rate.
COSD_UNKNOWN_CLASSIFIER
System Log Message classifier type classifier-type is invalid
Description The class-of-service (CoS) process (cosd) did not recognize the indicated classifier type
from the rtsock library.
Severity warning
Facility LOG_DAEMON
COSD_UNKNOWN_REWRITE
System Log Message rtsock rewrite type type is invalid
Description The class-of-service (CoS) process (cosd) did not recognize the indicated rewrite type
from the rtsock library.
Severity warning
Facility LOG_DAEMON
COSD_UNKNOWN_TRAFFIC_CLASS_MAP
System Log Message traffic-class-map type traffic-class-map-type is invalid
Description The class-of-service (CoS) process (cosd) did not recognize the indicated
traffic-class-map type from the rtsock library.
Severity warning
Facility LOG_DAEMON
COSD_UNKNOWN_TRANSLATION_TABLE
System Log Message rtsock translation table type translation-table-type is invalid
Description The class-of-service (CoS) process (cosd) did not recognize the indicated translation
table type from the rtsock library.
Severity warning
Facility LOG_DAEMON
Configuration Statements
This topic shows the complete configuration for class of service (CoS) statements for
the [edit class-of-service] hierarchy level, listing all possible configuration statements
and showing their level in the configuration hierarchy. When you are configuring the Junos
OS, your current hierarchy level is shown in the banner on the line preceding the
user@host# prompt.
[edit class-of-service]
adjustment-control-profiles {
profile-name {
application {
ancp;
radius-coa;
pppoe-tags;
}
}
}
classifiers {
(dscp | dscp-ipv6 | exp | ieee-802.1 | inet-precedence) classifier-name {
import (classifier-name | default);
forwarding-class class-name {
loss-priority level code-points [ aliases ] [ bit-patterns ];
}
}
}
code-point-aliases {
(dscp | dscp-ipv6 | exp | ieee-802.1 | inet-precedence) {
alias-name bits;
}
}
copy-plp-all;
drop-profiles {
profile-name {
fill-level percentage drop-probability percentage;
interpolate {
drop-probability [ values ];
fill-level [ values ];
}
}
}
fabric {
scheduler-map {
priority (high | low) scheduler scheduler-name;
}
}
forwarding-classes {
class class-name queue-num queue-number priority (high | low);
queue queue-number class-name priority (high | low) [ policing-priority (premium |
normal) ];
}
forwarding-class-map forwarding-class-map-name {
class class-name queue-num queue-number [ restricted-queue queue-number ];
}
forwarding-policy {
next-hop-map map-name {
forwarding-class class-name {
next-hop [ next-hop-name ];
lsp-next-hop [ lsp-regular-expression ];
non-lsp-next-hop;
discard;
}
}
class class-name {
classification-override {
forwarding-class class-name;
}
}
}
fragmentation-maps {
map-name {
forwarding-class class-name {
drop-timeout milliseconds;
fragment-threshold bytes;
multilink-class number;
no-fragmentation;
}
}
}
host-outbound-traffic {
forwarding-class class-name;
dscp-code-point value;
forwarding-class class-name;
ieee-802.1 {
default value;
rewrite-rules;
}
}
interfaces {
interface-name {
classifiers {
dscp (classifier-name | default);
ieee-802.1 (classifier-name | default) vlan-tag (inner | outer | classifier-name);
inet-precedence (classifier-name | default);
}
input-scheduler-map map-name;
input-shaping-rate rate;
irb {
unit logical-unit-number {
classifiers {
dscp (classifier-name | default) {
family [ inet mpls ];
}
dscp-ipv6 (classifier-name | default) {
family [ inet mpls ];
exp (classifier-name | default);
ieee-802.1 (classifier-name | default) vlan-tag (inner | outer | transparent);
}
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
exp (rewrite-name | default)protocol protocol-types;
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
output-forwarding-class-map forwarding-class-map-name;
member-link-scheduler (replicate | scale);
rewrite-rules {
dscp (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer);
inet-precedence (rewrite-name | default);
}
}
scheduler-map map-name;
scheduler-map-chassis map-name;
shaping-rate rate;
unit logical-unit-number {
classifiers {
(dscp | dscp-ipv6 | exp | ieee-802.1 | inet-precedence) (classifier-name | default)
family (mpls | inet);
}
forwarding-class class-name;
fragmentation-map map-name;
input-scheduler-map map-name;
input-shaping-rate (percent percentage | rate);
input-traffic-control-profile profile-name shared-instance instance-name;
loss-priority-maps {
frame-relay-de (name | default);
}
loss-priority-rewrites {
frame-relay-de (name | default);
}
output-traffic-control-profile profile-name shared-instance instance-name;
per-session-scheduler;
rewrite-rules {
dscp (rewrite-name | default)protocol protocol-types;
dscp-ipv6 (rewrite-name | default);
exp (rewrite-name | default)protocol protocol-types;
exp-push-push-push default;
exp-swap-push-push default;
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default)protocol protocol-types;
}
scheduler-map map-name;
shaping-rate rate;
translation-table (to-dscp-from-dscp | to-dscp-ipv6-from-dscp-ipv6 |
to-exp-from-exp | to-inet-precedence-from-inet-precedence) table-name;
}
}
}
loss-priority-maps {
frame-relay-de (Defining Loss Priority Maps)name {
loss-priority levelcode-points [alias | bits ];
}
}
loss-priority-rewrites {
frame-relay-de (Defining Loss Priority Maps)name {
loss-priority levelcode-point (alias | bits );
}
}
restricted-queues {
forwarding-class class-name queue queue-number;
}
rewrite-rules {
(dscp | dscp-ipv6 | exp | ieee-802.1 | ieee-802.1ad | inet-precedence) rewrite-name {
import (rewrite-name | default);
forwarding-class class-name {
loss-priority level code-point (alias | bits);
}
}
}
routing-instances routing-instance-name {
classifiers {
exp (classifier-name | default);
dscp (classifier-name | default);
dscp-ipv6 (classifier-name | default);
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
scheduler-name {
buffer-size (percent percentage | remainder | temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high)protocol
(any | non-tcp | tcp) drop-profile profile-name;
excess-priority (low | high);
excess-rate percent percentage;
excess-rate (percent percentage | proportion value);
priority priority-level;
transmit-rate (rate | percent percentage | remainder) <exact | rate-limit>;
}
}
system-defaults {
classifiers (classifier-name | exp)
traffic-control-profiles profile-name {
delay-buffer-rate (percent percentage | rate);
excess-rate (percent percentage | proportion value);
guaranteed-rate (percent percentage | rate);
overhead-accounting (frame-mode | cell-mode) <bytes byte-value>;
scheduler-map map-name;
shaping-rate (percent percentage | rate);
}
translation-table {
(to-dscp-from-dscp | to-dscp-ipv6-from-dscp-ipv6 | to-exp-from-exp |
to-inet-precedence-from-inet-precedence) table-name {
to-code-point value from-code-points (* | [ values ]);
}
}
tri-color;
On Juniper Networks MX Series 3D Universal Edge Routers with Enhanced Queuing DPCs,
you can configure the following CoS statements at the [edit class-of-service interfaces]
hierarchy level:
interface-set interface-set-name {
excess-bandwidth-share (proportional value | equal);
internal-node;
traffic-control-profiles profile-name;
output-traffic-control-profile-remaining profile-name;
}
dynamic-profiles {
profile-name {
class-of-service {
interfaces {
interface-name {
unit logical-unit-number {
classifiers {
type (classifier-name | default);
}
output-traffic-control-profile (profile-name |
$junos-cos-traffic-control-profile);
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
(scheduler-name) {
buffer-size (percent percentage | remainder | temporal microseconds |
$junos-cos-scheduler-bs);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high)
protocol (any | non-tcp | tcp) drop-profile (profile-name | predefined-variable);
excess-priority (low | high | $junos-cos-scheduler-excess-priority);
excess-rate (percent percentage | percent $junos-cos-scheduler-excess-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
priority (priority-level | $junos-cos-scheduler-priority);
shaping-rate (rate | predefined-variable);
transmit-rate (rate | percent percentage | remainder | percent percentage
$junos-cos-scheduler-tx) <exact | rate-limit>;
}
}
traffic-control-profiles profile-name {
}
premium {
if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
}
three-color-policer policer-name {
action {
loss-priority high then discard;
}
logical-interface-policer;
single-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
excess-burst-size bytes;
}
two-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
peak-burst-size bytes;
peak-information-rate bps;
}
}
}
}
policy-options {
prefix-listname {
ip-addresses;
dynamic-db;
}
}
interfaces {
interface-name {
unit logical-unit-number {
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max
maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
ppp-options {
chap;
pap;
}
vlan-id number;
}
vlan-tagging;
}
interface-set interface-set-name {
interface interface-name {
unit logical-unit-number;
}
}
demux0 {
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
demux-source {
source-prefix;
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
input filter-name;
output filter-name;
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
service-name-table table-name;
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max
maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
}
}
pp0 {
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
pap;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
}
output filter-name {
precedence precedence;
}
}
}
}
}
}
protocols {
igmp {
interface interface-name {
accounting;
disable;
group-policy;
immediate-leave
no-accounting;
promiscuous-mode;
ssm-map ssm-map-name;
static {
group group {
source source;
}
}
version version;
}
mld {
interface interface-name {
disable;
(accounting | no-accounting);
group-policy;
immediate-leave;
oif-map;
passive;
ssm-map ssm-map-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
version version;
}
}
router-advertisement {
interface interface-name {
current-hop-limit number;
default-lifetime seconds;
(managed-configuration | no-managed-configuration);
max-advertisement-interval seconds;
min-advertisement-interval seconds;
(other-stateful-configuration | no-other-stateful-configuration);
prefix prefix {
(autonomous | no-autonomous);
(on-link | no-on-link);
preferred-lifetime seconds;
valid-lifetime seconds;
}
reachable-time milliseconds;
retransmit-timer milliseconds;
}
}
}
}
}
routing-instances routing-instance-name {
interface interface-name;
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
rib routing-table-name {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
variables {
variable-name {
default-value default-value;
equals expression;
mandatory;
uid;
uid-reference;
}
}
}
services {
captive-portal-content-delivery {
rule rule-name {
match-direction (input | output | input-output);
term term-name {
from {
application [junos-http, junos-https, junos-httpproxy];
destination-address address <except>;
destination-prefix-list list-name <except>;
}
then {
accept;
redirect <url>;
rewrite <destination-address address> <destination-port port-number>;
syslog;
}
}
}
rule-set rule-set-name {
[rule rule-name];
}
}
}
services {
radius-flow-tap {
forwarding-class class-name;
interfaces interface-name;
multicast-interception;
policy policy-name {
inet {
drop-policyrule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
inet6 {
drop-policyrule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
}
source-ipv4-address ipv4-address;
)
}
Description Enable or disable the collection of IGMP join and leave event statistics for dynamically
created IGMP interfaces.
Description Enable or disable the collection of MLD join and leave event statistics for a dynamic
interface.
action
Syntax action {
loss-priority high then discard;
}
Syntax adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family filter]
Description Configure an Ascend-Data-Filter that the dynamic profile applies to a subscriber session.
Options counter—Enable a counter that increments each time the Ascend-Data-Filter rule is used.
Typically used for testing purposes.
not-mandatory—Suppress router from reporting an error when the RADIUS reply message
does not include the $junos-adf-rule-v4 or $junos-adf-rule-v6 variable that is
configured for the Ascend-Data-Filter in the dynamic profile. In this circumstance,
the Ascend-Data-Filter is not created.
precedence—Precedence value that sets the order in which dynamic service filters are
applied on the interface. The lower the precedence value, the higher the precedence
that is given. The precedence setting is used in conjunction with the precedence
settings of all dynamic service filters configured (not only Ascend-Data-Filters) on
the same interface to establish the order. For example, the order also includes any
configured input filter-name precedence precedence and output filter-name precedence
precedence statements.
Range: 0 through 255
Default: 0
adjustment-control-profiles
Syntax adjustment-control-profiles {
profile-name {
application {
ancp;
radius-coa;
pppoe-tags;
}
}
}
Description For adjustments performed by the ANCP or multicast applications on EQ DPCs and
MPC/MIC interfaces, specify the minimum shaping rate for an adjusted scheduler node.
The node is associated with a traffic-control profile.
Related • Configuring a Dynamic Minimum Adjusted Shaping Rate on Scheduler Nodes on page 102
Documentation
• Configuring a Dynamic Shaping-Rate Adjustment for Queues on page 103
Description For a MPC/MIC interface, determine the percentage of adjustment for the shaping rate
of a queue.
Syntax aggregate {
if-exceeding {
bandwidth-limit bandwidth;
burst-size-limit burst;
}
then {
discard;
}
}
Description On M40e, M120, and M320 edge routers with Flexible PIC Concentrator (FPC) input as
FFPC and FPC output as SFPC, and on MX Series, T320, T640, and T1600 edge routers
with Enhanced Intelligent Queuing (IQE) PICs, T4000 routers with Type 5 FPC and
Enhanced Scaling Type 4 FPC, configure an aggregate hierarchical policer.
Syntax ancp {
priority priority;
algorithm algorithm;
}
Description Configure the shaping rate adjustment controls for the ANCP application.
Default: adjust-always
Syntax application {
ancp;
radius-coa;
pppoe-tags;
}
Description Configure which applications in the adjustment control profile can make shaping rate
adjustments.
Hierarchy Level [edit services captive-portal-content-delivery rule rule-name term term-name from (Captive
Portal Content Delivery)]
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify groups from which to inherit configuration data for the radius-flow-tap policy.
Options group-name— Name of the group that inherits the configuration data.
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify groups from which to inherit configuration data for the radius-flow-tap policy.
Options group-name— Name of the group that does not inherit the configuration data.
authentication (Login)
Syntax authentication {
(encrypted-password "password" | plain-text-password);
load-key-file URL filename;
ssh-dsa "public-key";
ssh-ecdsa "public-key";
ssh-rsa "public-key";
}
Description Authentication methods that a user can use to log in to the router or switch. You can
assign multiple authentication methods to a single user.
You cannot configure a blank password for encrypted-password using blank quotation
marks (" "). You must configure a password whose number of characters range from
1 through 128 characters and enclose the password in quotation marks.
ssh-dsa "public-key"—SSH version 2 authentication. Specify the DSA public key. You can
specify one or more public keys for each user.
ssh-rsa "public-key"—SSH version 1 and SSH version 2 authentication. Specify the RSA
public key. You can specify one or more public keys for each user.
authentication-order
Description Set the order in which the Junos OS tries different authentication methods when verifying
that a client can access the router or switch. For each login attempt, the software tries
the authentication methods in order, from first to last.
Default password
Options authentication-methods
• password—Verify the client using the information configured at the [edit access profile
profile-name client client-name] hierarchy level.
NOTE: For subscriber access management, you must always specify the
radius method. Subscriber access management does not support the
password option (the default), and authentication fails when no method
is specified.
authentication-server
Description Specify a list of the RADIUS authentication servers used to authenticate DHCP, L2TP,
and PPP clients. The servers in the list are also used as RADIUS dynamic-request servers,
from which the router accepts and processes RADIUS disconnect requests, CoA requests,
and dynamic service activations and deactivations.
Description (MX Series 3D Universal Edge Routers and T4000 Core Routers only) Specify the amount
of bandwidth in gigabits per second to reserve for tunnel services.
Options bandwidth-value—Define the amount of bandwidth in gigabits per second to reserve for
tunnel services. On MX Series routers, the bandwidth values can be 1g, 10g, 20g, or
40g. On T4000 routers, the bandwidth values are multiples of 10g up to 100g.
NOTE: The bandwidth that you specify determines the port number of the
tunnel interfaces that are created. When you specify a bandwidth of 1g, the
port number is always 10. When you specify any other bandwidth, the port
number is always 0.
NOTE: If you specify a bandwidth that is not compatible with the type of
DPCs or MPCs and their respective Packet Forwarding Engine, tunnel services
are not activated. For example, you cannot specify 1 gigabit per second
bandwidth for a Packet Forwarding Engine on a 10-Gigabit Ethernet 4-port
DPC.
NOTE: Bandwidth rates of 20 gigabits per second and 40 gigabits per second
require use of an MX Series router with the MPC3E and the 100-Gigabit CFP
MIC.
bandwidth-limit (Policer)
Description For a single-rate two-color policer, configure the bandwidth limit as a number of bits per
second. Single-rate two-color policing uses the single token bucket algorithm to measure
traffic-flow conformance to a two-color policer rate limit.
Traffic at the interface that conforms to the bandwidth limit is categorized green. Traffic
that exceeds the specified rate is also categorized as green provided that sufficient tokens
remain in the single token bucket. Packets in a green flow are implicitly marked with low
packet loss priority (PLP) and then passed through the interface.
Traffic that exceeds the specified rate when insufficient tokens remain in the single token
bucket is categorized red. Depending on the configuration of the two-color policer, packets
in a red traffic flow might be implicitly discarded; or the packets might be re-marked with
a specified forwarding class, a specified PLP, or both, and then passed through the
interface.
Single-rate two-color policing allows bursts of traffic for short periods, whereas single-rate
and two-rate three-color policing allows more sustained bursts of traffic.
Hierarchical policing is a form of two-color policing that applies different policing actions
based on whether the packets are classified for expedited forwarding (EF) or for a lower
priority. You apply a hierarchical policer to ingress Layer 2 traffic to allows bursts of EF
traffic for short period and bursts of non-EF traffic for short periods, with EF traffic always
taking precedence over non-EF traffic.
Options bps—You can specify the number of bits per second either as a decimal number or as a
decimal number followed by the abbreviation k (1000), m (1,000,000), or g
(1,000,000,000).
Range: (M Series, MX Series, and T Series routers) 8000 through 100,000,000,000
Default: None.
bandwidth-percent
Description For a single-rate two-color policer, configure the bandwidth limit as a percentage value.
Single-rate two-color policing uses the single token bucket algorithm to measure
traffic-flow conformance to a two-color policer rate limit.
Traffic at the interface that conforms to the bandwidth limit is categorized green. Traffic
that exceeds the specified rate is also categorized as green provided that sufficient tokens
remain in the single token bucket. Packets in a green flow are implicitly marked with low
packet loss priority and then passed through the interface.
Traffic that exceeds the specified rate when insufficient tokens remain in the single token
bucket is categorized red. Depending on the configuration of the two-color policer, packets
in a red traffic flow might be implicitly discarded; or the packets might be re-marked with
a specified forwarding class, a specified PLP, or both, and then passed through the
interface.
The function of the bandwidth limit is extended by the burst size (configured using the
burst-size-limit bytes statement) to allow bursts of traffic up to a limit based on the
overall traffic load:
• During periods of relatively low traffic (traffic that arrives at or departs from the interface
at overall rates below the token arrival rate), unused tokens accumulate in the bucket,
but only up to the configured token bucket depth.
Single-rate two-color policing allows bursts of traffic for short periods, whereas single-rate
and two-rate three-color policing allows more sustained bursts of traffic.
Hierarchical policing is a form of two-color policing that applies different policing actions
based on whether the packets are classified for expedited forwarding (EF) or for a lower
priority. You apply a hierarchical policer to ingress Layer 2 traffic to allows bursts of EF
traffic for short period and bursts of non-EF traffic for short periods, with EF traffic always
taking precedence over non-EF traffic.
Options percentage—Traffic rate as a percentage of either the physical interface media rate or
the logical interface configured shaping rate. You can configure a shaping rate on a
logical interface by using class-of-service statement.
• Bandwidth Policers
Default If you do not include this statement, the default scheduler transmission rate and buffer
size percentages for queues 0 through 7 are 95, 0, 0, 5, 0, 0, 0, and 0 percent.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Description On M40e, M120, and M320 (with FFPC and SFPC) edge routers; on MPCs hosted on MX
Series routers; on T320, T640, and T1600 core routers with Enhanced Intelligent Queuing
(IQE) PICs; and on T4000 routers with Type 5 FPC and Enhanced Scaling Type 4 FPC,
configure the burst-size limit for premium or aggregate traffic in a hierarchical policer.
Options bytes—Burst-size limit in bytes. The minimum recommended value is the maximum
transmission unit (MTU) of the IP packets being policed. You can specify the value
either as a complete decimal number or as a decimal number followed by the
abbreviation k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1500 through 2,147,450,880 (1500 through 100,000,000,000 on MPCs hosted
on MX Series routers)
• Hierarchical Policers
burst-size-limit (Policer)
Description For a single-rate two-color policer, configure the burst size as a number of bytes. The
burst size allows for short periods of traffic bursting (back-to-back traffic at average
rates that exceed the configured bandwidth limit). Single-rate two-color policing uses
the single token bucket algorithm to measure traffic-flow conformance to a two-color
policer rate limit.
