System Software Configuration Guide: Service Aware Operating System
System Software Configuration Guide: Service Aware Operating System
SAOS
MAN-0157-001 - Revision A
June 2009
Copyright Ciena® Corporation
Ciena® Confidential and Proprietary
LEGAL NOTICES
THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CIENA CORPORATION
AND ITS RECEIPT OR POSSESSION DOES NOT CONVEY ANY RIGHTS TO REPRODUCE OR DISCLOSE ITS
CONTENTS, OR TO MANUFACTURE, USE, OR SELL ANYTHING THAT IT MAY DESCRIBE. REPRODUCTION,
DISCLOSURE, OR USE IN WHOLE OR IN PART WITHOUT THE SPECIFIC WRITTEN AUTHORIZATION OF CIENA
CORPORATION IS STRICTLY FORBIDDEN.
EVERY EFFORT HAS BEEN MADE TO ENSURE THAT THE INFORMATION IN THIS DOCUMENT IS COMPLETE
AND ACCURATE AT THE TIME OF PRINTING; HOWEVER, THE INFORMATION CONTAINED IN THIS DOCUMENT
IS SUBJECT TO CHANGE.
Copyright 2009 Ciena Corporation
Unpublished All Rights Reserved
The material contained in this document is also protected by copyright laws of the United States of America and other
countries. It may not be reproduced or distributed in any form by any means, altered in any fashion, or stored in a data
base or retrieval system, without express written permission of the Ciena Corporation.
Security
Ciena® cannot be responsible for unauthorized use of equipment and will not make allowance or credit for
unauthorized use or access.
Contacting Ciena
For additional office locations and phone numbers, please visit the Ciena web site at www.ciena.com.
BY INSTALLING OR USING THE EQUIPMENT, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS
AGREEMENT AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.
1. Right to Use License; Restrictions. Subject to these terms, and the payment of all applicable license fees, Ciena
grants to you, as end user, a non-exclusive license to use the Ciena software excluding open source components (the
"Software") in object code form solely in connection with, and as embedded within, the Equipment,. You shall have the
right to use the Software solely for your own internal use and benefit. You may make one copy of the Software and
documentation solely for backup and archival purpose, however you must reproduce and affix all copyright and other
proprietary rights notices that appear in or on the original. You may not, without Ciena's prior written consent, (i)
sublicense, assign, sell, rent, lend, lease, transfer or otherwise distribute the Software; (ii) grant any rights in the
Software or documentation not expressly authorized herein; (iii) modify the Software nor provide any third person the
means to do the same; (iv) create derivative works, translate, disassemble, recompile, reverse engineer or attempt to
obtain the source code of the Software in any way; or (v) alter, destroy, or otherwise remove any proprietary notices or
labels on or embedded within the Software or documentation. You acknowledge that this license is subject to Section
365 of the U.S. Bankruptcy Code and requires Ciena's consent to any assignment related to a bankruptcy proceeding.
Sole title to the Software and documentation, to any derivative works, and to any associated patents and copyrights,
remains with Ciena or its licensors. Ciena reserves to itself and its licensors all rights in the Software and
documentation not expressly granted to you. You shall preserve intact any notice of copyright, trademark, logo, legend
or other notice of ownership from any original or copies of the Software or documentation. Ciena does not place any
restrictions on the open source components that may be distributed along with the Software. Any applicable open
source licenses will be distributed to recipient separately.
2. Audit: Upon Ciena's reasonable request, but not more frequently than annually without reasonable cause, you shall
permit Ciena to audit the use of the Software at such times as may be mutually agreed upon to ensure compliance with
this Agreement.
3. Confidentiality. You agree that you will receive confidential or proprietary information ("Confidential Information") in
connection with the purchase, deployment and use of the Equipment. You will not disclose Confidential Information to
any third party without prior written consent of Ciena, will use it only for purposes for which it was disclosed, use your
best efforts to prevent and protect the contents of the Software from unauthorized disclosure or use, and must treat it
with the same degree of care as you do your own similar information, but with no less than reasonable care. You
acknowledge that the design and structure of the Software constitute trade secrets and/or copyrighted materials of
Ciena and agree that the Equipment is Confidential Information for purposes of this Agreement.
4. U.S. Government Use. The Software is provided to the Government only with restricted rights and limited rights.
Use, duplication, or disclosure by the Government is subject to restrictions set forth in FAR Sections 52-227-14 and
52-227-19 or DFARS Section 52.227-7013(C)(1)(ii), as applicable.The Equipment and any accompanying technical
data (collectively "Materials") are commercial within the meaning of applicable Federal acquisition regulations. These
Materials were developed fully at private expense. U.S. Government use of the Materials is restricted by this
Agreement, and all other U.S. Government use is prohibited. In accordance with FAR 12.212 and DFAR Supplement
227.7202, software delivered to you is commercial computer software and the use of that software is further restricted
by this Agreement.
5. Term of License. This license is effective until terminated. Customer may terminate this license at any time by
giving written notice to Ciena and destroying or erasing all copies of Software including any documentation. Ciena may
terminate this Agreement and your license to the Software immediately by giving you written notice of termination in
the event that either (i) you breach any term or condition of this Agreement or (ii) you are wound up other than
voluntarily for the purposes of amalgamation or reorganization, have a receiver appointed or enter into liquidation or
bankruptcy or analogous process in your home country. Termination shall be without prejudice to any other rights or
remedies Ciena may have. In the event of any termination Customer will have no right to keep or use the Software or
any copy of the Software for any purpose and Customer shall destroy and erase all copies of such Software in its
possession or control, and forward written certification to Ciena that all such copies of Software have been destroyed
or erased.
7. Limitation of Liability. ANY LIABILITY OF Ciena SHALL BE LIMITED IN THE AGGREGATE TO THE AMOUNTS
PAID BY YOU FOR THE SOFTWARE. THIS LIMITATION APPLIES TO ALL CAUSES OF ACTION, INCLUDING
WITHOUT LIMITATION BREACH OF CONTRACT, BREACH OF WARRANTY, NEGLIGENCE, STRICT LIABILITY,
MISREPRESENTATION AND OTHER TORTS. THE LIMITATIONS OF LIABILITY DESCRIBED IN THIS SECTION
ALSO APPLY TO ANY THIRD-PARTY SUPPLIER OF Ciena. NEITHER Ciena NOR ANY OF ITS THIRD-PARTY
SUPPLIERS SHALL BE LIABLE FOR ANY INJURY, LOSS OR DAMAGE, WHETHER INDIRECT, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL INCLUDING WITHOUT LIMITATION ANY LOST PROFITS, CONTRACTS,
DATA OR PROGRAMS, AND THE COST OF RECOVERING SUCH DATA OR PROGRAMS, EVEN IF INFORMED
OF THE POSSIBILITY OF SUCH DAMAGES IN ADVANCE.
8. General. Ciena may assign this Agreement to any Ciena affiliate or to a purchaser of the intellectual property rights
in the Software, but otherwise neither this Agreement nor any rights hereunder may be assigned nor duties delegated
by either party, and any attempt to do so will be void.This Agreement shall be governed by the laws of the State of
Maryland (without regard to the conflict of laws provisions) and shall be enforceable in the courts of Maryland. The
U.N. Convention on Contracts for the International Sale of Goods shall not apply hereto. This Agreement constitutes
the complete and exclusive statement of agreement between the parties relating to the license for the Software and
supersedes all proposals, communications, purchase orders, and prior agreements, verbal or written, between the
parties. If any portion hereof is found to be void or unenforceable, the remaining provisions shall remain in full force
and effect. The source code for open source components distributed to an end user is available upon request.
This guide contains information protected by copyright. No part of this publication may
be photocopied or reproduced in any form without prior written consent from Ciena
Corporation.
The software provided with Ciena Corporation hardware and described in this guide is
furnished under and is subject to a license and nondisclosure agreement.
Ethernet to the Subscriber, Fiber to the Subscriber, True Carrier Ethernet, and Ciena are
all trademarks of Ciena Corporation.
Other specific product names mentioned herein are trademarks of their respective
companies.
These copyright and trademark guidelines provide information concerning the proper
usage and protection of Ciena Corporation trademarks, registered trademarks, service
marks, registered service marks, tradenames, and/or registered tradenames.
Copyright
All content in this guide, including words, names, text, graphics, symbols, logos, icons,
images, devices, and/or software, is the property of Ciena Corporation or its content
suppliers and is protected by U.S. and international copyright laws. The compilation
(meaning the collection, arrangement, and assembly) of all content in this guide is the
exclusive property of Ciena Corporation and is protected by U.S. and international
copyright laws. All software mentioned in this guide is the property Ciena Corporation or
its software suppliers and protected by U.S. and international copyright laws. The
content in this guide may be used as a resource. Any other use, including the
reproduction, modification, distribution, transmission, republication, display, or
performance, of the content in this guide is strictly prohibited.
Trademarks
Ciena Corporation trademarks may not be used in connection with any product or service
that does not belong to Ciena Corporation. Furthermore, Ciena Corporation trademarks
may not be used in any manner that is likely to cause confusion among customers or in
such a way that it disparages or discredits Ciena Corporation.
A trademark is often categorized as a word, name, text, graphic, symbol, logo, icon,
image, device, and/or software or any combination used by a corporation to identify
their products and distinguish those products from other corporations.
A service mark is typically used to identify a corporation’s services rather than tangible
products.
Categories
Trademarks, service marks, and tradenames generally fall into two categories:
1. Those that are registered with the United States Patent and Trademark
Office1 (USPTO).
2. Those that are being used, but have not yet completed the registration
process.
Both categories are protected, although those that are registered provide visible notice
of the corporation’s rights and stronger enforcement provisions.
The registration process may take a long period of time before it is finalized, thus
pending trademarks, service marks, and tradenames may be in use by the corporation.
Trademarks, service marks, and tradenames must be used with the first mention or most
prominent appearance in a publication, but need not be used with each subsequent
appearance. If there are multiple uses of trademarks, service marks, and tradenames
throughout the publication, an explanatory note on the cover sheet is sufficient.
1. Full information regarding the United States Patent and Trademark Office (USPTO) may be found online
at http://www.uspto.gov
Service Aware Operating System SAOS MAN-0157-001 - Revision A
Copyright Ciena® Corporation June 2009
ISO Compliance
At a Glance:
• Intended Audience
• Overview
• Structure
• Document Conventions
This manual describes how to configure system software on the supported Service
Delivery Switches. This system software is based on a common Service Aware Operating
System (SAOS) code base designed to deliver consistent benefits across all Ethernet
deliver, aggregation, and distribution configurations. This system software cannot be
installed on other Service Delivery Switches, Service Concentration Switches or Service
Aggregation Switches.
Intended Audience
This publication is intended for users, such as network technicians and system
administrators, who will configure system software. It assumes that the intended user(s)
possess basic knowledge of, but not limited to:
• Proper Hardware Installation
• Proper Hardware Diagnostics
• Ethernet Concepts
• IEEE 802 Standards
• Open Systems Interconnection (OSI) Seven Layer Model
• Optical Fiber Distribution and Monitoring
• Local Area Networks (LAN)
• Virtual Local Area Networks (VLAN)
Overview
This manual provides information and examples for use in configuring system software on
any platform that it is installed. It includes an explanation of the key features supported
by the devices and provides example configurations for these features. Although these
examples are useful in configuration, they are not meant to be used as a configuration
template.
Structure
In addition to this Introduction, this manual includes the following chapters:
Chapter 2 Chassis Setup
• Provides details for enabling the Service Delivery Switch and setting up interfaces.
Chapter 9 OAM
• Explains how to configure Operations, Administrations, and Maintenance (OAM).
Chapter 12 Security
• Describes methods for preventing unauthorized access to network resources and
services.
Glossary
Defines various networking terms.
Document Conventions
This section describes content, style, and usage conventions that outline specific
categories of information throughout this manual.
Symbols
Symbols denote text that requires special attention. The information contained alongside
a symbol corresponds to one of three levels:
WARNING: This symbol is used to highlight information so the user can avoid personal injury.
CAUTION: This symbol is used to highlight information so the user can avoid equipment
damage or data loss.
server <IpHost>
priority <NUMBER: 1-7>
dns <on|off>
description <String[31]>
For server <IpHost>, the attribute could be entered as server
10.10.11.100 or server www.ciena.com. With priority
<NUMBER: 1-7> the text within <> indicates that 1 - 7 are valid values. In the
example of dns <on|off>, either the literal value of on or off is valid, such
as dns on. For description <String[31]>, any string of up to 31
characters is entered.
| Separates mutually exclusive items in a list, only one of which can be entered.
For example, in the syntax:
dhcp client options set subnet <on|off>
... Indicates the example has been abbreviated and that the actual display
contains more information.
At a Glance:
• Enabling the Switch • Configuring the Local Management
• Configuring the Serial Console Port Interface
• Configuring the Remote
Management Interface
This chapter provides information on setting up switches so that they can be enabled for
configuration over an IP connection.
Currently, this configuration cannot be changed, but you can disable, enable, and display
the status of the serial console port.
NOTE: The default priority for the remote management interface defaults to 7, and it is
not configurable.
NOTE: The local and remote management interfaces cannot be configured to the same IP
subnet.
NOTE: The CN 3911 does not support the local management interface.
NOTE: The local and remote management interfaces cannot be configured to the same IP
subnet.
This chapter provides explanations for implementing the basic switch set up and
describes the various options available to configure it.
Overview
The purpose of this chapter is to present the different tools for managing a Ciena switch.
Following these guidelines will help to streamline network operations by installing and
managing the device in the network and help to simplify the troubleshooting process.
Access Levels
When a user account is created, it is assigned an access level. The CLI provides three
access levels, including:
• Limited User (lu) - able to execute commands that do not change the state of the
system in a significant way or change the configuration of the device.
• Super User (su) - includes all the privileges of the limited user and can make
significant system state changes, modify the device configuration, and perform
execute commands including creating user accounts.
The CLI provides two default user names/passwords:
CN 3920 login: su
Password:
3. At the logon prompt, enter a user name and then a password to access the
prompt.
You can use the configuration save command to save the current configuration to
an alternate file. To save configuration to an alternate file:
> configuration save filename <FileName>
By saving alternate versions of command files, you can store multiple configuration files
for running different configurations of the system. For example, you can save
configuration to an alternate file as a backup to restore to a previous configuration or you
can store a configuration file for configuring another device of the same family. To
activate an alternate command file, use the configuration reset-to-user-config command:
> configuration reset-to-user-config filename <FileName>
You can set alternate configuration files as the default save file so that when a
configuration save is performed, the changes will be saved to the alternate configuration
file. For example:
> configuration set default-save-filename <FileName>
When the device is rebooted, it will load the default-load file, which may or may not be
the same file. However, when the device is rebooted it will load the startup-config file.
To set the alternate command file as the default load file:
> configuration set default-load-filename <FileName>
To display the default save and load files, use the configuration list command:
> configuration list
+-----------------------------------------------------------------------------+
| Configuration Files |
+-----------------------------------------------------------------------------+
| startup-config |
| test |
+-----------------------------------------------------------------------------+
| Default Save File: test |
| Default Load File: test |
+-----------------------------------------------------------------------------+
Configuration files are stored in the /mnt/sysfs/config/ directory. You can delete
configuration files from that directory using the rm command.
> rm /mnt/sysfs/config/<FileName>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! SERVICE ACCESS CONTROL CONFIG:
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! STATIC MAC CONFIG:
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! LLDP CONFIG:
!
!
Example:
> configuration search string aging lines 5
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! AGING and LEARNING CONFIG:
!
flow aging set time 1800
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! STATIC MAC CONFIG:
!
!
Configuring Telnet
By default, Telnet server is enabled and supports a maximum of 10 simultaneous sessions.
You can configure Telnet to allow up to 9 limited users, 9 admin users, and 10 super users
to log on simultaneously. By default, the maximum number of simultaneous sessions for
limited users is 4, admin users is 4, and super users is 5. You can adjust the number of
allowed connections per user to ensure proper management and utilization of the device.
To set the maximum number of simultaneous sessions per user access level:
telnet-server set {[max-limited-users <NUMBER:0-9>], [max-super-users <NUMBER:0-10>]}
Example:
> telnet-server set max-limited-users 3 max-super-users 6
To disable Telnet:
> telnet-server disable
To enable Telnet:
> telnet-server enable
In addition to the Telnet server, devices support a Telnet client for establishing Telnet
connections to other Telnet servers specified by a host name or IP address. Optionally,
you can log in with the specified user. If left unspecified, the remote system prompts for
the user name. Also, you can specify a TCP port other than the default, 23.
Example:
> telnet 10.10.121.19
3940 00:02:A1:24:0E:30
SAOS is True Carrier Ethernet TM software.
3940 login: su
Password:
Goodbye.
>
MAC table size - max 4,000 without a license, 16,000 with a license Advanced Ethernet
(32000 on the CN 3960)
Example:
> software license install license-key W1SSH2D3E4FGH5
One or more license keys can be stored in a single license file. There is no restriction on
the number of keys stored in a license file.
Example:
> software license install file license.txt server 172.16.172.100
Example:
> software license uninstall security
Configuring DHCP
SAOS supports IETF RFC 2131 Dynamic Host Configuration Protocol (DHCP) client on the
active and direct control module interfaces for IP address assignment and other IP
configuration through DHCP options. By default, DHCP is enabled on the remote
management interface.
When you enable DHCP on an interface, it creates a query and sends it to the DHCP server
to receive IP configuration. If the interface has an assigned IP address, it creates a
request query to renew the current IP address and obtain the configured DHCP options.
Otherwise, it creates a discover query to obtain an IP address and the configured DHCP
options. The server replies with the IP address and any configured DHCP options.
The DHCP client checks to see if the IP address is already in use by sending a gratuitous
ARP. If it is in use, it sends a decline and re-starts the discover process. When DHCP is
disabled, any configuration set through DHCP options are deleted. The configuration and
options applied as a result of DHCP are not saved in the configuration file. A reboot
requires a new DHCP transaction with the server.
The DHCP client supports the DHCP options as summarized in Table 3-2. A complete list
of DHCP options is defined in RFC 1533.
Configuring NTP
With the Network Time Protocol (NTP) client, you can configure a device to automatically
synchronize its time and date to a remote NTP server running Coordinated Universal Time
(UTC). By default, the NTP client is disabled, and you can manually configure the date
and time. When you enable the NTP client, date and time configuration received from an
NTP server will override any values manually set on the device. MD5 authentication
support allows the NTP client to verify that the server is in fact known and trusted.
In broadcast mode, you do not need to configure the NTP client to use a specific server.
Instead, the NTP client waits for broadcast servers on the same subnet to broadcast their
current time. When the NTP client receives the first message, it will interact with that
server to retrieve reliable time. When additional broadcast messages are received from
that server, the NTP client will calculate the time difference and adjust the clock
accordingly. If broadcast messages are received from several broadcast servers, the
client will select the most accurate server to use.
With polling mode (default), you need to specify the host names or IP addresses of NTP
servers along with a time interval to request for date and time information. SAOS supports
up to 10 NTP servers and a range between 16 - 4096 seconds for the polling interval with
16 seconds as the default.
As the NTP client communicates with the server, the server status is updated. Table 3-3
shows the status values you will see when displaying NTP configuration while the NTP
client communicates with NTP servers.
NOTE: When the device is set in broadcast mode, setting a polling-interval will be ignored
by the device.
NOTE: Any number can be entered for the interval value, but the system will round the
number down to the nearest allowed value, as shown in the following example.
Example:
> ntp-client set polling-interval 1000
method supported for the NTP client is RSA Message Digest 5 (MD5) with a private key
called keyed-MD5. NTP authentication keys are codes that are encrypted on both the
server and client that are used to identify the NTP time server. Each authentication key
consists of a key ID and the key itself. MD5 authentication works with both polling and
broadcast modes.
NOTE: MD5 authentication is not supported for NTP servers configured with DHCP
option 42. When the NTP servers are configured with DHCP, any user configured NTP
settings are overridden.
The authentication key number acts as a reference to the specified authentication key.
The actual keys must be identical on both the NTP client and the NTP server. The client
may use a subset of the authentication keys specified on the NTP server, and the keys are
case sensitive.
In polling mode, the NTP client configuration must specify the association of the key
number to a server. When configured, the NTP client sends a request for time to the NTP
Server with corresponding Key and Authentication code. The NTP server, after validating
the client's authentication, replies with an encrypted response along with timestamp
information. Upon receipt of the timestamp, the NTP client validates the Server's
authentication, if valid, time configuration is updated. Otherwise, the time configuration
is rejected.
In broadcast mode, since the server is auto-detected by the client, association of the key
number to a server cannot be configured at the client. However, the corresponding key
number and key values must be configured at the client. The NTP Server will broadcast
timestamp information along with the key number and Authentication code encoded in
the packet. Upon receipt of the timestamp, the NTP Client decrypts the key and verifies
it against a list of trusted keys. If the key matches one of the list of trusted keys, the NTP
Client starts synchronizing with that NTP Server using the same key number and
Authentication code as the Server.
Example:
> ntp-client md5-auth enable
Example:
> ntp-client md5-auth disable
Example:
> ntp-client md5-auth add key-id 1 md5 Key1
Example:
ntp-client md5-auth add key-id 1 md5 3bf313a5
Example:
> tget 10.25.41.68 ntp_simple_tag.key ntp_simple_tag.key
Received 46 bytes in 0.0 seconds.
Received 2000 bytes/second.
> ntp-client md5-auth import filename ntp_simple_tag.key
Example:
ntp-client md5-auth remove key-id 1
Example:
> ntp-client md5-auth show
DNS
The system supports up to three domain name servers that can be prioritized by the
administrator. This functionality resolves Hostnames to IP addresses. By default the DNS
client is enabled, although no servers are configured.
DNS servers can be configured via DHCP. When both DHCP and the user configure a set of
DNS servers, the servers configured by DHCP will be active (operationally enabled), and
the other servers will be inactive.
The following IP addresses cannot be specified as DNS servers:
• 0.0.0.0
• 224.0.0.0 -> 255.255.255.255
• 127.0.0.0 -> 127.255.255.255
An error is returned if an IP address is not resolved.
SSHv2
Secure Shell (SSH) provides remote login and SFTP file transfers. Intended as a more
secure replacement of Telnet, SSH verifies and grants access to log in requests by
encrypting user ID and passwords. It also supports public key based authentication. In
public key based authentication, a password is not required, instead a key pair consisting
of a private key and a public key is generated, then encrypted and stored on the server.
The public key must be distributed to the client machine.
NOTE: To enable SSHv2 commands, the Advanced Security feature license must be
installed with the software license install command.
This command generates, encrypts, and then stores the public/private key pair as
follows:
> cd /mnt/sysfs/ssh
> ls
ssh_host_rsa_key
ssh_host_rsa_key.pub
SSH user keys can be provisioned using the device’s XML file:
<XmlWwpCommandFile>
<XmlCmdPlatformClass name="CN3911"
version="saos-%VERSION%"
operation="upgrade"
serviceAffecting="yes">
</XmlCmdPlatformClass>
<XmlCmdPlatformClass name="brego"
configFilePath="myFolder/my-config-file.txt"
configFileRule="activate"
welcomeBanner="myBannerFile.txt"
licenseFile="myLicenseFile.txt"
<SshKeyFile name="user1.pk2"></SshKeyFile>
<SshKeyFile name="user2.pk2"></SshKeyFile>
<SshKeyFile name="user3.pk2"></SshKeyFile>
version="saos-%VERSION%"
packagePath="folder1/folder2/folder3"
operation="install"
serviceAffecting="no" >
</XmlCmdPlatformClass>
</XmlWwpCommandFile>
The default configuration allows any IP address to connect. Adding clients restricts
access to the IP addresses in the client list.
• Change the maximum number of authentication retries and which port listens for SSH
requests.
>ssh-server set {[authentication-retries <NUMBER: 1-3>] [listener-port] <NUMBER: 22 -
65535>]}
The authentication-retries setting determines how many times the SSH server will
prompt for a username and password validation if public key encryption fails. The
authentication retry counter is incremented when an authentication method fails,
even within the same login cycle. For example, with authentication-retries set to 3,
when the SSH client fails to authenticate using an RSA public key, and then a DSA public
key, each attempt increments the authentication-retries counter and only one prompt
for a username and password occurs for that login cycle.
• Remove any clients from which you do not want to accept a connection.