Traffic at the interface that conforms to the bandwidth limit is categorized green. Traffic
that exceeds the specified rate is also categorized as green provided that sufficient tokens
remain in the single token bucket. Packets in a green flow are implicitly marked with low
packet loss priority and then passed through the interface.
Traffic that exceeds the specified rate when insufficient tokens remain in the single token
bucket is categorized red. Depending on the configuration of the two-color policer, packets
in a red traffic flow might be implicitly discarded; or the packets might be re-marked with
a specified forwarding class, a specified PLP, or both, and then passed through the
interface.
The burst size extends the function of the bandwidth limit (configured using either the
bandwidth-limit bps statement or the bandwidth-percent percentage statement) to allow
bursts of traffic up to a limit based on the overall traffic load:
• During periods of relatively low traffic (traffic that arrives at or departs from the interface
at overall rates below the token arrival rate), unused tokens accumulate in the bucket,
but only up to the configured token bucket depth.
Single-rate two-color policing allows bursts of traffic for short periods, whereas single-rate
and two-rate three-color policing allows more sustained bursts of traffic.
Hierarchical policing is a form of two-color policing that applies different policing actions
based on whether the packets are classified for expedited forwarding (EF) or for a lower
priority. You apply a hierarchical policer to ingress Layer 2 traffic to allows bursts of EF
traffic for short period and bursts of non-EF traffic for short periods, with EF traffic always
taking precedence over non-EF traffic.
Table 51 on page 502 summarizes the relationship between the bandwidth-limit and the
token arrival rate. This information is useful in calculating the minimum burst-size-limit.
The burst-size limit enforced is based on the burst-size limit you configure. For a
rate-limited logical interface, the Packet Forwarding Engine calculates the optimum
burst-size-limit values and then applies the value closest to the burst-size-limit value
specified in the policer configuration.
On MX Series routers and EX Series switches, the burst-size limit is not as freely
configurable as it is on other platforms. Junos OS does not support an unlimited
combination of policer bandwidth and burst-size limits on MX Series routers and EX
Series switches. For a single-rate two-color policer on an MX Series router and on an EX
Series switch, the minimum supported burst-size limit is equivalent to the amount of
traffic allowed by the policer bandwidth limit in a time span of 1 millisecond. For example,
for a policer configured with a bandwidth-limit value of 1 Gbps, the minimum supported
value for burst-size-limit on an MX Series router is 125 KB. If you configure a value that is
smaller than the minimum, Junos OS overrides the configuration and applies the actual
minimum.
Options bytes—Burst-size limit in bytes. The minimum recommended value is the maximum
transmission unit (MTU) of the IP packets being policed. You can specify the value
either as a complete decimal number or as a decimal number followed by the
abbreviation k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000
Default: None
Options bytes—Byte adjustment value for the cell-mode or frame-mode shaping options. This can
be the predefined variable $junos-cos-byte-adjust, which is the variable for byte
adjustment that is replaced with a value obtained from the RADIUS server when a
subscriber authenticates over the interface to which the dynamic profile is attached.
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• egress-shaping-overhead
Syntax captive-portal-content-delivery {
rule rule-name {
match-direction (input | output | input-output);
term term-name {
from {
application [junos-http, junos-https, junos-httpproxy];
destination-address address <except>;
destination-prefix-list list-name <except>;
}
then {
accept;
redirect <url>;
rewrite <destination-address address> <destination-port port-number>;
syslog;
}
}
}
rule-set rule-set-name {
[rule rule-name];
}
}
Description Configure the HTTP redirect service by specifying the location to which a subscriber's
initial Web browser session is redirected, enabling initial provisioning and service selection
for the subscriber.
Options bytes—Byte adjustment value for the cell-mode or frame-mode shaping options.
NOTE: If you specify a value for the bytes bytes option, you cannot specify a
value for either the cell-mode-bytes option.
NOTE: Cell mode is supported only on logical interfaces and interface sets;
it is not supported on physical interfaces (ifd or ifd-remaining).
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• egress-shaping-overhead
Description Assign a user to a login class. You must assign each user to a login class.
Options class-name—One of the classes defined at the [edit system login class] hierarchy level.
Default If you do not configure any CoS features, all packets are transmitted from output
transmission queue 0.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Static Hierarchical Scheduling in a Dynamic Profile on page 32
Syntax classifiers {
dscp (classifier-name | default);
dscp-ipv6 (classifier-name | default);
ieee-802.1 (classifier-name | default) vlan-tag (inner | outer)
inet-precedence (classifier-name | default);
}
Description Apply a CoS behavior aggregate classifier to a dynamic interface. You can apply a default
classifier or one that is previously defined.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
color-aware
Syntax color-aware;
Description For a three-color policer, configure the way preclassified packets are metered. In
color-aware mode, the local router can assign a higher packet loss priority, but cannot
assign a lower packet loss priority.
For example, suppose an upstream router assigned medium-high packet loss priority to
a packet because the packet exceeded the committed information rate on the upstream
router interface.
• If the local router applies color-aware policing to the packet, the router cannot change
the packet loss priority to low, even if the packet conforms to the configured committed
information route on the local router interface.
• If the local router applies color-blind policing to the packet, the router can change the
packet loss priority to low if the packet conforms to the configured committed
information route on the local router interface.
Default If you omit the color-aware statement, the default behavior is color-aware mode.
color-blind
Syntax color-blind;
Description For a three-color policer, configure the way preclassified packets are metered. In
color-blind mode, the local router ignores the preclassification of packets and can assign
a higher or lower packet loss priority.
For example, suppose an upstream router assigned medium-high packet loss priority to
a packet because the packet exceeded the committed information rate on the upstream
router interface.
• If the local router applies color-aware policing to the packet, the router cannot change
the packet loss priority to low, even if the packet conforms to the configured committed
information route on the local router interface.
• If the local router applies color-blind policing to the packet, the router can change the
packet loss priority to low if the packet conforms to the configured committed
information route on the local router interface.
Default If you omit the color-blind statement, the default behavior is color-aware mode.
committed-burst-size
Description For a three-color policer, configure the committed burst size (CBS) as a number of bytes.
During periods of average traffic rates below the CIR, any unused bandwidth capacity
accumulates up to a maximum amount defined by the CBS. Short periods of bursting
traffic (back-to-back traffic at averages rates that exceed the CIR) are also categorized
as green provided that unused bandwidth capacity is available.
Traffic that exceeds both the CIR and the CBS is considered nonconforming.
Single-rate three-color policers use a dual token bucket algorithm to measure traffic
against a single rate limit. Nonconforming traffic is categorized as yellow or red, based
on the excess-burst-size statement included in the policer configuration.
Two-rate three-color policers use a dual-rate dual token bucket algorithm to measure
traffic against two rate limits. Nonconforming traffic is categorized as yellow or red based
on the peak-information-rate and peak-burst-rate statements included in the policer
configuration.
Options bytes—Number of bytes. You can specify a value in bytes either as a complete decimal
number or as a decimal number followed by the abbreviation k (1000),
m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000 bytes
committed-information-rate
Description For a three-color policer, configure the committed information rate as a number of bits
per second. The committed information rate (CIR) is the guaranteed bandwidth for traffic
arriving at or departing from the interface under normal line conditions.
In three-color policing, a CIR defines the guaranteed bandwidth for traffic arriving at or
departing from the interface under normal line conditions. A flow of traffic at an average
rate that conforms to the CIR is categorized green.
During periods of average traffic rates below the CIR, any unused bandwidth capacity
accumulates up to a maximum amount defined by the committed burst size (CBS). Short
periods of bursting traffic (back-to-back traffic at averages rates that exceed the CIR)
are also categorized as green provided that unused bandwidth capacity is available.
Traffic that exceeds both the CIR and the CBS is considered nonconforming.
Single-rate three-color policers use a dual token bucket algorithm to measure traffic
against a single rate limit. Nonconforming traffic is categorized as yellow or red, based
on the excess-burst-size statement included in the policer configuration.
Two-rate three-color policers use a dual-rate dual token bucket algorithm to measure
traffic against two rate limits. Nonconforming traffic is categorized as yellow or red based
on the peak-information-rate and peak-burst-rate statements included in the policer
configuration.
Options bps—Number of bits per second. You can specify a value in bits per second either as a
complete decimal number or as a decimal number followed by the abbreviation
k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000 bps
connection-limit
Description Configure the maximum number of connections sessions for each type of system services
(finger, ftp, ssh, telnet, xnm-clear-text, or xnm-ssl) per protocol (either IPv6 or IPv4).
Options limit—(Optional) Maximum number of established connections per protocol (either IPv6
or IPv4).
Range: 1 through 250
Default: 75
Related • Configuring clear-text or SSL Service for Junos XML Protocol Client Applications
Documentation
• Configuring DTCP-over-SSH Service for the Flow-Tap Application
Default If you do not include this statement, the delay-buffer calculation is based on the
guaranteed rate if one is configured, or the shaping rate if no guaranteed rate is configured.
Options rate—Delay-buffer rate, in bits per second (bps). You can specify a value in bits per second
either as a complete decimal number or as a decimal number followed by the
abbreviation k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1000 through 6,400,000,000,000 bps
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Traffic Scheduling and Shaping for Subscriber Access on page 11
Hierarchy Level [edit services captive-portal-content-delivery rule rule-name term term-name from (Captive
Portal Content Delivery)]
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify destination IP address or prefix value for radius-flow-tap policy rule mapping.
Hierarchy Level [edit services captive-portal-content-delivery rule rule-name term term-name from]
Description Specify the destination prefix list for rule matching. You configure the prefix list by including
the prefix-list statement at the [edit policy-options] hierarchy level.
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Options port-number— Number of the IPv4 or IPv6 destination port for the radius-flow-tap policy.
Syntax "disable:$junos-igmp-enable";
• Disabling IGMP
Syntax disable;
Description Specify the drop-policy that is applied to mirrored packets sent to a mediation device.
Description Within the drop-profile map, specify the name of the drop profile to use for random early
detection (RED) for a specific packet-loss priority (PLP) level and protocol type. A drop
profile maps a fill level (fullness of a queue) to a drop probability (probability that a
packet will be dropped). When a packet arrives, RED checks the queue fill level. If the fill
level corresponds to a nonzero drop probability, the RED algorithm determines whether
to drop the arriving packet.
You configure drop profiles statically (at the [edit class-of-service drop-profiles] hierarchy
level).
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Syntax drop-profile-map loss-priority (any | low | medium-low | medium-high | high) protocol (any
| non-tcp | tcp) drop-profile (profile-name | predefined-variable);
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Description For IPv4 traffic, apply a Differentiated Services (DiffServ) code point (DSCP) classifier
to a subscriber interface in a dynamic profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
Description For IPv4 traffic, apply a Differentiated Services (DiffServ) code point (DSCP) rewrite rule
to a subscriber interface in a dynamic profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Rewrite Rule Definition to a Subscriber Interface in a Dynamic Profile on
page 219
• rewrite-rules
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Options dscp-value— IPv4 or IPv6 dscp value for the radius-flow-tap policy.
Description For IPv6 traffic, apply a Differentiated Services (DiffServ) code point (DSCP) classifier
to a subscriber interface in a dynamic profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
Description For IPv6 traffic, apply a DSCP rewrite rule to a subscriber interface in a dynamic profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• rewrite-rules
Syntax dynamic-class-of-service-options {
vendor-specific-tags access-loop-encapsulation;
vendor-specific-tags actual-data-rate-downstream;
}
Related • Setting Shaping Rate and Overhead Accounting Based on PPPoE Vendor-Specific
Documentation Tags on page 125
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
dynamic-profiles
Syntax dynamic-profiles {
profile-name {
class-of-service {
interfaces {
interface-name ;
}
unit logical-unit-number {
classifiers {
type (classifier-name | default);
}
output-traffic-control-profile (profile-name | $junos-cos-traffic-control-profile);
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
}
scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
schedulers {
(scheduler-name) {
buffer-size (seconds | percent percentage | remainder | temporal microseconds);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high)
protocol (any | non-tcp | tcp) drop-profile profile-name;
excess-priority (low | high | $junos-cos-scheduler-excess-priority);
excess-rate (percent percentage | percent $junos-cos-scheduler-excess-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
priority priority-level;
shaping-rate (rate | predefined-variable);
transmit-rate (percent percentage | rate | remainder) <exact | rate-limit>;
}
}
traffic-control-profiles profile-name {
delay-buffer-rate (percent percentage | rate | $junos-cos-delay-buffer-rate);
excess-rate (percent percentage | proportion value | percent $junos-cos-excess-rate);
guaranteed-rate (percent percentage | rate | $junos-cos-guaranteed-rate);
overhead-accounting (shaping-mode) <bytes (byte-value>;
scheduler-map map-name;
shaping-rate (rate | predefined-variable);
}
}
firewall {
family family {
fast-update-filter filter-name {
interface-specific;
match-order [match-order];
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
only-at-create;
}
}
filter uid {
enhanced-mode-override;
interface-shared;
interface-specific;
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
}
}
}
policer uid {
filter-specific;
if-exceeding {
(bandwidth-limit bps | bandwidth-percent percentage);
burst-size-limit bytes;
}
logical-bandwidth-policer;
logical-interface-policer;
physical-interface-policer;
then {
policer-action;
}
}
hierarchical-policer uid {
aggregate {
if-exceeding {
bandwidth-limit-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
premium {
if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
}
three-color-policer uid {
action {
loss-priority high then discard;
}
logical-interface-policer;
single-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
excess-burst-size bytes;
}
two-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
peak-burst-size bytes;
peak-information-rate bps;
}
}
}
}
policy-options {
prefix-list uid {
ip-addresses;
dynamic-db;
}
}
interfaces interface-name {
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
}
unit logical-unit-number {
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
}
encapsulation (atm-ccc-cell-relay | atm-ccc-vc-mux | atm-cisco-nlpid |
atm-tcc-vc-mux | atm-mlppp-llc | atm-nlpid | atm-ppp-llc | atm-ppp-vc-mux |
atm-snap | atm-tcc-snap | atm-vc-mux | ether-over-atm-llc |
ether-vpls-over-atm-llc | ether-vpls-over-fr | ether-vpls-over-ppp | ethernet |
frame-relay-ccc | frame-relay-ppp | frame-relay-tcc | frame-relay-ether-type |
frame-relay-ether-type-tcc | multilink-frame-relay-end-to-end | multilink-ppp |
ppp-over-ether | ppp-over-ether-over-atm-llc | vlan-bridge | vlan-ccc | vlan-vci-ccc
| vlan-tcc | vlan-vpls);
family family {
address address;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name (
precedence precedence;
}
output filter-name {
precedence precedence;
}
}
rpf-check {
fail-filter filter-name;
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
}
unnumbered-address interface-name <preferred-source-address address>;
}
ppp-options {
chap;
pap;
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
interfaces {
demux0 {...}
}
interfaces {
pp0 {...}
}
protocols {
igmp {
interface interface-name {
accounting;
disable;
group-policy;
immediate-leave
no-accounting;
promiscuous-mode;
ssm-map ssm-map-name;
static {
group group {
source source;
}
}
version version;
}
mld {
interfaceinterface-name {
disable;
(accounting | no-accounting);
group-policy;
immediate-leave;
oif-map;
passive;
ssm-map ssm-map-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
version version;
}
}
router-advertisement {
interface interface-name {
current-hop-limit number;
default-lifetime seconds;
(managed-configuration | no-managed-configuration);
max-advertisement-interval seconds;
min-advertisement-interval seconds;
(other-stateful-configuration | no-other-stateful-configuration);
prefix prefix;
reachable-time milliseconds;
retransmit-timer milliseconds;
}
}
}
}
routing-instances routing-instance-name {
interface interface-name;
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
rib routing-table-name {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
routing-options {
access {
route prefix {
next-hop next-hop;
metric route-cost;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
}
variables {
variable-name {
default-value default-value;
equals expression;
mandatory;
uid;
uid-reference;
}
}
}
}
Description Create dynamic profiles for use with DHCP or PPP client access.
effective-shaping-rate
Syntax effective-shaping-rate;
Description Specify that the Cos-Effective-Shaping-Rate VSA [26–177] included in RADIUS Acct-Start,
Acct-Stop, and Interim-Acct messages reports the actual rate of the downstream traffic
for a subscriber, in kilobits per second.
Related • Reporting the Effective Shaping Rate for Subscribers on page 127
Documentation
enhanced-mode
Syntax enhanced-mode;
Description Limit static service filters or API-client filters to term-based filter format only for inet or
inet6 families when enhanced network services mode is configured at the [edit chassis
network-services] hierarchy level. When used with one of the chassis enhanced network
services modes, firewall filters are generated in term-based format for use with MPC
modules.
If enhanced network services are not configured for the chassis, the enhanced-mode
statement is ignored and any enhanced mode firewall filters are generated in both
term-based and, the default, compiled format. Only term-based (enhanced) firewall
filters will be generated, regardless of the setting of the enhanced-mode statement at
the [edit chassis network-services] hierarchy level, if any of the following are true:
• Flexible filter match conditions are configured at the [edit firewall family family-name
filter filter-name term term-name from] or [edit firewall filter filter-name term term-name
from] hierarchy levels.
• A match condition is configured that only works with MPC cards, such as firewall bridge
filters for IPv6 traffic.
NOTE: Do not use enhanced mode for firewall filters that are intended for
control plane traffic. Control plane filtering is handled by the Routing Engine
kernel, which cannot use the term-based format of the enhanced mode filters.
For packets sourced from the Routing Engine, the Routing Engine processes
Layer 3 packets by applying output filters to the packets and forwards Layer
2 packets to the Packet Forwarding Engine for transmission. By configuring
the enhanced mode filter, you explicitly specify that only the term-based
filter format is used, which also implies that the Routing Engine cannot use
this filter.
• Firewall Filters and Enhanced Network Services Mode Overview on page 311
• Configuring a Filter for Use with Enhanced Network Services Mode on page 313
enhanced-mode-override
Syntax enhanced-mode-override;
Description Overrides the default filter enhanced-mode of dynamic service filters when the chassis
is running in network-services enhanced IP mode. It functions similarly to the
enhanced-mode statement used to override the default IP mode of static filters when
the chassis is running in network-services enhanced IP mode.
When the chassis is running in network-service enhanced IP mode, all dynamic service
inet and inet6 firewall filters are automatically generated in term-based filter format
only. For any dynamic service filter that must be generated in both term-based and
compiled formats, you must specifically configure the enhanced-mode-override statement
for that filter definition.
Similar to how the filter enhanced-mode statement functions, if the chassis is not running
in network-services enhanced IP mode, then the enhanced-mode-override statement is
ignored.
• Firewall Filters and Enhanced Network Services Mode Overview on page 311
• Configuring a Filter for Use with Enhanced Network Services Mode on page 313
enhanced-policer
Syntax enhanced-policer
Description Collect additional statistics to be displayed using show commands. An FPC restart is
required after changing this configuration.
When you commit a configuration that contains the enhanced-policer statement at the
[edit chassis] hierarchy level, a warning message is displayed stating that all the FPCs
in the router need to be rebooted for the configuration changes to become effective. At
this point, you must confirm that you want to proceed with the reboot of the FPCs. If you
do not reboot the FPCs, the FPCs return all 0s (zeros) when you perform a query for the
retrieval of detailed statistics—for example, when you issue the show firewall detail
command.
• show policer
excess-burst-size
Description For a single-rate three-color policer, configure the excess burst size (EBS) as a number
of bytes. The EBS allows for moderate periods of bursting traffic that exceeds both the
committed information rate (CIR) and the committed burst size (CBS).
Traffic that exceeds both the CIR and the CBS is considered nonconforming.
Single-rate three-color policing uses a dual token bucket algorithm to measure traffic
against a single rate limit. Nonconforming traffic is categorized as yellow or red based
on the excess-burst-size statement included in the policer configuration.
During periods of traffic that conforms to the CIR, any unused portion of the guaranteed
bandwidth capacity accumulates in the first token bucket, up to the maximum number
of bytes defined by the CBS. If any accumulated bandwidth capacity overflows the first
bucket, the excess accumulates in a second token bucket, up to the maximum number
of bytes defined by the EBS.
A nonconforming traffic flow is categorized red if its size exceeds the bandwidth capacity
accumulated in the second token bucket. Packets in a red traffic flow are marked with
high PLP and then either passed through the interface or optionally discarded.