>ssh-server remove [client <IpAddress>]
</XmlWwpCommandFile>
The format of the key files should be as specified in http://www.openbsd.org/cgi-
bin/man.cgi?query=sshd&sektion=8 under the section AUTHORIZED_KEYS FILE FORMAT.
The keyfile is stored as /mnt/sysfs/ssh/users/<username/keyfile.
SFTP
After setting up the SSH server, you can transfer files with an SFTP client. SFTP uses
standard file transfer commands, such as get and put for transferring files. SFTP
encrypts the user ID, password, and the file and then transfers the information over the
SSH server port number.
Table 3-5 shows a list of tested SFTP clients. Other SFTP clients may also be compatible
but have not been explicitly tested with SAOS.
Example:
>system set host-name myHostName
Example of setting the time for Eastern Daylight Time (EDT) USA:
> system set time 09:33 time-offset -14400
Example of setting the time for Eastern Standard Time (EST) USA:
> system set time 09:33 time-offset -18000
NOTE: Be sure each line ends with a carriage return. If a line does not end with a carriage
return, it will not display.
Example:
> system show date host-name load-query time time-offset uptime
Friday December 31, 1999
MemTotal: 60664 kB
MemFree: 3420 kB
Example:
> system shell show
+--------- Shell Settings -----------------+
| Parameter | Value |
+-----------------------------+------------+
| Global more | on |
| Global more lines | 0 |
| Global inactivity timer | off |
| Global inactivity timeout | 10 min |
| Global login timer | on |
| Global login timeout | 60 sec |
| Session more | on |
| Session more lines | 0 |
| Welcome banner file | (none) |
+-----------------------------+------------+
Example:
> system state-dump tftp-server 192.168.75.100 file-name StateDump.txt
Writing system info
Writing interface info
Writing chassis info
Writing module info
Writing port info
Writing device ID info
Writing fan info
Writing power info
Writing archive info
Writing alarm info
Writing system config
Writing log files
File StateDump.txt transferred to tftp server 192.168.75.100
At a Glance:
• Overview • Port Mirroring
• VLANs and Traffic Flow • Port Loopback
• Behavior Summary • Port Statistics
• VLAN/Port Configuration
This chapter details the function of VLANs. It also details how to configure port settings
to switch traffic properly through the network.
Overview
Virtual Local Area Networks (VLANs) are a key element within the system software. A
VLAN is used to group resources that have a common set of requirements, regardless of
where they are located physically. They also allow ports on a device to be grouped in
order to limit the distribution of unicast, multicast, and broadcast traffic. For example,
flooded traffic originating from a particular VLAN can be limited to only other ports
belonging to that VLAN. VLANs allow traffic on the same physical connection to be divided
into separate services. These services can then be further divided into groups within each
service.
Port VLAN ID
The full VLAN address range from 1 to 4094 can be supported per port. For untagged or
priority-tagged frames, the next ingress rule applied is the Port VLAN ID (PVID). Each port
on the device has an associated PVID. By default, the PVID value is the default VLAN ID
(VLAN 1). When an untagged frame arrives at an ingress port (assuming that the port is
set to accept all frame types) it may be forwarded to all ports that are members of the
configured PVID (depending on additional ingress parameters set on the device). If an
ingress frame is not tagged with the VLAN specified by the port’s PVID, then the setting
on the port's Ingress Filter will apply.
Similarly, if a port is removed from a VLAN that is also its PVID, the PVID value remains
the same and the port's Ingress Filter setting is therefore applied (refer to the VLAN
Ingress Filter section).
The PVID assignment for aggregated ports is slightly different. When a physical port is
added to an aggregation, it inherits the PVID setting of the aggregation group. However,
when the port is removed from the aggregation, its own PVID setting becomes valid again.
NOTE: PVIDs can only be set to the VLAN ID of configured VLANs, therefore the VLAN must
exist before the corresponding PVID can be assigned. The port does not however, have to
be a member of the VLAN in order to assign the PVID.
Behavior Summary
The following tables summarize packet behavior.
VLAN/Port Configuration
All of the frame forwarding behaviors discussed in this chapter are port-based features,
but require VLANs to tie them together. The VLAN can be thought of as an imaginary wire
that connects the ingress port to the egress port(s). VLANs must be created using the CLI,
MIB, or the Device Manager, prior to configuring other features on the device. A VLAN is
identified by 2 basic parameters:
• VLAN ID: value used to identify the VLAN
• VLAN Name: (optional) defined by the network operator. VLAN names may not begin
with a number
NOTE: A maximum of 500 VLANs are supported without an Advanced Ethernet (AE)
license, and up to 4094 VLANs with an AE license.
All commands in the following sections (except “show” commands) require the user to
have super user or admin access level. Refer to the Access Levels section in Appendix 26,
on page 377 for information on CLI access privileges.
Step 2 Add ports to the VLAN. Ports can be added to the VLAN vlan add vlan <VlanList>
either by specifying the VLAN name or VID and a port port <PortNameList>
name.
Step 3 (Optional) Verify the creation of the VLAN. vlan show [port
<PortNameList> | vlan
vlan show lists all configured VLANs. vlan show <VlanList>]
port <PortNameList> displays the VLANs to which the
specified ports belong. vlan show vlan
<VlanList> displays information for a specific VLAN.
Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 5
Port Configuration
The following examples show how to configure a VLAN/port pair to receive traffic in one
state and egress it in a particular state (e.g., receive untagged traffic and egress tagged
traffic).
NOTE: By default, all ports are members of VLAN 1. Frames tagged with VLAN 1 will also
be forwarded since the PVID is set to VLAN 1 by default and is not changed in this
example.
To configure a port pair that will receive frames tagged with VLAN 300 and egress them
with the original tag intact, the following steps are used:
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList>} [tag
{<value> | none}]
Step 3 (Optional) Verify the creation of the VLAN. vlan show [port
<PortNameList> | vlan
<VlanList>]
Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 1,5
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList> [tag
{<value> | none}]
Step 3 Set the AFT on all ports to All. On ports 1-8, this value is port set port
the default setting. <PortNameList>
[acceptable-frame-type
<'all' | 'tagged-only'>]
Step 4 Set the PVID on all ports to the VLAN used in Step 2. port set port
<PortNameList> [pvid
<VlanList>]
Step 5 (Optional) Verify the ingress port settings. Note that the port show port
egress untagged VLAN automatically changes to the same <PortNameList>
value as the PVID.
Step 6 (Optional) Verify the egress port settings. Note that the port show port
egress untagged VLAN automatically changes to the same <PortNameList>
value as the PVID.
Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 1,5
3. > port set port 1,5 acceptable-frame-type all
4. > port set port 1,5 pvid 300
Assume now that port 1 is connected to the subscriber while port 5 connects to the
provider network, the frame will pass between the subscriber and the provider networks,
but the VLAN tag of 300, which may only have meaning in the provider network, will never
be seen in the customer’s network.
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList>
Step 3 Set the PVID on the ingress ports to the VLAN used in Step port set port
2. <PortNameList> [pvid
<VlanList>]
Step 4 Set the AFT on all ports to All. On ports 1-8, this value is port set port
the default setting. <PortNameList>
[acceptable-frame-type
<'all' | 'tagged-only'>]
Step 5 (Optional) Verify the ingress port settings. port show port
<PortNameList>
Step 6 Set the EUV on the egress port (provider port) to a VLAN port set port
that is different than the VLAN used in Step 2. Note that <PortNameList> [egress-
the value used does not have to correspond to an existing untag-vlan <VlanList>]
VLAN.
Step 7 (Optional) Verify the egress port settings. port show port
<PortNameList>
Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 1,5
3. > port set port 1,5 acceptable-frame-type all
4. > port set port 1 pvid 300
5. > port show port 1
6. > port set port 5 egress-untag-vlan 4094
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList> [tag
{<value> | none}]
Step 4 Set the AFT on all ports to All. On ports 1-8, this value is port set port
the default setting. <PortNameList>
[acceptable-frame-type
<'all' | 'tagged-only'>]
Step 5 (Optional) Set the ingress fixed .1d priority on the ingress port set port
port. <PortNameList> ingress-
fixed-dot1dpri <NUMBER: 0-
7>
Example:
1. > vlan create vlan 4000
2. > vlan add vlan 4000 port 1,5
3. > port set port 1 untagged-data-vid 100
4. > port set port 1,5 acceptable-frame-type all
5. > port set port 1 ingress-fixed-dot1dpri 4
6. > port show port 1
Hybrid Traffic
This scenario configures a port pair that will receive either tagged or untagged frames.
Tagged frames will egress with their original tag intact and untagged frames will egress
untagged.
In this example, any traffic tagged with VLAN 300 will enter the switch tagged and leave
the switch still tagged with VLAN 300, while untagged traffic will enter untagged and
leave untagged. The follow commands are used for this scenario:
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList> [tag
{<value> | none}]
Step 3 Set the AFT on the ingress ports to All. On ports 1-8, this port set port
value is the default. <PortNameList>
[acceptable-frame-type
<'all' | 'tagged-only'>]
Step 4 Set the PVID on the ingress ports to VLAN 1 (this is the port set port
default setting). <PortNameList> [pvid
<VlanList>]
Step 6 (Optional) Verify the ingress port settings. port show port
<PortNameList>
Step 7 (Optional) Verify the egress port settings. port show port
<PortNameList>
Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 1,5
3. > port set port 1,5 acceptable-frame-type all
4. > port set port 1 pvid 1
5. > port set port 5 egress-untag-vlan 1
6. > port show port 1
7. > port show port 5
Step 2 Add the ingress and egress ports to the VLAN. vlan add vlan <VlanList>
port <PortNameList> [tag
{<value> | none}]
Step 3 Set the AFT on the ports to Tagged-Only (Tagged-Only is port set port
the default setting for ports 9 and 10). <PortNameList>
[acceptable-frame-type
<'all' | 'tagged-only'>]
Step 4 Disable Ingress VLAN Filtering on the ports. VLAN Ingress port set <PortNameList>
Filtering should only be disabled if the ingress port is not [vlan-ingress-filter
<'on' | 'off'>]
a member of the tagged frame’s VLAN.
Step 5 Set the EUV on the ports to the VLAN used in Step 2. port set port
<PortNameList> [egress-
untag-vlan <VlanList>]
Step 6 (Optional) Verify the ingress port settings. port show port
<PortNameList>
CLI Example:
1. > vlan create vlan 300
2. > vlan add vlan 300 port 1,5
3. > port set port 1,5 acceptable-frame-type tagged-only
4. > port set port 1,5 vlan-ingress-filter off
5. > port set port 1,5 egress-untag-vlan 300
6. > port show port 1
7. > port show port 5
Port Mirroring
To monitor ingress and egress traffic, you can configure another port to “mirror” the
traffic of a specified port, or define up to 5 port state mirror groups (PSMGs). By attaching
a protocol analyzer to the port, you can monitor and analyze traffic. Port mirroring
actions can only be configured on physical ports.
Monitoring traffic on a port is a two-step process. First, port mirroring must be enabled
on the port that is to be the mirror port. Next, direct the input traffic, output traffic, or
both to the mirror port (the port to which the analyzer is attached).
Any port can be designated as a mirror port, but only one mirror port can be assigned at
a time. However, the ingress/egress traffic from multiple ports can be mapped to a single
mirror port. Port mirroring configuration persists after a reboot if the device
configuration has been saved.
Each PSMG has a source port group and a list of destination ports. A port can be added to
a PSMG in either the source group or destination port list. A port can only be a member
of one PSMG at a time.
It should be noted that a port defined as a mirror port will continue to transmit/receive
normally based on its configuration, such as its VLAN membership. It may be beneficial
to manually remove all configuration on the mirror port and place it in a designated
mirror VLAN to isolate the desired traffic.
The following example configures a mirror port to analyze the ingress and egress traffic
from port 6 using port 3 as the mirror port.
To configure port mirroring, the following steps are used:
Step 2 Configure port 6 to mirror its Ingress and Egress traffic to port set port
port 3. <PortNameList> ingress-
mirror <PortName> egress-
mirror <PortName>
Step 4 Display the configuration for port 6 (optional). port show port
<PortNameList>
CLI Example:
1. > port set port 3 mirror-port on
2. > port set port 6 ingress-mirror 3 egress-mirror 3
3. > port show port 3
4. > port show port 6
Port Loopback
External loopback is supported where data that is received on a port in loopback mode
will egress the same port, and the loopback occurs in the PHY.
Loopback can be enabled on any physical port independently, regardless of VLAN
membership. Setting the loopback attribute automatically sets the port’s learn limit to 0,
with an action of 'forward'. When the loopback setting is 'off', the configured learn limit
is then re-applied.
NOTE: If more than two ports within the same VLAN are configured to participate in a
loopback test, there is a danger of creating a broadcast storm.
CLI Example:
The following example starts a loopback on port 5.
Port Statistics
The system software tracks statistics per port including:
• RxBytes - Number of bytes received in good and bad packets including Frame Check
Sequence (FCS) bytes and excluding framing bits.
• RxPkts - Number of packets received, including good and bad.
• RxCrcErrorPkts - Number of packets received with CRC errors.
• RxMcastPkts - Number of good multicast packets received.
• RxBcastPkts - Number of good broadcast packets received.
• UndersizePkts - Number of packets received that were less than 64 bytes long
(excluding framing bits, but including Frame Check Sequence (FCS) bytes) and were
otherwise well formed.
• OversizePkts - Number of packets received that were longer than 1518 bytes
(excluding framing bits, but including FCS bytes) and were otherwise well formed.
• FragmentsPkts - Number of packets received that were less than 64 bytes in length
(excluding framing bits but including FCS bytes) and had either a bad FCS with an
integral number of bytes (FCS Error) or a bad FCS with a non-integral number of bytes
(Alignment Error).
• JabbersPkts - Number of packets received that were longer than 1518 bytes (excluding
framing bits, but including FCS bytes), and had either a bad FCS with an integral
number of bytes (FCS Error) or a bad FCS with a non-integral number of bytes
(Alignment Error).
• RxPausePkts - Number of received pause packets.
• 64OctsPkts - Number of packets (including bad packets) received that were 64 bytes
in length (excluding framing bits but including FCS bytes).
• 65To127OctsPkts -Number of packets (including bad packets) received that were
between 65 and 127 bytes in length inclusive (excluding framing bits but including FCS
bytes).
• 128To255OctsPkts -Number of packets (including bad packets) received that were
between 128 and 255 bytes in length inclusive (excluding framing bits but including FCS
bytes).
• 256To511OctsPkts - Number of packets (including bad packets) received that were
between 256 and 511 bytes in length inclusive (excluding framing bits but including FCS
bytes).
• 512To1023OctsPkts - Number of packets (including bad packets) received that were
between 512 and 1023 bytes in length inclusive (excluding framing bits but including
FCS bytes).
• 1024To1518OctsPkts - Number of packets (including bad packets) received that were
between 1024 and 1518 bytes in length inclusive (excluding framing bits but including
FCS bytes)
• TxBytes - Number of transmitted bytes in good and bad packets including FCS bytes
and excluding frame bits.
• TxPkts - Number of packets transmitted including good and bad.
• TxExDeferPkts - Number of transmitted excessive defer packets.
• TxGiantPkts - Number of well formed packets longer than 1518 bytes including FCS
bytes and excluding framing bits.
• TxUnderRunPkts - Number of transmitted underrun packets.
• TxCrcErrorPkts -Number of transmitted packets with CRC errors.
• TxLCheckErrorPkts - Number of transmitted length check packets.
• TxLOutRangePkts - Number of transmitted length out of range packets.
• TxLateCollPkts - Number of transmitted late collision packets.
• TxExCollPkts - Number of transmitted excessive collision packets.
• TxSingleCollPkts -Number of transmitted single collision packets.
• TxCollPkts - Number of transmitted collision packets.
• TxPausePkts - Number of transmitted pause packets.
• TxMcastPkts - Number of good multicast packets transmitted.
• TxBcastPkts - Number of good broadcast packets transmitted.
Info: This CLI output may take a while to display press CTRL-C to abort
<Screen clears>
+--------------- PORT THROUGHPUT SUMMARY 20 SECOND SAMPLE ------------------+
| Port | Bit Rate (Mbps) | Pkt Rate (Mpps) |
| | Tx | Rx | Tx | Rx |
+---------+----------------+----------------+----------------+----------------+
| 1 | 0.860 | | 0.001 | |
| 2 | 0.860 | | 0.001 | |
| 12 | | 2.984 | | 0.003 |
+---------+----------------+----------------+----------------+----------------+
This chapter explains the purpose and configuration of Central Processing Unit (CPU) rate
limiting.
Overview
Network protocol control frames require examination and processing from the CPU. When
the CPU must process a large volume of control frames per second, all CPU resources are
consumed. This overload causes the CLI and SNMP to become unresponsive.
Benefits
With CPU rate limiting, you can control the number of frames that the CPU must process
to help protect the CPU from resource overload, system lockup, and port link loss.
Configuration
By default, CPU rate limiting is globally disabled for the device, and enabled for all
individual ports. Before any CPU rate limiting is enforced for the individual ports, you
must enable CPU rate limiting globally.
You can configure CPU rate limits in Packets Per Second (PPS) per physical port for the
following packet classes:
• Bootstrap Protocol (BOOTP) and Dynamic Host Configuration Protocol (DHCP) control
frames. The default rate limit is 5 PPS.
• Connectivity Fault Management (CFM) control frames. The default rate limit is 50 PPS.
• Tunneled control frames. The default rate limit is 250 PPS.
• 802.1x port-based network access control frames. The default rate limit is 5 PPS.
• Operation, Administration, and Maintenance (EOAM) control frames. The default rate
limit is 5 PPS.
• Egress Port Restriction (EPR) Address Resolution Protocol (ARP) control frames. The
default rate limit is 5 PPS.
• Internet Group Management Protocol (IGMP) control frames. The default rate limit is
5 PPS.
• Generic Internet Protocol control frames. The default rate limit is 700 PPS.
• Link Aggregation Control Protocol (LACP) control frames. The default rate limit is 5
PPS.
• Link Layer Discovery Protocol (LLDP) control frames. The default rate limit is 5 PPS.
• Multi-Protocol Label Switching (MPLS) control frames. The default rate limit is 5 PPS.
• Provider Edge (PE) ARP control frames. The default rate limit is 5 PPS.
• Per VLAN Spanning Tree (PVST) control frames. The default rate limit is 5 PPS.
• Rapid Spanning Tree Protocol (RSTP) control frames. The default rate limit is 5 PPS.
• Loopback (used for debug). The default rate limit is 5 PPS.
• Remote loopback (used for debug). The default rate limit is 5 PPS.
• Two-Way Active Measurement Protocol (TWAMP) test frames. The default rate limit is
100 PPS.
• Two-Way Active Measurement Protocol (TWAMP) response frames. The default rate
limit is 250 PPS.
• Unknown control frames (do not match other packet classes). The default rate limit is
500 PPS.
Example:
> flow cpu-rate-limit set port 15 twamp 300
Example:
> flow cpu-rate-limit unset port 15 twamp
To enable globally:
flow cpu-rate-limit enable
Example:
> flow cpu-rate-limit enable
Example:
> flow cpu-rate-limit enable port 15
To disable globally:
flow cpu-rate-limit disable
Example:
> flow cpu-rate-limit disable
Example:
> flow cpu-rate-limit disable port 15
Step 2 Set the CFT rate limit for UNI ports. flow cpu-rate-limit set
{port <PhyPortNameList}
Step 3 Set the RSTP, LACP, and LLDP rate limit for NNI ports. flow cpu-rate-limit set
{port <PhyPortNameList}
Step 4 Set the CFT rate limit for NNI ports. flow cpu-rate-limit set
{port <PhyPortNameList}
Example:
1. > flow cpu-rate-limit set port 1-5 bootp 50
2. > flow cpu-rate-limit set port 1-5 cft 50 cfm 0 inet 5 dflt 10
3. > flow cpu-rate-limit set port 25-28 rstp 50 lacp 10 lldp 25
4. > flow cpu-rate-limit set port 25-28 cft 10
5. > flow cpu-rate-limit enable
Troubleshooting
Example:
> flow cpu show
+----------------------------------------------+
| Per Port CPU Rate Limiting |
+--------+-----------+---------------+---------+
| Port | Admin | Operational | Drops |
+--------+-----------+---------------+---------+
| 1 | Enabled | Disabled | |
| 2 | Enabled | Disabled | |
| 3 | Enabled | Disabled | |
| 4 | Enabled | Disabled | |
| 5 | Enabled | Disabled | |
| 6 | Enabled | Disabled | |
| 7 | Enabled | Disabled | |
| 8 | Enabled | Disabled | |
| 9 | Enabled | Disabled | |
| 10 | Enabled | Disabled | |
+--------+-----------+---------------+---------+
Example:
> flow cpu-rate-limit show port 15
+------------------------------------+
| Packets Per Second Rate Limits |
| Port | Packet Class | PPS Rate |
+------+-----------------+-----------+
| 15 | Bootp/DHCP | 5 |
| 15 | CFM | 50 |
| 15 | CFT | 250 |
| 15 | Dot 1X | 5 |
| 15 | EOAM | 5 |
| 15 | EPR ARP | 5 |
| 15 | IGMP | 5 |
| 15 | INET/IP | 700 |
| 15 | LACP | 5 |
| 15 | LLDP | 5 |
| 15 | MPLS | 5 |
| 15 | PE ARP | 5 |
| 15 | PVST | 5 |
| 15 | RSTP | 5 |
| 15 | Loopback | 5 |
| 15 | Remote Loopback | 5 |
| 15 | TWAMP TST | 100 |
| 15 | TWAMP RSP | 250 |
| 15 | Default | 500 |
+------+-----------------+-----------+
Example:
> flow cpu-rate-limit show port 15 statistics
+----------- Rate Limit Packet Statistics -----------+
| Port | Packet Class | Dropped | Passed |
+------+-----------------+-------------+-------------+
| 15 | Bootp/DHCP | 0 | 13900 |
| 15 | CFM | 0 | 0 |
| 15 | CFT | 0 | 0 |
| 15 | Dot 1X | 0 | 0 |
| 15 | EOAM | 0 | 0 |
| 15 | EPR ARP | 0 | 0 |
| 15 | IGMP | 0 | 0 |
| 15 | INET/IP | 0 | 8511 |
| 15 | LACP | 0 | 4671 |
| 15 | LLDP | 0 | 4590 |
| 15 | MPLS | 0 | 0 |
| 15 | PE ARP | 0 | 0 |
| 15 | PVST | 0 | 0 |
| 15 | RSTP | 8 | 68853 |
| 15 | Loopback | 0 | 0 |
| 15 | Remote Loopback | 0 | 0 |
| 15 | TWAMP TST | 0 | 0 |
| 15 | TWAMP RSP | 0 | 0 |
| 15 | Default | 0 | 0 |
| 15 | Default | 0 | 0 |
| 15 | Drop | 0 | 0 |
+------+-----------------+-------------+-------------+
Example:
> flow cpu-rate-limit clear port 15 statistics
NOTE: This version of system software supports the IEEE 802.1X-2001 Standard.
802.1x Overview
The IEEE 802.1x standard defines an authentication protocol that uses a centralized
authentication server (typically a RADIUS server) to provide port-based and user-based
network access control. This provides a method for authenticating customer premise
equipment (CPE) and the Portals, Service Delivery Switches, and/or Service
Concentration Switches used to provide the CPE network connection.
When a device configured for 802.1x authentication is connected to the network, it
passes an authentication request to the device providing its uplink. That device then
passes the request through the network to the authentication server, which compares the
device’s user name and password to a pre-entered subscriber database entry and decides
whether to allow the device full access to the network.
NOTE: If you upgrade from a software release prior to 4.7.2 without first installing the
Advanced-Security feature license, will be disabled and its configuration will not be
supported.
The use of 802.1x with RADIUS authentication differs from standard RADIUS management
authentication. 802.1x uses port-based authentication, whereas RADIUS by itself is used
to authenticate users who are attempting to access a device in order to change or
monitor its configuration. However, the same RADIUS server could be used for
authentication in both instances. Figure 6-1 shows an example of 802.1x authentication.
Authenticator
Device B
Port 6 RADIUS
802.1x EAPOL
Messages
Messages
Supplicant
Authentication
Device A Server
Port 4
The 802.1x standard specifies the following roles in the authentication process:
• Supplicant - is the device requesting access to the network. This could be a subscriber
device, such as a PC, or a port on a Portal, Service Delivery Switch, or Service
Concentration Switch that is connected to another device providing its uplink. In the
case of a PC, the PC’s network interface card (NIC) is configured for 802.1x
authentication using EAP-MD5. When the NIC is enabled, it issues an 802.1x
authentication request to a port on the device providing its uplink that is configured
as an 802.1x Authenticator. Until the Supplicant is successfully authenticated, only
extensible application protocol over LAN (EAPOL) messages from the Supplicant are
accepted by the Authenticator port on the uplink device, while other data packets are
dropped.