Options bytes—Number of bytes. You can specify a value in bytes either as a complete decimal
number or as a decimal number followed by the abbreviation k (1000),
m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000 bytes
Description Determine the priority of excess bandwidth traffic on a scheduler in a dynamic profile.
none—System does not demote the priority of guaranteed traffic when the bandwidth
exceeds the shaping rate or the guaranteed rate.
Related • Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
Documentation on page 138
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
on page 138
Description For an MPC interface, determine the percentage or proportion of excess bandwidth traffic
to share for all priorities of traffic.
$junos-cos-excess-rate—Variable for the excess rate that is specified for the logical
interface. The variable is replaced with a value obtained from the RADIUS server
when a subscriber authenticates over the interface to which the dynamic profile is
attached.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
on page 138
Description For an MPC/MIC interface, determine the percentage of excess bandwidth for high-priority
traffic to share.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
on page 138
Description For an MPC/MIC interface, determine the percentage of excess bandwidth for low-priority
traffic to share.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Managing Excess Bandwidth Distribution for Dynamic CoS on MIC and MPC Interfaces
on page 138
Syntax exclude;
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static group
multicast-group-address]
Description Configure the group to operate in exclude mode on the dynamic interface. In exclude
mode all sources except the address configured are accepted for the group. By default,
the group operates in include mode.
Hierarchy Level [edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family family
rpf-check],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family rpf-check]
Description Specify a filter that evaluates packets that fail a unicast RPF check. The filter determines
what action to take with the failed packets. If the fail filter is not configured, the failed
packets are silently discarded.
Options filter-name—Name of the filter that evaluates packets that fail the RPF check.
Description Configure fast update filters or parameterized filters for a protocol family.
NOTE: Not all subordinate stanzas are available to every protocol family.
• pppoe—(MX Series routers with MPCs only) Point-to-Point Protocol over Ethernet
Options filter-name—Name that identifies the filter. The name can contain letters, numbers, and
hyphens (-) and can be up to 64 characters long. To include spaces in the name,
enclose it in quotation marks (“ ”).
filter (Configuring)
Options filter-name—Name that identifies the filter. This must be a non-reserved string of not
more than 64 characters. To include spaces in the name, enclose it in quotation
marks (“ ”). Firewall filter names are restricted from having the form __.*__ (beginning
and ending with underscores) or __.* (beginning with an underscore.
• simple-filter (Configuring)
Syntax filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family],
[edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family
family],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family]
Description Apply a dynamic filter to an interface. You can configure filters for either family inet or
family inet6, and the filters can be classic filters, fast update filters, or (for the adf
statement) Ascend-Data-Filters. Only the Internet Protocol version 4 (IPv4) protocol
family is currently supported for dynamic PPPoE logical interfaces.
Options input filter-name—Name of one filter to evaluate when packets are received on the
interface.
output filter-name—Name of one filter to evaluate when packets are transmitted on the
interface.
Syntax filter {
input filter-name;
output filter-name;
}
Options input filter-name—Name of one filter to evaluate when packets are received on the
interface.
output filter-name—Name of one filter to evaluate when packets are transmitted on the
interface.
• Dynamically Attaching Statically Created Filters for Any Interface Type on page 246
filter-specific
Syntax filter-specific;
Description Set the prefix-specific action or policer to operate in filter-specific mode, meaning that
a single policer and counter are shared by all filter terms that reference the prefix-specific
action or policer. By default, the prefix-specific action or policer operates in term-specific
mode, meaning that a separate policer and counter are used for each filter term that
references the prefix-specific action or policer.
Syntax firewall {
family family {
fast-update-filter filter-name {
interface-specific;
match-order [match-order];
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
only-at-create;
}
}
}
filter uid {
enhanced-mode-override;
interface-shared;
interface-specific;
term term-name {
from {
match-conditions;
}
then {
action;
action-modifiers;
}
}
}
hierarchical-policer uid {
aggregate {
if-exceeding {
bandwidth-limit-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
premium {
if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
then {
policer-action;
}
}
}
policer uid {
filter-specific;
if-exceeding {
(bandwidth-limit bps | bandwidth-percent percentage);
burst-size-limit bytes;
}
logical-bandwidth-policer;
logical-interface-policer;
physical-interface-policer;
then {
policer-action;
}
}
three-color-policer uid {
action {
loss-priority high then discard;
}
logical-interface-policer;
single-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
excess-burst-size bytes;
}
two-rate {
(color-aware | color-blind);
committed-burst-size bytes;
committed-information-rate bps;
peak-burst-size bytes;
peak-information-rate bps;
}
}
}
Options uid—You must assign a variable UID as the name of firewall filters and policers.
Related • Methods for Regulating Traffic by Applying Hierarchical Policers on page 317
Documentation
• Configuring Fast Update Filters on page 288
flow-tap-dtcp
Syntax flow-tap-dtcp {
ssh {
connection-limit limit;
rate-limit limit;
}
}
Description Configure Dynamic Tasking Control Protocol (DTCP) sessions to run over SSH in support
of the flow-tap application. Note that the flow-tap feature is not supported on outbound,
or egress, traffic. Only inbound, or ingress, traffic is supported.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Description Specify forwarding class that is applied to mirrored packets sent to a mediation device.
Description Configure properties for the DPC or MPC and corresponding Packet Forwarding Engines
to create tunnel interfaces.
(MX Series Virtual Chassis only) When you configure chassis properties for MPCs installed
in a Virtual Chassis member router, statements included at the [edit chassis member
member-id fpc slot slot-number] hierarchy level apply to the MPC in the specified slot
number only on the specified member router in the Virtual Chassis. Statements included
at the [edit chassis fpc slot slot-number] hierarchy level apply to the MPCs in the specified
slot number on each member router in the Virtual Chassis.
BEST PRACTICE: To ensure that the statement you use to configure MPC
chassis properties in an MX Series Virtual Chassis applies to the intended
member router and MPC, we recommend that you always include the member
member-ID option before the fpc statement, where member-id is 0 or 1 for a
two-member MX Series Virtual Chassis.
pic number—Specify the number of the Packet Forwarding Engine. Each DPC includes
four Packet Forwarding Engines.
Range: 0 through 4
Description Configure the mode to shape downstream ATM traffic based as frames.
Options bytes—Byte adjustment value for the cell-mode or frame-mode shaping options.
NOTE: If you specify a value for the bytes bytes option, you cannot specify a
value for either the frame-mode-bytes option.
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• egress-shaping-overhead
Syntax from {
application [junos-http, junos-https, junos-httpproxy];
destination-address address <except>;
destination-prefix-list list-name <except>;
}
Syntax from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
Syntax For group configuration with a source, use the following syntax:
group ip-address {
source ip-address;
}
group group;
Hierarchy Level [edit dynamic-profiles profile-name protocols igmp interface interface-name static],
Description When configuring with a source address, configure the IGMP multicast group address
that receives data on an interface and a source address for certain packets. For
configuration without a source address, configure only the IGMP multicast group address
that receives data on an interface.
group—Name of group.
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static]
Description The MLD multicast group address and (optionally) the source address for the multicast
group being dynamically configured on an interface.
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static group
multicast-group-address]
Description Configure the number of static groups to be created over the dynamic interface.
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static group
multicast-group-address source]
Description Configure the number of times the address should be incremented for each static group
created on a dynamic interface. The increment is specified in a format similar to an IPv6
address.
Description Configure a limit for the number of multicast groups (or [S,G] channels in IGMPv3)
allowed on a dynamic logical interface. After this limit is reached, new reports will be
ignored and all related flows are not flooded on the logical interface.
Default By default, there is no limit to the number of multicast groups that can join the interface.
Description Configure a limit for the number of multicast groups (or [S,G] channels in MLDv2) allowed
on a dynamic logical interface. After this limit is reached, new reports will be ignored and
all related flows are not flooded on the logical interface.
Default By default, there is no limit to the number of multicast groups that can join the interface.
Description Compare the IGMPv2 or IGMPv3 group against the specified group policy, after receiving
an IGMP report, and perform the action configured in that policy (for example, reject the
report).
Description Compare the MLDv1 or MLDv2 group against the specified group policy, after receiving
an MLD report, and perform the action configured in that policy (for example, reject the
report).
Default If you do not include this statement and you do not include the delay-buffer-rate
statement, the logical interface receives a minimal delay-buffer rate and minimal
bandwidth equal to 2 MTU-sized packets.
Options rate—Guaranteed rate in bits per second (bps). You can specify a value in bits per second
either as a complete decimal number or as a decimal number followed by the
abbreviation k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1000 through 6,400,000,000,000 bps
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Traffic Scheduling and Shaping for Subscriber Access on page 11
hierarchical-policer
Description Specify a hierarchical policer on Enhanced Intelligent Queuing (IQE) PICs and SONET
interfaces hosted on M120 and M320 edge routers with incoming Flexible PIC
Concentrators (FPCs) as SFPC and outgoing FPCs as FFPC; on MPCs hosted on MX
Series routers; on T320, T640, and T1600 core routers with Enhanced Intelligent Queuing
(IQE) PICs; and on T4000 routers with Type 5 FPC and Enhanced Scaling Type 4 FPC.
Options hierarchical-policer-name—Name that identifies the policer. The name can contain letters,
numbers, and hyphens (-), and can be up to 255 characters long. To include spaces
in the name, enclose it in quotation marks (“ ”).
Syntax hierarchical-scheduler {
implicit-hierarchy;
maximum–hierarchy–levels number;
}
• GRE tunnel interfaces configured on physical interfaces hosted on MIC or MPC line
cards in MX Series routers
• If you include the maximum-hierarchy-levels option, interface sets are allowed only at
level 3; they are not allowed at level 2. In this case, if you configure a level 2 interface
set, you generate Packet Forwarding Engine errors.
Related • Understanding Two-Level and Three-Level Hierarchical CoS for Subscriber Interfaces
Documentation on page 25
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Rewrite Rule Definition to a Subscriber Interface in a Dynamic Profile on
page 219
• rewrite-rules
Syntax if-exceeding {
bandwidth-limit bps;
burst-size-limit bytes;
}
Description For M40e, M120, and M320 (with FFPC and SFPC) edge routers and T320, T640, and
T1600 core routers with Enhanced Intelligent Queuing (IQE) PICs, T4000 routers with
Type 5 FPC and Enhanced Scaling Type 4 FPC, specify bandwidth and burst limits for a
premium or aggregate component of a hierarchical policer.
if-exceeding (Policer)
Syntax if-exceeding {
(bandwidth-limit bps | bandwidth-percent number);
burst-size-limit bytes;
}
• Bandwidth Policers
• Multifield Classification
• Hierarchical Policers
Syntax igmp {
interface interface-name {
accounting;
disable;
group-limit policy-name;
group-policy;
immediate-leave;
no-accounting;
oif-map map-name;
passive <allow-receive> <send-general-query> <send-group-query>;
promiscuous-mode;
ssm-map ssm-map-name;
static {
group group {
source source;
}
}
version version;
}
}
Description Enable IGMP on the router. IGMP must be enabled for the router to receive multicast
packets.
Default IGMP is disabled on the router. IGMP is automatically enabled on all broadcast interfaces
when you configure Protocol Independent Multicast (PIM) or Distance Vector Multicast
Routing Protocol (DVMRP).
• Understanding IGMP
• Enabling IGMP
Syntax immediate-leave;
Description Enable the routing device to leave the multicast group immediately after the last host
leaves the multicast group.
Syntax immediate-leave;
Description The immediate leave setting is useful for minimizing the leave latency of MLD
memberships. When this setting is enabled, the routing device leaves the multicast group
immediately after the last host leaves the multicast group.
The immediate-leave setting enables host tracking, meaning that the device keeps track
of the hosts that send join messages. This allows MLD to determine when the last host
sends a leave message for the multicast group.
When the immediate leave setting is enabled, the device removes an interface from the
forwarding-table entry without first sending MLD group-specific queries to the interface.
The interface is pruned from the multicast tree for the multicast group specified in the
MLD leave message. The immediate leave setting ensures optimal bandwidth
management for hosts on a switched network, even when multiple multicast groups are
being used simultaneously.
When immediate leave is disabled and one host sends a leave group message, the routing
device first sends a group query to determine if another receiver responds. If no receiver
responds, the routing device removes all hosts on the interface from the multicast group.
Immediate leave is disabled by default for both MLD version 1 and MLD version 2.
NOTE: Although host tracking is enabled for IGMPv2 and MLDv1 when you
enable immediate leave, use immediate leave with these versions only when
there is one host on the interface. The reason is that IGMPv2 and MLDv1 use
a report suppression mechanism whereby only one host on an interface sends
a group join report in response to a membership query. The other interested
hosts suppress their reports. The purpose of this mechanism is to avoid a
flood of reports for the same group. But it also interferes with host tracking,
because the router only knows about the one interested host and does not
know about the others.
Syntax inet {
drop-policy rule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
Description Specify the inet family for the policy that is applied to mirrored packets sent to a mediation
device.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
default—The default mapping. By default, IP precedence rewrite rules alter the first three
bits on the type of service (ToS) byte while leaving the last three bits unchanged.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Rewrite Rule Definition to a Subscriber Interface in a Dynamic Profile on
page 219
• rewrite-rules
Syntax inet6 {
drop-policy rule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
Description Specify the inet6 family for the policy that is applied to mirrored packets sent to a
mediation device.
Syntax input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family service]
Description Define the input service sets and filters to be applied to traffic by a dynamic profile. Only
the Internet Protocol version 4 (IPv4) protocol family is currently supported for dynamic
PPPoE logical interfaces.
• Enabling IGMP
In a dynamic profile that defines an agent circuit identifier (ACI) interface set, observe
the following guidelines when you use the interface statement:
Options interface-name–Either the specific name of the interface to include in the interface set,
or the predefined dynamic interface variable $junos-interface-ifd-name. The interface
variable is dynamically replaced with the interface that the DHCP or PPPoE subscriber
accesses when connecting to the router.
Syntax interfaceinterface-name {
disable;
(accounting | no-accounting);
group-policy;
immediate-leave;
oif-map;
passive;
ssm-map ssm-map-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
version version;
}
Description Define the maximum bandwidth for a dynamic interface on which you want to apply
bandwidth management.
Options interface-name—Names of the physical or logical interface. For details about specifying
interfaces, see Types of Interfaces Overview.
Description For MX Series routers with enhanced queuing DPCs or MPC/MIC modules, configure an
interface set for dynamic CoS.
interface-shared
Syntax interface-shared;
Syntax interface-specific;
Hierarchy Level [edit dynamic-profiles profile-name firewall family family fast-update-filter filter-name]
Description Configure interface-specific names for firewall counters that are based on fast update
filters.
Syntax interfaces {
interface-name {
unit logical-unit-number {
classifiers {
dscp (classifier-name | default);
dscp-ipv6 (classifier-name | default);
ieee-802.1 (classifier-name | default) vlan-tag (inner | outer)
inet-precedence (classifier-name | default);
}
output-traffic-control-profile (profile-name | $junos-cos-traffic-control-profile);
rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
}
}
Options interface-name—Either the specific name of the interface you want to assign to the
dynamic profile or the interface variable ($junos-interface-ifd-name). The interface
variable is dynamically replaced with the interface the client accesses when
connecting to the router.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying Traffic Shaping and Scheduling to a Subscriber Interface in a Dynamic Profile
on page 217
Syntax interfaces {
interface-name {
unit logical-unit-number {
auto-configure {
agent-circuit-identifier {
dynamic-profile profile-name;
}
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
filter {
adf {
counter;
input-precedence precedence;
not-mandatory;
output-precedence precedence;
rule rule-value;
}
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;shared-name filter-shared-name;
}
}
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
mode loose;
}
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max
maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name;
shared-name filter-shared-name;
output filter-name;
shared-name filter-shared-name;
}
ppp-options {
chap;
pap;
}
proxy-arp;
vlan-id;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
vlan-tagging;
}
interface-set interface-set-name {
interface interface-name {
unit logical unit number {
advisory-options {
downstream-rate rate;
upstream-rate rate;
}
}
}
pppoe-underlying-options {
max-sessions number;
}
}
demux0 {
unit logical-unit-number {
demux-options {
underlying-interface interface-name
}
family family {
access-concentrator name;
address address;
direct-connect;
duplicate-protection;
dynamic-profile profile-name;
demux-source {
source-prefix;
}
filter{
input filter-name (
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
mac-validate (loose | strict):
max-sessions number;
max-sessions-vsa-ignore;
rpf-check {
fail-filter filter-name;
mode loose;
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max
maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
}
filter {
input filter-name;
output filter-name;
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
pp0 {
unit logical-unit-number {
keepalives interval seconds;
no-keepalives;
pppoe-options {
underlying-interface interface-name;
server;
}
ppp-options {
authentication [ authentication-protocols ];
chap {
challenge-length minimum minimum-length maximum maximum-length;
}
pap;
}
family inet {
unnumbered-address interface-name;
address address;
service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
filter {
input filter-name {
precedence precedence;
shared-name filter-shared-name;
}
output filter-name {
precedence precedence;
shared-name filter-shared-name;
}
}
}
}
}
}
NOTE: Though we do not recommend it, you can also enter the specific name
of the interface you want to assign to the dynamic profile.
Related • Configuring Dynamic Subscriber Interfaces Using IP Demux Interfaces in Dynamic Profiles
Documentation
• Configuring Dynamic PPPoE Subscriber Interfaces Using Dynamic Profiles
Description Specify tunnel interfaces that are used to send mirrored packets to a mediation device.
logical-bandwidth-policer
Syntax logical-bandwidth-policer;
Description For a policer with a bandwidth limit configured as a percentage (using the
bandwidth-percent statement), specify that the percentage be based on the shaping
rate defined on the logical interface, rather than on the media rate of the physical interface.
• interface-specific statement
Syntax logical-interface-fpc-redundancy;
Description Provide module redundancy for demux subscribers on aggregated Ethernet bundles
configured with targeted distribution. Backup links for a subscriber are chosen on a
different EQ DPC or MPC from the primary link, based on the link with the fewest number
of subscribers among the links on different modules. If all links are on a single module
when this is configured, backup links are not provisioned.
Related • Configuring Link and Module Redundancy for Demux Subscribers in an Aggregated
Documentation Ethernet Interface on page 146
logical-interface-policer
Syntax logical-interface-policer;
• action
login
Syntax login {
announcement text;
class class-name {
allow-commands "regular-expression";
allow-configuration-regexps "regular expression 1" "regular expression 2";
configuration-breadcrumbs;
deny-commands "regular-expression";
( deny-configuration | deny-configuration-regexps ) “regular expression 1” “regular
expression 2 ”;
idle-timeout minutes;
login-script filename;
login-tip;
permissions [ permissions ];
}
message text;
password {
change-type (set-transitions | character-set);
format (md5 | sha1 | des);
maximum-length length;
minimum-changes number;
minimum-length length;
}
retry-options {
backoff-threshold number;
backoff-factor seconds;
minimum-time seconds;
tries-before-disconnect number;
}
user username {
full-name complete-name;
uid uid-value;
class class-name;
authentication authentication;
(encrypted-password "password" | plain-text-password);
ssh-rsa "public-key";
ssh-dsa "public-key";
}
}
Description Specify a loss priority to which to apply a drop profile in a dynamic profile. The drop profile
map sets the drop profile for a specific PLP and protocol type. The inputs for the map
are the PLP designation and the protocol type. The output is the drop profile.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Description For packets with high loss priority, discard the packets. The loss priority setting is implicit
and is not configurable. Include this statement if you do not want the local router to
forward packets that have high packet loss priority.
For single-rate three-color policers, the Junos OS assigns high loss priority to packets
that exceed the committed information rate and the excess burst size.
For two-rate three-color policers, the Junos OS assigns high loss priority to packets that
exceed the peak information rate and the peak burst size.
Hierarchy Level [edit services captive-portal-content-delivery rule (Captive Portal Content Delivery)
rule-name]
Options input—Apply the rule match on the input side of the interface.
max-queues-per-interface
Description On IQ, MPC, and DPC interfaces on M120, T320, T640, T1600, TX Matrix, and TX Matrix
Plus routers, or on MIC or MPC interfaces on MX Series routers, configure eight egress
queues.
Related • Configuring the Junos OS to Support Eight Queues on IQ Interfaces for T Series and M320
Documentation Routers
• Configuring the Maximum Number of Queues for Trio MPC/MIC Interfaces on page 94
Hierarchy Level [edit dynamic-profiles profile-name firewall family family fast-update-filter filter-name]
Description Specify the match conditions and the order in which the conditions are examined. Enclose
a string of multiple conditions in brackets. The router examines only the conditions you
specify, and examines them in the specified order.
Options match-order—One or more of the following conditions. “Fast Update Filter Match
Conditions” on page 292 describes the match conditions.
• destination-address
• destination-port
• source-address
• source-port
Syntax mld {
interfaceinterface-name {
disable;
(accounting | no-accounting);
group-policy;
immediate-leave;
oif-map;
passive;
ssm-map ssm-map-name;
static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
version version;
}
}
Syntax multicast {
interface interface-name {
no-qos-adjust;
}
}
NOTE: You cannot apply a scope policy to a specific routing instance. That
is, all scoping policies are applied to all routing instances. However, the scope
statement does apply individually to a specific routing instance.
Syntax multicast-interception;
Description Enables subscriber secure policy to mirror IPv4 multicast traffic sent to subscribers. It
enables the mirroring of multicast traffic for all subscribers on the chassis.
Mirroring of multicast traffic is supported only for subscribers in the default logical system.
no-accounting
Syntax no-accounting;
Description Disable the collection of IGMP join and leave event statistics on a per-interface basis.
Syntax no-qos-adjust;
Description Disable hierarchical bandwidth adjustment for all dynamically created subscriber
interfaces that are identified by their MLD or IGMP request from a specific multicast
interface.
Description Associates an OIF map to the IGMP interface using a dynamic profile. The OIF map is a
routing policy statement that can contain multiple terms.
Description Associate an outgoing interface (OIF) map to a dynamic MLD logical interface. The OIF
map is a routing policy statement that can contain multiple terms.
Syntax output {
service-set service-set-name {
service-filter filter-name;
}
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family service]
Description Define the output service sets and filters to be applied to traffic by a dynamic profile.
Only the Internet Protocol version 4 (IPv4) protocol family is currently supported for
dynamic PPPoE logical interfaces.
Description Apply an output traffic scheduling and shaping profile to the logical interface.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying Traffic Shaping and Scheduling to a Subscriber Interface in a Dynamic Profile
on page 217
• Using the CLI to Modify Traffic-Control Profiles That Are Currently Applied to Subscribers
Syntax overhead-accounting {
bytes bytes;
cell-mode cell-mode-bytes cell-mode-bytes;
frame-mode frame-mode-bytes frame-mode-bytes;
}
Description Configure the mode to shape downstream ATM traffic based on either frames or cells.
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
• egress-shaping-overhead
Description Dynamically specify that IGMP run on the interface and either not send and receive control
traffic or selectively send and receive control traffic such as IGMP reports, queries, and
leaves.
NOTE: You can selectively activate up to two out of the three available
options for the passive statement while keeping the other functions passive
(inactive). Activating all three options would be equivalent to not using the
passive statement.
• Configuring IGMP
Description Specify that MLD run on the interface and either not send and receive control traffic or
selectively send and receive control traffic such as MLD reports, queries, and leaves.
NOTE: You can selectively activate up to two out of the three available
options for the passive statement while keeping the other functions passive
(inactive). Activating all three options would be equivalent to not using the
passive statement.
peak-burst-size
Description For a two-rate three-color policer, configure the peak burst size (PBS) as a number of
bytes. The PBS defines the maximum number of bytes of unused peak bandwidth capacity
that can be accumulated. The accumulated bandwidth allows for moderate periods of
bursting traffic that exceeds the peak information rate (PIR) and the committed burst
size (CBS).
Two-rate three-color policers use a dual-rate dual token bucket algorithm to measure
traffic against two rate limits.
• A traffic flow is categorized yellow if exceeds the CIR and CBS but conforms to the
PIR. Packets in a yellow flow are marked with medium-high packet loss priority (PLP)
and then passed through the interface.
• A traffic flow is categorized red if exceeds the PIR and the PBS-bounded accumulation
of available peak bandwidth capacity. Packets in a red traffic flow are marked with
high PLP and then either passed through the interface or optionally discarded.
Options bytes—Number of bytes. You can specify a value in bytes either as a complete decimal
number or as a decimal number followed by the abbreviation k (1000),
m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000 bytes
peak-information-rate
Description For a two-rate three-color policer, configure the peak information rate (PIR) as a number
of bits per second. The PIR is the maximum rate for traffic arriving at or departing from
the interface under peak line conditions. Traffic that exceeds the committed information
rate (CIR) and the committed burst size (CBS) is metered to the PIR.
Two-rate three-color policers use a dual-rate dual token bucket algorithm to measure
traffic against two rate limits.
• A traffic flow is categorized green if it conforms to both the CIR and the CBS-bounded
accumulation of available committed bandwidth capacity.
• A traffic flow is categorized yellow if exceeds the CIR and CBS but conforms to the
PIR. Packets in a yellow flow are marked with medium-high packet loss priority (PLP)
and then passed through the interface.
• A traffic flow is categorized red if exceeds the PIR and the PBS-bounded accumulation
of available peak bandwidth capacity. Packets in a red traffic flow are marked with
high PLP and then either passed through the interface or optionally discarded.
Options bps—Number of bits per second. You can specify a value in bits per second either as a
complete decimal number or as a decimal number followed by the abbreviation
k (1000), m (1,000,000), or g (1,000,000,000).
Range: 1500 through 100,000,000,000 bps
permissions
Description Configure the login access privileges to be provided on the router or switch.
Options permissions—Privilege type. For a list of permission flag types, see Understanding Junos
OS Access Privilege Levels.
physical-interface-policer
Syntax physical-interface-policer;
A physical interface policer can be a two-color or three-color policer. When you apply
physical interface policer, to different protocol families on the same logical interface, the
protocol families share the same policer instance. This means that rate limiting is
performed aggregately for the protocol families for which the policer is applied. This
feature enables you to use a single policer instance to perform aggregate policing for
different protocol families on the same physical interface. If you want a policer instance
to be associated with a protocol family, the corresponding physical interface filter needs
to be applied to that protocol family. The policer is not automatically applied to all
protocol families configured on the physical interface.
In contrast, with logical interface policers there are multiple separate policer instances.
policer (Configuring)
Description Configure policer rate limits and actions. When included at the [edit firewall] hierarchy
level, the policer statement creates a template, and you do not have to configure a policer
individually for every firewall filter or interface. To activate a policer, you must include
the policer-action modifier in the then statement in a firewall filter term or on an interface.
policer-name—Name that identifies the policer. The name can contain letters, numbers,
and hyphens (-), and can be up to 255 characters long. To include spaces in the
name, enclose it in quotation marks (“ ”). Policer names cannot begin with an
underscore in the form __.*.
• priority (Schedulers)
Description Specify the policy that is applied to mirrored packets sent to a mediation device.
Syntax policy-options {
prefix-list uid {
ip-addresses;
dynamic-db;
}
}
Description Define a list of IPv4 or IPv6 address prefixes for use in a dynamic firewall filter or in an
HTTP redirect configuration.
You can configure up to 85,325 prefixes in each prefix list. To configure more than 85,325
prefixes, configure multiple prefix lists and apply them to multiple firewall filter terms.
Options uid—Unique identifier of the prefix list. You must assign a UID as the prefix list name.
ip-addresses—List of IPv4 or IPv6 address prefixes, one IP address per line in the
configuration.
dynamic-db—Specify that the routing policy and policy objects reference policies
configured in the dynamic database at the [edit dynamic] hierarchy level.
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service input],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family service input]
Description Define the filter to be applied to traffic after service processing. The filter is applied only
if a service set is configured and selected. You can configure a postservice filter on the
input side of the interface only. Only the Internet Protocol version 4 (IPv4) protocol family
is currently supported for dynamic PPPoE logical interfaces.
Syntax pppoe-tags {
priority priority;
algorithm algorithm;
}
Description Configure the shaping rate adjustment controls for the Point-to-Point Protocol over
Ethernet (PPPoE) Tags application.
Options priority—Priority of the Point to Point Protocol over Ethernet IA Tags application in the
adjustment control profile.
Range: 1 through 10; 1 being the highest priority.
Default: 2
algorithm—Rate adjustment algorithm used by the Point to Point Protocol over Ethernet
(PPPoE) IA Tags application.
Values:
• adjust-never—Do not perform rate adjustments.
Default: adjust-less
precedence
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family filter input filter-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family filter output filter-name],
[edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family family
filter input filter-name],
[edit dynamic-profiles profile-name interfaces demux0 unit logical-unit-number family family
filter output filter-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family filter input filter-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family filter output filter-name]
Description Apply a precedence to a dynamic filter. Only the Internet Protocol version 4 (IPv4) protocol
family is currently supported for dynamic PPPoE logical interfaces.
Options precedence—Precedence value for the filter. The lower the precedence value, the higher
the precedence.
Range: 0 through 250
Default: 0
Syntax premium {
if-exceeding {
bandwidth-limit bandwidth;
burst-size-limit burst;
}
then {
discard;
}
}
Description On M40e, M120, and M320 edge routers with FPC input as FFPC and FPC output as SFPC,
and on MX Series, T320, T640, and T1600 edge routers with Enhanced Intelligent Queuing
(IQE) PICs, T4000 routers with Type 5 FPC and Enhanced Scaling Type 4 FPC, specify
a premium level for a hierarchical policer.
• Hierarchical Policers
• high—Scheduler has high priority. Assigning high priority to a queue prevents the queue
from being underserved.
• strict-high—Scheduler has strictly high priority. Configure a high priority queue with
unlimited transmission bandwidth available to it. As long as it has traffic to send, the
strict-high priority queue receives precedence over low, medium-low, and medium-high
priority queues, but not high priority queues. You can configure strict-high priority on
only one queue per interface.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
profile (Access)
idle-timeout seconds;
interface-id interface-id;
keepalive seconds;
primary-dns primary-dns;
primary-wins primary-wins;
secondary-dns secondary-dns;
secondary-wins secondary-wins;
}
user-group-profile profile-name;
}
domain-name-server;
domain-name-server-inet;
domain-name-server-inet6;
preauthentication-order preauthentication-method;
provisioning-order (gx-plus | jsrc);
radius {
accounting-server [ ip-address ];
attributes {
exclude {
...
}
ignore {
framed-ip-netmask;
input-filter;
logical-system:routing-instance;
output-filter;
}
}
authentication-server [ ip-address ];
options {
accounting-session-id-format (decimal | description);
calling-station-id-delimiter delimiter-character;
calling-station-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
client-accounting-algorithm (direct | round-robin);
client-authentication-algorithm (direct | round-robin);
coa-dynamic-variable-validation;
ethernet-port-type-virtual;
interface-description-format {
exclude-adapter;
exclude-sub-interface;
}
juniper-dsl-attributes;
nas-identifier identifier-value;
nas-port-extended-format {
adapter-width width;
ae-width width;
port-width width;
slot-width width;
stacked-vlan-width width;
vlan-width width;
atm {
adapter-width width;
port-width width:
slot-width width;
vci-width width:
vpi-width width;
}
}
nas-port-id-delimiter delimiter-character;
nas-port-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
nas-port-type {
ethernet {
port-type;
}
}
revert-interval interval;
vlan-nas-port-stacked-format;
}
preauthentication-server ip-address;
}
radius-server server-address {
accounting-port port-number;
accounting-retry number;
accounting-timeout seconds;
dynamic-request-port
port port-number;
retry attempts;
routing-instance routing-instance-name;
secret password;
max-outstanding-requests value;
source-address source-address;
timeout seconds;
}
service {
accounting-order (activation-protocol | radius);
}
session-options {
client-group [ group-names ];
client-idle-timeout minutes;
client-session-timeoutminutes;
}
}
Description Configure PPP CHAP, or a profile and its subscriber access, L2TP, or PPP properties.
For CHAP, the name serves as the mapping between peer identifiers and CHAP secret
keys. This entity is queried for the secret key whenever a CHAP challenge or response
is received.
Syntax promiscuous-mode;
Description Specify that the interface accepts IGMP reports from hosts on any subnetwork. Note
that when enabling promiscuous-mode, all routing devices on the ethernet segment
must be configured with the promiscuous mode statement. Otherwise, only the interface
configured with lowest IPv4 address acts as the querier for IGMP for this Ethernet segment.
Description Specify the protocol type for the specified scheduler in a dynamic profile.
NOTE: Protocol types non-tcp and tcp are not supported on MX Series routers.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify the match IP protocol type for the radius-flow-tap policy.
Options protocol—Protocol for the IPv4 or IPv6 address for the radius-flow-tap policy.
Syntax radius {
accounting-server [ ip-address ];
attributes {
exclude
...
}
ignore {
framed-ip-netmask;
input-filter;
logical-system-routing-instance;
output-filter;
}
}
authentication-server [ ip-address ];
options {
accounting-session-id-format (decimal | description);
calling-station-id-delimiter delimiter-character;
calling-station-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
client-accounting-algorithm (direct | round-robin);
client-authentication-algorithm (direct | round-robin);
coa-dynamic-variable-validation;
ethernet-port-type-virtual;
interface-description-format {
exclude-adapter;
exclude-sub-interface;
}
ip-address-change-notify message;
juniper-dsl-attributes;
nas-identifier identifier-value;
nas-port-extended-format {
adapter-width width;
ae-width width;
port-width width;
slot-width width;
stacked-vlan-width width;
vlan-width width;
atm {
adapter-width width;
port-width width:
slot-width width;
vci-width width:
vpi-width width;
}
}
nas-port-id-delimiter delimiter-character;
nas-port-id-format {
agent-circuit-id;
agent-remote-id;
interface-description;
nas-identifier;
}
nas-port-type {
ethernet {
port-type;
}
}
revert-interval interval;
vlan-nas-port-stacked-format;
}
preauthentication-server ip-address;
}
Description Configure the RADIUS parameters that the router uses for AAA authentication and
accounting for subscribers.
Syntax radius-coa {
priority priority;
algorithm algorithm;
}
Description Configure the shaping rate adjustment controls for the RADIUS CoA application.
Options priority—Priority of the RADIUS CoA application in the adjustment control profile.
Range: 1 through 10; 1 being the highest priority.
Default: 1
Default: adjust-always
radius-flow-tap
Syntax radius-flow-tap {
forwarding-class class-name;
interfaces interface-name;
multicast-interception;
policy policy-name {
inet {
drop-policyrule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
inet6 {
drop-policy rule-name {
from {
apply-groups group-name;
apply-groups-except group-name;
destination-address address;
destination-port port-number;
dscp dscp-value;
protocol protocol;
source-address address;
source-port port-number;
}
}
}
}
source-ipv4-address ipv4-address;
)
Description Assign parameters that are used with subscriber secure policy mirroring.
radius-server
rate-limit
Description Configure the maximum number of connections attempts per protocol (either IPv6 or
IPv4) on an access service.
Options rate-limit limit—(Optional) Maximum number of connection attempts allowed per minute,
per IP protocol (either IPv4 or IPv6).
Range: 1 through 250
Default: 150
Related • Configuring clear-text or SSL Service for Junos XML Protocol Client Applications
Documentation
Syntax rewrite-rules {
dscp (rewrite-name | default);
dscp-ipv6 (rewrite-name | default);
ieee-802.1 (rewrite-name | default) vlan-tag (outer | outer-and-inner);
inet-precedence (rewrite-name | default);
}
}
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• rewrite-rules
Syntax routing-options {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
multicast {
interface interface-name {
no-qos-adjust;
}
}
rib routing-table-name {
access {
route prefix {
metric route-cost;
next-hop next-hop;
preference route-distance;
tag route-tag;
}
}
access-internal {
route subscriber-ip-address {
qualified-next-hop underlying-interface {
mac-address address;
}
}
}
}
}
Syntax rpf-check {
fail-filter filter-name;
mode loose;
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family]
Description Check whether traffic is arriving on an expected path. You can include this statement
with the inet protocol family only.
Description Specify the rule the router uses when applying this service.
Options rule-name—Identifier for the collection of terms that constitute this rule.
Description Define a set of captive portal content delivery rules that the router uses when applying
this service.
Options rule-set-name—Identifier for the collection of rules that constitute this rule set.
Options scheduler-name—Either the specific name of the scheduler configuration block or the
scheduler variable ($junos-cos-scheduler).
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Description Associate a scheduler map name with a traffic-control profile in a dynamic profile.
The scheduler map can be defined dynamically (at the [edit dynamic-profiles profile-name
class-of-service scheduler-maps] hierarchy level) or statically (at the [edit class-of-service
scheduler-maps] hierarchy level).
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Traffic Scheduling and Shaping for Subscriber Access on page 11
Syntax scheduler-maps {
map-name {
forwarding-class class-name scheduler scheduler-name;
}
}
Description Specify a scheduler map name in a dynamic profile and associate it with the scheduler
configuration and forwarding class.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Syntax schedulers {
scheduler-name{
adjust-minimum rate;
adjust-percent percentage;
buffer-size (percent percentage | remainder | temporal microseconds |
$junos-cos-scheduler-bs);
drop-profile-map loss-priority (any | low | medium-low | medium-high | high) protocol
(any | non-tcp | tcp) drop-profile (profile-name | predefined-variable);
excess-priority (low | high | $junos-cos-scheduler-excess-priority | none);
excess-rate (percent percentage | percent $junos-cos-scheduler-excess-rate);
priority (priority-level | $junos-cos-scheduler-priority);
shaping-rate (rate | predefined-variable) <burst-size bytes>;
transmit-rate (rate | percent percentage | remainder | percent percentage
$junos-cos-scheduler-tx) <exact | rate-limit>;
}
}
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
Syntax service {
input {
service-set service-set-name {
service-filter filter-name;
}
post-service-filter filter-name;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
}
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos–interface–unit” family
family]
Description Define the service sets and filters to be applied to an interface. This statement is not
supported for family inet6.
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service input service-set service-set-name],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service output service-set service-set-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service input service-set service-set-name],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service output service-set service-set-name]
Description Define the filter to be applied to traffic before it is accepted for service processing.
Configuration of a service filter is optional; if you include the service-set statement without
a service-filter definition, the router software assumes that the match condition is true
and selects the service set for processing automatically. Only the Internet Protocol version
4 (IPv4) protocol family is currently supported for dynamic PPPoE logical interfaces.
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service input],
[edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family service output],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service input],
[edit dynamic-profiles profile-name interfaces pp0 unit “$junos-interface-unit” family family
service output]
Description Define one or more service sets in a dynamic profile. Service sets are applied to an
interface. If you define multiple service sets, the router software evaluates the filters in
the order in which they appear in the configuration. Only the Internet Protocol version 4
(IPv4) protocol family is currently supported for dynamic PPPoE logical interfaces.
Syntax services {
...
captive-portal-content-delivery {
rule rule-name {
match-direction (input | output | input-output);
term term-name {
from {
application [junos-http, junos-https, junos-httpproxy];
destination-address address <except>;
destination-prefix-list list-name <except>;
}
then {
accept;
redirect <url>;
rewrite <destination-address address> <destination-port port-number>;
syslog;
}
}
}
rule-set rule-set-name {
[rule rule-name];
}
}
...
}
Description Define the captive portal and content delivery set of the rules statements to be applied
to traffic.
Description Configure a shaping rate for a logical interface or a scheduler. The sum of the shaping
rates for all logical interfaces on the physical interface can exceed the physical interface
bandwidth. This practice is known as oversubscription of the peak information rate (PIR).
Options rate—Peak rate in bits per second (bps). You can specify the value as a complete decimal
number or as a decimal number followed by the abbreviation k (1000),
m (1,000,000), or g (1,000,000,000).
Range: 1000 through 160,000,000,000 bps
• $junos-cos-shaping-rate—Variable for the shaping rate that is specified for the logical
interface. Use this variable at the [edit dynamic-profiles profile-name class-of-service
traffic-control-profiles profile-name] hierarchy level.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Traffic Scheduling and Shaping for Subscriber Access on page 11
shared-name
Hierarchy Level [edit dynamic-profiles profile-name interfaces interface-name unit logical-unit-number family
family-name filter [input | output] filter-name]
single-rate
Syntax single-rate {
(color-aware | color-blind);
committed-information-rate bps;
committed-burst-size bytes;
excess-burst-size bytes;
}
Description Configure a single-rate three-color policer in which marking is based on the committed
information rate (CIR), committed burst size (CBS), and excess burst size (EBS).
Packets that conform to the CIR or the CBS are assigned low loss priority (green). Packets
that exceed the CIR and the CBS but are within the EBS are assigned medium-high loss
priority (yellow). Packets that exceed the EBS are assigned high loss priority (red).
Green and yellow packets are always forwarded; this action is not configurable. You can
configure red packets to be discarded. By default, red packets are forwarded.
Hierarchy Level [edit dynamic-profiles profile-name protocols igmp interface interface-name static]
Description Specify the IP version 4 (IPv4) unicast address to send data on an interface.