NOTE: If the Supplicant is configured to use DHCP to obtain an IP address, the DHCP
request is not passed to the DHCP server until after the Supplicant has successfully
authenticated. If the Supplicant does not authenticate, it does not receive an IP address
- preventing it from being reached via an uplink or a subscriber connection. A direct serial
port connection to the Supplicant device is then required to correct the problem.
• Auto - provides 802.1x operation on a port, allowing only EAPOL frames to be sent
and received until the client successfully authenticates. Once authenticated,
regular traffic is allowed.
• Force Authorized - In this mode, 802.1X is disabled and the port is in an
authorized state. The port transmits and receives normal traffic without 802.1X-
based authentication of the client.
• Force Unauthorized - causes all communications from an 802.1x client to be
blocked, preventing the client from authenticating through this port.
• Authentication Server - receives the RADIUS authentication requests sent from the
Authenticator, looks to see if the Supplicant’s user name and password (and additional
information if configured) are in its subscriber data base, and responds with a message
to allow or deny network access to the Supplicant. For the authentication to succeed,
the Authentication Server must be configured to use the same encryption type as the
Supplicant (currently only EAP-MD5 is supported).
Deployment Example
Figure 6-2 illustrates a possible network topology where 802.1x is used. Device A has a
connection to an Authentication server that is configured with a list of user names and
passwords. Device A port 16 is configured as an Authenticator, and is connected to
Device B port 25, which is configured as a Supplicant. When Device B is connected to
Device A and is powered on, it sends out EAPOL messages to Device A to begin the
authentication process. Device A forms the EAPOL messages into a RADIUS message and
forwards the request to the Authentication Server. Once authenticated, Device A port 16
allows regular traffic to ingress from Device B port 25. If Device B port 25 fails to
authenticate, regular traffic from that port is blocked, preventing traffic from any
devices downstream from reaching the network.
Device A
Port 1
Port 16
Authenticator
Authentication
Device B
Server
Portal
Port 25
Supplicant
PC Port 5 Port 24
Authenticator Supplicant Authenticator
After Device B port 25 has successfully authenticated, it can pass data from downstream
devices that receive their uplink from that port, such as the Portal connected to port 24.
When the Portal connected to Device B is powered on, it sends EAPOL messages out port
5 to Device B port 24, which in turn forms the message into a RADIUS message and
forwards it upstream to the Authentication Server. Once the Portal has successfully
authenticated, Device B port 24 will allow regular traffic from the Portal to ingress that
port.
If a PC is connected to a subscriber port on the Portal, the same 802.1x process can be
used to authenticate the PC and unblock the port on the Portal to provide network access.
Configuring 802.1x
For all of the following examples refer to Figure 6-2. However, these examples configure
only Device A and Device B in Figure 6-2. Port 16 on Device A is configured as an
Authenticator and port 25 on Device B as a Supplicant. These examples also assume that
the proper entries have already been entered on the Authentication (RADIUS) server.
As previously described, 802.1x operation consists of three entities: Supplicant,
Authenticator, and Authentication Server. The Supplicant and Authenticator are
configured on individual physical ports on the devices.
The Authentication Server is a third party device that is separately controlled by the
network administrator, but must be accessible by the Authenticator in order to
authenticate the Supplicant. The user name(s) and password(s) used by Supplicants must
be configured on the server. The server must also be configured to use MD5 encryption.
Most Authentication servers can be configured to allow multiple Supplicants to use the
same user name and password to authenticate, but may also require each Supplicant to
have a unique user name and/or password.
NOTE: The following Authenticator and Supplicant configuration examples assume that
all 802.1x controls are in their default state. Only the required controls are changed in
order to successfully authenticate the Supplicant device. Additional configuration
changes may be required, depending on the actual network topology.
Step 2 On the Supplicant device (Device B), enter the port dot1x supp set port
number of the Supplicant (Port 25 in this example), the <PhyPortNameList>
username, and the password for the Supplicant.
Step 3 Enable Supplicant operation on port 25 of Device B. dot1x supp enable port
<PhyPortNameList>
CLI Example:
1. dot1x supp set port 25 username Joan password nomoresecrets
2. dot1x supp enable port 25
3. dot1x enable
The Supplicant is now sending EAPOL Start messages, and is looking for an Authenticator.
Step 2 Specifying the RADIUS server that will be used as the radius add server <IpHost>
Authentication Server. Specify the IP address, UDP port if
needed (default 1812), and specify whether the server
will be used as a dedicated 802.1x authenticating server
(dot1x) or if it will be used for both user authentication
AND 802.1x authentication (All).
Step 4 Enable the RADIUS server for the Authenticator device. radius enable [server
<IpHostRadius>]
Step 6 Configure Authenticator settings on port 16 of Device A, dot1x auth set port
setting the PAE mode to auto (default). <PhyPortNameList>
Step 7 Enable Authenticator operation on port 16 of Device A. dot1x auth set port
<PhyPortNameList>
CLI Example:
1. > radius add server 10.10.10.10 use-for dot1x
2. > radius set key radiuskey
3. > radius enable server 10.10.10.10
4. > radius enable
5. > dot1x auth set port 16 mode auto
6. > dot1x auth enable port 16
7. > dot1x enable
802.1x operation has now been enabled on the device and port 16 has been configured as
an Authenticator.
Verifying Authentication
The Port Access Entity (PAE) state for the Supplicant and the Authenticator monitor the
current state of authentication. When the Supplicant has authenticated, both devices
should indicate that state.
> dot1x show
3. Check the box next to “Enable IEEE 802.1x authentication for this network.”
4. Select MD5-Challenge for the EAP Type.
5. Un-check any other boxes that may be checked.
6. Select OK.
7. Close the NIC properties window.
NOTE: Even after the PC has successfully authenticated, it will not have network
connectivity unless the NIC has either been configured with a static IP address that is
within the network’s subnet or it has been configured to use DHCP to obtain an IP address
and a DHCP server is reachable on the network.
• Verify that the Authentication Server’s authentication port number is the same number
specified in the Supplicant’s settings.
• Verify that the RADIUS key specified matches the key configured on the Authentication
Server.
• Verify that the user name and password specified for the Supplicant are exactly the
same as they are entered in the Authentication Server’s user list (including the use of
lower and upper case characters)
This chapter discusses the differences between Link Aggregation and LACP. It also
explains how to configure them.
Overview
Link Aggregation is defined in IEEE 802.3ad. This standard defines how two or more full-
duplex Ethernet ports of the same speed can be combined into a single logical port to
carry traffic between two devices connected in parallel. This logical grouping of ports
enables load sharing and load balancing among these ports and thus an aggregation of
bandwidth as well. Traffic destined to egress on an aggregated port is distributed among
all the links in the group.
Link Aggregation also provides inherent, automatic redundancy for high-traffic network
connections. This is achieved by dynamically redirecting traffic from a failed port to the
remaining good port in the aggregation group. Link Aggregation can therefore be used to
expand bandwidth and add link redundancy.
NOTE: The IEEE 802.3ad standard does not support aggregation of bandwidth between
links taking different paths and connecting to different upstream units. Only ports
connected in parallel between two units can be aggregated.
almost transparent. The only traffic losses will be the frames either in the egress queue
or those already on the wire at the time of failure. Up to 8 LAGs are supported with up
to 8 physical ports per unit.
In addition, aggregated ports operate as if they were a single entity with respect to L2
address learning, regardless of which port of the LAG traffic ingresses.
Two types of Link Aggregation are supported, manual Link Aggregation and Link
Aggregation Control Protocol (LACP). However, regardless of the type of Link Aggregation,
the user is only required to create a LAG, add ports to it, and then specify the mode of
aggregation (manual or LACP). The unit will take care of the rest of the configuration
itself.
NOTE: EOAM loopback set on the LEAD port of an aggregation will cause the RECEIVE-side
aggregation (if it is the lead port in loopback) to NOT forward traffic. EOAM loopback
done on ANY other physical port in the aggregation should pass traffic correctly.
LACP
IEEE 802.3ad LACP allows for standards-based link aggregation between devices over full
duplex, same-speed links. LACP utilizes control packets in order to establish aggregation
of links, maintain that aggregation, and distribute or redistribute bandwidth for load
balancing and link failure. The LACP protocol is very intricate and prone to configuration
errors. Ciena has therefore simplified the configuration of Link Aggregation.
Traditionally, network administrators had to worry about configuring such parameters as
Actor Admin Keys, Operational keys, collector max delay, and other such complications.
In the Ciena implementation, all of these parameters are handled behind the scenes.
After a LAG has been created on one device and ports are added, it will look for eligible
ports on its peer to aggregate with. It doesn’t matter if the two LAGs have the same
configurations as their peer, as long as the groups are valid they will find each other and
negotiate an aggregation.
LAG 8
Ports 9, 12, 14, 16
Aggregation
LAG 2
Ports 5, 8, 10, 12
NOTE: Advanced users may still directly configure parameters and keys for both LAGs and
physical ports.
LACP uses two types of control frames; LACP PDUs and Marker Frames. Both messages use
a globally unique destination address of 01-80-C2-00-00-02 and a corresponding Ethernet
type. LACP PDUs are used for negotiation between links. Marker frames are used to
maintain frame sequence order.
As bandwidth is distributed across aggregated ports and a port is made ready to forward
frames on the LAG, Marker Frames and Marker Response Frames are exchanged. When an
event that requires flow redistribution occurs, the flows that need to be redistributed are
first blocked. Once blocked, a Marker Frame that has a response timer tied to it, is sent
out each port in the aggregation group to the link partner (i.e. another Service Delivery
Switch/Service Concentration Switch) for each flow. When the Marker Response Frames
are received or the response timers expire, the flow is moved in the forwarding database
of the newly selected port and forwarding is once again enabled.
NOTE: When naming Link Aggregation Groups, do not use a dash (-) symbol. The CLI will
misinterpret the dash as denoting a port range.
CAUTION: When changing the mode of a link aggregation from manual to LACP or from
LACP to manual for a single link, a service disruption will occur on the LACP side until the
modes match again. If connecting to the device using the management interface, the
desired aggregation state must be modified on the “far end” device first or connectivity
will be lost unless a backup link exists.
For example, remote connections between Juniper devices are lost after disabling link
aggregation. Juniper devices should be set to manual mode with the interfaces <agg
group> aggregated-ether-options lacp command.
Step 3 (optional) Verify the configuration of the LAG. aggregation show agg
<LagPortName[7]> [info]
[mode]
Step 5 Add the aggregation to the VLAN vlan add vlan <VlanList>
port <PortNameList>
CLI Example:
The following example creates an aggregation group with ports 5,8,11, and 15 named
group_1 in VLAN 10.
1. > aggregation create agg group_1
2. > aggregation add agg group_1 port 5,8,11,15
3. > aggregation show agg group_1 info
+--------------------- Agg Port 2049 Info --------------------+
| Parameter | Value |
+---------------------------+---------------------------------+
| LAG Port Name & ID | group_1 0x0801(2049) |
| Added Total Ports | 5 8 11 15 |
| Primary Ports | 5 8 11 15 |
| Protection Ports | 0 - |
| Selected Ports | 5 8 11 15 |
| Admin & Oper State | Up Up |
| Lacp Mode | LACP |
| Marker Delay | 0 |
| Marker Resp_All_Rcvd Count| 0 |
| Time_Out Count | 0 |
| Ready Waiting | None |
| Port Entry | |
| Aggregator Index | 0x0801 |
| ACTOR Port MAC | 00:02:A1:07:18:A0 |
| Sys Prio & ID | 0x8000 00:02:A1:07:18:A0 |
| Admin & Oper Key | 0x0801 0x2801 |
| Agg/Individual | Aggregate |
| Coll Max. Delay | 0 |
| PARTNER Sys Prio & ID | 0x8000 00:02:A1:15:57:40 |
| Oper Key | 0x2801 |
| Coll Max Delay | 0 |
| Revert Time out | 5000 (ms) |
| Revert Protection | Off |
+---------------------------+---------------------------------+
Step 2 Add ports to the Aggregation Group as regular aggregation add agg
Distribution ports. <LagPortName[7]> {[port
<PhyPortNameList>]
[protection-port
<PhyPortNameList>]}
Step 3 Add additional ports to the Aggregation Group as aggregation add agg
Protection ports. <LagPortName[7]> {[port
<PhyPortNameList>]
[protection-port
<PhyPortNameList>]}
Step 5 Set revert delay timer from 0—60,000 ms aggregation set agg
(default = 5000 ms) <LagPortName[7]> revert-
delay <NUMBER: 0-60000>
CLI Example:
1. > aggregation create agg 111
2. > aggregation add agg 111 port 1,2,3
3. > aggregation add agg 111 protection-port 4,5,6
4. > aggregation set agg 111 revert-protection on
5. > aggregation set agg 111 revert-delay 10000
This chapter discusses how to monitor the chassis environment, including temperature,
power supplies, Power On Self Test (POST), device archive, and device identification
information. System resources are also monitored and available for display. System
resource items include CPU and memory usage, as well as aggregations, meter profiles,
PBT entries, virtual switches, and MAC tables.
Environmental Overview
Environmental monitoring of chassis components can provide early warning indications of
possible component failure. Monitoring these components via the CLI ensures safe and
reliable system operation and avoids network interruptions.
Example:
chassis fan-tray set sensor-id 1 high-temp-threshold 40 low-temp-threshold 5
+- TEMPERATURE THRESHOLD -+
| Low | High |
+------------+------------+
| 0 C | 60 C |
+------------+------------+
Field Description
Low Threshold The lowest temperature at which the device
can be safely operated.
Field Description
ID • ID 1— Main power supply
• ID 2— backup battery
Type Indicates whether the power supply is AC or
DC, or not installed (Unequipped).
NOTE: On the CN 3940 platform with 2 installed power supplies, if one is not powered up,
POST will fail as if the power supply is faulted. Software does not distinguish between a
power supply without power and a power supply that is faulted.
Example:
> device-archive show
Example:
> device-archive save
> file cd /mnt/sysfs/archive
> file ls
Example:
> chassis show attributes
Example:
> chassis show capabilities
Example:
> chassis show mac
This chapter provides an overview of the IEEE 802.3ah Operations, Administration, and
Maintenance (OAM) and how to configure OAM on devices running this version of SAOS.
Overview
IEEE 802.3ah OAM defines a standard for data link layer Operations, Administration
and Maintenance (OAM) sublayer within Layer 2 of the OSI model. It provides
mechanisms for monitoring link operation such as remote fault indication and remote
loopback control. It is important to note that this OAM functionality only applies to
point-to-point Ethernet links. It is the responsibility of higher layer protocols to
implement end-to-end OAM functions (over multiple links) in a network.
One of the key functions that can be implemented using OAM is remote loopback mode
which is a mechanism by which a Data Terminating Equipment (DTE) requests a remote
DTE to go into loopback mode. In this mode all frames sent to the remote DTE are simply
looped back unchanged. The return frames can then be analyzed by the sender to
determine link quality. Note that in addition to EOAM loopback, a loopback test can also
be performed using two physical ports within the same VLAN or broadcast domain using
the port set port loopback command.
Principles of Operation
OAM remote loopback is the ability to test link quality/performance and isolate link faults
by sending frames from one DTE and looping them back at the other DTE. As such,
loopback is an intrusive procedure and all normal port operations such as forwarding and
learning are disrupted. Any services supported by the ports involved also cease to
function. SAOS therefore provides the ability to configure a port to ignore loopback
requests.
OAM loopback can only be initiated by DTEs that are configured for OAM Active mode.
Active mode DTEs can be switched to loopback mode. In rare cases when two Active mode
DTEs simultaneously issue loopback commands for the other DTE, one of the DTEs drops
its request and accepts the remote DTE’s command.
Medium
Link Events
802.3ah OAM uses 2 types of link events, critical link events and non-critical link events.
Critical link events (link fault, dying gasp, etc.) are signaled to the remote DTE by setting
the appropriate flag in the OAMPDU frame header. Non-critical events are conveyed using
Event Notification PDUs. The data field in an event OAMPDU consists of event TLVs.
Critical Events
Critical events are generated for the following events:
• Dying Gasp- generated when a reboot command is issued administratively, when power
is lost, or there is a fatal software error.
• Critical Link Event- generated when the unit temperature crosses above the configured
threshold (default = 40°C), unit temperature crosses below the configured threshold
(default = 0°C), or fan speed drops below 800 RPM.
Non-Critical Events
Non-critical event notifications are sent under the following conditions:
• Errored Frame Event- generated if the errored frame count is equal to or greater than
the specified threshold for that period. Jabber, oversize, undersize, fragment and CRC
errors are all monitored.
• Errored Frame Period Event- generated if the errored frame count is greater than or
equal to the specified threshold for a period (number of received frames). Jabber,
oversize, undersize, fragment and CRC errors are all monitored.
• Errored Frame Seconds Summary Event- generated if the number of errored frame
seconds is equal to or greater than the specified threshold for that period. An errored
frame second is a 1 second interval wherein at least one frame error is detected.
Jabber, oversize, undersize, fragment and CRC errors are all monitored.
Feature Benefits
The primary benefit of 802.3ah OAM is to provide the ability to monitor a link for critical
events and then put the remote device into loopback mode to test on the link. OAM
functions can be implemented once two directly connected DTEs become aware of each
others’ OAM capabilities. This is made possible through an OAM discovery process.
OAM information is conveyed in Slow Protocol frames called OAMPDUs. OAMPDUs must be
standard length frames (64-1518 octets) and must be untagged. As per the standard, a
maximum of 10 OAMPDUs may be sent per second.
Discovery is the process by which the OAM capabilities of peer OAM-enabled entities are
discovered. Information OAM Protocols Data Units (OAMPDUs) are used to exchange OAM
capability information. In addition, the flags field in the OAMPDU header is used to
indicate the current state of OAM discovery. Once discovery is successful other OAM
messages/commands can be exchanged between peer OAM entities. The discovery
process re-starts automatically if an OAM entity does not receive an Information OAMPDU
from the peer OAM entity within 5 seconds.
Configuring OAM
OAM is disabled by default on all ports, but can be enabled or disabled on a per-port basis.
NOTE: To enable EOAM commands, the Advanced OAM feature license must be installed
with the software license install command.
Enabling OAM
In the following configuration example, the user displays the state of port 5 on a device,
then enables OAM on this port. The same configuration is applied to another device on
port 11.
NOTE: In this example, configuration settings are verified by using show commands.
Although these steps are listed as optional, it is good practice to verify command settings
using these commands.
Configuration steps:
Step 2 Display the current state of port 5 on device A. eoam show [port
<PhyPortNameList>] [link-
events] [errd-events-
statistics] [event-log]
Step 3 Set port 5 to enable mode active on device A and port 11 eoam enable [port
to enable mode passive on device B. <PhyPortNameList>]
Step 4 (Optional) Verify the configuration of the port. eoam show [port
<PhyPortNameList>] [link-
events] [errd-events-
statistics] [event-log]
CLI Example:
1. > eoam show port 5
+--Global Oam Status --+
| Disable |
+----------------------+
+----------------------------- Oam Port Statistics -------------------------+
|Port|Admin| Oper State |Mode|OAM Func Support| Info | Info | Unkn |
| |State| | |UniD|Lb |Ev |Var| PduTx | PduRx |CodeRx|
+----+-----+------------+----+----+---+---+---+------------+-----------+------+
|5 |Dis |Disable |Act |0 |0 |0 |0 |0 |0 |0 |
+----+-----+------------+----+----+---+---+---+------------+-----------+------+
Enabling Loopback
In the following configuration example, the user displays the state of port 5, then enables
the loopback on this port. This example assumes that the peer device/port has been
enabled to participate in OAM loopback.
NOTE: In this example, configuration settings are verified by using show commands.
Although these steps are listed as optional, it is good practice to verify command settings
using these commands.
Configuration steps:
Step 3 (Optional) Verify the configuration of the port. eoam show [port
<PhyPortNameList>] [link-
events] [errd-events-
statistics] [event-log]
Step 5 Once troubleshooting has been accomplished, OAM eoam loopback stop port
loopback is stopped. <PhyPortNameList>
CLI Example:
1. > eoam show port 5
+--Global Oam Status --+
| Enable |
+----------------------+
+----------------------------- Oam Port Statistics -------------------------+
|Port|Admin| Oper State |Mode|OAM Func Support| Info | Info | Unkn |
| |State| | |UniD|Lb |Ev |Var| PduTx | PduRx |CodeRx|
+----+-----+------------+----+----+---+---+---+------------+-----------+------+
|5 |En |SendAny |Act |0 |1 |1 |0 |192 |38 |0 |
+----+-----+------------+----+----+---+---+---+------------+-----------+------+
At a Glance:
• Overview • Displaying Transceiver Information
• Compliance • Determining Transceiver Speed
• Identification • Disabling and Enabling Transceivers
• Diagnostics • Setting the Port Connector Mode
This chapter explains transceiver technology and describes the various management
options available.
Overview
The Small Form-factor Pluggable (SFP) device used with a device is a hot-swappable
compact optical transceiver and is supported by most fiber optic component vendors.
SFPs offer high speed (5 Gbps and higher) and physical compactness. Port transceiver
information, including status and type, is available via CLI or SNMP.
Compliance
The system software supports SFP transceivers that are compliant with the following
documents:
• Small Form Factor Pluggable (SFP) Transceiver Multi Source Agreement, September 14,
2000
• Digital Diagnostic Monitoring Interface for Optical transceivers SFF-8473, Draft
Revision 9.0, April 4, 2002.
For a list of supported optics refer to the Hardware Installation and User’s Guide for the
platform you are working with.
Identification
Ciena devices support transceivers that contain a standard serial erasable programmable
read-only memory (EPROM) that provides information on the type of SFP used. The
following information is read from the EPROM:
Diagnostics
Ciena devices support advanced transceivers that have an additional diagnostic serial
EPROM. The system software determines if the transceiver has the diagnostic EPROM and
will provide the following information to the user:
• Wavelength
• Temperature
• Rx Power
• Tx Power
• Tx Disable State
• Tx Fault State
• Rx Rate Select State
The information is stored in a table on a per port basis. The standard EPROM information
is updated during initialization or when a new transceiver has been inserted. The
diagnostic information is updated at a rate of 1 port per 5 seconds. However, this process
has a low priority, and in times of a heavy CPU load, the information may be refreshed
slowly or not at all.
Transceivers that support diagnostics can trigger events and SNMP traps, including:
• SFPs: BiasHigh, BiasLow, RxPowerHigh, RxPowerLow, TempHigh, TempLow,
TxPowerHigh, TxPowerLow, VccHigh, VccLow
• XFPs: BiasHigh, BiasLow, RxPowerHigh, RxPowerLow, TempHigh, TempLow,
TxPowerHigh, TxPowerLow
Each of these events and traps include a warning and alarm version of each, for example,
BiasHighAlarm and BiasHighWarning). Thresholds are set by the SFP vendors, and are not
programmable. Both event classes (alarm, warning) are logged under the xcvr-mgr. The
warnings are logged using category of debug and the severity of warning. The alarms are
logged using category of debug and the severity of minor.
These alarms and warnings are based on flags that are set or cleared inside the SFP. These
flags are polled at a low priority and slow rate, so flags may be set and then cleared
without generating a trap or event. For example, if the TempHigh alarm threshold is
exceeded for a few seconds, and then cleared before the flag is polled, it will not trigger
a TempHigh alarm. You can forcibly clear alarms and warnings by removing and then
reinserting the transceiver or disabling g and then enabling the port.
NOTE: The option “diagnostics” is supported for SFPs that actually support diagnostics.
If the SFP does not have internal diagnostics capabilities then an error will be returned.
+----+-----+-----+---------Transceiver-Status------------+----------------+----+
| |Admin| Oper| |Ether Medium & |Diag|
|Port|State|State| Vendor Name & Part Number |Connector Type |Data|
+----+-----+-----+---------------------------------------+----------------+----+
|9 |Empty| | | | |
|10 |Empty| | | | |
|11 |Empty| | | | |
|12 |Ena |Ena |WORLDWIDEPACKETS XCVR-010Y31 Rev10 |1000BASE-LX/LC | |
+----+-----+-----+---------------------------------------+----------------+----+
Example:
> port xcvr show port 12
+----+-----+-----+---------Transceiver-Status------------+----------------+----+
| |Admin| Oper| |Ether Medium & |Diag|
|Port|State|State| Vendor Name & Part Number |Connector Type |Data|
+----+-----+-----+---------------------------------------+----------------+----+
|12 |Ena |Ena |WORLDWIDEPACKETS XCVR-010Y31 Rev10 |1000BASE-LX/LC | |
+----+-----+-----+---------------------------------------+----------------+----+
Example:
> port xcvr show port 9 vendor
| BR, max | 0 | |
| BR, min | 0 | |
| Vender Serial Number | | |
| Date (mm/dd/yy) | | |
|--------------------------+--------------------+------------------------------|
| Diag Monitor Type | 0x0 | |
| - Legacy diagnostics | Bit 7 | No |
| - Diagnostics monitoring| Bit 6 | No |
| - Internally calibrated | Bit 5 | No |
| - Externally calibrated | Bit 4 | No |
| - Rx power measurement | Bit 3 | OAM |
|--------------------------+--------------------+------------------------------|
| Enhanced Options | 0x0 | |
| - Alarm/Warning Flags | Bit 7 | No |
| - Soft TX_DISABLE | Bit 6 | No |
| - Soft TX_FAULT | Bit 5 | No |
| - Soft RX_LOS | Bit 4 | No |
| - Soft RATE_SELECT | Bit 3 | No |
|--------------------------+--------------------+------------------------------|
| SFF-8472 Compliance | 0x0 | None |
+--------------------------+--------------------+------------------------------+
The optic speed can also be determined using the port xcvr show port
<PortNameList> vendor command. The Encoding “Value” column displays the
actual value read from the optic, while the “Decoded String Equivalent” column indicates
the port speed supported.
Example:
> port xcvr show port 1 vendor
+------------------------ XCVR VENDOR DATA - Port 1 ------------------------+
| Parameter | Value | Decoded String Equivalent |
+--------------------------+--------------------+------------------------------+
| Identifier | 0x3 | SFP transciever |
| Ext. Identifier | 0x4 | SFP/GBIC |
| Connector | 0x7 | LC |
+--------------------------+--------------------+------------------------------+
| Transceiver Codes | 0x0000000002000000 | |
| - SONET Compliance | 0x0000 | |
| - Ethernet Compliance | 0x02 | 1000BASE-LX |
| - Link Length | 0x00 | unknown |
| - Transmitter Technology| 0x0000 | unknown |
| - Transmission Media | 0x00 | unknown |
| - Channel speed | 0x00 | unknown |
+--------------------------+--------------------+------------------------------+
| Encoding | 0x01 | 8B10B |
| BR, Nominal | 13 | Gigabit |
|--------------------------+--------------------+------------------------------|
...
+--------------------------+--------------------+------------------------------+
Example:
> port disable port 9
Example:
> port enable port 9
In addition, speed is set to “Auto” with auto-negotiation enabled. So, you can install 1G
or 100M transceivers, and the system will automatically set the speed accordingly. If
these settings or other port attributes are set explicitly and do not match the capabilities
of the active connector, a mismatch warning will be generated. The warning will be
cleared when the attributes match the capabilities of the active connector.
NOTE: If you upgrade a CN 3911 device using an RJ-45 connector from 6.1.0.92 to
6.2.0.91, IP connectivity to the device will be lost. After the upgrade, the remote
interface port (9 or 10) defaults to "SFP mode" after the upgrade. At that point, you need
to access the device's serial console port to set the port back to RJ-45 mode.
NOTE: If you attempt to set the mode to a connector that is not supported for the
specified port, the system generates a “Capability not supported” error message.
Example:
> port set port 9 mode rj45
At a Glance:
• Overview • Bi-directional Port State Mirroring
• Principles of Operation • Configuring Port State Mirroring
• Feature Benefits
This chapter provides an overview of Port State Mirroring and how to configure it on Ciena
devices running SAOS software.
Overview
Port State Mirroring (sometimes referred to as link loss forwarding or link state tracking)
provides link redundancy by associating the link state of one or more source (uplink) ports
with one or more downstream (destination) ports on the switch. If the link is lost on a
source port, all of the other destination ports associated with it are automatically placed
in a disabled state as well. When used in conjunction with OSPF or RSTP, port state
mirroring can be leveraged to force the use of a secondary link.
If port state mirroring is not configured and a link is lost (a cable is disconnected, the
connected switch or router goes down, etc.) the link state of the associated interfaces is
not affected and a failover to a secondary interface is not initiated.
Principles of Operation
Port state mirroring allows ports to be bundled together in a related group referred to as
a port state mirror group (PSMG). Within the group, the link state of the destination ports
is dependent upon the link state of the source port(s) in the PSMG. With a single source
port, if the source port becomes disabled, all of the destination ports in the group will be
forced into a disabled state as well. Likewise, when the source port becomes available
again, the destination ports transition back to an enabled state (dependant upon their
own availability).
In a PSMG that has more than one source port, all source ports must be disabled in order
for the destination ports to be forced into a disabled state. For example, if a PSMG has
ports 1 and 2 configured as source ports, both ports must be down to force the destination
ports into a disabled state. This also means that only one source port is required to be up
in order to transition all destination ports back to the enabled state.
Feature Benefits
Allowing the port state of source ports to directly control the port state of destination
ports provides an easy way to shape traffic patterns. Port state mirroring also provides
another way to detect link health that otherwise might not be detected.
Provider Provider
Router Device 1 Router
Port
4 Port
15
Figure 11-1: Bi-directional Port State Mirroring
In Figure 11-1, assume that port 4 and port 15 have been configured in a bi-directional
PSMG. If port 15 cannot establish link with the customer router, then port 4 will become
disabled as well.
CAUTION: This feature should be configured with care in the event that other customers
are serviced by the router connected to Device 1, as they will lose connection to the
service provider router as well.
Bi-directional PSMGs are configured the same as a standard PSMG, however, the type must
be specified as bi-directional instead of uni-directional.
This example forces the servers to switch over to their secondary links when the uplinks
become unavailable. In addition, it disables the secondary links when the uplinks are
unavailable. Primary links are represented as solid lines, whereas secondary links are
represented as dashed lines.
Network
Port Port
3 Port
Port 10
9
4
Device 1 Port Device 2
Port
7
Port 6 Port
8 Port
Port Port 5 Port
2 12
1 11
Configuration steps:
This configuration example assumes the proper VLAN/port assignments have already been
configured.
Step 2 Add source ports 3 and 4 and destination ports 1, 2, 5, port state-mirror-group
and 6 to PSMG1. add {[<psmg-src-group-
attr>] [<psmg-dst-list-
attr>]}
Step 4 Create Port State Mirror Group PSMG2 on Device 2. port state-mirror-group
create <psmg-object (15)>
Step 5 Add source ports 9 and 10 and destination ports 7, 8, 11, port state-mirror-group
and 12 to PSMG2. add {[<psmg-src-group-
attr>] [<psmg-dst-list-
attr>]}
Step 6 (optional) Verify that the ports have been assigned to the port state-mirror-group
PSMG and that their operational status deploys as Link show [<psmg-object>]
Up.
CLI Example:
Device 1
1. > port state-mirror-group create group PSMG1
2. > port state-mirror-group add group PSMG1 src-port 3,4 dst-port 1,2,5,6
3. > port state-mirror-group show
+---------------- PORT STATE MIRROR GROUPS --------------+
| | Collective | Member Counts |
| Name | Oper State | Source | Destination |
+-----------------+------------+-----------+-------------+
| PSMG1 | Enabled | 2 | 4 |
+-----------------+------------+-----------+-------------+
Device 2
1. > port state-mirror-group create group PSMG2
2. > port state-mirror-group add group PSMG2 src-port 9,10 dst-port
7,8,11,12
At a Glance:
• Overview • Service Access Control
• Service Access Control • RADIUS
• User Management • TACACS+
• IP Access Control Lists
This chapter explains how to configure various security features of devices running SAOS.
Security features are employed to prevent unauthorized access to network resources and
to deployed services.
Overview
SAOS employs several methods to prevent unauthorized access to devices and to control
the way that services are distributed through the network. Some features restrict certain
types of protocols or packets, while others restrict port access. The following security
features can be combined to provide an increased security level:
• Service Access Control- controls device access to the network.
• RADIUS- grants conditional access to configured users using Remote Authentication Dial
In User Service (RADIUS).
• TACACS- performs authentication, authorization and accounting (AAA) functions using
Terminal Access Controller Access Control System (TACACS).
By configuring static MAC entries, security is provided to allow only those frames to be
forwarded that have a source MAC address that is recognized by the device.
When an SAC entry is created, a maximum number of dynamic MAC addresses is entered
for a specific port. Setting this limit specifies the number of dynamic MAC addressees
without having to know their actual value. Once the limit is reached, additional MAC
addresses will not be learned and frames from subsequent devices can be configured to
either be forwarded or dropped. The learn limit does not apply to static MAC addresses.
For example, if the learn limit is set to four, the device will learn the MAC addresses of
the first four subscriber devices connected to the network and allow them to send
frames, and can drop frames that come from a fifth device (assuming that all devices are
connected to the network at the same time). Frames containing source addresses that
match static addresses in the device will be forwarded, and are unaffected by the MAC
limit set on the port.
A MAC aging timer can also be set for dynamically learned MACs, which clears entries from
the MAC table when they have been inactive for the period of time specified. Static MAC
addresses are never aged out. In the previous example, although only four devices may
be connected to the network at one time, devices may be unplugged from the network
and new devices (i.e., new MAC addresses) will be allowed once the old MAC address ages
out.
It should be noted that limiting MAC addresses does not provide absolute security as a
MAC address can still be spoofed (made to look like an authorized MAC address).
Benefits
SAC protects the Provider network from unauthorized access and can help prevent denial
of service attacks. In addition, Service providers could use SAC to offer different
subscriber access packages without having to know any specifics about the subscriber
devices. For example, a SAC could be created for “Gold” level subscribers that allows
them to connect up to 5 devices (i.e. 5 MAC addresses) to the network, while “Bronze”
level subscribers are only allowed to connect 1 device to the network at a time.
Configuration
This section provides configuration examples for configuring SAC.
NOTE: The device is capable of learning a maximum of 16,000 dynamic MACs (32,000 on
the CN 3960), which requires installation of the Advanced Ethernet (AE) license key.
Without the AE license, the device is restricted to learning a maximum of 4,000 dynamic
MACs. License keys can be purchased by contacting Ciena customer support.
NOTE: The MAC aging timer is configured for the entire device, it cannot be set on a VLAN
or port basis. Depending on the location of this device in the network, changing the MAC
aging timer may cause connectivity issues with critical devices. When changing the MAC
aging timer, be certain that desirable devices will not be inadvertently aged out.
NOTE: In the following example, configuration settings are verified by using show
commands. Although these steps are listed as optional, it is good practice to verify
command settings using these commands.
Configuration steps:
Step 3 Set MAC aging to 120 seconds. flow aging set time <10 -
The default MAC aging timer is 300 seconds. 1000000>}
Step 4 Enter the static MAC address. Note that in order to add a flow static-mac add vlan
static MAC on port 5, the VLAN used must already be <VlanID> mac
<xx:xx:xx:xx:xx:xx> port
created and port 5 must be a member of the VLAN
<PortNo>}
Step 6 (Optional) Verify the MAC aging settings. flow aging show
Step 7 (Optional) Verify the static MAC entry. flow show static-mac
CLI Example:
1. > flow access-control create port 5 max-dynamic-macs 4
2. > flow aging enable
3. > flow aging set time 120
4. > flow static-mac add vlan 300 port 5 mac aa:bb:cc:dd:ee:ff
5. > flow access-control show
+------------------------- FLOW ACCESS-CONTROL TABLE -----------------------+
| Instance | Dynamic Addresses | | Oper |
| Type | Value | Maximum | Learned | Threshold | Status |
+---------+-----------------+----------+----------+-------------+-----------+
| Port | 5 | 4 | 0 | Not Reached | Enabled |
+---------+-----------------+----------+----------+-------------+-----------+
In the following example, access to a port is limited to one device, such as a set top box,
for ports 5 and 6.
On port 5, the device’s MAC address is entered manually, no dynamic learning will take
place on that port and no other devices will be accepted on this port. On port 6, the MAC
address is learned dynamically, but MAC address aging is disabled for the device.
On port 6, if the Ethernet device is removed, its source MAC address will remain in the
MAC Learning table until the MAC table is flushed. Until such time, the SAOS device will
not forward packets from a different device on if it is attached to port 6.
NOTE: In the following example, configuration settings are verified by using show
commands. Although these steps are listed as optional, it is good practice to verify
command settings using these commands.
Configuration steps:
Step 2 Enter the static MAC address. flow static-mac add vlan
In order to add a static MAC on port 5, the VLAN used <VlanID> mac
<xx:xx:xx:xx:xx:xx> port
must already be created and port 5 must be a member of
<PortNo>}
the VLAN
Step 4 (Optional) Verify the static MAC entry. flow show static-mac
Step 5 Create a SAC entry and set the maximum number of flow access-control create
allowed MAC addresses to 1. port <PortNo> {max-
dynamic-macs <max-macs-
value>}
CLI Example:
1. > flow access-control create port 5 max-dynamic-macs 0
2. > flow static-mac add vlan 300 mac aa:bb:cc:dd:ee:ff port 5
3. > flow access-control show
+------------------------- FLOW ACCESS-CONTROL TABLE -----------------------+
| Instance | Dynamic Addresses | | Oper |
| Type | Value | Maximum | Learned | Threshold | Status |
+---------+-----------------+----------+----------+-------------+-----------+
| Port | 5 | 0 | 0 | Reached | Enabled |
+---------+-----------------+----------+----------+-------------+-----------+
The following CLI commands are used to turn the Forward-Unlearned option on or off:
> flow access-control create port 1 max-dynamic-macs 25 forward-unlearned on
> flow access-control create port 1 max-dynamic-macs 25 forward-unlearned off
Note that packets will be forwarded if an SA is unlearned and the table is full. Because
the device learns at line rate, the flow show mac-addr command will lag behind the
hardware when learning at a high rate.
User Management
Telnet access to the CLI through user accounts can be limited. When logging in, users are
asked to supply a user name and a password. If they do not supply the correct password,
or the user account does not exist, they will be denied access. The user account password
can be specified as a secret (encrypted) or as clear text in order to ensure that the
password cannot be easily viewed.
When a user account is created, it is assigned a privilege level. The privilege level
determines the access rights for that user. The CLI provides the following user privilege
levels:
• Limited User - can only execute commands that show system configuration
information but cannot change the configuration of the device.
• Super User - includes all the privileges of the limited user, can make system
configuration changes, and perform execute commands.
At least one of each type of user must be configured on the device. To delete a default
user, the network operator must first create a user of the same type and then delete the
default account. This ensures that the network operator controls access rights to the
device.
Two user names/passwords are provided by default:
If a user password is forgotten, it cannot be retrieved. However, a super user can assign
the user a new password or the user can be deleted and added again with a different
password.
NOTE: When you create users and save the configuration, the user create user
command is saved in the SECURITY CONFIG: section of the configuration file. The plain
text password is encrypted and saved with the attribute of secret. For example:
user create user superuser1 access-level super secret
abcd1234467890e
You can copy this line from the configuration file of one device to the configuration file
of another device to ensure the user is configured the same on both devices. The user will
be able to log on to both devices with the same plain text password.
Feature Benefit
Controlling device access through user accounts enables the network operator to
expressly define those users that can view configuration information and those that can
view and modify configuration information.
Configuring Users
If your user ID has super access level, you can create users with limited (read-only) or
super (read/write) access level. User names and passwords are case sensitive and are
limited to a length of 16 characters. Also, you can delete users. Before deleting a default
user, create a user of the same type and then delete the default account. If a user forgets
their password, it cannot be retrieved. However, you can assign the user a new password
or delete the user and create it again with a different password. When you create users
and save the configuration, the user create user command is saved in the SECURITY
CONFIG: section of the configuration file. The plain text password is encrypted and saved
with the attribute of secret. For example:
user create user superuser1 access-level super secret
abcd1234467890e
You can copy this line from the configuration file of one device to the configuration file
of another device to ensure the user is configured the same on both devices. The user will
be able to log on to both devices with the same plain text password. Optionally, you can
create or update users to use the secret attribute to use a pre-encrypted password.
The following example creates 2 users, one with super user privilege and the other with
limited user access level.
CLI Example:
> user create user MIS access-level super password 2manysecrets
> user create user data access-level limited password blue32
> user show
+--------- USER ACCOUNT TABLE -----+-------+
| Username | Privilege | Flags |
+------------------+---------------+-------+
| MIS | super | P |
| data | limited | P |
| su | super | DP |
| user | limited | D |
+------------------+---------------+-------+
NOTE: The DP and D shown in the Flags column above indicates that an account is a
default account. These accounts may be deleted if desired, however one active user
account of each privilege level must always exist.
Displaying Users
If your user ID has super or limited user access, you can display created users, users who
are currently logged on, and your own user name and access level.
CLI Example:
To set the authorization scope, priority, and method:
user auth set [scope <all|serial|remote>] [priority <NUMBER: 1...3> ]
[method <none|local|radius|tacacs>]
To specify TACACS server used only for local and remote interface login attempts and use
the local DB for serial port and primary backup login attempts:
> user auth set priority 1 method tacacs scope remote
> user auth set priority 2 method local scope serial
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a client/server system used to
secure networks against unauthorized remote access such as with Telnet. When
authenticating a telnet user, the device sends authentication requests to a RADIUS server
or servers. The RADIUS servers keep track of all user authentication and service access
information. The RADIUS server returns authentication results to the device and the user
is either allowed or denied access based on this information.
RADIUS servers are also used as the preferred server for 802.1x authentication. The
802.1x framework uses RADIUS messages for communication between the authenticator
and the authentication server. For this purpose, RADIUS configuration includes a
parameter that allows the RADIUS sever to be designated strictly as a user authentication
server, an 802.1x authentication server, or both.
Feature Benefit
RADIUS servers allow the network operator to configure and control user accounts in one
central location instead of having to configure accounts on every device on the network.
RADIUS enables access and authentication control to be very flexible in the way it
regulates access.
Configuring RADIUS
RADIUS can be enabled/disabled either on a global basis or on a server by server basis.
By default RADIUS is globally enabled. When a RADIUS server is configured on the device,
that server is enabled by default. The destination UDP port number for the server can also
be specified. If it is not specified, the default port number of 1812 will be used. A specific
priority that controls the order in which servers are contacted can be set for each server,
if desired. The server priority continues sequentially and increases or decreases
automatically so there are no gaps in server priority. If a new server is added without
specifying a priority, it is assigned a priority based on the last server present in the list.
In addition, the servers can be searched by their priority or cached value (last accessed).
Also, the authentication key can be specified in MD5 encrypted format rather than clear
text.
Various attributes can be set that determine how the device interacts with configured
RADIUS servers:
Field Description
Timeout Length of time, in seconds, that the device will wait
for a response from the RADIUS server.
The following example enters a RADIUS server, and then sets the global parameters for
using RADIUS authentication.
NOTE: In the following example, configuration settings are verified by using show
commands. Although these steps are listed as optional, it is good practice to verify
command settings using these commands.
Step 5 (Optional) Check the RADIUS server statistics. radius show [stats]
CLI Example:
> radius enable
> radius add server 10.10.10.100
> radius set server 10.10.10.100 use-for user-login
> radius set key 2manysecrets retries 2 timeout 2
> radius set search-method cached
> radius show
+---------------------------------------------------+
| IP Address : 10.10.10.100 |
| Access Requests : 971 |
| Access Rejects : 0 |
| Access Accepts : 971 |
| Access Challenges : 0 |
| Access Retransmission : 0 |
| Bad Autheticators : 0 |
| Pending Requests : 0 |
| Packets Dropped : 0 |
| Malformed Responses : 0 |
+---------------------------------------------------+
NOTE: If the RADIUS server does not respond to requests or is not accessible, the only way
to access the device is through SNMP/EMS unless you have configured the authorization
provider to use the local database as a second priority authorization method.
TACACS+
TACACS+ is a security protocol that performs the following AAA functions between a
Network Access Server (NAS) and an authentication server:
• Authentication—Grants users access when they first log in to a device or request a
service.
• Authorization—Determines which actions users are allowed to perform when they do
have access to a device. Authorization will be performed only if authentication was
done by TACACS+.
• Accounting—Records user actions in order to perform security audits or for billing
purposes. Accounting will be performed only if authentication was done by TACACS+.
The TACACS+ protocol client is supported where the device operates as a NAS. The
TACACS+ client can be configured to support up to 8 authentication, authorization and
accounting servers via the CLI or SNMP. If a TACACS+ server is not configured, a locally
configured password file is used for authentication. Local authentication is used only if
the user authentication provider order is configured properly to allow for it.
NOTE: TACACS+ is not compatible with previous TACACS and XTACACS protocols.
Feature Benefit
TACACS+ provides an industry standard means of controlling AAA functions. It also
provides security by using a shared key to encrypt information between the NAS and the
authentication server.
Configuring TACACS+
TACACS+ can be enabled/disabled on a global basis, and can also be enabled on specific
Authentication, Authorization or Accounting servers. (Note that authentication must be
enabled for Authorization or Accounting to be operational.)
NOTE: To configure TACACS+, you need to install the Advanced Security license key. To
obtain the Advanced Ethernet license key, contact Ciena Sales.
When performing authentication, the login password allows all ASCII values from 32 to 126
except ASCII 34 ("). This is because passwords that contain a space (ASCII 32) must be
enclosed in quotes, and the quotes are removed prior to encryption. Also, spaces at the
beginning or end of the password are discarded, and should not be used. In addition, the
password can be specified as a secret (encrypted) as well as clear text.
Authentication will fail under the following circumstances:
• The TACACS server operational state is DISABLED
• The number of authentication retries has been met
If all servers have been tried without success, or if a server rejects the user credentials,
then the authentication is considered to have failed. The user login/authentication
attempt is denied.
Authenticated users can execute commands and their associated arguments, and these
are passed as fully expanded CLI commands to the TACACS+ server. Attribute-Value types
other than "cmd" and "cmd-arg" are not supported.
When session and command accounting are enabled, start and stop messages are sent for
each login session and command that is executed. TACACS+ statistics can be viewed and
cleared.
The following example creates 3 TACACS+ servers to be used for authentication, sets the
global parameters for using TACACS+ authentication, and then enables AAA.
NOTE: In the following example, configuration settings are verified by using show
commands. Although these steps are listed as optional, it is good practice to verify
command settings using these commands.
To configure TACACS+:
CLI Example:
> tacacs add server 10.10.10.100
> tacacs add server 10.10.10.200
> tacacs enable
> tacacs set key 543432
> tacacs set retries 2
> tacacs set timeout 24
> tacacs set privilegelvlrw 3
> tacacs set server 10.10.10.200 priority 1
> tacacs authentication enable
> tacacs authorization enable
> tacacs accounting enable
NOTE: Be careful to not enable the IP-ACL feature without ensuring that the IP
addresses/subnets are configured correctly or you have local or serial access to the
device, as you might not be able to reach the device once IP-ACLs are enabled. This can
affect all communications to the remote management interface which includes TWAMP,
SNMP, MPLS signalling, etc.
Feature Benefit
IP-ACLs control inbound access to the device, preventing unauthorized IP addresses from
communicating with the device.
Configuring IP-ACL
The IP-ACL feature is controlled via a global enable setting. When the feature is disabled,
incoming frames are not examined. When enabled, a default drop entry is enabled, with
individual IP-ACL entries specifying exceptions to the drop entry. Incoming frames are
then tested against a table of configured IP-ACL entries to determine their eligibility for
further processing.
IP-ACL entries can be added to the table and must contain, at a minimum, an IP source
address (IP-SA) and IP mask (IP-MASK). A list of allowed ingress ports can optionally be
specified when an IP-ACL entry is added. This list defines which specific hardware ports
of the device the frame can be accepted from. A port list can be specified as a single port
number, a comma separated list of port numbers, a port range, or some combination of
these. If not specified, frames can ingress from any valid port.
The IP address and IP mask information for interfaces that are configured on the device
can be imported into the IP-ACL access list table. This way, the IP-ACL table can be pre-
loaded to avoid being locked out of the device when the IP-ACL feature is enabled.