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static group
multicast-group-address]
Description IP version 6 (IPv6) unicast source address for the multicast group being configured on
a dynamic interface.
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify source IP address or prefix value from which to inherit configuration data for
radius-flow-tap policy rule mapping.
Hierarchy Level [edit dynamic-profiles profile-name protocols mld interface interface-name static group
multicast-group-address source]
Description Configure the number of multicast source addresses that should be accepted for each
static group created on dynamic interfaces.
Hierarchy Level [edit dynamic-profile profile-name protocols mld interface interface-name static group
multicast-group-address source]
Description Configure the number of times the address should be incremented for each static group
created on the dynamic interface. The increment is specified in a format similar to an
IPv6 address.
source-ipv4-address
Description Specify the source IP address used in the IP header that is prepended to mirrored packets
sent to a mediation device.
Hierarchy Level [edit services radius-flow-tap policy policy-name inet drop-policy rule-name from],
[edit services radius-flow-tap policy policy-name inet6 drop-policy rule-name from]
Description Specify the match source port for the radius-flow-tap policy.
Options port-number— Number of the IPv4 or IPv6 source port for the radius-flow-tap policy.
ssh
Syntax ssh {
authentication-order [authentication-methods];
ciphers [ cipher-1 cipher-2 cipher-3 ...];
client-alive-count-max seconds;
client-alive-interval seconds;
connection-limit limit;
hostkey-algorithm <algorithm|no-algorithm>;
key-exchange <algorithm>;
macs <algorithm>;
max-sessions-per-connection <number>;
no-passwords;
no-tcp-forwarding;
protocol-version [v1 v2];
rate-limit limit;
root-login (allow | deny | deny-password);
}
Description Allow SSH requests from remote systems to the local router or switch.
Related • Configuring SSH Service for Remote Access to the Router or Switch
Documentation
Syntax static {
group group;
group group {
source source;
}
}
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
Syntax static {
group multicast-group-address {
exclude;
group-count number;
group-increment increment;
source ip-address {
source-count number;
source-increment increment;
}
}
}
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
subscriber-leave-timer
Description Length of time before the multicast VLAN updates QoS data (for example, available
bandwidth) for subscriber interfaces after it receives an IGMP leave message.
Options seconds—Length of time before the multicast VLAN updates QoS data (for example,
available bandwidth) for subscriber interfaces after it receives an IGMP leave
message. Specifying a value of 0 results in an immediate update. This is the same
as if the statement were not configured.
Range: 0 through 30
Default: 0 seconds
Syntax targeted-distribution;
Description Configure egress data for a dynamic logical interface to be sent across a single member
link in an aggregated Ethernet bundle. A backup link is provisioned with CoS scheduling
resources in the event that the primary assigned link goes down. The aggregated Ethernet
interface must be configured without link protection.
Related • Configuring the Distribution Type for Demux Subscribers on Aggregated Ethernet
Documentation Interfaces on page 145
Syntax targeted-distribution;
Description Configure egress data for a logical interface to be sent across a single member link in an
aggregated Ethernet bundle. A backup link is provisioned with CoS scheduling resources
in the event that the primary assigned link goes down. The aggregated Ethernet interface
must be configured without link protection.
Description Define the term match and action properties for the captive portal content delivery rule.
Options action—(Optional) An action to take if conditions match. If you do not specify an action,
the packets that match the conditions in the from statement are accepted.
from—(Optional) Match packet fields to values. If not included, all packets are considered
to match and the actions and action modifiers in the then statement are taken.
only-at-create—(Optional) Specify that the term is added only when the fast update
filter is first created. No subsequent changes can be made to the term in the filter.
Use this option only for terms that do not include subscriber-specific data in their
match conditions, such as common or default terms (for example, counting the
default drop packets).
term-name—Name that identifies the term. The name can contain letters, numbers, and
hyphens (-), and can be up to 64 characters long. To include spaces in the name,
enclose it in quotation marks (“ ”).
Syntax then {
accept;
redirect <url>;
rewrite <destination-address address> <destination-port port-number>;
syslog;
}
Description Define the term actions and any optional action modifiers for the captive portal content
delivery rule.
Options action—Actions to accept, redirect, or rewrite packets and all subsequent packets in flows
that match the rules.
• accept—Accept the packets and all subsequent packets in flows that match the
rules.
• redirect—Redirect the packet and all subsequent packets in flows that match the
rules. You can optionally configure the following action modifier:
• url—(Optional) URL destination for the redirected packet. The URL must begin
with http:// or https://.
• rewrite— Rewrite the packet and all subsequent packets in flows that match the
rules. You can optionally configure one or both of the following action modifiers:
three-color-policer (Configuring)
Options policer-name—Name of the three-color policer. Reference this name when you apply the
policer to an interface.
uid—When you configure a policer at the [edit dynamic-profiles] hierarchy level, you must
assign a variable UID as the policer name.
Syntax traceoptions {
file filename <files number> <match regular-expression> <size size> <world-readable |
no-world-readable>;
flag flag;
no-remote-trace;
}
Options file filename—Name of the file to receive the output of the tracing operation. Enclose the
name within quotation marks. All files are placed in the directory /var/log. Ensure
that filenames are unique for each logical system or routing instance in which Mobile
IP is configured.
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). If you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through 1 GB
Default: 128 KB
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten. If you specify a maximum number of files, you also must specify a
maximum file size with the size option.
Range: 2 through 1000
Default: 3 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. You can include the following flags:
• ipc—Trace Inter-Process Communication (IPC) messages between the PIC and the
Routing Engine.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Traffic Scheduling and Shaping for Subscriber Access on page 11
• Using the CLI to Modify Traffic-Control Profiles That Are Currently Applied to Subscribers
Description Specify the transmit rate or percentage for a scheduler in a dynamic profile.
Default If you do not include this statement, the default scheduler transmission rate and buffer
size percentages for queues 0 through 7 are 95, 0, 0, 5, 0, 0, 0, and 0 percent.
Options rate—Transmission rate, in bps. You can specify a value in bits per second either as a
complete decimal number or as a decimal number followed by the abbreviation
k (1000), m (1,000,000), or g (1,000,000,000).
Range: 3200 through 6,400,000,000,000 bps
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Configuring Schedulers in a Dynamic Profile for Subscriber Access on page 13
tunnel-services (Chassis)
Syntax tunnel-services {
bandwidth (1g | 10g | 20g | 40g);
tunnel-only;
}
Description For MX Series 3D Universal Edge Routers, configure the amount of bandwidth for tunnel
services.
For M7i, M10i, M120, M320, T Series and TX Matrix routers with IQ2 PICs and IQ2E PICs,
configure support for per unit scheduling for GRE tunnels. You can specify the IQ2 and
IQ2E PICs to work exclusively in tunnel mode or as a regular PIC. The default setting uses
IQ2 and IQ2E PICs as a regular PIC. If you do not configure the tunnel-only option, the IQ2
and IQ2 PICs operate as regular PICs. For M7i, M10i, M120, M320, T Series and TX Matrix
routers with IQ2 PICs and IQ2E PICs, you can use the tunnel-only option to specify that
an IQ2 or IQ2E PIC work in tunnel mode only.
NOTE: Bandwidth rates of 20 gigabits per second and 40 gigabits per second
require use of an MX Series router with the 100-Gigabit Ethernet Modular
Port Concentrator (MPC) and the 100-Gigabit CFP MIC.
NOTE: On MX80 routers and MX Series routers with Trio-based FPCs, when
ingress queuing is enabled for a PIC, tunnel services and inline services are
not supported on the same PIC.
Options tunnel–only (Optional)—For M7i, M10i, M120, M320, T Series and TX Matrix routers with
IQ2 PICs and IQ2E PICs, specify that an IQ2 or IQ2E PIC work in tunnel mode only.
two-rate
Syntax two-rate {
(color-aware | color-blind);
committed-information-rate bps;
committed-burst-size bytes;
peak-information-rate bps;
peak-burst-size bytes;
}
Description Configure a two-rate three-color policer in which marking is based on the committed
information rate (CIR), committed burst size (CBS), peak information rate (PIR), and
peak burst size (PBS).
Packets that conform to the CIR or the CBS are assigned low loss priority (green). Packets
that exceed the CIR and the CBS but are within the PIR or the PBS are assigned
medium-high loss priority (yellow). Packets that exceed the PIR and the PBS are assigned
high loss priority (red).
Green and yellow packets are always forwarded; this action is not configurable. You can
configure red packets to be discarded. By default, red packets are forwarded.
Syntax uid;
Description Configure a unique ID for parameterized filters in a dynamic profile created for services.
The values that the system uses for these variables are applied when the subscriber
authenticates.
uid-reference
Syntax uid-reference;
Description When you configure a unique ID (UID) variable, include this statement to specify that the
value for the UID is supplied by RADIUS when the subscriber authenticates.
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(push | swap);
tag-protocol-id tpid;
vlan-id number;
}
output {
service-set service-set-name {
service-filter filter-name;
}
}
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | swap);
tag-protocol-id tpid;
vlan-id number;
}
}
service-name-table table-name
short-cycle-protection <lockout-time-min minimum-seconds lockout-time-max
maximum-seconds>;
unnumbered-address interface-name <preferred-source-address address>;
filter {
input filter-name;
output filter-name;
}
keepalives {
interval seconds;
}
ppp-options {
chap;
pap;
}
vlan-id number;
vlan-tags outer [tpid].vlan-id [inner [tpid].vlan-id];
}
}
Description Configure a logical interface on the physical device. You must configure a logical interface
to be able to use the physical device.
Options logical-unit-number—The specific unit number of the interface you want to assign to the
dynamic profile, or one of the following Junos OS predefined variables:
Related • Configuring Dynamic Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
Documentation
• Configuring Static Underlying VLAN Interfaces to Use Agent Circuit Identifier Information
Description Configure a logical interface on the physical device. You must configure a logical interface
to be able to use the physical device.
• value—Specific unit number of the interface you want to assign to the dynamic-profile
Range: 0 through 16385. For demux and PPPoE interfaces, the unit numbers can range
from 0 through 1,073,741,823.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying Traffic Shaping and Scheduling to a Subscriber Interface in a Dynamic Profile
on page 217
user (Access)
Related • Setting Shaping Rate and Overhead Accounting Based on PPPoE Vendor-Specific
Documentation Tags on page 125
• Bandwidth Management for Downstream Traffic in Edge Networks Overview on page 115
If you have already configured the router to use IGMP version 1 and then
configure it to use IGMP version 2, the router continues to use IGMP version
1 for up to 6 minutes and then uses IGMP version 2.
Description Configure the MLD version explicitly on the dynamic interface. MLD version 2 (MLDv2) is
used only to support source-specific multicast (SSM).
Required Privilege routing and trace—To view this statement in the configuration.
Level routing-control and trace-control—To add this statement to the configuration.
Description Apply this IEEE-802.1 classifier to the inner or outer VLAN tags in a dynamic profile.
Default If you do not include this statement, the classifier applies to the outer VLAN tag only.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Classifier to a Subscriber Interface in a Dynamic Profile on page 220
• classifiers (Definition)
Description Apply this IEEE-802.1 rewrite rule to the outer or outer and inner VLAN tags in a dynamic
profile.
Default If you do not include this statement, the rewrite rule applies to the outer VLAN tag only.
Options outer—Apply the rewrite rule to the outer VLAN tag only.
outer-and-inner—Apply the rewrite rule to both the outer and inner VLAN tags.
Related • Guidelines for Configuring Dynamic CoS for Subscriber Access on page 4
Documentation
• Applying a Rewrite Rule Definition to a Subscriber Interface in a Dynamic Profile on
page 219
• rewrite-rules
Operational Commands
• clear firewall
• clear igmp membership
• clear igmp statistics
• clear mld membership
• clear mld statistics
• clear services captive-portal-content-delivery statistics
• request interface rebalance (Aggregated Ethernet for Subscriber Management)
• show class-of-service
• show class-of-service adjustment-control-profile
• show class-of-service interface
• show class-of-service interface-set
• show class-of-service scheduler-hierarchy interface
• show class-of-service scheduler-hierarchy interface-set
• show class-of-service scheduler-map
• show class-of-service traffic-control-profile
• show firewall
• show firewall log
• show firewall templates-in-use
• show igmp group
• show igmp interface
• show igmp statistics
• show interfaces targeting (Aggregated Ethernet for Subscriber Management)
• show mld group
• show mld interface
• show mld statistics
• show services captive-portal-content-delivery
• show services service-sets summary
• show subscribers
• show subscribers summary
clear firewall
Syntax clear firewall (all | counter counter-name | filter filter-name | log (all | logical-system-name
) | logical-system logical-system-name)
Syntax (EX Series clear firewall (all | counter counter-name | filter filter-name | log (all | logical-system-name)
Switches) | policer counter (all | counter-id counter-index))
When you clear the counters of a filter, this impacts not only the counters shown by the
CLI, but also the ones tracked by SNMP2.
Subscriber management uses firewall filters to capture and report the volume-based
service accounting counters that are used for subscriber billing. The clear firewall
command also clears the service accounting counters that are reported to the RADIUS
accounting server. For this reason, you must be cautious in specifying which firewall
statistics you want to clear.
NOTE: The clear firewall command cannot be used to clear the Routing Engine
filter counters on a backup Routing Engine that is enabled for graceful Routing
Engine switchover (GRES).
If you clear statistics for firewall filters that are applied to Trio-based DPCs and that also
use the prefix-action action on matched packets, wait at least 5 seconds before you enter
the show firewall prefix-action-stats command. A 5-second pause between issuing the
clear firewall and show firewall prefix-action-stats commands avoids a possible timeout
of the show firewall prefix-action-stats command.
Options all—Clear the packet and byte counts for all filters. On EX Series switches, this option
also clears the packet counts for all policer counters.
counter counter-name—Clear the packet and byte counts for a filter counter that has been
configured with the counter firewall filter action.
filter filter-name—Clear the packet and byte counts for the specified firewall filter.
log (all | logical-system-name)—Clear log entries for IPv4 firewall filters that have then
log as an action. Use log all to clear all log entries or log logical-system-name to clear
log entries for the specified logical system.
logical-system logical-system-name—Clear the packet and byte counts for the specified
logical system.
policer counter (all | counter-id counter-index)—(EX8200 switches only) Clear all policer
counters using the policer counter all command, or clear a specific policer counter
using the policer counter counter-id counter-index command. The value of
counter-index can be 0, 1, or 2.
Sample Output
clear firewall all
user@host> clear firewall all
Options none—Clear all IGMP members on all interfaces and for all address ranges.
group address-range—(Optional) Clear all IGMP members that are in a particular address
range. An example of a range is 224.2/16. If you omit the destination prefix length,
the default is /32.
Output Fields See show igmp group for an explanation of output fields.
Sample Output
clear igmp membership
The following sample output displays IGMP group information before and after the clear
igmp membership command is entered:
The following sample output displays IGMP group information before and after the clear
igmp membership interface command is issued:
The following sample output displays IGMP group information before and after the clear
igmp membership group command is entered:
Output Fields See show igmp statistics for an explanation of output fields.
Sample Output
clear igmp statistics
The following sample output displays IGMP statistics information before and after the
clear igmp statistics command is entered:
Mtrace Request 0 0 0
Domain Wide Report 0 0 0
V3 Membership Report 0 0 0
Other Unknown types 0
IGMP v3 unsupported type 0
IGMP v3 source required for SSM 0
IGMP v3 mode not applicable for SSM 0
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear mld membership
user@host> clear mld membership
Options none—(Same as logical-system all) Clear MLD statistics for all interfaces.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
clear mld statistics
user@host> clear mld statistics
Output Fields When you enter this command, you receive feedback on the status of your request.
Description Manually rebalance the subscribers on an aggregated Ethernet bundle with targeted
distribution enabled.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request interface rebalance
user@host >request interface rebalance interface ae0
show class-of-service
Description Display the entire class-of-service (CoS) configuration, including system-chosen defaults.
Executing this command is equivalent to executing all show class-of-service commands
in succession.
Output Fields See the output field descriptions for the commands.
Sample Output
show class-of-service
user@host> show class-of-service
Forwarding class Queue
best-effort 0
expedited-forwarding 1
assured-forwarding 2
network-control 3
Code point type: dscp
Alias Bit pattern
af11 001010
af12 001100
af13 001110
...
Code point type: dscp-ipv6
Alias Bit pattern
af11 001010
af12 001100
af13 001110
...
Code point type: exp
Alias Bit pattern
af11 100
af12 101
be 000
...
Code point type: ieee-802.1
Alias Bit pattern
af11 100
af12 101
be 000
...
Classifier: dscp-default, Code point type: dscp, Index: 6
Code point Forwarding class Loss priority
000000 best-effort low
Release Information Command introduced in Junos OS Release 13.1 for MX Series Routers.
Description For MPC/MIC interfaces only, display the adjustment control profiles.
Related • Verifying the CoS Adjustment Control Profile Configuration on page 185
Documentation
Output Fields Table 52 on page 704 describes the output fields for the show class-of-service
adjustment-control-profile command. Output fields are listed in the approximate order
in which they appear.
Priority Priority of the adjusting application. Possible values are1 through 10; 1 being the highest priority.
Sample Output
show class-of-service adjustment-control-profile
user@host> show class-of-service adjustment-control-profile
Description Display the logical and physical interface associations for the classifier, rewrite rules, and
scheduler map objects.
Options none—Display CoS associations for all physical and logical interfaces.
detail—(M Series, MX Series, and T Series routers) (Optional) Display QoS and CoS
information based on the interface.
If the interface interface-name is a physical interface, the output includes:
Output Fields Table 53 on page 707 describes the output fields for the show class-of-service interface
command. Output fields are listed in the approximate order in which they appear.
Dedicated Queues Status of dedicated queues configured on an interface. Supported only on Trio MPC/MIC interfaces
on MX Series routers.
Total non-default Number of queues created in addition to the default queues. Supported only on Trio MPC/MIC
queues created interfaces on MX Series routers.
Rewrite Input IEEE (QFX Series only) IEEE 802.1p code point (priority) rewrite value. Incoming traffic from the Fibre
Code-point Channel (FC) SAN is classified into the forwarding class specified in the native FC interface (NP_Port)
fixed classifier and uses the priority specified as the IEEE 802.1p rewrite value.
Shaping rate Maximum transmission rate on the physical interface. You can configure the shaping rate on the
physical interface, or on the logical interface, but not on both. Therefore, the Shaping rate field is
displayed for either the physical interface or the logical interface.
Scheduler map Name of the output scheduler map associated with this interface.
Scheduler map (QFX Series only) Name of the fabric forwarding class set scheduler map associated with a QFabric
forwarding class sets system Interconnect device interface.
Input shaping rate For Gigabit Ethernet IQ2 PICs, maximum transmission rate on the input interface.
Input scheduler map For Gigabit Ethernet IQ2 PICs, name of the input scheduler map associated with this interface.
Chassis scheduler map Name of the scheduler map associated with the packet forwarding component queues.
Rewrite Name and type of the rewrite rules associated with this interface.
Object Category of an object: Classifier, Fragmentation-map (for LSQ interfaces only), Scheduler-map, Rewrite,
Translation Table (for IQE PICs only), or traffic-class-map (for T4000 routers with Type 5 FPCs).
Type Type of an object: dscp, dscp-ipv6, exp, ieee-802.1, ip, inet-precedence, or ieee-802.1ad (for traffic class
map on T4000 routers with Type 5 FPCs)..
Device flags The Device flags field provides information about the physical device and displays one or more of the
following values:
Interface flags The Interface flags field provides information about the physical interface and displays one or more
of the following values:
• Admin-Test—Interface is in test mode and some sanity checking, such as loop detection, is disabled.
• Disabled—Interface is administratively disabled.
• Down—A hardware failure has occurred.
• Hardware-Down—Interface is nonfunctional or incorrectly connected.
• Link-Layer-Down—Interface keepalives have indicated that the link is incomplete.
• No-Multicast—Interface does not support multicast traffic.
• No-receive No-transmit—Passive monitor mode is configured on the interface.
• Point-To-Point—Interface is point-to-point.
• Pop all MPLS labels from packets of depth—MPLS labels are removed as packets arrive on an
interface that has the pop-all-labels statement configured. The depth value can be one of the
following:
• 1—Takes effect for incoming packets with one label only.
• 2—Takes effect for incoming packets with two labels only.
• [ 1 2 ]—Takes effect for incoming packets with either one or two labels.
Flags The Logical interface flags field provides information about the logical interface and displays one or
more of the following values:
Input Filter Names of any firewall filters to be evaluated when packets are received on the interface, including
any filters attached through activation of dynamic service.