Existing IP-ACL entries can be modified to alter their optional parameters, but not their
IP-SA or IP-MASK. Existing IP-ACL entries can be removed by specifying their IP-SA and IP-
MASK.
To configure IP-ACL:
Step 4 (Optional) Import the IP addresses and IP mask of interface ip-acl import
configured interfaces.
CLI Example:
In this example, there is only 1 host IP address that can match this ACL:
> interface ip-acl add ip 10.10.10.100 netmask 255.255.255.255
> interface ip-acl enable
> interface ip-acl show
> interface ip-acl clear statistics
In this example, the valid hosts range from 10.10.10.1 through 10.10.10.255 and source
from either port 27 or port 28:
> interface ip-acl add ip 10.10.10.0 netmask 255.255.255.0 port 27,28
> interface ip-acl enable
In this example, the IP addresses and IP mask of configured interfaces are imported into
the IP ACL list:
> interface ip-acl import
> interface ip-acl enable
At a Glance:
• Overview • Troubleshooting
• Benefits
• Configuring Broadcast Containment
Overview
Broadcast containment prevents services from being disrupted by broadcast storms on
specified ports. A broadcast storm occurs when broadcast packets flood the network,
creating excessive traffic and degrading performance. When a broadcast filter is created
and one or more ports are added to it, the device monitors incoming broadcast packets
for a specified period of time. Broadcast packets exceeding the configured threshold are
dropped. SNMP traps are sent when the configured broadcast threshold is exceeded and
when broadcast traffic goes below the configured threshold.
The system software supports containment rates for the following flood traffic types:
• Unknown unicast traffic
• Layer 2 Broadcast traffic
• Layer 2 Unknown Multicast traffic
Benefits
Broadcast containment prevents services from being disrupted by Layer 2 broadcast
storms and Denial of Service (DoS) attack.
Example:
> broadcast-containment enable
Example:
> broadcast-containment disable
NOTE: If you downgrade to a software release prior to 6.5, any containment classification
settings you configure will be lost, and filtered traffic types will revert to Layer 2
Broadcast traffic (bcast) and Layer 2 Unknown Multicast traffic (l2-mcast).
The maximum number of filters that can be created per platform is as follows:
• CN 3911 - 15
• CN 3920 - 18
• CN 3940 and CN 5140 - 36
• CN 3960 - 18
Example:
> broadcast-containment create filter denial kbps 2000 port 1
Example:
> broadcast-containment set filter denial kbps 1000 containment-classification
bcast,l2-mcast,unknown-ucast
Example:
> broadcast-containment delete filter denial
NOTE: Multiple ports can be added to a filter, but only one filter may be applied to a
specific port at a time. Also, when multiple ports are added to a filter, the bandwidth for
the filter is shared among the ports.
Example:
> broadcast-containment add filter denial port 5
Example:
> broadcast-containment add filter denial port 5
Sample Configuration
The following example creates a Broadcast Containment filter that limits the number of
broadcast packets received on port 10 to 2000 kbps.
Step 3 Set the containment rate and classification for the filter. broadcast-containment set
CLI Example:
1. > broadcast-containment enable
2. > broadcast-containment create filter denial
3. > broadcast-containment set filter denial kbps 2000 containment-classification l2-
mcast
4. > broadcast-containment add filter denial port 10
Troubleshooting
Example:
> broadcast-containment show
+--------- Broadcast Containment Globals --------+
| Parameter | Value |
+-------------------------+----------------------+
| Admin Status | Enabled |
+-------------------------+----------------------+
Example:
> broadcast-containment show filter denial
+------------ Broadcast Containment Filter -----------+
| Parameter | Value |
+----------------------------------+------------------+
| Filter Name | denial |
| Index | 1 |
| Kilobits Per Second (Kbps) | 2000 |
| Broadcast | Off |
| L2 Multicast | On |
| Unknown Unicast | Off |
+----------------------------------+------------------+
+--------------- Associated Members ------------------+
| |
| Port 10 |
+----------------------------------+------------------+
Example:
> broadcast-containment show port 1
+--------------------------- Port Filters ---------------------------+
| Port | Filter |
| Name | Description | Name | ID |
+-----------------+-----------------------+-----------------+--------+
| 1 | test | denial | 1 |
+-----------------+-----------------------+-----------------+--------+
At a Glance:
• Overview • Egress Scheduling
• Ingress Resolved COS Mapping • Egress Shaping
• Traffic Profiling • Configuring Frame Bandwidth
• Ingress R-CoS to Egress CoS Queue Calculation
Mapping
• Congestion Avoidance
This chapter details Quality of Service (QoS) features of the system software. QoS refers
to the management of bandwidth to ensure that network traffic is allocated the desired
amount of network resources.
Overview
This chapter describes the mechanisms for managing bandwidth, including:
• Ingress Resolved Class of Service Mapping - applies a Resolved CoS Policy.
• Traffic Profiling - provide ingress traffic classification and metering.
NOTE: To configure traffic profiling, you need to install the Advanced Ethernet license
key. To obtain the Advanced Ethernet license key, contact Ciena Sales.
• Ingress R-CoS to Egress CoS queue mapping — assigns traffic to CoS queues based upon
R-CoS values.
• Congestion avoidance processing — method for managing CoS queue traffic when
congestion occurs on egress.
NOTE: To enable configurable congestion avoidance, you need to install the Advanced
Ethernet license key. To obtain the Advanced Ethernet license key, contact Ciena Sales.
• Egress Scheduling — determines the order in which the physical queues are processed.
• Egress Shaping - controls bandwidth for taking frames out of queues at egress.
• Configurable frame bandwidth calculation — configure whether to use the inter-frame-
gap (IFG) in the calculations for ingress metering and egress shaping.
NOTE: The Resolved CoS policy on a port is ignored when it is involved in one or more
virtual switch (subscriber) memberships. With that configuration, the R-CoS is
determined by the encap CoS policy (and priority) that is configured at the virtual switch.
However, when the encap CoS policy configured on a Virtual Switch Member is port-
inherit, the Resolved Cos Policy is not ignored.
• The default Resolved CoS Policy for all ports is Outer .1D mapped. The default Resolved
CoS Map is shown in Table 14-1, in this chapter.
1 1 1 Green
2 2 2 Green
3 3 3 Green
4 4 4 Green
5 5 5 Green
6 6 6 Green
7 7 7 Green
Example:
> port set port 1 resolved-cos-policy dot1d-tag1-cos
Example:
> port set port 1 resolved-cos-policy dot1d-tag1-cos
To display the Resolved CoS Policy and Fixed Resolved CoS settings of a port:
port show port <PortName>
Example:
> port show port 1
Traffic Profiling
Traffic profiling classifies ingress traffic based upon each frame’s CoS value and compares
the traffic flow to a configured Committed Information Rate (CIR) and Peak Information
Rate (PIR) defined in kilobits per second (kbps). Depending upon how the traffic flow
compares to these rates, the R-COLOR of each frame is set to a specific value upon
ingress. Traffic ingressing at a rate:
• Up to CIR will be marked Green and allowed through.
• Above CIR and less than PIR will be marked Yellow and allowed through.
• Above PIR will be marked Red and dropped.
NOTE: On a 100 Mbps port the CIR cannot be set to the full amount of physical bandwidth
of the port (100 Mbps). This is because 1 Mb of bandwidth is reserved for the ingress and
egress of BPDUs and other high priority traffic. To commit all of the physical bandwidth
to a CIR could create a serious condition in which the device does not receive critical
frames. To avoid this issue, the CIR should only be configured to a maximum of 99 Mbps.
Example:
> traffic-profiling show
Example:
> traffic-profiling set port 1 arp-standard-profile bypass meter-pool TP-POOL1 mode standard-
vlan nonconform-standard-profile drop
Example:
> traffic-profiling show port 1
Example on CN 3920:
> traffic-profiling show meter-pool
NOTE: The configured CIR and PIR will always normalize to the rate equal to or greater
than the configured value in 64 kilobit increments in order to be processed by the
hardware.
Example:
> traffic-profiling standard-profile create port 1 profile 1 cir 128 pir 128 ip-prec 1 dscp 1
Example:
> traffic-profiling standard-profile set port 1 profile 1 dot1dpri 1
Example:
> traffic-profiling standard-profile unset port 1 profile 1 dot1dpri 1
Example:
> traffic-profiling standard-profile show
Example:
> traffic-profiling standard-profile show port 1
Example:
> traffic-profiling standard-profile clear statistics
Example:
> traffic-profiling standard-profile show statistics
Configuration steps:
Step 4 Set traffic profiling mode on port 1 to standard- traffic-profiling set port
dot1dpri (default). <PortName>
Step 5 Confirm the per port configuration for port 1. traffic-profiling show
port <PortName>
Step 6 Create Traffic profile 1 on port 1 with CIR 3,000Kbps and traffic-profiling
PIR 3,200Kbps, dot1dpri 0,1,2. standard-profile create
Step 7 Create Traffic profile 2 on port 1 with CIR 3,000Kbps and traffic-profiling
PIR 3,200Kbps, dot1dpri 3,4,5. standard-profile create
Step 8 Create Traffic profile 3 on port 1 with CIR 2,000Kbps and traffic-profiling
PIR 2,432Kbps, dot1dpri 6,7. standard-profile create
Example:
1. > traffic-profiling enable
2. > traffic-profiling enable port 1
3. > traffic-profiling show
Configuration steps:
Step 3 Set traffic profiling mode on port 1 to standard- traffic-profiling set port
vlan. <PortName>
Step 5 Confirm the per port configuration for port 1. traffic-profiling show
port <PortName>
Step 7 Add port 1 and 9 to VLAN1001, 1002, 1003. vlan add vlan <VlanList>
port <PortNameList>
Step 9 Create Traffic profile 1 on port 1 with CIR 100 kbps and traffic-profiling
PIR 1024 Kbps, and classifier VLAN 1001. standard-profile create
Step 10 Create Traffic profile 2 on port 1 with CIR 100 kbps and traffic-profiling
PIR 1024 Kbps, and classifier VLAN 1002. standard-profile create
Step 11 Create Traffic profile 3 on port 1 with CIR 100 kbps and traffic-profiling
PIR 1024 Kbps, and classifier VLAN 1003. standard-profile create
+-----------------------------------------------------------------------------+
|VLAN| | Ports 1 |
| ID | VLAN Name |1234567890 |
+----+--------------------------------+---------------------------------------+
| 1|Default |xxxxxxxxxx |
| 127|VLAN#127 | xx |
| 270|Mgmt | x |
|1001|VLAN#1001 |x x |
|1002|VLAN#1002 |x x |
|1003|VLAN#1003 |x x |
+----+--------------------------------+---------------------------------------+
1 0
2 1
3 2
4 3
5 4
6 5
7 6
In addition to the default queue mapping, up to 7 custom Queue Map Profiles can be
created to configure R-CoS to CoS queue mapping. The mapping-mode of custom queue
map profiles is always R-CoS mapped. Any port can use a custom queue map profile by
configuring the ingress-to-egress-qmap attribute on the port. R-CoS values (0 - 7) can be
mapped to CoS Queues (0 - 7), or any combination thereof (for example, all 7 R-CoS values
mapped to the same CoS queue, etc.).
NOTE: A custom R-CoS queue map profile cannot be deleted if it is assigned to a port, as
it must first be removed from the port before it can be deleted.
Congestion Avoidance
Congestion avoidance processing determines whether a frame should be enqueued or
dropped. Congestion avoidance is configured per queue based on a congestion avoidance
profile associated with each CoS queue. This profile contains the drop parameters for
traffic. Drop parameters are defined by the following general attributes:
• Drop Threshold—defines the percentage of the queue capacity that is reached before
packets are eligible to be dropped.
• Drop Probability—define the percentage of packets that are dropped once the
threshold is exceeded.
By dropping packets before the queue fills up, congestion avoidance controls the average
buffer queue size by indicating to the end hosts when they should temporarily slow down
transmission of TCP packets. Randomly dropping packets prior to periods of high
congestion tells the packet source to decrease its transmission rate. Assuming the packet
source is using TCP, it will decrease its transmission rate until all the packets reach their
destination, indicating that the congestion is cleared. TCP not only pauses, but it also
restarts quickly and adapts its transmission rate to the rate that the network can support.
Depending upon the hardware platform, the system software supports Simple Random
Early Detection (sRED) profiles or simple Weighted Random Early Discard (sWRED) profiles
for congestion avoidance that are enabled by default. You can configure custom
congestion avoidance profiles for your platform and configure the egress port queues to
use them.
If you create a custom sRED profile without specifying the thresholds or drop probability
values, the profile will be the same as the Default-SRED profile.
Example:
traffic-services queuing congestion-avoidance-profile create profile green-yellow-1 green-
threshold 100 yellow-threshold 1 yellow-drop-probability 100pct
Example:
traffic-services queuing congestion-avoidance-profile set profile green-yellow-1 green-
threshold 90 green-drop-probability 0.1953125pct yellow-threshold 25
For each traffic type, an sWRED profile supports an sWRED curve with a configurable start
threshold (1-100 percent), upper threshold (1-100 percent), and a maximum drop
probability. Maximum drop probability values include:
• 100pct - 100 percent
• 75pct - 75 percent
• 50pct -50 percent
• 25pct -25 percent
• 10pct - 10 percent
• 9pct - 9 percent
• 8pct - 8 percent
• 7pct - 7 percent
• 6pct - 6 percent
• 5pct - 5 percent
• 4pct - 4 percent
• 3pct - 3 percent
• 2pct - 2 percent
• 1pct - 1percent
• 0pct - 0 percent
When the number of packets are below the start threshold, no packets are dropped.
When they exceed the start threshold, and are below the upper threshold, they are
dropped according to the maximum drop probability value. When the number of packets
reaches the upper threshold, all packets are dropped according to the maximum drop
probability until the number of packets is below the upper threshold.
The default sWRED profile (Default-S-WRED) is configured as follows:
• TCP green start threshold - 75 percent
• TCP green maximum upper threshold - 100 percent
• TCP green maximum drop probability - 0 percent
• TCP yellow start threshold - 50 percent
• TCP yellow maximum upper threshold - 100 percent
If you create a custom sWRED profile without specifying the thresholds or drop probability
values, the profile will be the same as the Default-S-WRED profile.
Example:
traffic-services queuing congestion-avoidance-profile create profile green-yellow-1 tcp-
green-upper-threshold 100 tcp-yellow-upper-threshold 1 tcp-yellow-drop-probability 100pct
Example:
traffic-services queuing congestion-avoidance-profile set profile green-yellow-1 non-tcp-
upper-threshold 1 non-tcp-drop-probability 100pct
Example:
traffic-services queuing egress-port-queue-group set queue 2 port 1 congestion-avoidance-
profile green-yellow-1
To clear the congestion avoidance profile to the default for an egress port
queue:
traffic-services queuing egress-port-queue-group unset queue <NUMBER: 0-7> port
<PortQueueGroup> congestion-avoidance-profile
Example:
traffic-services queuing egress-port-queue-group unset queue 2 port 1 congestion-avoidance-
profile
Example of sRED:
> traffic-services queuing egress-port-queue-group show queue 0 port 1
Example of sWRED:
> traffic-services queuing egress-port-queue-group show queue 0 port 1
Egress Scheduling
Scheduling determines the order in which the physical queues are processed. Currently,
the system software follows strict priority scheduling by default. CoS queue 7 has the
highest priority while CoS queue 0 has the lowest priority. When contention (or
congestion) for bandwidth occurs in the system, the higher priority CoS queues will be
serviced before the lower priority CoS queues. By default, the 802.1p priority (VLAN
priority in the frame) is used to map to an internal priority (resolved CoS) which is then
mapped to a physical CoS queue. The result is that frames with a higher priority will
transmit before those with a lower priority. Strict priority queuing reduces resources for
low priority packets, but ensures low-latency servicing of high-priority packets.
In addition to strict priority, three other scheduling methods can be configured. When
configured for any of these scheduler modes, if the scheduling weight of a queue in the
egress port queue group is set to 0, the scheduler will treat that queue as if it is in strict
priority mode.
• Weighted Round Robin (WRR)—queues in the queuing group are scheduled in a
weighted fashion according to the per-queue scheduler-weight.
• Round-Robin (RR)—queues in the queuing group are scheduled as if all queues in the
queuing group have equal weighting.
• Weighted Deficit Round Robin (WDRR)—queues in the queuing group are scheduled in
a weighted fashion according to the per-queue scheduler-weight and frame size.
To change an egress port's scheduler algorithm for the egress queue group:
traffic-services queuing egress-port-queue-group set port <PortQueueGroup> scheduler-
algorithm <strict|round-robin|weighted-deficit-round-robin|weighted-round-robin>
Example:
> traffic-services queuing egress-port-queue-group set port 9 scheduler-algorithm weighted-
round-robin
To change a queue's weight for use with the port’s scheduler algorithm:
traffic-services queuing egress-port-queue-group set queue <NUMBER: 0-7> port
<PortQueueGroup> scheduler-weight <NUMBER: 0-1000>
NOTE: The default weight for CoS Queue 7 is 0, which is serviced in a strict-priority
fashion being the highest priority over all other CoS queues in the Egress Queue group.
Queue 7 is typically reserved for CPU-Sourced traffic and should not be changed.
Example:
traffic-services queuing egress-port-queue-group set queue 0 port 9 scheduler-weight 100
To display queue weight and scheduler algorithms for all or a specific egress
port:
traffic-services queuing egress-port-queue-group show [port <PortQueueGroup>]
Example:
> traffic-services queuing egress-port-queue-group show port 9
Egress Shaping
A shaper-rate and burst size can be configured on the egress port queue group that limits
the amount of egress bandwidth a port uses and controls the amount of traffic that can
burst. Each queue can also be individually shaped according to the following parameters:
• CIR in Kbps—this is rate of traffic that can egress from a queue and be considered
guaranteed traffic.
• CBS in Kbytes—this is the amount of CIR traffic that can burst from a queue (the CIR
bucket size).
• EIR in Kbps—this is the rate of traffic that can egress from a queue above CIR and is
considered non-guaranteed traffic.
• EBS in Kbytes—this is the amount of EIR traffic that can egress from a queue (the EIR
bucket size).
In order to guarantee CIR, the individually set CIR on queues must not be oversubscribed
for the egress port that the frames are egressing. That is, the sum of all CIRs for the
physical queues and the virtual queues in a queue group on a port should not exceed the
administrative (and operational) speed of the port. When the shaper rate of the egress
port queue group is set, it sets a single Information Rate (IR) regardless of the CIR and EIR
of the individual queues. To guarantee CIR, the sum of the CIRs on each queue cannot
exceed the IR of the egress port queue group.
When a queue or an attribute of the egress queue group of an aggregated port is modified,
that value is updated at each queue or physical port of the aggregation, with the
exception of the shaper rate bandwidth. The shaper rate bandwidth is divided equally
amongst the number of distributing ports. This means that the shaper rate can be used
to control the total bandwidth that the ports share, otherwise the ports would each have
an amount of bandwidth that would add up to a cumulative amount of bandwidth for the
aggregation member ports.
When you set the burst size, the value is rounded to the nearest larger 4Kbyte block. The
burst size is not divided among ports in an aggregation group.
Example:
> traffic-services queuing egress-port-queue-group set port 3 shaper-rate 1200
Example:
> traffic-services queuing egress-port-queue-group set port 3 burst-size 1024
Example:
> traffic-services queuing egress-port-queue-group set queue 0 port 9 cir 5000 cbs 5000 eir
4000 ebs 3000
Note that when the system is in payload calculation mode, the 20-byte IFG is not
considered in the bandwidth equations. However, the physical port must still operate
according to Ethernet standards and take into account the IFG when transmitting packets.
Therefore, the operator could possibly configure a CIR sum at a port that would exceed
the physical bandwidth of the port due to the required IFG on the wire. The software does
not attempt to adjust bandwidth or issue user-events when in payload mode. The
software assumes bandwidth to be configured and consumed according to transport
mode.
At a Glance:
• Overview • Unknown Multicast Filtering
• IGMP Snooping • Configuring Multicast
This chapter details how to configure multicast services in some typical situations.
Overview
Typical Internet Group Management Protocol (IGMP) was designed for environments that
have a low volume of multicast packets and no real-time traffic requirements for
processing IGMP messages. IGMP was designed for networks where multicast services are
critical, such as networks delivering IP broadcast video. Devices employ enhanced IGMP
snooping and various filters to limit multicast streams and assure their timely delivery.
IGMP Snooping
While traditional IGMP snooping works well in most enterprise networks, service providers
delivering converged services need to deliver high-bandwidth multicast services to many
subscribers without disruptions. These types of networks must handle near-real-time
join/leave processing for all subscribers.
In order to support these requirements, several enhancements to traditional IGMP are
provided, including Proxy Query Delay, IGMP message shaping, an IGMP query engine,
IGMP message filtering, configurable IGMP leave modes, rapid topology response, and fast
join/leave processing. It should be noted that multicast services (IGMP) is globally
enabled for the entire device by default, however, it can be enabled or disabled for each
multicast VLAN individually.
Figure 15-1 is an example of an active Query Engine in a network. The multicast server
interfaces directly with the “top-level” device (device 1), which is also acting as the IGMP
querier for the network. The other devices forward IGMP messages to the “top-level”
device only. Multicast streams flow from device 1 to device 2 and from device 1 to device
3.
Multicast
Server
Device 1
Query Engine
Enabled
Device 2 Device 3
If the query engine was enabled on device 2 instead of device 1, no membership reports
would forward from device 2 to device 1, and no multicast streams would flow from
device 1 to device 2.
When using the Query Engine, the device must not have a learned or configured router
port for the VLAN. Additionally, you need to set the Source IP address to a value other
than the default value of 0.0.0.0.
NOTE: Do not enable this feature if using a traditional IGMP router on the network.
software to intelligently forward IGMP join messages to server ports only if that IGMP join
message is required to cause a multicast stream to flow to the host. IGMP join messages
that are redundant are filtered.
NOTE: If two IGMP join messages are received on two ports, and the last 3 octets of the
destination IP address are the same, the second port cannot be part of the multicast
group. For example, Port 1 receives a JOIN with destination IP 224.1.2.3, and it becomes
part of the multicast group. If Port 2 receives a JOIN message with destination
IP 225.1.2.3, then Port 2 cannot become part of the multicast group.
ESPN
Multicast Multicast
Server Stream
Router
MSNBC
Multicast
Stream
MSNBC join
Set Top Box A Message
MSNBC join
Message Device 1
Device 4
Device 2
Device 3
ESPN join
Message
For example, if a subscriber on Set Top Box A is watching a video channel such as ESPN,
when the subscriber on Set Top Box B changes the channel to ESPN (subscribes to the ESPN
multicast group) Set Top Box B sends an IGMP join message to device number 3. However,
device 3 does not forward the join message upstream since the multicast stream is
already present. In contrast, if Set Top Box A joins the MSNBC multicast group, a join
message would be sent all the way upstream back to the multicast router since the router
does not have any active members in the MSNBC group.
StreamCast
Typical multicast video deployments support a centralized server topology where a single
video source provides all multicast content for a VLAN. While backup servers may exist,
only one server delivers content.
A distributed solution allows a number of multicast servers to deliver content on a VLAN.
Figure 15-3 shows such an architecture where two multicast routers each actively
provide video content on the same VLAN. StreamCast is the solution that supports
distributed video architecture, which allows service offerings that provide customers the
ability to set up video conferences between many remote offices or other multicast
streaming applications.
Multicast
Server A
Multicast
Server B
Device 1
Query Engine
Enabled
Device 2 Device 3
membership report is received for the group on that port before the timer expires, the
timer is cancelled. However, if the port does not receive a membership report, the port
will be removed as soon as the timer expires.
This delay, reduces channel-change latency, which can be especially useful in situations
such a last channel recall. It also resolves problems introduced when a subscriber
connects a hub or non-IGMP switch to their customer premises equipment (CPE).
Inquisitive leave should only be enabled on devices that have a CPE (e.g., a set top box)
attached to them.
IGMP Parameters
The following table is a summary of IGMP parameters. In cases where these parameters
have different names between the Device Manager and the CLI, the Device Manager name
is listed in parentheses.
Field Description
IGMP Snooping Displays whether IGMP is active for the entry selected.
(Active State)
Default Router Port The port on the device used to communicate with the router.
This port sends and receives the IGMP query and join/leave
messages. If a router port is not assigned, the value will be 0.
Used if the actual router port is not known.
IGMP Leave Mode Enables inquisitive leave. When enabled, the Active Linger
Timeout is used to remove ports from the multicast group
(Inq. Leave State) membership table. When a leave report is received by the
device, the Last Member Query Interval timer is started and
a group-specific query will egress the port. The timer is
canceled if a membership report is received on the port. The
port is removed from the group when the timer expires.
Last Member Query Interval Max response time inserted into group-specific queries sent in
response to leave messages. Also determines the amount of
(Last Mem. Query Int.) time between group-specific queries. Ignored when
inquisitive-leave is disabled.
L2 Packet Priority 802.1p priority value assigned to IGMP packets for this VLAN.
Default priority is 7.
(Priority)
Robustness Number of IGMP join or IGMP leave messages to send for each
multicast group.
Linger Timeout The time, in seconds, that a filter will remain in the IGMP
table after all hosts have left the group. This is done to give
sufficient time for the upstream IGMP router to receive and
process the leave message. The filter is removed when the
Linger Timeout expires.
Active Linger Timeout Used for inquisitive leaves. If no join message are received
before the timer expires, the port is removed from the group.
Field Description
Router Query Interval Determines the time (in seconds) to wait for the router to
send a General Query message.
(Router Query Int.)
Minimum Query Response Time Time, in deciseconds (1/10 of a second), that hosts have to
respond to an IGMP query.
Group Address Range (Start) Configures the starting IP address in the multicast range for
the IGMP router that corresponds to this multicast entry. Each
(Rtr. Range Start IP) router should be configured to use a separate range of
multicast addresses to avoid conflict.
Group Address Range (End) Configures the ending IP address in the multicast range for
the IGMP router that corresponds to this multicast entry.
(Rtr. Range End IP)
Proxy Query Source Address When the query engine is enabled, this address is used as the
source for all query packets. This IP address must be unique
(Source IP Address) for the VLAN.
Proxy Query Interval Determines the interval, in seconds when the query engine
will send IGMP general queries.
(Query Interval)
Proxy Query Response Interval Determines the rate at which devices respond to IGMP queries
from the router.
Proxy Query Delay Query messages are sent to one port at a time. This setting
determines the delay between forwarding messages to each
port.
Configuring Multicast
The following examples show various IGMP configurations in ring topologies.The default
settings for the IGMP timers should work well for most applications.
In addition, there are two important configuration settings on the multicast router that
can affect IGMP performance.
• Query-Response-Interval -determines how fast the device must respond to a general
query. A short interval results in a burst of responses within a very short time, causing
the CPU load to spike. A larger value helps avoid this peak thereby easing CPU load.
Where possible, this value should be set as close to (but not exceeding) the query-
interval.
• Query-Interval -on the router, this value determines how often the router sends a
general-query message. Each time the device receives a general query, it must use
system resources to respond to the router. If the interval is too short it could cause the
device to become sluggish. The minimum value should be about one minute for every
100 multicast groups on the network. The value chosen for query-interval on the router
should be less than or equal to the value chosen for router-query-interval on the
device.
NOTE: To configure Multicast, you need to install the Advanced Ethernet license key. To
obtain the Advanced Ethernet license key, contact Ciena Sales.
Multicast
Server Router
Device 1
Device 2 Device 4
Device 3
Step 2 Set the query timers to the same values as on the multicast-services igmp-
multicast router. snooping set
Step 4 (Optional) Enable UMF on the specified VLAN for the multicast-services umf
devices that have subscriber equipment connected to drop
them (in our example, device 2 and 3).
Since the configuration of each box is very similar, the following example will configure
device 2 from Figure 15-4.
CLI Example:
1. > multicast-services create vlan 300
2. > multicast-services igmp-snooping set query-response-interval
100
3. > multicast-services igmp-snooping enable
4. > multicast-services umf drop vlan 300
For this example, multicast services are delivered on VLAN 300. In the topology
represented in Figure 15-5, UMF is required on device 1 to contain the streams being
flooded by the multicast server. On all other devices, UMF is optional.
Multicast
Server
Device 1
Device 2 Device 4
Device 3
Step 2 Configure the Query Engine on the same device. multicast-services igmp-
snooping set
When using this command, the source IP address must be
set before the Query Engine is enabled. In addition, the
router port must be set to 0 (unlearned).
Step 4 Enable UMF on device 1. (Optional) Enable UMF on the multicast-services umf
specified VLAN for the devices that have subscriber drop
equipment connected to them (in our example, device 2
and 3).
CLI Example:
1. > multicast-services create vlan 300
2. > multicast-services igmp-snooping set query-ip-source- addr
10.10.10.10 query-engine on
3. > multicast-services igmp-snooping enable
4. > multicast-services umf drop vlan 300
5. > multicast-services show configuration vlan 300
+----------------------------------------------------+------------------------+
| MULTICAST CONFIGURAITON VLAN 300 VLAN#300 |
+----------------------------------------------------+------------------------+
| Global Multicast Services | enable |
| Multicast Services | enable |
| UMF | drop |
| WKM Forwarding | disabled |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURAITON (general) |
+----------------------------------------------------+------------------------+
| IGMP Snooping | enable |
| IGMP Query Engine | on |
| IGMP Leave Mode | fast |
| L2 Packet Priority | 7 |
| Robustness | 1 |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURAITON (proxy query) |
+----------------------------------------------------+------------------------+
| Proxy Query Interval (s) | 125 |
| Proxy Query Response Interval (ds) | 100 |
| Proxy Query Delay (ds) | 10 |
| Proxy Query Source Address | 10.10.10.10 |
| Last Member Query Interval (ds) | 10 |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURAITON (router) |
+----------------------------------------------------+------------------------+
| Router Query Interval (s) | 250 |
| Linger Timeout (s) | 120 |
| Active Linger Timeout (s) | 30 |
| Minimum Query Response Interval (ds) | 50 |
| Group Address Range (start) | 0.0.0.0 |
| Group Address Range (end) | 0.0.0.0 |
| Default Router Port | 0 |
+----------------------------------------------------+------------------------+
Device 1
Device 2 Device 4
Device 3
In response to a topology change, for example, if the link that has the router port for the
device goes down, device will advertise a router address of 0.0.0.0 to indicate that it has
lost the router. For example, assuming that router 1 has a lower IP address than Router
2, if the link between device 1 and Router 1 goes down, devices 1, 2, 3 and 4 will send
out general queries advertising a router address of 0.0.0.0. Device 4 will become the
interface for multicast services and all joins/leaves will then be sent to it. However, when
Router 1 is restored, it will again become the primary router and Router 2 will again go
into standby mode.
This allows the network to continue delivery of multicast services while ensuring the least
delay in service possible. This also allows order to be maintained between the two
multicast routers, so that there is no competition or confusion.
In this example, multicast services are assumed to be delivered on VLAN 300. For the
network represented in Figure 15-6, UMF is required on device 1, and device 2. On all
other devices, it is optional.
Step 2 Enable UMF on device 1 and device 4. (Optional) Enable multicast-services umf
UMF on the specified VLAN for the devices that have drop
subscriber equipment connected to them (in our
example, device 2 and 3).
Step 3 Set the query timers to the same values as on the multicast-services igmp-
multicast router. snooping set
Since the configuration of each box is very similar, the following example will configure
device 1 from Figure 15-6. Note that device 1 and device 4 should be configured exactly
the same.
CLI Example:
1. > multicast-services create vlan 300
2. > multicast-services umf drop vlan 300
3. > multicast-services igmp-snooping set query-response-interval
100
4. > multicast-services igmp-snooping enable
Multicast
Set Top Box Server
Device 3
Device 1
Device 2
In this scenario, the Query Engine must be enabled on device 1 and device 3, but only one
Query Engine will be active at a time. The second Query Engine will effectively be in
standby mode. The active Query Engine is determined by identifying the engine with the
lowest source IP address. This Query Engine then handles general queries and
“authorizes” the delivery of various streams through the network.
In response to a topology change, for example, if the link that has the router port for a
device goes down, the device will advertise a router address of 0.0.0.0 to indicate that
it has lost the router.
For example, assuming that device 1 has a lower source IP address than device 3, if the
link between device 1 and the Multicast Server goes down, devices 1, 2, and 3 will send
out general queries advertising a router address of 0.0.0.0. Device 3 will then become the
interface for multicast services and all joins/leaves will then be sent to it. However, when
the link between device 1 and the Multicast Server is restored, it will again become the
primary Query Engine, and device 3 will return to standby mode.
This allows the network to continue delivery of multicast services while ensuring the least
delay in service possible. This also allows order to be maintained between the two Query
Engines, so that there is no competition or confusion.
In this example, multicast services are assumed to be delivered on VLAN 300. The network
should also be using RSTP. For the network represented in Figure 15-7, UMF is required
on device 1, and device 3. On all other devices, it is optional.
Make sure that the source IP address for the two devices
is different and that the device that should become the
primary Query Engine has a lower IP address.
Step 4 Enable UMF on devices 1 and 3. (Optional) Enable UMF on multicast-services umf
devices that have subscriber equipment connected to drop
them (in our example, device 2).
Since the configuration of each box is very similar, the following example will configure
device 1 from Figure 15-5. Note that with the exception of the Query Engine source IP
address, the configuration for device 1 and device 3 should be exactly the same.
CLI Example:
1. > multicast-services create vlan 300
2. > multicast-services igmp-snooping set query-ip-source-addr
10.10.10.10 query-engine on
3. > multicast-services igmp-snooping enable
4. > multicast-services umf drop vlan 300
At a Glance:
• Overview • Ethernet Virtual Private Line
• Principles of Operation • Ethernet Private Line/LAN
• Q-in-Q Encapsulation • EVPL Bundling
This chapter details the configuration of Layer 2 VPNs on devices running SAOS software,
providing support for 802.1ad Provider Bridging.
Overview
Virtual Private Networks (VPNs), generally based on traditional Frame Relay and ATM
services, have been broadly used with carriers and customers, providing point to point
and WAN solutions. These technologies were historically expensive to install and
complicated to operate. However, new end-user services have been implemented using
Ethernet LAN services as a broadcast technology.
This solution supports the deployment of L2 VPNs or Transparent LAN Services that enable
a service provider to provide Ethernet Private Line/LAN (EPL) or Ethernet Virtual Private
Line (EVPL) to their encap customers. The customer perspective is that their connection
to the service provider is a direct connection to a private line or LAN between their sites.
Up to 64 provider bridges can be supported.
L2 VPNs transport Ethernet/802.3 and VLAN tagged traffic between multiple sites that
belong to the same L2 broadcast domain or VPLS service. These services are deployed
over Ethernet using an extension of 802.1Q, called Q-in-Q.
Principles of Operation
Q-in-Q is implemented via the attachment of a Virtual Circuit (defining the Provider
VLAN) to a Virtual Switch (defining the Subscriber VLANs), as shown in Figure 16-3. The
customer perspective is that their connection to the service provider is a direct
connection using a private LAN between geographically separated sites.
Provider VLAN
UNI NNI
VS VC
NNI
UNI
NOTE: In order to use the 802.1ad provider bridging feature, you need to install the
Advanced Ethernet (AE) license key. License keys can be purchased by contacting Ciena
customer support.
Virtual Switch
A virtual switch (VS) is a Layer 2 forwarding domain between a customer bundle (multiple
per-port per-VLAN entries) or per-port entries and the network transport interfaces
(VCs). Ethernet switches have long been governed by the use of VLANs. Traffic tagged
with a specific VLAN is forwarded to other VLAN member ports. However, in
geographically separated networks, the same VLAN ID may be used by more than one
subscriber group, but for security and administrative purposes, the VLAN must remain
separated.
A virtual switch essentially separates the forwarding plane from the data plane, thus the
virtual switch is customer-centric, while the virtual circuit is service-centric.
A virtual switch should be configured whenever there is a need for a Point-to-Point,
Ethernet Virtual Private LAN solution.
Reserved VLAN
A reserved VLAN is used internally to link a virtual switch with an internal switching
domain, and acts to connect both subscriber and provider facing interfaces. A reserved
VLAN must be created for each virtual switch before the virtual switch is configured. The
reserved VLAN pool is part of the same 1-4094 range as the system VLAN pool. The system
assigns the reserved VLAN from this pool when the VS is created.
Subscriber/UNI traffic can also be switched without connecting to the provider/transport
network.
Reserved VLAN
UNI NNI
VS
NNI
UNI
Reserved VLANs are configured using the virtual-switch add reserved-vlan CLI
command. Reserved VLANs cannot be deleted using the vlan delete CLI command,
instead they must be removed using the virtual-switch remove reserved-vlan
command. In addition, the default name for a reserved cannot be changed, so reserved
VLANs will always appear in the format of VLAN#XXX.
The virtual-switch show command can be used to see which reserved VLAN is
associated with a virtual switch:
> virtual-switch show
Virtual Circuits
A virtual circuit (VC) defines a secure logical connection between one or more customer
endpoints. It is a service trunk, where transport services start and end (encap and
decap).This association is based on an extension to IEEE 802.1ad VLAN standard referred
to as double tagging (Q-in-Q). Virtual circuits encapsulate and decapsulate L2 tags over
the service provider’s network to allow data to be easily switched without the need for
in-depth individual packet analysis or routing decisions at each network device. They can
be thought of as the provider VLAN.
Provider VLAN
The provider VLAN is defined by the VLAN assigned to the virtual circuit when it is
created. When a VC with a provider VLAN is attached to a VS, the provider VLAN itself
becomes the double-tagged (encapsulated) VLAN. The virtual circuit references the
provider VLAN, and the VC VLAN has a service port associated with it.
Q-in-Q Encapsulation
Encapsulating an 802.1Q VLAN tagged frame within another 802.1Q tag enables the
service provider to encapsulate the customer VLAN tagging information while using VLANs
within the provider network. SAOS allows Ethernet virtual circuits to be statically
created. An Ethernet-VC uses an additional 802.1Q VLAN tag and includes the following:
• Service Etype (default 0x8100)
• Service VLAN ID (range)
• Service .1d (range)
Q-in-Q Ethertype
The Ethertype of the outer VLAN tag can be customized. This allows compatibility with
standard 802.1Q encapsulation methods like Extreme's vMAN that uses the 9100, and
802.1ad for Provider Bridging. Using the virtual-circuit ethernet set port
command, the Ethertype value to use can be configured as described in Table 16-1, in
this chapter.
encap-only When this policy is set then only encapsulated frames going
out a port will use the configured Ethertype (see Table 16-1,
in this chapter). This will affect both single and double tagged
frames that have had a provider VLAN tag added to them.
NOTE: The only policy available on current platforms is All. This means that all VLAN
tagged frames that egress the port will be affected by the configured Ethertype as the
outer tag e-type.
CLI Example:
> virtual-switch ethernet add vs vsName port 1 vlan 300 encap-cos-policy fixed
encap-fixed-dot1dpri 5
SVID (1000)
VC 1000/100
VS 1
CVID (100) SVID (2000)
VC NNI
UNI 2000/200
VS 2
CVID (200) (svid) SVID (3000)
VS 3 VC 3000/300
CVID (300)
1. Create a provider VLAN and add the NNI port to the VLAN.
2. Create an Ethernet virtual circuit for the provider VLAN.
3. Create a virtual switch and add UNI port(s) to the subscriber VLAN.
4. Attach the Ethernet VC to the VS.
CLI Example:
> vlan create vlan 100
> vlan create vlan 200
> vlan create vlan 300
> vlan add vlan 100,200,300 port 7,8
> virtual-circuit ethernet create vc vc0 vlan 100
> virtual-circuit ethernet create vc vc1 vlan 200
> virtual-circuit ethernet create vc vc3 vlan 300
> virtual-switch add reserved-vlan 1000-1002
> virtual-switch ethernet create vs vs1 vc vc0 encap-fixed-dot1dpri 0
> virtual-switch ethernet create vs vs2 vc vc1 encap-fixed-dot1dpri 1
> virtual-switch ethernet create vs vs3 vc vc2 encap-fixed-dot1dpri 2
> virtual-switch ethernet add vs vs1 port 1 vlan 100
> virtual-switch ethernet add vs vs2 port 1 vlan 200
> virtual-switch ethernet add vs vs3 port 1 vlan 300
All customer VC
UNI VS
VLANs (CVID) 1001 NNI
(SVID) 1001/CVID
CLI Example:
> vlan create vlan 101
> vlan add vlan 101 port 10
> virtual-switch add reserved-vlan 1001
SAOS also supports point to multipoint Ethernet Virtual Private LAN (EVP-LAN) with
multiple EVCs per UNI and fixed policy priority bit re-marking on ingress.
EVPL Bundling
SAOS supports Ethernet Virtual Private Line (EVPL) bundling. EVPL bundling allows
multiple customer VLAN IDs (C-VIDs) to be mapped to one or more virtual switches. Up to
4094 unique VLANs can be configured on one port. It should be noted that EVPL bundling
will only function where traffic is being encapsulated.
As an example, Figure 16-5 shows multiple C-VIDS ingressing on port 28. VLANs 10-20
have been mapped to virtual switch 2, and VLANs 100-110 and 250 are mapped to
Ethernet-VS 1. This allows multiple C-VIDs to be mapped to two separate virtual switches.
Port 28
CLI Example:
> virtual-switch ethernet add vs vs1 port 28 vlan 100-110,250
> virtual-switch ethernet add vs vs2 port 28 vlan 10-20
NOTE: If the port vlan-ingress-filter parameter is set to on, only frames that match a
configured VLAN tag will be forwarded.
At a glance:
• Overview • Configuring CFM Services for a VLAN
• Benefits Service
• Configuring CFM Globally • Configuring CFM Services for a
Virtual Switch
• Configuring CFM Services
• CFM Over Q-in-Q
• Configuring MEPs
• Troubleshooting
• Configuring Remote MEPs
• Configuring MIPs
This chapter discusses the Ciena implementation of the IEEE P802.1ag/D8 Connectivity
Fault Management (CFM) protocol that is used to detect and isolate network service
connectivity problems.
Overview
Connectivity Fault Management (CFM) provides a method to continuously monitor the
end-to-end network connectivity of a network service, such as a Virtual Switch (VS) or a
VLAN. Services can be monitored over a single hop, a point-to-point link, or over multiple
hops, using equipment managed by one or more service providers and operations entities.
Services are identified by a collection of Service Access Points (SAPs) called a Service
Instance. There are two types of SAPs:
• Maintenance End Points - Maintenance End Points (MEPs) are created at the edge
(entry/exit) points of the service being monitored.
• Maintenance Intermediate Points - Maintenance Intermediate Points (MIPs) are created
between MEPs to track faults at intermediate points.
MEPs send periodic multicast messages (called Continuity Check Messages or CCMs) to
each other through the VS or VLAN service to determine the status of the service
connection. These can be thought of as heartbeat messages. Devices not configured for
CFM forward CCMs as they would any other multicast message. If an expected CCM is not
received by a MEP on a participating network device within the specified period, a fault
alarm regarding the service is issued in the form of an SNMP trap and system log message.
In Figure 17-1, the service being monitored is VLAN 5. The MA consists of three MEPs (one
on each edge of the service) and several MIPs. One of the MEPs monitors VLAN 5 at its
source, which is the connection to the service provider. The other two MEPs monitor VLAN
5 at the devices that connect directly to the customer premise equipment (CPE). The MIPs
represent one or more CFM-configured network devices (switches/Service Delivery
Switches/Service Concentration Switches) used to connect VLAN 5 to multiple
subscribers.
VLAN 5 MEP
CPE
Maintenance Domains
Unless a dedicated end-to-end physical connection is used (such as a fiber optic cable),
delivering Ethernet services between remote sites typically requires connections through
equipment installed and controlled by a separate administrative entity. Each of these
entities needs to monitor the status of the services that they are providing in order to be
aware of any loss of service and at what point the service has been disrupted.
In order to monitor the same service through the equipment used by various carrier
entities, portions of the network under the control of a common administrative entity are
identified by a Maintenance Domain (MD). CFM provides up to eight MDs each numbered
from 0-7 to identify its position relative to adjacent CFM domains. The values assigned
must be carefully chosen, with the lowest numeric value used for the “inner most”
domain levels and higher numbered domain levels assigned in sequence as they are
configured outward toward the ends of the service. CFM domains must be fully nested,
that is, an inner domain must be fully contained within a surrounding domain.
The default MD level is 3. The MD level does not necessarily have to be changed to
configure CFM. The level would only have to be changed when the Operator’s CFM needs
are different from what a level 3 MD can provide.
NOTE: If a Maintenance Domain name is changed, it must be changed on all other units.
The name must be the same on each end point.
The three general types of domains are: Customer, Provider, and Operator. These names
are guidelines to indicate the type of entity typically associated with a particular
maintenance domain.
• Customer domains contain the devices connected to the customer and to the source
of the service being monitored. For example, if two physically separate business
entities are connecting to each other, customer equipment is configured for CFM
operation at both ends to monitor the connection, specifying the same domain at both
ends. The Customer domain is assigned a level in the range of 5 to 7.
• Provider domains represent the connection used to join each end of the Customer
domain. For example, this could be the Internet service provider used by the business.
The Provider domain is assigned a level in the range of 3 to 4.
• Operator domains are the central physical infrastructure provider. This could be the
owner of a fiber optic network that spans the distance between the cities where the
two business units are located. The Operator domain is assigned a level in the range
of 0 to 2.
Figure 17-2 shows three Maintenance Domains associated with a Service Instance used to
monitor connectivity across a Provider network between two CE devices. Devices CE1 and
CE2 reside in the outer-most MD at MD Level 5. The CE devices may be administered by
either the Customer or the Provider. The Provider administers devices MTU1 and MTU2 in
a second MD at MD Level 4, which is surrounded by the Customer MD. The CE devices
connect to the service at Domain Service Access Points (DSAPs) on the boundary between
the Customer and Provider MDs. DSAPs are members of the MD that offer the ability to
connect to external systems and lie on the edge of the MD. These DSAPs correspond to
the same physical ports as those associated with the SAPs in Figure 17-2. The example
includes a third MD at MD Level 2, contained within the Provider MD. This illustrates that
the Provider has contracted with an Operator to transport the service between its MTU
devices. The Provider connects its devices to the Operator's network at a second set of
DSAPs, which lie on the boundary between the Provider and Operator Maintenance
Domains. The Provider has no knowledge of the internal topology or configuration of the
network contained within the Operator MD.
MEPs pass CCMs of higher relative domain levels without acting on them. For example,
when one of the MEPs in the Customer domain sends a CCM, the MEPs in the Provider and
Operator domain pass the CCMs on to the MEP at the other end of the Customer domain.
This is what allows Connection Fault Management to work across multiple domains.
However, CCMs with equal or lower relative domain levels are not passed on by MEPs in
order to contain those messages within their respective domains.
Maintenance Associations
A Maintenance Association (MA) relates a Service Instance with a Maintenance domain and
includes the group of SAPs belonging to the Service Instance. CFM frames carry a
Maintenance Association Identifier (MAID) that identifies the connection between SAPs.
The MAID includes the Maintenance Domain name along with a Short MA Name.
MEPs
As previously mentioned, MEPs send and receive continuity check messages (CCMs) over
the service on a periodic basis to determine if that service is still available. Each MEP is
assigned a unique numeric identifier (MEPID) and maintains a table of other MEPs
(referred to as remote MEPs) that belong to its MA. This table, called the MEP-CCM-
Database, is used to determine if one or more remote MEPs are no longer sending CCMs.
MEPS are directional: Up or Down. A Down MEP sends CCMs towards and receives them
from the physical medium. Down MEPs monitor service connectivity from one device to
another carrying the same service. This could be a direct connection or a connection
through several other devices and MIPs. An Up MEP sends CCMs towards and receives them
from the MAC Relay Entity.
MIPs
Like MEPs, MIPs respond to and forward link-trace messages that are used to identify the
point in an MA where the service is lost. MEPs and MIPs also respond to loopback messages
that are also used to isolate faults at intermediate service nodes. Unlike MEPs, MIPs do
not exchange CCMs, but they do act on CCMs and forward them.A MIP is not affiliated with
a single MA, and processes CFM protocol frames for all MAs traversing an SI at or above
its specified MD Level. Another function of a MIP is to record all CCMs received by a logical
interface that are at or above its MD Level, in order to construct the MIP-CCM Database.
This database serves as a record of the CFM monitored services that are using a service
instance, and provides a learn table of the MAC addresses used by MEPs. In the event that
entries have aged-out of the normal MAC learn table due to a service failure, the MIP-CCM
database can be alternatively queried to resolve forwarding information for Linktrace
requests during the troubleshooting process.