Output Filter Names of any firewall filters to be evaluated when packets are transmitted on the interface, including
any filters attached through activation of dynamic service.
Link flags Provides information about the physical link and displays one or more of the following values:
• ACFC—Address control field compression is configured. The Point-to-Point Protocol (PPP) session
negotiates the ACFC option.
• Give-Up—Link protocol does not continue connection attempts after repeated failures.
• Loose-LCP—PPP does not use the Link Control Protocol (LCP) to indicate whether the link protocol
is operational.
• Loose-LMI—Frame Relay does not use the Local Management Interface (LMI) to indicate whether
the link protocol is operational.
• Loose-NCP—PPP does not use the Network Control Protocol (NCP) to indicate whether the device
is operational.
• Keepalives—Link protocol keepalives are enabled.
• No-Keepalives—Link protocol keepalives are disabled.
• PFC—Protocol field compression is configured. The PPP session negotiates the PFC option.
Last flapped Date, time, and how long ago the interface went from down to up. The format is Last flapped:
year-month-day hour:minute:second:timezone (hour:minute:second ago). For example, Last flapped:
2002-04-26 10:52:40 PDT (04:33:20 ago).
Statistics last cleared Number and rate of bytes and packets received and transmitted on the physical interface.
IPv6 transit statistics Number of IPv6 transit bytes and packets received and transmitted on the logical interface if IPv6
statistics tracking is enabled.
Input errors Input errors on the interface. The labels are explained in the following list:
Output errors Output errors on the interface. The labels are explained in the following list:
• Carrier transitions—Number of times the interface has gone from down to up. This number does not
normally increment quickly, increasing only when the cable is unplugged, the far-end system is
powered down and up, or another problem occurs. If the number of carrier transitions increments
quickly (perhaps once every 10 seconds), the cable, the far-end system, or the PIC is malfunctioning.
• Errors—Sum of the outgoing frame aborts and FCS errors.
• Drops—Number of packets dropped by the output queue of the I/O Manager ASIC. If the interface
is saturated, this number increments once for every packet that is dropped by the ASIC's RED
mechanism.
NOTE: Due to accounting space limitations on certain Type 3 FPCs (which are supported in M320
and T640 routers), the Drops field does not always use the correct value for queue 6 or queue 7
for interfaces on 10-port 1-Gigabit Ethernet PICs.
• Aged packets—Number of packets that remained in shared packet SDRAM so long that the system
automatically purged them. The value in this field should never increment. If it does, it is most likely
a software bug or possibly malfunctioning hardware.
• HS link FIFO underflows—Number of FIFO underflows on the high-speed links between the ASICs
responsible for handling the router interfaces.
• MTU errors—Number of packets whose size exceeds the MTU of the interface.
Egress queues Total number of egress queues supported on the specified interface.
Queue counters CoS queue number and its associated user-configured forwarding class name.
NOTE: Due to accounting space limitations on certain Type 3 FPCs (which are supported in M320
and T640 routers), the Dropped packets field does not always display the correct value for queue 6
or queue 7 for interfaces on 10-port 1-Gigabit Ethernet PICs.
SONET alarms (SONET) SONET media-specific alarms and defects that prevent the interface from passing packets.
When a defect persists for a certain period, it is promoted to an alarm. Based on the router
SONET defects configuration, an alarm can ring the red or yellow alarm bell on the router or light the red or yellow
alarm LED on the craft interface. See these fields for possible alarms and defects: SONET PHY,
SONET section, SONET line, and SONET path.
SONET line Active alarms and defects, plus counts of specific SONET errors with detailed information.
SONET path Active alarms and defects, plus counts of specific SONET errors with detailed information.
Received path trace SONET/SDH interfaces allow path trace bytes to be sent inband across the SONET/SDH link. Juniper
Networks and other router manufacturers use these bytes to help diagnose misconfigurations and
Transmitted path trace network errors by setting the transmitted path trace message so that it contains the system hostname
and name of the physical interface. The received path trace value is the message received from the
router at the other end of the fiber. The transmitted path trace value is the message that this router
transmits.
Packet Forwarding Information about the configuration of the Packet Forwarding Engine:
Engine configuration
• Destination slot—FPC slot number.
• PLP byte—Packet Level Protocol byte.
CoS information Information about the CoS queue for the physical interface.
• CoS transmit queue—Queue number and its associated user-configured forwarding class name.
• Buffer usec—Amount of buffer space allocated to the queue, in microseconds. This value is nonzero
only if the buffer size is configured in terms of time.
• Limit—Displayed if rate limiting is configured for the queue. Possible values are none and exact. If
exact is configured, the queue transmits only up to the configured bandwidth, even if excess
bandwidth is available. If none is configured, the queue transmits beyond the configured bandwidth
if bandwidth is available.
Forwarding classes Total number of forwarding classes supported on the specified interface.
Egress queues Total number of egress queues supported on the specified interface.
Queued Bytes Number of bytes queued to this queue. The byte counts vary by PIC type.
Transmitted Packets Number of packets transmitted by this queue. When fragmentation occurs on the egress interface,
the first set of packet counters shows the postfragmentation values. The second set of packet counters
(displayed under the Packet Forwarding Engine Chassis Queues field) shows the prefragmentation
values.
Transmitted Bytes Number of bytes transmitted by this queue. The byte counts vary by PIC type.
RED-dropped packets Number of packets dropped because of random early detection (RED).
• (M Series and T Series routers only) On M320 and M120 routers and the T Series routers, the total
number of dropped packets is displayed. On all other M Series routers, the output classifies dropped
packets into the following categories:
• Low, non-TCP—Number of low-loss priority non-TCP packets dropped because of RED.
• Low, TCP—Number of low-loss priority TCP packets dropped because of RED.
• High, non-TCP—Number of high-loss priority non-TCP packets dropped because of RED.
• High, TCP—Number of high-loss priority TCP packets dropped because of RED.
• (MX Series routers with enhanced DPCs, and T Series routers with enhanced FPCs only) The output
classifies dropped packets into the following categories:
• Low—Number of low-loss priority packets dropped because of RED.
• Medium-low—Number of medium-low loss priority packets dropped because of RED.
• Medium-high—Number of medium-high loss priority packets dropped because of RED.
• High—Number of high-loss priority packets dropped because of RED.
NOTE: Due to accounting space limitations on certain Type 3 FPCs (which are supported in M320
and T640 routers), this field does not always display the correct value for queue 6 or queue 7 for
interfaces on 10-port 1-Gigabit Ethernet PICs.
RED-dropped bytes Number of bytes dropped because of RED. The byte counts vary by PIC type.
• (M Series and T Series routers only) On M320 and M120 routers and the T Series routers, only the
total number of dropped bytes is displayed. On all other M Series routers, the output classifies
dropped bytes into the following categories:
• Low, non-TCP—Number of low-loss priority non-TCP bytes dropped because of RED.
• Low, TCP—Number of low-loss priority TCP bytes dropped because of RED.
• High, non-TCP—Number of high-loss priority non-TCP bytes dropped because of RED.
• High, TCP—Number of high-loss priority TCP bytes dropped because of RED.
NOTE: Due to accounting space limitations on certain Type 3 FPCs (which are supported in M320
and T640 routers), this field does not always display the correct value for queue 6 or queue 7 for
interfaces on 10-port 1-Gigabit Ethernet PICs.
Transmit rate Configured transmit rate of the scheduler. The rate is a percentage of the total interface bandwidth.
Rate Limit Rate limiting configuration of the queue. Possible values are :
Excess Priority Priority of the excess bandwidth traffic on a scheduler: low, medium-low, medium-high, high, or none.
Adjustment information Display the assignment of shaping-rate adjustments on a scheduler node or queue.
Sample Output
show class-of-service interface (Physical)
user@host> show class-of-service interface so-0/2/3
Physical interface: so-0/2/3, Index: 135
Maximum usable queues: 8, Queues in use: 4
Total non—default queues created: 4
Scheduler map: <default>, Index: 2032638653
Classifier ipprec-compatibility ip 13
0 af3 0 0 0
1 af2 0 0 0
2 ef2 0 0 0
3 ef1 0 0 0
0 af3 0 0 0
1 af2 0 0 0
2 ef2 0 0 0
3 ef1 0 0 0
normal
af1 4 4 0 low
normal
Logical interface ge-0/3/0.0 (Index 68) (SNMP ifIndex 152) (Generation 159)
Flags: SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.1 ] Encapsulation: ENET2
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 1500, Generation: 172, Route table: 0
Flags: Sendbcast-pkt-to-re
Input Filters: filter-in-ge-0/3/0.0-i,
Policer: Input: p1-ge-0/3/0.0-inet-i
Protocol mpls, MTU: 1488, Maximum labels: 3, Generation: 173, Route table: 0
Flags: Is-Primary
Output Filters: exp-filter,,,,,
Logical interface ge-1/2/0.0 (Index 347) (SNMP ifIndex 638) (Generation 156)
Filter: filter-in-ge-0/3/0.0-i
Counters:
Name Bytes Packets
count-filter-in-ge-0/3/0.0-i 0 0
Filter: exp-filter
Counters:
Name Bytes Packets
count-exp-seven-match 0 0
count-exp-zero-match 0 0
Policers:
Name Packets
p1-ge-0/3/0.0-inet-i 0
Classifier ipprec-compatibility ip 13
Logical interface ge-0/3/0.1 (Index 69) (SNMP ifIndex 154) (Generation 160)
Flags: SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.2 ] Encapsulation: ENET2
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol inet, MTU: 1500, Generation: 174, Route table: 0
Flags: Sendbcast-pkt-to-re
Classifier ipprec-compatibility ip 13
Classifier ipprec-compatibility ip 13
[edit]
user@host-g11#
Description Display the configured shaping rate and the adjusted shaping rate for each logical interface
set configured for hierarchical class of service (CoS).
Output Fields Table 54 on page 734 describes the output fields for the show class-of-service interface-set
command. Output fields are listed in the approximate order in which they appear.
Interface-set Name of a logical interface set composed of one or more logical interfaces for which hierarchical
scheduling is enabled.
Index Index number of this interface set or the internal index number of this object.
Output traffic control Name of the output traffic-control profile attached to the logical interface set.
profile
Adjusting application Name of the application that communicates shaping-rate adjustment information to the Junos OS
class-of-service process (cosd) on the broadband services router (BSR). The BSR uses the information
from this application to perform shaping-rate adjustments on the scheduler node that manages the
interface set. The adjusting application appears as ancp LS-0 which is the Junos OS Access Node
Control Profile process (ancpd) that performs shaping-rate adjustments on schedule nodes. The
nodes are logical interface sets configured to represent subscriber local loops. When the
synchronization speed of the DSL line changes, ancpd communicates the local loop speed to cosd
over the default logical system, LS-0, and then the BSR throttles the shaping rate on the scheduler
node to the loop speed.
The adjusting application can also appear as PPPoE, which adjusts the shaping-rate and
overhead-accounting class-of-service attributes on dynamic subscriber interfaces in a broadband
access network based on access line parameters in Point-to-Point Protocol over Ethernet (PPPoE)
Tags [TR-101]. This feature is supported on MPC/MIC interfaces on MX Series routers. The shaping
rate is based on the actual data rate downstream attribute. The overhead accounting value is based
on the access loop encapsulation attribute and specifies whether the access loop uses Ethernet
(frame mode) or ATM (cell mode).
Adjustment type Type of shaping-rate adjustment performed by the BSR on the scheduler node. The type of adjustment
appears as Adjustment type, meaning that the configured shaping rate is adjusted by an absolute
value as opposed to by a percentage of the configured rate.
Configured shaping rate The maximum transmission rate on the physical interface as configured by the output traffic-control
profile attached to the scheduler node.
Adjustment value Value of the shaping-rate adjustment information sent by the adjusting application to cosd.
Sample Output
show class-of-service interface-set
user@host> show class-of-service interface-set example-ifset-ge-4/0/0-7
Interface-set: example-ifset-ge-4/0/0–7, Index: 8
Physical interface: ge-4/0/0, Index: 270
Queues supported: 8, Queues in use: 8
Output traffic control profile: example-tcp-basic-rate, Index: 11395
Adjusting application: ancp LS-0
Adjustment type: absolute
Configured shaping rate: 50000000
Adjustment value: 888000
Adjustment overhead-accounting mode: cell
Release Information Command introduced in Junos OS Release 13.3 for MX Series Routers.
Related
Documentation
Output Fields Table 55 on page 736 describes the output fields for the show class-of-service
scheduler-hierarchy interface command. Output fields are listed in the approximate order
in which they appear.
guaranteed priority Actual queue priority in the guaranteed region (high, low, or none)
excess priority Actual queue priority in the excess region (high, low, or none)
queue weight Actual queue weight for excess CoS weighted round-robin
excess weight Actual interface unit per priority weights for excess weighted round-robin
Sample Output
show class-of-service scheduler-hierarchy interface
user@host> show class-of-service scheduler-hierarchy interface ge-1/0/0
--------------------------------------------------------------------------------
Interface/ shaping guarnteed guaranteed/ queue excess
resource name rate rate excess weight weight
Release Information Command introduced in Junos OS Release 13.3 for MX Series Routers.
Description For MPC/MIC interface sets only, display the scheduler hierarchy.
Output Fields Table 56 on page 738 describes the output fields for the show class-of-service
scheduler-hierarchy interface-set command. Output fields are listed in the approximate
order in which they appear.
guaranteed priority Actual queue priority in the guaranteed region (high, low, or none)
excess priority Actual queue priority in the excess region (high, low, or none)
queue weight Actual queue weight for excess CoS weighted round-robin
excess weight Actual interface-set per priority weights for excess weighted round-robin
Sample Output
show class-of-service scheduler-hierarchy interface-set
user@host> show class-of-service scheduler-hierarchy interface-set ifset
--------------------------------------------------------------------------------
Interface/ shaping guarnteed guaranteed/ queue excess
resource name rate rate excess weight weight
Description Display the mapping of schedulers to forwarding classes and a summary of scheduler
parameters for each entry.
Output Fields Table 57 on page 740 describes the output fields for the show class-of-service
scheduler-map command. Output fields are listed in the approximate order in which they
appear.
Index Index of the indicated object. Objects having indexes in this output include scheduler maps, schedulers,
and drop profiles.
Forwarding class Classification of a packet affecting the forwarding, scheduling, and marking policies applied as the
packet transits the router.
Transmit rate Configured transmit rate of the scheduler (in bps). The rate is a percentage of the total interface
bandwidth, or the keyword remainder, which indicates that the scheduler receives the remaining
bandwidth of the interface.
Rate Limit Rate limiting configuration of the queue. Possible values are none, meaning no rate limiting, and exact,
meaning the queue only transmits at the configured rate.
Maximum buffer delay Amount of transmit delay (in milliseconds) or the buffer size of the queue. The buffer size is shown
as a percentage of the total interface buffer allocation, or by the keyword remainder to indicate that
the buffer is sized according to what remains after other scheduler buffer allocations.
Excess priority Priority of excess bandwidth: low, medium-low, medium-high, high, or none.
Explicit Congestion (QFX Series only) Explicit congestion notification (ECN) state:
Notification
• Disable—ECN is disabled on the specified scheduler
• Enable—ECN is enabled on the specified scheduler
Drop profiles Table displaying the assignment of drop profiles by name and index to a given loss priority and protocol
pair.
Sample Output
show class-of-service scheduler-map
user@host> show class-of-service scheduler-map
Scheduler map: dd-scheduler-map, Index: 84
Description For Gigabit Ethernet IQ PICs, Channelized IQ PICs, EQ DPCs, and Trio MPC/MIC interfaces
only, display traffic shaping and scheduling profiles.
(ACX Series routers) For ATM IMA pseudowire interfaces, display traffic shaping and
scheduling profiles.
Output Fields Table 58 on page 742 describes the output fields for the show class-of-service
traffic-control-profile command. Output fields are listed in the approximate order in which
they appear.
ATM Service (MX Series routers with ATM Multi-Rate CE MIC) Configured
category of ATM service. Possible values:
Shaping rate burst Configured burst size for the shaping rate, in bytes.
Shaping rate priority high Configured shaping rate for high-priority traffic, in bps.
Shaping rate priority Configured shaping rate for medium-priority traffic, in bps.
medium
Shaping rate priority low Configured shaping rate for low-priority traffic, in bps.
Shaping rate excess high Configured shaping rate for high-priority excess traffic, in bps.
Shaping rate excess low Configured shaping rate for low-priority excess traffic, in bps.
Excess rate high Configured excess rate for high priority traffic, in percent or
proportion.
Excess rate low Configured excess rate for low priority traffic, in percent or
proportion.
NOTE: (MX Series routers with ATM Multi-Rate CE MIC) This value
depends on the ATM service category chosen. Possible values:
Guaranteed rate burst Configured burst size for the guaranteed rate, in bytes.
overhead accounting mode Configured shaping mode: Frame Mode or Cell Mode.
Sample Output
show class-of-service traffic-control-profile
user@host> show class-of-service traffic-control-profile
Traffic control profile: Profile1, Index: 57625
Scheduler map: m1
Delay Buffer rate: 500000
Guaranteed rate: 1000000
show class-of-service traffic-control-profile (MX Series routers with Clear Channel Multi-Rate CE MIC)
user@host> show class-of-service traffic-control-profile
Traffic control profile: at-vbr1, Index: 11395
ATM Service: RTVBR
Scheduler map: m3
overhead accounting mode: Frame Mode
Shaping rate: 1000 cps
Shaping rate burst: 500 cells
Delay Buffer rate: 2000 cps
Guaranteed rate: 1000 cps
show class-of-service traffic-control-profile (ACX Series routers with ATM IMA pseudowire interfaces)
user@host> show class-of-service traffic-control-profile
Traffic control profile: foo, Index: 38286
ATM Service: RTVBR
Shaping rate: 2000 cps
show firewall
Description Display enhanced statistics and counters for all configured firewall filters.
Options none—(Optional) Display statistics and counters for all configured firewall filters and
counters. For EX Series switches, this command also displays statistics about all
configured policers.
detail—(EX Series switches and MX Series routers only) (Optional) Display firewall filter
statistics and enhanced policer statistics and counters.
• show policer
List of Sample Output show firewall filter (MX Series Router and EX Series Switch) on page 750
show firewall filter (non MX Series Router and EX Series Switch) on page 750
show firewall filter (Dynamic Input Filter) on page 750
show firewall (Logical Systems) on page 750
show firewall (counter counter-name) on page 751
show firewall log on page 751
show firewall policer counters (EX8200 Switch) on page 751
show firewall policer counters (detail) (EX8200 Switch) on page 751
show firewall policer counters (counter-id counter-index) (EX8200 Switch) on page 752
show firewall policer counters (counter-id counter-index detail) (EX8200
Switch) on page 752
show firewall detail on page 752
Output Fields Table 59 on page 748 lists the output fields for the show firewall command. Output fields
are listed in the approximate order in which they appear.
Filter Name of a filter that has been configured with the filter statement at the [edit firewall] hierarchy
level.
• When an interface-specific filter is displayed, the name of the filter is followed by the full
interface name and by either -i for an input filter or -o for an output filter.
• When dynamic filters are displayed, the name of the filter is followed by the full interface name
and by either -in for an input filter or -out for an output filter. When a logical system–specific
filter is displayed, the name of the filter is prefixed with two underscore (__) characters and the
name of the logical system (for example, __ls1/filter1).
• When a service filter is displayed that uses a service set, the separator between the service-set
name and the service-filter name is a semicolon (:).
NOTE: For bridge family filter, the ip-protocol match criteria is supported only for IPv4 and not
for IPv6. This is applicable for line cards that support the Junos Trio chipset, such as the MX 3D
MPC line cards.
• Name—Name of a filter counter that has been configured with the counter firewall filter action.
• Bytes—Number of bytes that match the filter term under which the counter action is specified.
• Packets—Number of packets that matched the filter term under which the counter action is
specified.
NOTE: On M and T series routers, firewall filters cannot count ip-options packets on a per option
type and per interface basis. A limited work around is to use the show pfe statistics ip options
command to see ip-options statistics on a per Packet Forwarding Engine (PFE) basis. See show
pfe statistics ip for sample output.
• Name—Name of policer.
• Bytes—(For two-color policers on MX Series routers and EX Series switches, and for hierarchical
policers on MS-DPC, MIC, and MPC interfaces on MX Series routers) Number of bytes that
match the filter term under which the policer action is specified. This is only the number
out-of-specification (out-of-spec) byte counts, not all the bytes in all packets policed by the
policer.
For other combinations of policer type, device, and line card type, this field is blank.
• Packets—Number of packets that matched the filter term under which the policer action is
specified. This is only the number of out-of-specification (out-of-spec) packet counts, not all
packets policed by the policer.