Loopback Messages
Loopback messages are unicast frames that a MEP transmits, at the request of an
administrator, to verify connectivity to a particular MEP or MIP. Upon reception, the MEP
or MIP transmits a Loopback Reply (LBR) to the initiator. A loopback message can also be
configured to contain arbitrary data, which can be used to diagnose faults that are
sensitive to frame size, or a specific data pattern.
Linktrace Messages
Linktrace messages are multicast frames that a MEP transmits, at the request of an
administrator, to either isolate a service fault to a specific MEP, or to trace the path
through the network to a particular MEP or Target MAC address. When the fdb-only
parameter is specified, only the normal forwarding database is used to look up the target
MAC, and not the MEP CCM and MIP CCM databases that would also be used otherwise.
When processing a received linktrace message, the UseFDBonly flag in the message is
honored when looking up the target MAC.
For each visible MIP, linktrace messages indicate ingress action, relay action, and egress
action. Linktrace messages also contain a TTL value (configurable), which is decremented
each time the Linktrace messages are forwarded by the MEP or MIP. Linktrace messages
are multicast, reply messages are unicast.
Y.1731 tests are initiated by the network administrator and are sent between specific
MEPs in the same ME. This then triggers the unicast DMMs or LMMs to be sent to the
desired remote MEP with a specified packet count at a configurable interval (default is
100 ms). MIPs do not participate in delay/jitter or frame loss measurements.
MEP 12
MIP
X
RSTP
MEP 10 MIP BLOCK MIP MEP 11
Figure 17-4 displays the path that DMMs and LMMs would take (green lines) and the return
path for DMRs and LMRs (red lines) for a test of delay/jitter or frame loss initiated on MEP
10 to MEP 11.
Benefits
CFM provides utilities to maintain network connectivity including:
• Path discovery - Linktrace messages are used to determine the path taken to a target
MAC address.
• Fault detection - CCMs are used to detect both connectivity failures and unintended
connectivity between Service Instances.
• Fault verification and isolation - Loopback messages are used to perform fault
verification, or to confirm successful initiation or restoration of connectivity.
Linktrace messages and loopback messages are used to isolate faults.
• Fault notification - Fault notification is provided by the MEP that detected a
connectivity fault either because expected CCMs were not received, unexpected or
invalid CCM were received, or the CCM carried a notification of the failure of its
associated MEP.
• Fault recovery - Fault notifications help network operators correct configuration
errors or replace failed components.
Provider Example
In this example, a Provider has created a Maintenance Association (MA) to monitor a
Service Instance on VLAN 10, associated with a data service sold to the Subscriber. This
MA allows the Provider to determine whether or not the fault lies within its own network
if a Subscriber reports that the service is down.
For simplicity, this example depicts only the relationship between two MEPs on two
Service Delivery Switches in Multi-tenant Units (MTU1 and MTU2). Figure 17-5 depicts the
MEP on MTU1, port 2, and MTU2 port 9. The Provider creates Maintenance Association
PROVIDER1 at Maintenance Domain Level 4 on each MTU device. MEPs 1 and 2 on port 2
and port 9 respectively are then added to this Maintenance Association.
In order for the Provider to monitor and troubleshoot service connectivity to the edge of
the Operator network, the Operator must expose MIPs at the ports where the service
connects to its network. Although the Provider is unable to administratively manage these
MIPs, they allow the Provider to use CFM Loopback and Linktrace mechanisms to
determine whether or not a service fault lies within the Operator network.
The Operator creates MIPs for VLAN 10 at MD Level 4 in ports 4 and 7. These MIPs are not
associated with a specific Maintenance association, and are accessible by any
Maintenance Association associated with its VLAN and MD Level. Thus, the Operator is
able to provide MIPs to the Provider without specific knowledge of the Provider's
Maintenance Association configuration.
Operator Example
In this example, the Operator (OPERATOR1) and the Provider wish to use CFM to
simultaneously monitor the service on VLAN 10. To this end, the Operator creates its own
Maintenance Association for the service at Maintenance Domain Level 2. This MA allows
the Operator to monitor and troubleshoot connectivity for the service within its own
network without interfering with the operation of the Provider's Maintenance Association
on the same VLAN, but at a higher MD Level.
As shown in Figure 17-6, configuration of this MA requires the creation of the OPERATOR1
Maintenance Association on devices OP1 and OP2, and MEPs on ports 4 and 7. Although
not depicted in the diagram, the Operator could also create MIPs on any intermediate
devices that transport the service.
Customer Example
CFM can also monitor the VLAN 10 service between Subscriber devices in the Customer
Maintenance Domain, independent of the Maintenance Associations in the Provider and
Operator Maintenance Domains. Although a Customer MA will verify end-to-end service
connectivity, the Customer is only able to isolate a fault to a specific link if the fault lies
within the Customer Maintenance Domain. A fault can be isolated to the interior of the
Provider network, but the Provider must be contacted to further troubleshoot the service
disruption.
Figure 17-7 shows a Customer configured MA between the two CE devices. This
configuration coexists with the previously defined PROVIDER1 and OPERATOR1
Maintenance Associations. The CUSTOMER1 MA is created on devices CE1 and CE2. MEPs
are configured on CE1, port 1 and CE2, port 10. The MIPs shown on the Provider devices
MTU1 and MTU2 must be created by the Provider.
UP MEP UP MEP
DOWN DOWN
P1
MEP MEP
DOWN MEPs
Maintenance Association P1 is configured for the physical link connecting the Provider and
Operator networks. Therefore, this requires that the Operator and Provider agree on a
Maintenance Domain Level and a Maintenance Association name. The Operator and
Provider must each create MA P1 on their respective devices. The Operator creates the
MEP for OP2 port 7, while the Provider creates the MEP for MTU2 port 8. Once configured,
MA P1 can be used by both Operator and Provider to monitor VLAN 10 connectivity across
the link connecting their networks.
NOTE: In order to configure CFM, you need to install the Advanced OAM (AOAM) license
key. License keys can be purchased by contacting Ciena customer support.
To enable CFM:
cfm enable
To disable CFM:
cfm disable
Example:
> cfm set ethertype 35272 mep-hold-time 300000 dot1ad-strict enable mip-level-enforment on
Example:
> cfm show
+------------ CFM GLOBAL CONFIGURATION -------------+
| Parameter | Value |
+-------------------------------+-------------------+
| Admin State | Enabled |
| Ethertype | 0x8902 |
| Y1731 Ethertype | 0x8902 |
| Remote MEP Hold Time (ms) | 10000 |
| 802.1ad Strict Mode | Off |
| MIP Level Enforcement | Off |
| MIP CCM Database Learning | Enabled |
| Frames/sec Avail | 1998 |
| Source MAC For PBT CFM Frames | 00:02:A1:31:23:C0 |
| Total Rx Frames | 360999 |
| Total Tx Frames | 585314 |
+-------------------------------+-------------------+
NOTE: If a Maintenance Domain name is changed, it must be changed on all other units.
The name must be the same on each end point.
Example:
> cfm md set level 7 CustomerMD7
Example:
> cfm md show
+---- CFM MAINTENANCE DOMAINS ---+
|Level |Name |Services|
+------+----------------+--------+
|0 |md0 |0 |
|1 |md1 |0 |
|2 |md2 |0 |
|3 |md3 |2 |
|4 |md4 |0 |
|5 |md5 |0 |
|6 |md6 |0 |
|7 |md7 |0 |
+------+----------------+--------+
Example:
> cfm md show level 3
+------------- CFM MAINTENANCE DOMAIN INFO ---------------+
| Parameter | Value |
+----------------------+----------------------------------+
| Level | 3 |
| Name | md3 |
| Index | 4 |
| Number of Services | 2 |
| MD Name | md3 |
| MD Name Length | 3 |
| MD Name Format | String |
+----------------------+----------------------------------+
Example:
> cfm md show level 3 services
NOTE: For examples of configuring CFM services for PBT tunnels, refer to the Configuring
PBT section in Chapter 23, on page 351.
NOTE: A total of up to 256 combined CFM services are supported on the CN 3911 and
CN 3920, and up to 530 on the CN 3940, CN 3960, and CN 5140. This includes VS, VLAN,
and PBT tunnel services (on platforms that support the service).
Example:
> cfm service create vs VS-1 name CFM-SRV-VS-1 next-mepid 300
Example:
> cfm service create vlan 1001
3 Remote MEP CCM Defect indicates that the local MEP is not RM
receiving CCMs from Remote MEP(s).
• Alarm Time—Time (in milliseconds) that defects must be present before issuing a Fault
Alarm. The Alarm Time starts whenever a fault greater than the Alarm Priority is
detected. The range is 0 – 36000 milliseconds. Default = 1000 ms (1 second). The lower
the value, the faster a fault alarm is issued.
• CCM Interval—The CCM Interval refers to the frequency at which CCM messages are
transmitted. The default value is 1 second. Valid CCM intervals are defined in
Table 17-2, in this chapter.
1 or 4ms 4 milliseconds
2 or 10ms 10 milliseconds
1 or 4ms 4 milliseconds
2 or 10ms 10 milliseconds
5 or 10sec 10 seconds
6 or 1min 60 seconds
7 or 10min 10 minutes
NOTE: Setting the CCM Interval to 4 milliseconds is not recommended for a production
environment, although it can be used for testing. Also, note that faster CCM rates are
more CPU intensive.
• DMM Interval—The DMM Interval refers to the frequency at which DMM messages are
transmitted. The default value is 1 second. Valid DMM intervals are defined in
Table 17-3, in this chapter.
1 or 4ms 4 milliseconds
2 or 10ms 10 milliseconds
5 or 10sec 10 seconds
6 or 1min 60 seconds
7 or 10min 10 minutes
NOTE: Setting the DMM Interval to 4 milliseconds is not recommended for a production
environment, although it can be used for testing.
• LMM Interval—The LMM Interval refers to the frequency at which LMM messages are
transmitted. The default value is 1 second. Valid LMM intervals are defined in
Table 17-4, in this chapter.
1 or 4ms 4 milliseconds
2 or 10ms 10 milliseconds
5 or 10sec 10 seconds
6 or 1min 60 seconds
7 or 10min 10 minutes
NOTE: Setting the LMM Interval to 4 milliseconds is not recommended for a production
environment, although it can be used for testing.
• CCM Loss Bucket Size—CCM loss bucket size for CCM loss statistics ranging from 1-60
minutes. The default bucket duration is 15 minutes, which provides a default history
of 24 hours.
• CCM Loss Num—CCM loss number ranging from 1-255.
• CCM Loss Stats—Enables or disables CCM loss statistics collection. When enabled, the
history of CCM frame sequence errors for a remote MEP are saved. Each sequence error
is used to compute the number of CCM frames that have been lost. This number is then
added to the current history bucket. SAOS has a total of 96 history buckets. Changes
to the enable/disable state or bucket duration flush the history.
• Level—Maintenance Domain Level for the service. The default is 3.
• Name—Name for the service. By default, the name matches the virtual switch or VLAN
associated with the service.This identifier will be used as the Short MA Name of its
associated MA. The link partner associated with the same service on the far end must
be configured with the same identifier for CFM to function correctly.
• Next MEPID—CFM has a configurable nextMepid value, with the range 1-8191, which is
used to determine default MEPIDs. When a MEP is created without a specified MEPID,
the current value of nextMepid will be used as the MEPID of the new MEP, and then
incremented by one. If the resulting value of nextMepid is already used by an existing
MEP, nextMepid will be continually incremented until a unique value is found. The
purpose of nextMepid is to provide a mechanism for generating MEPIDs that are unique
in the MA across all devices in the Service network. Be sure to assign each device a
nextMepid value that will guarantee MEPID uniqueness across all MEPs.
• Remote MEP aging time—Time period in milliseconds that a Remote MEP in the service
can stay in an RMEP fault state before it is deleted. For example, if it is set to 60000,
a Remote MEP will be deleted one minute after CCMs are no longer received from it.
The default value is 0, which disables remote MEP aging.
• Remote Mep Discovery - Enables or disables Remote MEP Discovery for the service.
When disabled, Remote MEPs must be explicitly configured and will not be discovered
through CCM reception.
• Reset Time—Time period for which there should be no fault identified before clearing
previous faults.
• Sender ID Type (sender-id-type) -Sender ID TLV type.
Example:
> cfm service set service CFM-SRV-VS-1 name VS-CFM-1
Example:
> cfm service delete service VS-CFM-1
Example:
> cfm service enable service VS-CFM-1
Example:
> cfm service disable service VS-CFM-1
The list of all CFM services indicates existence of a fault with an "X" for the following
service faults:
• XC (Cross-connect) - Indicates that a CCM was received with an incorrect MAID
(MEGID), or was for an MD Level different than the service MD Level.
• CC (Error CCM)- Indicates that a CCM was received with an incorrect ccm-interval, or
that the Remote MEP's MEPID equals the MEPID of a local MEP in the service.
• RM (RMEP Error) - Indicates that a CCM not been received from a Remote MEP within
3.5 * ccm-interval.
• PS (Port Status) - Indicates that one or more Remote MEPs reside in a ports that are
not forwarding.
• RDI (RDI) - Indicates that one or more Remote MEPs have detected service faults.
• IS (Instability) - Indicates that the service is yet to discover a stable Remote MEP.
Faults indicated here may not have been reported through a service fault event, as that
requires a fault to have a priority greater than the service alarm-priority and be present
for a period of time longer than the service alarm-time. A CFM service that is completely
healthy will not have any Service Fault indicators. Some service fault conditions may be
expected. For example, if a service has a Remote MEP in a port that is disabled, then the
PS fault will always be present.
Example:
> cfm service show
Example:
> cfm service show service VLAN#1001
+-------------------------------- CFM MEPs ----------------------------+
| | | | | |Admin|CCM |CCM|
|Service |Port |Mepid|Type| Mac Address |State|State|Pri|
+----------------+--------+-----+----+-----------------+-----+-----+---+
|VLAN#1001 |1 |1 |down|00:02:A1:24:0E:32|en |on |7 |
+----------------+--------+-----+----+-----------------+-----+-----+---+
Example:
> cfm service show service CFM_VLAN_777 remote-mep
Configuring MEPs
In order for CCM messages to be generated and processed, MEPs must be configured for
the CFM service.
Creating a MEP
Attributes for a MEP include:
• vlan - Customer VLAN ID specified for MEPs on ports that are members of a virtual
switch. The default is 0.
• type - The type determines whether CFM Messages processed by a MEP ingress and
egress through its associated logical interfaces (down), or are logically forwarded to
and from its logical interface from other logical interfaces in the service instance (up).
The default type is up.
• mepid - Numeric identifier unique for every MEP in the Maintenance Association. The
default MEPID is the next MEP ID available.
NOTE: A total of up to 256 MEPs are supported on the CN 3911 and CN 3920, and up to
530 MEPs are supported on the CN 3940, CN 3960, and CN 5140.
When you create a CFM service for virtual switches, an up MEP is automatically created
for each subscriber port. A separate MEP is created for each customer VLAN (C-VID) on
every subscriber port. You can also create MEPs manually. For example, you can create
a down MEP on a subscriber port for monitoring within the customer network or a down
MEP on a provider port to monitor the provider network. Note that once a VLAN
parameter is specified when creating a MEP on a subscriber port, it is not configurable
once the MEP is created.
To create a MEP:
cfm mep create service <CFMServiceName> port <PortName> [vlan <VlanId] [type <up|down>] [mepid
<NUMBER: 1-8191>]
Example:
> cfm mep create service CFM_VLAN_777 port 10 type down mepid 2
Example:
> cfm mep set service CFM_VLAN_777 port 10 mepid 201
Deleting a MEP
If needed, you can delete MEPs no longer in use for a CFM service.
To delete a MEP:
cfm mep delete service <CFMServiceName> {local-mepid <NUMBER: 1-8191> | port <PortName> [vlan
<Vlan>]}
Example:
> cfm mep delete service CFM_VLAN_777 port 10
Disabling a MEP
For troubleshooting, you can disable a MEP to prevent processing of CFM messages.
To disable a MEP:
cfm mep disable service <CFMServiceName> {local-mepid <NUMBER: 1-8191> | port <PortName> [vlan
<Vlan>]}
Example:
> cfm mep disable service CFM_VLAN_777 port 10
Enabling a MEP
Newly created MEPs are automatically enabled. If you disabled a MEP, you can enable it.
To enable a MEP:
cfm mep enable service <CFMServiceName> {local-mepid <NUMBER: 1-8191> | port <PortName> [vlan
<Vlan>]}
Example:
> cfm mep enable service CFM_VLAN_777 port 10
Displaying MEPs
You can display a summary of all CFM MEPS including the associated CFM services, logical
interfaces, MEP ID, type, MAC address, administrative state, CCM state, CCM priority, and
Loopback Message priority. Also, you can display additional detailed configuration and
statistics for specified MEPs, such as transmitted and received CCMs, loopback messages,
and linktrace messages.
Example:
> cfm mep show
Example:
> cfm mep show service vsl02 mepid 2002
+-------------------------------- CFM MEP INFO --------------------------------+
| Parameter | Value |
+-------------------------------------+----------------------------------------+
| Service | vs102 |
| Service Type | VLAN |
| VLAN Name | VLAN#102 |
| Service Network | 102 |
| Port | 1 |
| VLAN | 1002 |
| MEPID | 2002 |
| Mac Address | 00:02:A1:31:23:C2 |
| Type | Up |
| Admin State | enabled |
| CCM State | on |
| CCM Priority | 7 |
| Tag Mode | off |
| Tag VID | 0 |
| Tag Priority | 7 |
| Next Loopback Sequence Number | 1 |
| Next Linktrace Sequence Number | 1 |
| Rx Total Valid Frames | 0 |
| Rx Total Invalid Frames | 0 |
| Rx Invalid Message Overflow | 0 |
| Rx Invalid Port Status TLV | 0 |
| Rx Invalid Interface Status TLV | 0 |
| Rx Invalid Sender ID TLV | 0 |
| Tx CCM | 0 |
| Rx Valid CCM | 0 |
| Rx CCM In Sequence | 0 |
| Rx CCM Sequence Errors | 0 |
| Rx MD Level Xcon CCM | 0 |
| Rx MAID Xcon CCM | 0 |
| Rx MEPID Error CCM | 0 |
| Rx CCM-Interval Error CCM | 0 |
| Rx Invalid CCM | 0 |
| Tx Loopback Message | 0 |
| Tx Loopback Reply | 0 |
| Rx In-order Loopback Reply | 0 |
| Rx Out-of-order Loopback Reply | 0 |
| Rx Content Mismatch Loopback Reply | 0 |
| Rx Unexpected Loopback Reply | 0 |
| Rx Invalid Loopback Reply | 0 |
| Rx Valid Loopback Message | 0 |
| Rx Invalid Loopback Message | 0 |
| Tx Linktrace Message | 0 |
| Rx Valid Linktrace Message | 0 |
| Rx Total Invalid Linktrace Message | 0 |
| Rx Invalid Linktrace Relay Action | 0 |
| Tx Linktrace Reply | 0 |
| Delay Measurement Repeats | Disabled |
| Delay Measurement Delay (min) | 0 |
| Tx Delay Measurement Message | 0 |
| Rx Delay Measurement Message | 0 |
| Tx Delay Measurement Reply | 0 |
| Rx Delay Measurement Reply | 0 |
| Rx Delay Measurement Reply Timeout | 0 |
| Frame Loss Measurement Repeats | Disabled |
| Frame Loss Measurement Delay (min) | 0 |
| Tx Frame Loss Measurement Message | 0 |
| Rx Frame Loss Measurement Message | 0 |
| Tx Frame Loss Measurement Reply | 0 |
| Rx Frame Loss Measurement Reply | 0 |
| Rx Frame Loss Measure Reply Timeout | 0 |
+-------------------------- Last Loopback Message -----------------------------+
| Target Remote MEPID | 0 |
| Target Mac Address | 00:00:00:00:00:00 |
| Priority: | 7 |
| Count: | 0 |
| First Sequence Number | 0 |
| LBMs Sent | 1 |
| LBMs To Send | 0 |
| Rx In-order Loopback Reply | 0 |
| Rx Out-of-order Loopback Reply | 0 |
| Rx Content Mismatch | 0 |
+--------------------- Last Delay Measurement Message -------------------------+
| Target Remote MEPID | 0 |
| Target Mac Address | 00:00:00:00:00:00 |
| Priority | 0 |
| Frame Count Tx | 0 |
| Frame Count Rx | 0 |
| Delay in us | 0 |
| Jitter in us | 0 |
+------------------- Last Frame Loss Measurement Message ----------------------+
| Target Remote MEPID | 0 |
| Target Mac Address | 00:00:00:00:00:00 |
| Priority | 0 |
| Frame Count Tx | 0 |
| Frame Count Rx | 0 |
| Frame Loss Near | 0 |
| Frame Loss Far | 0 |
+-------------------------- Last Linktrace Message ----------------------------+
| Target Remote MEPID | 0 |
| Target Mac Address | 00:00:00:00:00:00 |
| Priority | 7 |
| Sequence Number | 0 |
| Initial TTL | 0 |
| Use FDB Only | No |
|---------------------------- Linktrace Responses -----------------------------|
| |Ttl| |Remote MEP |Relay| Ingress | Egress |Flags|
|Ttl|Idx|Trans Id |Mac Address |Actn |Port |Actn |Port |Actn |FY|TM|
+---+---+----------+-----------------+-----+--------+-----+--------+-----+--+--|
NOTE: A total of up to 4609 Remote MEPs are supported on the CN 3911 and CN 3920, and
up to 8192 Remote MEPs are supported on the CN 3940, CN 3960, and CN 5140.
associated with a Remote MEP can be configured to a fixed value, an the MAC address is
uninitialized until it is either explicitly configured or a CCM containing the MEPID
associated with that Remote MEP is processed.
Example:
> cfm remote-mep create service VLAN#1001 mepid 100 hold-state lock
Example:
> cfm remote-mep set service CFM-1 hold-state disabled
Example:
> cfm remote-mep delete service CFM-1 mepid 100
Example:
> cfm remote-mep disable service VS-CFM-1 mepid 2
Example:
> cfm remote-mep enable service VS-CFM-1 mepid 2
Example:
> cfm service set service vl100l5 remote-mep-discovery disable
• F - Remote MEP Fault. A CCM has not been received from the Remote MEP within
ccm-interval*3.5.
• P - Port Status. The last CCM received from the Remote MEP indicated a Port Status
fault.
• R - RDI - The last CCM received from the Remote MEP indicated an RDI fault.
In a healthy service, Remote MEPs will typically not have any fault indicators. A non-zero
value for "Seq Error" indicates that one or more CCMs from the Remote MEP were lost in
transit. CCMs that are delayed for a period of time > ccm-interval*3.5 are not reflected
in the "Seq Error" field, although such a condition may trigger and RMEP Fault (F).
Also, you can display details for a specific remote MEP.
Example:
> cfm remote-mep show
+------------------------------ CFM REMOTE MEPS -------------------------------+
| | | |State|Total |Seq |Last |Fault|
|Service |Mepid|Mac Address |Ad|Op|Rx CCM |Error|Seq Num |F|M|R|
+----------------+-----+-----------------+--+--+---------+-----+---------+-+-+-+
|VS-CFM-1 |2 |00:00:00:00:00:00|en|hd|0 |0 |0 |X| | |
+----------------+-----+-----------------+--+--+---------+-----+---------+-+-+-+
Example:
> cfm remote-mep show service vl100l5 mepid 3
Configuring MIPs
A MIP is able to forward and respond to Linktrace messages, and it provides an
intermediate target for Loopback messages, making fault isolation possible. Note that
you can disable the MIP CCM Database. When the database is disabled, MIPs will not
process CCMs to create new entries and any entries currently in the database are
removed. In addition, the global mip-level-enforcement setting can be turned off to
ignore the level configured on the MIP.
Creating MIPs
When you have intermediate devices (between the devices containing service MEPs) in a
VLAN service, you need to create a MIP. Similar to MEPs, MIPs can be created on individual
C-VIDs of a VS subscriber port.