Policer Counter Index (EX8200 switch only) Global management counter ID. The counter ID value (counter-index) can
be 0, 1, or 2.
Green (EX8200 switch only) Number of packets within the limits. The number of packets is smaller than
the committed information rate (CIR).
Yellow (EX8200 switch only) Number of packets partially within the limits. The number of packets is
greater than the CIR, but the burst size is within the excess burst size (EBS) limit.
Bytes (EX8200 switch only) Number of green, yellow, red, or discarded packets in bytes.
Packets (EX8200 switch only) Number of green, yellow, red, or discarded packets.
Filter name (EX8200 switch only) Name of the filter with a term associated to a policer.
Term name (EX8200 switch only) Name of the term associated with a policer.
Policer name (EX8200 switch only) Name of the policer that is associated with a global management counter.
P1-t1 • OOS packet statistics for packets that are marked out-of-specification (out-of-spec) by the
policer. Changes to all packets that have out-of-spec actions, such as discard, color marking,
or forwarding-class, are included in this counter.
• Offered packet statistics for traffic subjected to policing.
• Transmitted packet statistics for traffic that is not discarded by the policer. When the policer
action is discard, the statistics are the same as the in-spec statistics; when the policer action
is non-discard (loss-priority or forwarding-class), the statistics are included in this counter.
Sample Output
show firewall filter (MX Series Router and EX Series Switch)
user@host> show firewall filter test
Filter: test
Counters:
Name Bytes Packets
Counter-1 0 0
Counter-2 0 0
Policers:
Name Bytes Packets
Policer-1 2770 70
Filter: __lr1/test
Counters:
Name Bytes Packets
icmp 420 5
Filter: __default_bpdu_filter__
Filter: __lr1/inet_filter1
Counters:
Name Bytes Packets
inet_tcp_count 0 0
inet_udp_count 0 0
Filter: __lr1/inet_filter2
Counters:
Name Bytes Packets
inet_icmp_count 0 0
inet_pim_count 0 0
Filter: __lr2/inet_filter1
Counters:
Name Bytes Packets
inet_tcp_count 0 0
inet_udp_count 0 0
Filter: foo
Counters:
Name Bytes Packets
c1 17652140 160474
Policers:
Name Bytes Packets
P1-t1
OOS 0 18286
Offered 0 18446744073709376546
Transmitted 0 18446744073709358260
Output Fields Table 60 on page 753 lists the output fields for the show firewall log command. Output
fields are listed in the approximate order in which they appear.
• A—Accept
• D—Discard
• R—Reject
Name of Interface • Displays a physical interface name if the packet arrived at a port
on a line card.
• Displays local if the packet was generated by the device's internal
Ethernet interface, em1 or fxp1, which connects the Routing Engine
with the router’s packet-forwarding components.
Name of protocol Packet’s protocol name: egp, gre, icmp, ipip, ospf, pim, rsvp, tcp, or
udp.
Sample Output
show firewall log
user@host>show firewall log
Time Filter Action Interface Protocol Src Addr Dest Addr
Description Display the names of configured filter templates that are currently in use by dynamic
subscribers and the number of times each template is referenced.
Output Fields Table 61 on page 756 lists the output fields for the show firewall templates-in-use command.
Output fields are listed in the approximate order in which they appear.
Filter Template Name of a filter that has been configured using the filter statement at either the [edit firewall] or [edit
dynamic-profiles profile-name firewall] hierarchy and is being used as a template for dynamic subscriber
filtering.
Reference Count Number of times the filter has been referenced by subscribers accessing the network.
Sample Output
show firewall templates-in-use
user@host> show firewall templates-in-use
Dynamic Subscribers Reference Counts
Filter Template
Reference Count
---------------
---------------
egressFilter
10
ingressFilter
10
dfilter
5
dfilter-pol
5
Description Display Internet Group Management Protocol (IGMP) group membership information.
Options none—Display standard information about membership for all IGMP groups.
List of Sample Output show igmp group (Include Mode) on page 759
show igmp group (Exclude Mode) on page 760
show igmp group brief on page 760
show igmp group detail on page 760
Output Fields Table 62 on page 758 describes the output fields for the show igmp group command.
Output fields are listed in the approximate order in which they appear.
Interface Name of the interface that received the IGMP membership report. A name of All levels
local indicates that the local routing device joined the group itself.
Group Mode Mode the SSM group is operating in: Include or Exclude. All levels
Source timeout Time remaining until the group traffic is no longer forwarded. The timer is detail
refreshed when a listener in include mode sends a report. A group in exclude
mode or configured as a static group displays a zero timer.
Last reported by Address of the host that last reported membership in this group. All levels
Timeout Time remaining until the group membership is removed. brief none
Group timeout Time remaining until a group in exclude mode moves to include mode. The timer detail
is refreshed when a listener in exclude mode sends a report. A group in include
mode or configured as a static group displays a zero timer.
Sample Output
show igmp group (Include Mode)
user@host> show igmp group
Interface: t1-0/1/0.0
Group: 232.1.1.1
Group mode: Include
Source: 10.0.0.2
Last reported by: 10.9.5.2
Timeout: 24 Type: Dynamic
Group: 232.1.1.1
Group mode: Include
Source: 10.0.0.3
Last reported by: 10.9.5.2
Timeout: 24 Type: Dynamic
Group: 232.1.1.1
Group mode: Include
Source: 10.0.0.4
Last reported by: 10.9.5.2
Timeout: 24 Type: Dynamic
Group: 232.1.1.2
Group mode: Include
Source: 10.0.0.4
Last reported by: 10.9.5.2
Timeout: 24 Type: Dynamic
Interface: t1-0/1/1.0
Interface: ge-0/2/2.0
Interface: ge-0/2/0.0
Interface: local
Group: 224.0.0.2
Source: 0.0.0.0
Last reported by: Local
Timeout: 0 Type: Dynamic
Group: 224.0.0.22
Source: 0.0.0.0
Last reported by: Local
Timeout: 0 Type: Dynamic
The output for the show igmp group brief command is identical to that for the show igmp
group command.
Source: 0.0.0.0
Source timeout: 0
Last reported by: Local
Group timeout: 0 Type: Dynamic
Group: 224.0.0.22
Group mode: Exclude
Source: 0.0.0.0
Source timeout: 0
Last reported by: Local
Group timeout: 0 Type: Dynamic
Output Fields Table 63 on page 762 describes the output fields for the show igmp interface command.
Output fields are listed in the approximate order in which they appear.
Querier Address of the routing device that has been elected to send membership queries. All levels
SSM Map Policy Name of the source-specific multicast (SSM) map policy that has been applied to the All levels
IGMP interface.
Timeout How long until the IGMP querier is declared to be unreachable, in seconds. All levels
Group limit Maximum number of groups allowed on the interface. Any joins requested after the limit All levels
is reached are rejected.
Group threshold Configured threshold at which a warning message is generated. All levels
This threshold is based on a percentage of groups received on the interface. If the number
of groups received reaches the configured threshold, the device generates a warning
message.
Group log-interval Time (in seconds) between consecutive log messages. All levels
• On—Indicates that the router removes a host from the multicast group as soon as the
router receives a leave group message from a host associated with the interface.
• Off—Indicates that after receiving a leave group message, instead of removing a host
from the multicast group immediately, the router sends a group query to determine if
another receiver responds.
• On—Indicates that the router can accept IGMP reports from subnetworks that are not
associated with its interfaces.
• Off—Indicates that the router can accept IGMP reports only from subnetworks that
are associated with its interfaces.
• On—Indicates that the router can run IGMP on the interface but not send or receive
control traffic such as IGMP reports, queries, and leaves.
• Off—Indicates that the router can run IGMP on the interface and send or receive control
traffic such as IGMP reports, queries, and leaves.
The passive statement enables you to selectively activate up to two out of a possible
three available query or control traffic options. When enabled, the following options
appear after the on state declaration:
OIF map Name of the OIF map (if configured) associated with the interface. All levels
SSM map Name of the source-specific multicast (SSM) map (if configured) used on the interface. All levels
Sample Output
show igmp interface
user@host> show igmp interface
Interface: at-0/3/1.0
Querier: 10.111.30.1
State: Up Timeout: None Version: 2 Groups: 4
SSM Map Policy: ssm-policy-A
Interface: so-1/0/0.0
Querier: 10.111.10.1
State: Up Timeout: None Version: 2 Groups: 2
SSM Map Policy: ssm-policy-B
Interface: so-1/0/1.0
Querier: 10.111.20.1
State: Up Timeout: None Version: 2 Groups: 4
SSM Map Policy: ssm-policy-C
Immediate Leave: On
Promiscuous Mode: Off
Configured Parameters:
IGMP Query Interval: 125.0
IGMP Query Response Interval: 10.0
IGMP Last Member Query Interval: 1.0
IGMP Robustness Count: 2
Derived Parameters:
IGMP Membership Timeout: 260.0
IGMP Other Querier Present Timeout: 255.0
The output for the show igmp interface brief command is identical to that for the show
igmp interface command. For sample output, see show igmp interface on page 764.
The output for the show igmp interface detail command is identical to that for the show
igmp interface command. For sample output, see show igmp interface on page 764.
Output Fields Table 64 on page 766 describes the output fields for the show igmp statistics command.
Output fields are listed in the approximate order in which they appear.
IGMP packet statistics Heading for IGMP packet statistics for all interfaces or for the specified interface name.
• Bad Length—Number of messages received with length errors so severe that further classification
could not occur.
• Bad Checksum—Number of messages received with a bad IP checksum. No further classification
was performed.
• Bad Receive If—Number of messages received on an interface not enabled for IGMP.
• Rx non-local—Number of messages received from senders that are not local.
• Timed out—Number of groups that timed out as a result of not receiving an explicit leave message.
• Rejected Report—Number of reports dropped because of the IGMP group policy.
• Total Interfaces—Number of interfaces configured to support IGMP.
Sample Output
show igmp statistics
user@host> show igmp statistics
IGMP packet statistics for all interfaces
IGMP Message type Received Sent Rx errors
Membership Query 8883 459 0
V1 Membership Report 0 0 0
DVMRP 0 0 0
PIM V1 0 0 0
Cisco Trace 0 0 0
V2 Membership Report 0 0 0
Group Leave 0 0 0
Mtrace Response 0 0 0
Mtrace Request 0 0 0
Domain Wide Report 0 0 0
V3 Membership Report 0 0 0
Other Unknown types 0
IGMP v3 unsupported type 0
IGMP v3 source required for SSM 0
IGMP v3 mode not applicable for SSM 0
Description (MX Series routers only) Display status information about the distribution of subscribers
on different links in an aggregated Ethernet bundle.
Output Fields Table 65 on page 769 lists the output fields for the show interfaces targeting command.
Output fields are listed in the approximate order in which they appear.
Redundancy mode Redundancy mechanism on the interface: Link Level Redundancy or FPC All levels
Redundancy.
Physical Interface
Physical interface Name of the physical interface and state of the interface. All levels
Sample Output
show interfaces targeting ae0
user@host> show interfaces targeting ae0
Aggregated interface: ae0
Redundancy mode: Link Level Redundancy
Total number of distributed interfaces: 3
Physical interface: ge-1/0/0, Link status: Up
Number of primary distributions: 200
Number of backup distributions: 200
Description Display information about Multicast Listener Discovery (MLD) group membership.
List of Sample Output show mld group (Include Mode) on page 772
show mld group (Exclude Mode) on page 773
show mld group brief on page 773
show mld group detail (Include Mode) on page 773
show mld group detail (Exclude Mode) on page 774
Output Fields Table 66 on page 771 describes the output fields for the show mld group command. Output
fields are listed in the approximate order in which they appear.
Interface Name of the interface that received the MLD membership report; local means All levels
that the local router joined the group itself.
Group Mode Mode the SSM group is operating in: Include or Exclude. All levels
Last reported by Address of the host that last reported membership in this group. All levels
Source timeout Time remaining until the group traffic is no longer forwarded. The timer is detail
refreshed when a listener in include mode sends a report. A group in exclude
mode or configured as a static group displays a zero timer.
Timeout Time remaining until the group membership is removed. brief none
Group timeout Time remaining until a group in exclude mode moves to include mode. The timer detail
is refreshed when a listener in exclude mode sends a report. A group in include
mode or configured as a static group displays a zero timer.
Sample Output
show mld group
(Include Mode)
user@host> show mld group
Interface: fe-0/1/2.0
Group: ff02::1:ff05:1a67
Group mode: Include
Source: ::
Last reported by: fe80::2e0:81ff:fe05:1a67
Timeout: 245 Type: Dynamic
Group: ff02::1:ffa8:c35e
Group mode: Include
Source: ::
Last reported by: fe80::2e0:81ff:fe05:1a67
Timeout: 241 Type: Dynamic
Group: ff02::2:43e:d7f6
Group mode: Include
Source: ::
Last reported by: fe80::2e0:81ff:fe05:1a67
Timeout: 244 Type: Dynamic
Group: ff05::2
Group mode: Include
Source: ::
Last reported by: fe80::2e0:81ff:fe05:1a67
Timeout: 244 Type: Dynamic
Interface: local
Group: ff02::2
Source: ::
Last reported by: Local
Timeout: 0 Type: Dynamic
Group: ff02::16
Source: ::
Last reported by: Local
Timeout: 0 Type: Dynamic
The output for the show mld group brief command is identical to that for the show mld
group command. For sample output, see show mld group (Include Mode) on page 772
show mld group (Exclude Mode) on page 773.
Group: ff02::2
Group mode: Include
Source: ::
Last reported by: Local
Timeout: 0 Type: Dynamic
Group: ff02::16
Source: ::
Last reported by: Local
Timeout: 0 Type: Dynamic
Output Fields Table 67 on page 775 describes the output fields for the show mld interface command.
Output fields are listed in the approximate order in which they appear.
Querier Address of the router that has been elected to send membership queries. All levels
SSM Map Policy Name of the source-specific multicast (SSM) map policy that has been applied All levels
to the interface.
SSM Map Policy Name of the source-specific multicast (SSM) map policy at the MLD interface. All levels
Timeout How long until the MLD querier is declared to be unreachable, in seconds. All levels
• On—Indicates that the router can run IGMP or MLD on the interface but not
send or receive control traffic such as IGMP or MLD reports, queries, and
leaves.
• Off—Indicates that the router can run IGMP or MLD on the interface and send
or receive control traffic such as IGMP or MLD reports, queries, and leaves.
OIF map Name of the OIF map associated to the interface. All levels
SSM map Name of the source-specific multicast (SSM) map used on the interface, if All levels
configured.
Group limit Maximum number of groups allowed on the interface. Any memberships All levels
requested after the limit is reached are rejected.
Group threshold Configured threshold at which a warning message is generated. All levels
Group log-interval Time (in seconds) between consecutive log messages. All levels
• On—Indicates that the router removes a host from the multicast group as
soon as the router receives a multicast listener done message from a host
associated with the interface.
• Off—Indicates that after receiving a multicast listener done message, instead
of removing a host from the multicast group immediately, the router sends
a group query to determine if another receiver responds.
Sample Output
show mld interface
user@host> show mld interface
Interface: fe-0/0/0
Querier: None
State: Up Timeout: 0 Version: 1 Groups: 0
SSM Map Policy: ssm-policy-A
Interface: at-0/3/1.0
Querier: 8038::c0a8:c345
State: Up Timeout: None Version: 1 Groups: 0
SSM Map Policy: ssm-policy-B
Interface: fe-1/0/1.0
Querier: ::192.168.195.73
State: Up Timeout: None Version: 1 Groups: 3
SSM Map Policy: ssm-policy-C
SSM map: ipv6map1
Immediate Leave: On
Configured Parameters:
MLD Query Interval (.1 secs): 1250
MLD Query Response Interval (.1 secs): 100
MLD Last Member Query Interval (.1 secs): 10
MLD Robustness Count: 2
Derived Parameters:
MLD Membership Timeout (.1secs): 2600
MLD Other Querier Present Timeout (.1 secs): 2550
The output for the show mld interface brief command is identical to that for the show
mld interface command. For sample output, see show mld interface on page 777.
The output for the show mld interface detail command is identical to that for the show
mld interface command. For sample output, see show mld interface on page 777.
Output Fields Table 68 on page 779 describes the output fields for the show mld statistics command.
Output fields are listed in the approximate order in which they appear.
Sample Output
show mld statistics
user@host> show mld statistics
MLD packet statistics for all interfaces
MLD Message type Received Sent Rx errors
Listener Query (v1/v2) 0 2 0
Listener Report (v1) 0 0 0
Listener Done (v1/v2) 0 0 0
Listener Report (v2) 0 0 0
Other Unknown types 0
MLD v2 source required for SSM 2
MLD v2 mode not applicable for SSM 0
Rejected Report 0
Total Interfaces 2
Description Display the current operational state of all captive portal interfaces.
Sample Output
show services captive-portal-content-delivery
user@host> show services captive-portal-content-delivery pic ms-5/0/0
Name Index
ms-5/0/0 20
Options none—Display service set summary information for all adaptive services interfaces.
Output Fields Table 69 on page 784 lists the output fields for the show services service-sets summary
command. Output fields are listed in the approximate order in which they appear.
Service type Type of adaptive service, such as stateful firewall (SFW), Network
Address Translation (NAT), intrusion detection service (IDS), Layer
2 Tunneling Protocol (L2TP), Compressed Real-Time Transport
Protocol (CRTP), or IP Security (IPsec)
Service sets configured Total number of service sets configured on the PIC that use internal
service set IDs and do not consume external service sets, including
CRTP and L2TP
Policy bytes used Policy bytes used by a particular service or all services
Sample Output
show services service-sets summary
user@host> show services service-sets summary
Service sets CPU
Interface configured Bytes used Policy bytes used utilization
show subscribers
count—(Optional) Display the count of total subscribers and active subscribers for any
specified option. You can use the count option alone or with the address, client-type,
interface, logical-system, mac-address, profile-name, routing-instance, stacked-vlan-id,
subscriber-state, or vlan-id options.
id—(Optional) Display a specific subscriber session whose session id matches the specified
subscriber ID. You can display subscriber IDs by using the show subscribers extensive
or the show subscribers interface extensive commands.
vci-identifier—(MX Series routers with MPCs and ATM MICs with SFP only) (Optional)
Display active ATM subscribers whose ATM virtual circuit identifier (VCI) matches
the specified VCI identifier. The range of values is 0 through 255.
vpi-identifier—(MX Series routers with MPCs and ATM MICs with SFP only) (Optional)
Display active ATM subscribers whose ATM virtual path identifier (VPI) matches the
specified VPI identifier. The range of values is 0 through 65535.
vlan-id—(Optional) Display subscribers whose VLAN ID matches the specified VLAN ID.
NOTE: Due to display limitations, logical system and routing instance output
values are truncated when necessary.
Output Fields Table 70 on page 789 lists the output fields for the show subscribers command. Output
fields are listed in the approximate order in which they appear.
Interface Interface associated with the subscriber. The router or switch displays subscribers whose interface
matches or begins with the specified interface.
IP Address/VLAN ID Subscriber IP address or VLAN ID associated with the subscriber in the form tpid.vlan-id
No IP address or VLAN ID is assigned to an L2TP tunnel-switched session. For these subscriber sessions
the value is Tunnel-switched.
LS:RI Logical system and routing instance associated with the subscriber.
Type Subscriber client type (DHCP, L2TP, PPP, PPPoE, STATIC-INTERFACE, VLAN).
IPv6 Prefix Subscriber IPv6 prefix. If you are using DHCPv6 prefix delegation, this is the delegated prefix.
IPv6 Address Pool Subscriber IPv6 address pool. The IPv6 address pool is used to allocate IPv6 prefixes to the DHCPv6
clients.
IPv6 Network Prefix Length of the network portion of the IPv6 address.
Length
Interface Set Internally generated name of the dynamic ACI interface set used by the subscriber session.
Interface Set Type Interface type of the ACI interface set: Dynamic. This is the only ACI interface set type currently
supported.
Interface Set Session ID Identifier of the dynamic ACI interface set entry in the session database.
Underlying Interface Name of the underlying interface for the subscriber session.
Dynamic Profile Version Version number of the dynamic profile used for the subscriber.
State Current state of the subscriber session (Init, Configured, Active, Terminating, Tunneled).
L2TP State Current state of the L2TP session, Tunneled or Tunnel-switched. When the value is Tunnel-switched,
two entries are displayed for the subscriber; the first entry is at the LNS interface on the LTS and the
second entry is at the LAC interface on the LTS.
Tunnel switch Profile Name of the L2TP tunnel switch profile that initiates tunnel switching.
Name
Stacked VLAN Id Stacked VLAN ID associated with the subscriber in the form tpid.vlan-id.
Agent Circuit ID Option 82 agent circuit ID associated with the subscriber. The ID is displayed as an ASCII string unless
the value has nonprintable characters, in which case it is displayed in hexadecimal format.
Agent Remote ID Option 82 agent remote ID associated with the subscriber. The ID is displayed as an ASCII string unless
the value has nonprintable characters, in which case it is displayed in hexadecimal format.
ATM VPI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual path identifier (VPI) on the
subscriber’s physical interface.
ATM VCI (MX Series routers with MPCs and ATM MICs with SFP only) ATM virtual circuit identifier (VCI) for
each VPI configured on the subscriber interface.
Login Time Date and time at which the subscriber logged in.
Effective shaping-rate Actual downstream traffic shaping rate for the subscriber, in kilobits per second.
IPv4 rpf-check Fail Filter Name of the filter applied by the dynamic profile to IPv4 packets that fail the RPF check.
Name
IPv6 rpf-check Fail Filter Name of the filter applied by the dynamic profile to IPv6 packets that fail the RPF check.
Name
DHCP Options len = number of hex values in the message. The hex values specify the type, length, value (TLV) for
DHCP options, as defined in RFC 2132.
Underlying Session ID For DHCPv6 subscribers on a PPPoE network, displays the session ID of the underlying PPPoE interface.
Service Sessions Number of service sessions (that is, a service activated using RADIUS CoA) associated with the
subscribers.
Session Timeout Number of seconds of access provided to the subscriber before the session is automatically terminated.
(seconds)
Idle Timeout (seconds) Number of seconds subscriber can be idle before the session is automatically terminated.
IPv6 Delegated Address Name of the pool used for DHCPv6 prefix delegation.
Pool
IPv6 Delegated Network Length of the prefix configured for the IPv6 delegated address pool.
Prefix Length
ADF IPv4 Input Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 input filter (client or service session).
Name The filter name is followed by the rules (in hexadecimal format) associated with the ADF filter and
the decoded rule in Junos OS filter style.
ADF IPv4 Output Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv4 output filter (client or service session).
Name The filter name is followed by the rules (in hexadecimal format) associated with the ADF filter and
the decoded rule in Junos OS filter style.
ADF IPv6 Input Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 input filter (client or service session).
Name The filter name is followed by the rules (in hexadecimal format) associated with the ADF filter and
the decoded rule in Junos OS filter style.
ADF IPv6 Output Filter Name assigned to the Ascend-Data-Filter (ADF) interface IPv6 output filter (client or service session).
Name The filter name is followed by the rules (in hexadecimal format) associated with the ADF filter and
the decoded rule in Junos OS filter style.
IPv4 Input Filter Name Name assigned to the IPv4 input filter (client or service session).
IPv4 Output Filter Name Name assigned to the IPv4 output filter (client or service session).
IPv6 Input Filter Name Name assigned to the IPv6 input filter (client or service session).
IPv6 Output Filter Name Name assigned to the IPv6 output filter (client or service session).
IFL Input Filter Name Name assigned to the logical interface input filter (client or service session).
IFL Output Filter Name Name assigned to the logical interface output filter (client or service session).
Sample Output
show subscribers (IPv4)
user@host> show subscribers
Interface IP Address/VLAN ID User Name LS:RI
ge-1/3/0.1073741824 100 default:default
demux0.1073741824 100.0.0.10 WHOLESALER-CLIENT default:default
demux0.1073741825 101.0.0.3 RETAILER1-CLIENT test1:retailer1
demux0.1073741826 102.0.0.3 RETAILER2-CLIENT test1:retailer2
default:ASP-1
* 2041:1:1::/48
* 2061:1:1:1::/64
pp0.1073741837 23.1.1.3 dualstackuser2@ISP1.com
default:ASP-1
* 2001:1:2:5::/64
Type: DHCP
IP Address: 100.20.10.7
IP Netmask: 255.255.0.0
Logical System: default
Routing Instance: default
Interface: demux0.1073744383
Interface type: Dynamic
Dynamic Profile Name: dhcp-demux-prof
MAC Address: 00:10:94:00:01:f3
State: Active
Radius Accounting ID: jnpr :2560
Login Time: 2009-08-25 14:43:56 PDT
Type: PPPoE
User Name: pppoeTerV6User1Svc
IP Address: 100.16.12.137
IP Netmask: 255.0.0.0
IPv6 User Prefix: 1016:0:0:c88::/64
Logical System: default
Routing Instance: default
Interface: pp0.1073745151
Interface type: Dynamic
Underlying Interface: demux0.8201
Dynamic Profile Name: pppoe-client-profile
MAC Address: 00:0d:02:01:00:01
Session Timeout (seconds): 31622400
Idle Timeout (seconds): 86400
State: Active
Radius Accounting ID: jnpr demux0.8201:6544
Session ID: 6544
Agent Circuit ID: ifl3720
Agent Remote ID: ifl3720
Login Time: 2012-05-21 13:37:27 PDT
Service Sessions: 1
Session ID: 1
Login Time: 2011-08-25 12:12:26 PDT
DHCP Options: len 42
00 08 00 02 00 00 00 01 00 0a 00 03 00 01 00 51 ff ff 00 03
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
Type: L2TP
User Name: ap@example.com
Logical System: default
Type: PPPoE
User Name: dualstackuser1@ISP1.com
IP Address: 61.1.1.1
IPv6 Prefix: 2041:1:1::/48
IPv6 User Prefix: 2061:1:1:1::/64
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
Dynamic Profile Name: dualStack-Profile1
MAC Address: 00:00:64:03:01:02
State: Active
Radius Accounting ID: 2
Session ID: 2
Login Time: 2011-11-30 00:18:05 PST
Type: DHCP
IPv6 Prefix: 2041:1:1::/48
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:64:03:01:02
State: Active
Radius Accounting ID: jnpr :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
show subscribers detail (PPPoE Subscriber Session with ACI Interface Set)
user@host> show subscribers detail
Type: PPPoE
User Name: ppphint2
IP Address: 10.10.1.5
Logical System: default
Routing Instance: default
Interface: pp0.1073741825
Interface type: Dynamic
Interface Set: aci-1001-demux0.1073741824
Interface Set Type: Dynamic
Interface Set Session ID: 2
Underlying Interface: demux0.1073741824
Dynamic Profile Name: aci-vlan-pppoe-profile
Dynamic Profile Version: 1
MAC Address: 00:00:64:39:01:02
State: Active
Radius Accounting ID: 3
Session ID: 3
Agent Circuit ID: aci-ppp-dhcp-dvlan-50
Login Time: 2012-03-07 13:46:53 PST
State: Active
Radius Accounting ID: 1
Session ID: 1
Login Time: 2011-08-25 12:12:26 PDT
DHCP Options: len 42
00 08 00 02 00 00 00 01 00 0a 00 03 00 01 00 51 ff ff 00 03
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
IPv6 Address Pool: pd_pool
IPv6 Network Prefix Length: 48
Type: PPPoE
User Name: dualstackuser1@ISP1.com
IP Address: 61.1.1.1
IPv6 Prefix: 2041:1:1::/48
IPv6 User Prefix: 2061:1:1:1::/64
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Dynamic
Dynamic Profile Name: dualStack-Profile1
MAC Address: 00:00:64:03:01:02
State: Active
Radius Accounting ID: 2
Session ID: 2
Login Time: 2011-11-30 00:18:05 PST
IPv6 Delegated Network Prefix Length: 48
IPv6 Interface Address: 2061:1:1:1::1/64
IPv6 Framed Interface Id: 1:1:2:2
IPv4 Input Filter Name: FILTER-IN-pp0.1073741825-in
IPv4 Output Filter Name: FILTER-OUT-pp0.1073741825-out
IPv6 Input Filter Name: FILTER-IN6-pp0.1073741825-in
IPv6 Output Filter Name: FILTER-OUT6-pp0.1073741825-out
Type: DHCP
IPv6 Prefix: 2041:1:1::/48
Logical System: default
Routing Instance: ASP-1
Interface: pp0.1073741825
Interface type: Static
MAC Address: 00:00:64:03:01:02
State: Active
Radius Accounting ID: jnpr :3
Session ID: 3
Underlying Session ID: 2
Login Time: 2011-11-30 00:18:35 PST
DHCP Options: len 42
00 08 00 02 0b b8 00 01 00 0a 00 03 00 01 00 00 64 03 01 02
00 06 00 02 00 19 00 19 00 0c 00 00 00 00 00 00 00 00 00 00
00 00
IPv6 Delegated Network Prefix Length: 48
show subscribers aci-interface-set-name detail (Subscriber Sessions Using Specified ACI Interface Set)
user@host> show subscribers aci-interface-set-name aci-1003-ge-1/0/0.4001 detail
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-set-profile
Dynamic Profile Version: 1
State: Active
Session ID: 13
Agent Circuit ID: aci-ppp-vlan-10
Login Time: 2012-03-12 10:41:56 PDT
Type: PPPoE
User Name: ppphint2
IP Address: 10.10.1.7
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
Interface type: Dynamic
Interface Set: aci-1003-ge-1/0/0.4001
Interface Set Type: Dynamic
Interface Set Session ID: 13
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-pppoe-profile
Dynamic Profile Version: 1
MAC Address: 00:00:65:26:01:02
State: Active
Radius Accounting ID: 14
Session ID: 14
Agent Circuit ID: aci-ppp-vlan-10
Login Time: 2012-03-12 10:41:57 PDT
show subscribers agent-circuit-identifier detail (Subscriber Sessions Using Specified ACI Substring)
user@host> show subscribers agent-circuit-identifier aci-ppp-vlan detail
Type: VLAN
Logical System: default
Routing Instance: default
Interface: ge-1/0/0.
Underlying Interface: ge-1/0/0.4001
Dynamic Profile Name: aci-vlan-set-profile
Dynamic Profile Version: 1
State: Active
Session ID: 13
Agent Circuit ID: aci-ppp-vlan-10
Login Time: 2012-03-12 10:41:56 PDT
Type: PPPoE
User Name: ppphint2
IP Address: 10.10.1.7
Logical System: default
Routing Instance: default
Interface: pp0.1073741834
Interface type: Dynamic
Interface Set: aci-1003-ge-1/0/0.4001
Type: DHCP
User Name: test1@test.com
IP Address: 172.16.200.6
IP Netmask: 255.255.255.0
Logical System: default
Routing Instance: testnet
Interface: demux0.1073741826
Interface type: Static
MAC Address: 00:00:6e:56:01:04
State: Active
Radius Accounting ID: 21
Session ID: 21
Login Time: 2011-10-20 16:24:33 EST
Service Sessions: 2
show subscribers stacked-vlan-id vlan-id interface detail (Combined Output for a Specific Interface)
user@host> show subscribers stacked-vlan-id 101 vlan-id 100 interface ge-1/2/0.* detail
Type: VLAN
Interface: ge-1/2/0.1073741824
Interface type: Dynamic
Dynamic Profile Name: svlan-prof
State: Active
Stacked VLAN Id: 0x8100.101
VLAN Id: 0x8100.100
Login Time: 2009-03-27 11:57:19 PDT
Type: VLAN
Interface: ge-1/2/0.1073741825
Interface type: Dynamic
Dynamic Profile Name: vlan-prof-tpid
State: Active
VLAN Id: 100
Login Time: 2009-03-11 06:48:54 PDT
count—(Optional) Display the count of total subscribers and active subscribers for any
specified option.
pic—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers
by PIC number and the total number of subscribers.
port—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers
by port number and the total number of subscribers.
slot—(M120, M320, and MX Series routers only) (Optional) Display a count of subscribers
by FPC slot number and the total number of subscribers.
NOTE: Due to display limitations, logical system and routing instance output
values are truncated when necessary.
Output Fields Table 71 on page 805 lists the output fields for the show subscribers command. Output
fields are listed in the approximate order in which they appear.
Subscribers by State Number of subscribers summarized by state. The summary information includes the following:
Subscribers by Client Number of subscribers summarized by client type. Client types can include DHCP, L2TP, PPP, PPPOE,
Type STATIC-INTERFACE, and VLAN. Also displays the total number of subscribers for all client types
(Total).
Subscribers by LS:RI Number of subscribers summarized by logical system:routing instance (LS:RI) combination. Also
displays the total number of subscribers for all LS:RI combinations (Total).
Interface Interface associated with the subscriber. The router or switch displays subscribers whose interface
matches or begins with the specified interface.
For aggregated Ethernet interfaces, the output of the summary (pic | port | slot) options prefixes the
interface name with ae0:.
Count Count of subscribers displayed for each PIC, port, or slot when those options are specified with the
summary option. For an aggregated Ethernet configuration, the total subscriber count does not equal
the sum of the individual PIC, port, or slot counts, because each subscriber can be in more than one
aggregated Ethernet link.
Total Subscribers Total number of subscribers for all physical interfaces, all PICS, all ports, or all LS:RI slots.
IP Address/VLAN ID Subscriber IP address or VLAN ID associated with the subscriber in the form tpid.vlan-id
LS:RI Logical system and routing instance associated with the subscriber.
Sample Output
show subscribers summary
user@host> show subscribers summary
Subscribers by State
Init 3
Configured 2
Active 183
Terminating 2
Terminated 1
TOTAL 191
TOTAL 191
TOTAL 191
TOTAL 191
Subscribers by LS:RI
default:default 1
default:ri1 28
default:ri2 16
ls1:default 22
ls1:riA 38
ls1:riB 44
logsysX:routinstY 42
TOTAL 191
Total: 3998
Subscribers by LS:RI
default:default: 3998
Total: 3998
Subscribers by LS:RI
default:default: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Subscribers by LS:RI
default:default: 4825
Total: 4825
Index
• Index on page 811
filter...................................................................................552 group-limit.....................................................................568
firewall.............................................................................555 group-policy..................................................................569
input.................................................................................584 immediate-leave.........................................................580
interface-shared..........................................................590 no-accounting.............................................................480
interface-specific........................................................590 oif-map...........................................................................608
match-order..................................................................603 passive..............................................................................613
output.............................................................................609 source..............................................................................655
post-service-filter........................................................623 source-count................................................................656
precedence....................................................................625 source-increment........................................................657
service.............................................................................648 ssm-map.......................................................................660
service-filter..................................................................649 static................................................................................662
service-set.....................................................................650 version.............................................................................686
shared-name................................................................653 dynamic MLD statements
term..................................................................................666 disable..............................................................................519
dynamic IGMP statements interface..........................................................................587
accounting.....................................................................480 mld...................................................................................604
disable..............................................................................519 dynamic profiles
group associating fast update filters...............................300
with source...........................................................564 associating service sets.............................................315
without source....................................................564 configuring for client access...................................338
group-limit......................................................................567 examples..............................................................265, 340
group-policy..................................................................568 dynamic profiles statements
igmp..................................................................................578 dynamic-profiles..........................................................527
immediate-leave..........................................................579 interface
interface..........................................................................585 dynamic routing options.................................588
no-accounting interfaces........................................................................592
interface................................................................606 mld...................................................................................604
oif-map multicast
interface.................................................................607 dynamic routing options.................................605
passive no-qos-adjust
interface..................................................................612 dynamic routing options..................................607
promiscuous-mode routing-options.............................................................641
interface..................................................................631 uid......................................................................................678
source uid-reference.................................................................678
interface.................................................................655 dynamic protocols
ssm-map overview...........................................................................337
interface................................................................660 dynamic service sets
static applying fast update filters.......................................315
interface..................................................................661 overview...........................................................................315
version dynamic subscribers
interface.................................................................685 interfaces statement..................................................592
dynamic MLD dynamic variables
overview..........................................................................343 configuring unique identifiers..................................252
dynamic MLD interface statements
accounting.....................................................................480
exclude............................................................................545
group................................................................................565
group-count..................................................................566
group-increment.........................................................566
firewall filters..........................................................................227 H
classic filters...................................................................231 hierarchical policer................................................................321
configuring fast update filters................................288 configuration statement for
fast update filters...............................................227, 284 aggregate..............................................................486
log information, displaying.......................................753 example............................................................................321
overview...........................................................................231 overview............................................................................317
statistics hierarchical-policer statement.........................................571
clearing....................................................................691 hierarchical-scheduler..........................................................25
See also dynamic firewall filters implicit-hierarchy.....................................................72, 74
firewall hierarchical-policer.............................................258 hierarchical-scheduler statement
firewall policer.......................................................................258 for subscriber interfaces............................................573
firewall statement HTTP redirect
dynamic profiles..........................................................555 configuring subscriber interfaces...........................351
flow-tap-dtcp statement..................................................557 remote operation flow....................................348, 350
font conventions...................................................................xxix HTTP service
forwarding-class statement example configuring attached to a dynamic
dynamic CoS.................................................................557 interface.....................................................................364
subscriber secure policy...........................................558 example configuring attached to a static
fpc statement interface.....................................................................356
MX Series routers........................................................559 HTTP_redirect
frame-mode statement example DA rewrite....................................................366
CoS statements............................................................561 example redundant multiservice...........................367
dynamic CoS statements.........................................561
from statement.....................................................................562 I
subscriber secure policy...........................................563 ieee-802.1 statement
dynamic classifiers......................................................574
G dynamic rewrite rules.................................................575
group statement if-exceeding statement
dynamic IGMP hierarchical policer......................................................576
with source...........................................................564 single-rate two-color policer...................................577
without source....................................................564 IGMP
dynamic MLD interface.............................................565 enabling...........................................................................578
group-count statement group membership, displaying...............................758
dynamic MLD interface.............................................566 interfaces, displaying..................................................762
group-increment statement network models............................................................337
dynamic MLD interface.............................................566 statistics, displaying...................................................766
group-limit statement version.............................................................................685
dynamic IGMP...............................................................567 igmp statement
dynamic MLD interface.............................................568 dynamic IGMP..............................................................578
group-policy statement IGMP statements
dynamic IGMP..............................................................568 promiscuous-mode
dynamic MLD interface.............................................569 interface..................................................................631
groups immediate-leave statement
IGMP membership, displaying................................758 dynamic IGMP...............................................................579
MLD dynamic MLD interface............................................580
clearing..................................................................698 implicit-hierarchy.......................................25, 66, 69, 72, 74
displaying................................................................771 inet-precedence statement
guaranteed-rate statement dynamic classifiers.....................................................582
dynamic CoS.................................................................570 dynamic rewrite rules................................................582
V Virtual Chassis
variables, Junos OS predefined module redundancy...................................................597
dynamic CoS (schedulers) redundancy
$junos-cos-scheduler..............................159, 647 module....................................................................597
$junos-cos-scheduler-bs......................159, 499 targeted traffic distribution.....................................664
$junos-cos-scheduler-dropfile-any.....159, 521 vlan-tag statement
$junos-cos-scheduler-dropfile-high....159, 521 dynamic classifiers.....................................................686
$junos-cos-scheduler-dropfile-low.....159, 521 dynamic rewrite-rules................................................687
$junos-cos-scheduler-dropfile-medium-high.159,521
$junos-cos-scheduler-dropfile-medium-low.159,521 W
$junos-cos-scheduler-pri.......................159, 627 walled garden
$junos-cos-scheduler-tx........................159, 675 example configuring as an HTTP service
configuring an access dynamic rule................................................................................356
profile..................................................................169 example configuring as service filter....................355
example...................................................................179
for dynamic interface sets...............166, 171, 174
overview..................................................................159
dynamic CoS (traffic control profiles)
$junos-cos-byte-adjust.......503, 505, 561, 611
$junos-cos-byte-adjust-cell..................505, 611
$junos-cos-byte-adjust-frame..............561, 611
$junos-cos-delay-buffer-rate........................516
$junos-cos-excess-priority............................540
$junos-cos-excess-rate...................................542
$junos-cos-excess-rate-high........................543
$junos-cos-excess-rate-low..........................544
$junos-cos-overhead-accounting.................611
$junos-cos-scheduler-excess-rate..............541
$junos-cos-scheduler-map...........................645
$junos-cos-scheduler-shaping-rate...........652
$junos-cos-shaping-mode..............................611
$junos-cos-shaping-rate................................652
dynamic CoS (traffic-control-profiles)
$junos-cos-guaranteed-rate.........................570
configuring an access dynamic
profile..................................................................169
example...................................................................179
for dynamic interface sets...............166, 171, 174
overview..................................................................159
vendor-specific-tags access-loop-encapsulation
statement
dynamic CoS................................................................684
verification
aggregate route.............................................................153
version statement
dynamic IGMP
interface.................................................................685
dynamic MLD interface............................................686