To create MIPs:
cfm mip create {vlan <VlanId>} {port <PortName>} [level <NUMBER: 0-7>]
Example:
> cfm mip create vlan 1001 port 1
Example:
> cfm mip set vlan 1001 port 1 level 0
Deleting MIPs
To delete a MIP:
cfm mip delete {vlan <VlanId>} {port <PortName>}
Example:
> cfm mip delete vlan 1001 port 1
Example:
> cfm mip database disable
Example:
> cfm mip show
Example:
> cfm mip-ccm-db show
+------------------------------ MIP CCM Database ------------------------------+
| | | |Total | Last CCM Information |
|VLAN| MAC Address |Port |CCM Rx |Seq Num |Time |Lv|Mepid| PS |RDI|
+----+-----------------+--------+---------+---------+--------+--+-----+----+---|
|777 |00:02:A1:30:A1:78|9 |101 |2784 |0 |3 |200 |Up | X |
+----+-----------------+--------+---------+---------+--------+--+-----+----+---|
Step 5 Create a down MEP for the network facing port. cfm mep create
Example:
1. > vlan create vlan 10
2. > vlan add vlan 10 port 1
3. > cfm service create vlan 10 name CFM_VLAN_10 level 5
4. > cfm md set level 5 name Customer
5. > cfm mep create service CFM_VLAN_10 port 1 type down mepid 1
6. > cfm enable
7. > cfm service enable service CFM_VLAN_10
Step 5 Create a down MEP for the network facing port. cfm mep create
Example:
1. > vlan create vlan 10
2. > vlan add vlan 10 port 10
3. > cfm service create vlan 10 name CFM_VLAN_10 level 5
4. > cfm md set level 5 name Customer
5. > cfm mep create service CFM_VLAN_10 port 10 type down mepid 2
6. > cfm enable
7. > cfm service enable service CFM_VLAN_10
Example:
1. > cfm service create vs VS-1 name CFM_VS_1
2. > cfm enable
3. > cfm service enable service CFM_VS_1
Troubleshooting
Normally, the Tx LBM value is equal to the LBR in Order value to indicate that an LBR was
received for each LBM, and that all LBRs were received in the expected order. If LBR Out
of Order is greater than 0, then some LBRs were not received in the same order as their
associated LBMs were transmitted. If Tx LBM is greater than the LBR In Order value plus
the LBR Out of Order value, then an LBR was not received for every LBM transmitted.
NOTE: Linktrace requests may also be sent to any arbitrary MAC address, not necessarily
a MEP/MIP. This feature can be used to trace paths, even those outside of a given
Maintenance Association.
You can display the linktrace replies, including the following information:
• Ttl -Time to Live. An LTR is received from each CFM aware node that handles and
propagates the LTM. Each node decrements the LTM Ttl by one and encodes the
resulting value in the LTR. Normally, the Ttl values in the LTR list start at the initial
LTM Ttl - 1, and decrease by one for each row in the table. Non-sequential Ttl values
indicate that not all LTRs send by intermediate nodes were received, or that the LTM
Ttl was incorrectly decremented at some point.
• Ttl Idx - Time to Live Index. A locally assigned value used to differentiate multiple
LTRs received with the same Ttl value. Normally, one LTR is received for each Ttl, and
its Ttl index is 1. Multiple LTR entries for the same Ttl indicate an error condition, as
it is the result of the LTM being handled on multiple forwarding paths through the
network to the target DA.
• Relay Action - Indicates how the LTM was handled by the MEP or MIP as follows:
• Hit - The LTM reached the target MEP or MIP.
• FDB - The egress port for forwarding to the LTM target MAC was resolved using the
MAC learn table.
• MFDB - The egress port for forwarding to the LTM target MAC was resolved using
the MEP or MIP CCM Database.
• -nodef- - Undefined. This value should never be present in an LTR Relay Action.
• Ingress Port - Name of the port on which the LTM was received. The name is either a
port number or aggregation name.
• Ingress Action - Reports how a data frame to the LTM target MAC would be handled at
the ingress port as follows:
• Ok - The frame would be accepted for forwarding
• Down - The ingress port is not operational.
• Blocked - The ingress port is blocked by topology enforcement.
• VID - The ingress port is not a member of the LTM's VID, and ingress filtering is
enabled.
• -nodef- - Undefined. This value should never be returned as an Ingress Action.
• Egress Port - Name of the port that is the target of the LTM, or the port that a data
frame to the LTM target MAC would be transmitted out when forwarded. The name is
either a port number or aggregation name.
• Egress Action - Reports how a frame to the LTM target MAC would be handled as it
passes through the egress port as follows:
• Ok - The frame would be forwarded.
• Down - The frame would be discarded because the egress port is not operational.
• Blocked - The frame would be discarded because the egress port is blocked by
topology enforcement.
• VID - The frame would be discarded because the egress port is not a member of the
LTM VID and egress filtering is enabled.
• -nodef- - Undefined. This indicates that the frame would not reach the egress port.
For example, in the case where the LTM is targeted at a MEP in the ingress port,
the output would look like this:
|---------------------------- Linktrace Responses -----------------------------|
| |Ttl| |Remote MEP |Relay| Ingress | Egress |Flags|
|Ttl|Idx|Trans Id |Mac Address |Actn |Port |Actn |Port |Actn |FY|TM|
+---+---+----------+-----------------+-----+--------+-----+--------+-----+--+--|
|63 |1 |1 |00:02:A1:31:23:C7|Hit |6 |Ok |5 |nodef| | |
+---+---+----------+-----------------+-----+--------+-----+--------+-----+--+--|
• Flags - Reports two flags in the linktrace responses:
• FY - FwdYes.
• TM - TerminalMEP.
A normal linktrace result is to receive one LTR for each intermediate MIP (if any) along
the forwarding path to the target MAC, and a LTR from the target MEP or MIP, or the
Remote MEP that handles an LTM targeted at an arbitrary DA. Failure to receive any LTRs
indicates one or more of the following conditions:
• The LTM was not handled by any MEP or MIP that could resolve how to forward to the
target MAC.
• The LTM did not traverse any MEPs or MIPs as it was multicast through the network.
• All LTRs were lost in transit.
• The LTR Ttl values should be consecutive. A Ttl value that is more than one less than
Ttl value of the LTR immediately above it in the output typically indicates that one or
more LTRs were lost in transit.
Example:
cfm delay send service CFM_VLAN_10 local-mepid 2 remote-mepid 1
Example:
> cfm delay send-mac ervice CFM_VLAN_10 local-mepid 2 mac 01:02:03:04:05:06
Example:
> cfm delay show
Example:
> cfm delay cancel service CFM_VLAN_10 local-mepid 2 remote-mepid 1
Example:
> cfm delay cancel-mac service CFM_VLAN_10 local-mepid 1 mac 01:02:03:04:05:06
To clear delay measurement statistics for all or a specific service local MEP ID:
cfm delay clear [service <CFMServiceName>] [local-mepid <NUMBER: 1-8191>]
Example:
> cfm delay clear
Example:
cfm frame-loss send service CFM_VLAN_10 local-mepid 2 remote-mepid 1
Example:
> cfm frame-loss send-mac service CFM-VLAN_10 local-mepid 2 mac 01:02:03:04:05:06 repeat 1
count 250 delay-threshold 2000 jitter-threshold 4000
Example:
> cfm frame-loss show
Example:
> cfm frame-loss cancel service CFM_VLAN_10 local-mepid 2remote-mepid 1
Example:
> cfm frame-loss send-mac service CFM_VLAN_10 local-mepid 2 mac 01:02:03:04:05:06
Example:
> cfm show statistics
+------------------------------------------+------------------+
| Loopback: |
| Tx Total LBM | 0 |
| Tx Total LBR | 0 |
| Rx Total LBM | 0 |
| Rx Total LBR | 0 |
| Rx LBM Invalid First TLV Offset | 0 |
| Rx LBR Invalid First TLV Offset | 0 |
| Rx Unresolved LBM | 0 |
| Rx Unresolved LBR | 0 |
+------------------------------------------+------------------+
| LinkTrace: |
| Tx Total LTM | 0 |
| Tx Total LTR | 0 |
| Rx Total LTM | 0 |
| Rx Total LTR | 0 |
| Rx LTM Invalid First TLV Offset | 0 |
| Rx LTR Invalid First TLV Offset | 0 |
| Rx LTR Invalid Relay Action | 0 |
| Rx Unresolved LTM | 0 |
| Rx Unresolved LTR | 0 |
+------------------------------------------+------------------+
Example:
> cfm service show service vl100 statistics
+----------------------+----------------------------------+
| Loss Stats | |
| Total Tx LMM | 0 |
| Total Tx LMR | 0 |
| Total Rx LMM | 0 |
| Total Rx LMR | 0 |
+----------------------+----------------------------------+
Example:
> cfm clear statistics
Example:
> cfm service clear statistics
Example:
> cfm service clear service v1100 statistics
Example:
> cfm mep clear statistics
Example:
> cfm mep clear serivce v1100 port 5 statistics
Example:
> cfm remote-mep clear statistics
Example:
> cfm remote-mep clear serivce v1100 mep-id 600 statistics
To clear delay measurement statistics for all or a specific service local MEP ID:
cfm delay clear [service <CFMServiceName>] [local-mepid <NUMBER: 1-8191>]
Example:
> cfm delay clear
To clear loss measurement statistics for all or a specific service local MEP ID:
cfm frame-loss clear [service <CFMServiceName>] [local-mepid <NUMBER: 1-8191>]
Example:
> cfm frame-loss clear
Example:
> cfm stack show
At a Glance:
• Overview • Configuration
• Benefits • Troubleshooting
This chapter explains how to configure the treatment of Layer 2 (L2) control frames with
L2 control frame tunneling.
NOTE: To configure L2 control frame tunneling, you need to install the Advanced Ethernet
license key. To obtain the Advanced Ethernet license key, contact Ciena Sales.
Overview
A device identifies the associated protocol of L2 control frame based upon the Media
Access Control Destination Address (MAC DA) and other information within the frame.
Depending upon the state of processing, L2 control frames can be in three forms:
• Untagged - standards based definition of the protocol’s control frame. In this form,
the frame does not have a VLAN tag, but does have the protocol specific MAC DA.
Depending upon the protocol, it may have a specific EtherType value and other
information. Typically, control frames in this format are received from the subscriber
facing interface.
• Transparent (tagged)- one or more 802.1 VLAN tags have been added to transform the
frame, and the protocol specific MAC DA is left intact. This form occurs when a control
frame is received from a subscriber facing interface, encapsulated as a data frame,
and then forwarded from a network facing interface for transport through the provider
network.
• L2 Protocol Tunneling (L2PT) - standard MAC DA has been transformed to the L2PT
special MAC DA.
In conformance with IEEE standards, the default configuration does not propagate
untagged L2 control frames through the network. If the default disposition is “discard”,
the frames are dropped without further processing. If the disposition is “peer”, the
frames are forwarded to the software process that handles the specific protocol. Table
18-1, in this chapter shows the frame format for the three forms for each protocol along
with the default disposition for each.
Benefits
With L2 Control Frames Tunneling, you can change the handling of untagged L2 control
frames to be processed and forwarded as if they were data frames instead of being
discarded or locally processed. Also, you can change the handling of transparent L2
control frames to be transformed to L2PT frame format.
Configuration
L2 control frame tunneling directs untagged L2 control frames into a forwarding domain
of a virtual switch. Every virtual switch is associated with an L2 control frame tunneling
configuration container. The container storing the configuration information is called an
L2 control frame tunneling instance, which includes:
• Administrative Status - whether or not L2 control frame tunneling is enabled or
disabled for the virtual switch.
• Fixed .1D priority- sets the .1D priority value applied to untagged L2 control frames
to provide the baseline for Class of Service (CoS) treatment of the frame as it switches
through the device. The priority value ranges from 0-7, where 7 has the highest priority
and 0 has the lowest priority.
• Protocol Disposition List - sets a user-defined list of protocols to be processed by L2
control frame tunneling along with a disposition action of forward or discard.
To set the Fixed .1D Priority value for frames forwarded by an L2 control frame
tunneling instance:
virtual-switch l2-cft set vs <VirtualSwitchName> priority <NUMBER: 0-7>
Transparent Mode
When the tunnel method is in transparent mode, the switching chip hardware handles
dispositions without sending frames to the CPU for processing, and is referred to as "fast
path" operation. With "fast path" operation, untagged L2 control frame dispositions are
maintained when the control frame ingresses a customer-facing interface with the
untagged-ctrl-vs specified. Protocol dispositions are not maintained when the equivalent
tagged L2 control frame ingresses a network-facing interface(s). In transparent mode, the
L2 control frame is encapsulated accordingly, and the IEEE or Cisco MAC DA is left intact.
L2PT Mode
When the virtual switch is configured for L2PT mode, L2 control frames are classified and
either dropped or forwarded, according to each protocol's disposition and the untagged-
ctrl-vs designation at each customer-facing interface. In L2PT mode the L2 control frame
is fully decoded based on the proper IEEE or Cisco MAC DA and any relevant Op-Codes in
the frame. If there is a specific protocol match on a protocol that supports L2PT
stamping, the frame is eligible for conversion to and from L2PT and proper IEEE or Cisco
MAC DA. Certain protocols do not support L2PT transformation, since their classification
data does not contain enough information to uniquely identify the protocol once the
protocol-specific MAC DA has been replaced. Such protocols do not have an L2PT form.
In general, when the virtual switch is in L2PT mode, the switching chip hardware sends
L2 control frames to the CPU for "slow-path" processing. The frame agent will egress that
frame out the customer-facing interfaces as a "proper" IEEE or Cisco L2 control frame, and
egress the frame out network-facing interfaces as the same L2PT frame.
L2 control frames that ingress a network-facing interface are processed as follows:
• If the L2 control frame is in the L2PT-equivalent form and is fully decodable, it is
converted back to the proper IEEE or Cisco MAC DA.
• Egressing Customer-Facing Interface(s): The proper IEEE or Cisco MAC DA form of
the frame will egress out all customer-facing interfaces of the virtual switch.
• Egressing Network-Facing Interface(s): The L2PT form of the frame will egress out
all network-facing interfaces, except for the interface on which the frame
ingressed.
• If the L2 control frame has an L2PT MAC DA, but is not decodable, that frame will be
switched out all customer-facing and network-facing interfaces with no conversion of
MAC DA.
• If the L2 control frame is already in the proper IEEE or Cisco MAC DA form, that frame
will be switched out all customer-facing and network-facing interfaces with no
conversion of MAC DA to L2PT. This means that if an IEEE L2 control frame enters a
network-facing interface, that same frame will egress interfaces regardless of the
L2PT mode enabled on the virtual switch.
The configuration example in this section shows how you can configure virtual switches
and ports to classify untagged L2 control frames and then transform them into the L2PT
form. The ingress port classification allows untagged L2 control frames and frames with
VLAN tag 100. The L2 control frame tunneling instance is enabled for the virtual switch.
Also, RSTP and LACP are added to the protocol disposition list with the disposition of
forwarding.
Step 2 Add the ingress and egress ports to VLAN 100. vlan add vlan <VlanId>
port <PortName>
Step 4 Confirm the ports are members of VLAN 100. vlan show vlan <VlanId>
Step 5 Create a virtual circuit and assign it to VLAN 100. virtual-circuit ethernet
create vc
<VirtualCircuitName> vlan
<VlanId>
Step 6 Confirm the creation of the virtual circuit (Optional). virtual-circuit show
Step 7 Confirm the VLAN 100 is associated with the virtual virtual-circuit show vc
circuit (Optional). <VirtualCircuitName>
Step 10 Add the ingress port to the virtual switch. virtual-switch ethernet
add vs <VirtualSwitchName>
port <PortName>
Step 11 Enable L2 control frame tunneling for the virtual switch. virtual-switch l2-cft
enable vs
<VirtualSwitchName>
Step 12 Add the control protocols to the protocol disposition list virtual-switch l2-cft
with the desired disposition for the L2 control frame protocol add vs
<VirtualSwitchName>
tunneling instance.
Step 13 Add the L2 control frame classification to the port for port set port <portName>
ingress traffic. untagged-ctrl-vs
<VirtualSwitchName>
Step 14 Confirm the L2 control frame tunnel configuration of the virtual-switch l2-cft show
virtual switch (Optional). vs <VirtualSwitchName>
Example:
1. > vlan create vlan 100
2. > vlan add vlan 100 port 1
3. > vlan show
4. > vlan show vlan 100
5. > virtual-circuit ethernet create vc cft-vc vlan 100
Troubleshooting
Example:
> virtual-switch l2-cft show
+------------------------- L2 Ctrl Protocol Tunneling -----------------------+
| Virtual Switch | Admin State | Tunnel Method | Priority |
+------------------+-------------+--------------------------------+----------+
| cft_0 | Disabled | l2pt | 6 |
| cft_1 | Disabled | l2pt | 6 |
| cft_2 | Disabled | l2pt | 6 |
| cft_3 | Disabled | l2pt | 6 |
| cft_4 | Disabled | l2pt | 6 |
| cft_5 | Disabled | l2pt | 6 |
| cft_6 | Disabled | l2pt | 6 |
| cft_7 | Disabled | l2pt | 6 |
| cft_8 | Disabled | l2pt | 6 |
| cft-vs | Disabled | l2pt | 6 |
+------------------+-------------+--------------------------------+----------+
Example:
> virtual-switch l2-cft show vs cft-vs
Example:
> port show port 9
Example:
> configuration show
...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! VIRTUAL-CIRCUIT CONFIG: virtual circuits
!
virtual-circuit ethernet create vc cft-vc0 vlan 100
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! VIRTUAL-SWITCH CONFIG:
!
virtual-switch add reserved-vlan 1000
!
virtual-switch ethernet create vs cft-vs vc cft-vc0
!
virtual-switch ethernet add vs cft-vs port 9
!
port set port 9 untagged-ctrl-vs cft-vs
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! L2 CFT CONFIG:
!
virtual-switch l2-cft enable vs cft-vs
!
virtual-switch l2-cft protocol add vs cft-vs ctrl-protocol rstp disposition forward
virtual-switch l2-cft protocol add vs cft-vs ctrl-protocol lacp disposition forward
!
!
...
At a Glance:
• Overview
• Benefits
• Configuring TWAMP
• Troubleshooting
NOTE: To configure TWAMP functionality, you need to install the Advanced OAM license
key. To obtain the Advanced OAM license key, contact Ciena Sales.
Overview
As defined in RFC4656, One-Way Active Measurement Protocol (OWAMP) measures uni-
directional IP performance between two devices. Based upon OWAMP, TWAMP provides bi-
directional measurements of IP performance between two devices through an exchange
of test messages. The system software supports the following TWAMP modes:
• TWAMP Light Responder
• TWAMP Complete Server
• TWAMP Client
NOTE: For additional information regarding NTP, see the Configuring NTP section in
Chapter 3, on page 27.
Protocols
In compliance with the Internet Engineering Task Force (IETF) draft document, draft-ietf-
ippm-twamp-06.txt, TWAMP Light Responder and Complete TWAMP use the TWAMP-Test
protocol to exchange TWAMP test packets between the devices. Complete TWAMP uses a
second protocol, TWAMP-Control to initiate, start, and stop a TWAMP test session.
Operational Roles
In a TWAMP-Test session, devices operate in the following roles:
• Session-Sender - Endpoint device that sends TWAMP measurement packets.
• Session-Reflector - Endpoint device that receives TWAMP measurement packets with
the ability to create and send TWAMP measurement packets in response.
• Server - Endpoint device that manages one or more TWAMP-Test sessions, including the
state of the session endpoint devices.
• Control-Client - Endpoint device that initiates requests, triggers the start and stop of
a test session.
While the TWAMP-Test session runs, the Session-Sender sends TWAMP-Test packets to the
device. When incoming frames contain a UDP packet and the UDP destination port
matches the device’s configured active TWAMP port, the Session-Reflector processes the
packets and returns response packets to the Session-Sender. After the exchange of test
packets is complete, the Control-Client ends the session.
During a TWAMP session, the Server component recognizes an incoming TCP-based test
session request, and configures itself for this test session. Operating in this mode, only
one test session is supported at a time and test responses are returned only to the control
device that established the session. Any other incoming UDP test messages are dropped.
Formal requests to establish a test session while one exists will be refused.
TWAMP Client
With TWAMP Client mode, devices operate as a Control-Client and a Session-Sender
enabling the device to establish test sessions and generate test initiation messages.
Devices may be used as test originators and manage multiple test sessions with multiple
remote devices. Figure 19-4 illustrates the relationship between the TWAMP protocols
and the operational roles where one device is operating in TWAMP Client mode and the
other in TWAMP Complete mode.
TWAMP-Test Packets
TWAMP supports variable sizes of TWAMP-Test packets, and can process at a minimum of
1200 packets per minute. Currently, the Session-Sender packet follows the format shown
in Figure 19-5.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
Sequence Number
Timestamp
Error Estimate
Packet Padding
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
Sequence Number
Timestamp
Packet Padding
Benefits
TWAMP provides a way for network administrators to quickly measure latency and jitter
between two devices with real-time processing.
Configuring TWAMP
TWAMP configuration includes the following:
• Enabling and disabling the TWAMP state globally and per port.
• Configuring the global TWAMP attributes.
• Enabling and disabling the TWAMP Light Responder.
• Enabling and disabling TWAMP Complete Server.
• Configuring TWAMP Client.
To enable globally:
twamp enable
Example:
> twamp enable
Example:
> twamp enable port 15
To disable globally:
twamp disable
Example:
> twamp disable
Example:
> twamp disable port 15
Example:
> twamp set port 5678
Example:
> twamp unset port timeout
To disable globally:
twamp light disable
Example:
> twamp light disable
To enable globally:
twamp light enable
Example:
> twamp light enable
To disable globally:
twamp server disable
Example:
> twamp server disable
To enable globally:
twamp server enable
Example:
> twamp server enable
NOTE: TWAMP Client cannot be disabled with existing TWAMP sessions, as each session
has memory allocated to it for statistics gathering. Before the disable command will be
accepted, delete all sessions. To stop a test, run the twamp client test stop
command.
To disable globally:
twamp client disable
Example:
> twamp client disable
To enable globally:
twamp client enable
Example:
> twamp client enable
Poisson Distribution Average 3.3s, Fixed - 238 bytes 4 shared among test sessions and 15
300ms to 12s denoted by IP precedence (0-7)or
DSCP (0-63) values.
Example:
> twamp client session create name myTest host 192.168.12.34 cos-policy ip-prec ip-prec 7
repeat off type fixed
Example:
+------------------------------------------------------------------------------+
| TWAMP Client Sessions |
+-----------------+-----------------+-----+----+---+----+---+----+---+----+----+
| Name | IP Addr |State|Port|CoS|DSCP|IPP|Size|RPT|Type|Seq#|
+-----------------+-----------------+-----+----+---+----+---+----+---+----+----+
| myTest | 192.168.12.34 | Idle| 861| I | 0 | 7 | 142| N | Fix| 0|
+-----------------+-----------------+-----+----+---+----+---+----+---+----+----+
Example:
> twamp client session set name myTest type poisson
Example:
> twamp client delete name myTest
Example:
> twamp client show statistics name myTest
+-----------------+---------+-----------+----+----+----+----+---------------+
| Name | RT 95th | RT 99.9th | Tx | Rx | RL | OL |Completion Time|
+-----------------+---------+-----------+----+----+----+----+---------------+
| myTest | 0.312 | 0.410 | 272| 272| 0| 0| 08/ 5/08 21:29|
+-----------------+---------+-----------+----+----+----+----+---------------+
Example:
> twamp client clear statistics name myTest
Example:
> twamp server show
+--------------------------------------------------------------+
| TWAMP Server Test Sessions |
+----+----------+----------+-----------------+------+----------+
| ID | State | Src Port | Host IP | Pkts | SeqNum |
+----+----------+----------+-----------------+------+----------+
| 1 | Test | 49154 | 192.168.12.342 | 9000 | 0 |
| 2 | Listen | 0 | 0.0.0.0 | 0 | 0 |
| 3 | Listen | 0 | 0.0.0.0 | 0 | 0 |
| 4 | Listen | 0 | 0.0.0.0 | 0 | 0 |
+----+----------+----------+-----------------+------+----------+
To clear a session:
twamp server clear session <Session ID: 1-4>
Example:
> twamp server clear session 1
Sample Configuration
This configuration example shows the steps for configuring TWAMP components, including
the steps for configuring NTP.
To configure TWAMP:
Example:
1. > twamp set port 5678
2. > twamp enable
3. > twamp light enable
4. > twamp server enable
5. > twamp client enable
6. > twamp client session create name myTest host 192.168.12.34 cos-
policy ipprec ipprec 7 type fixed
7. > ntp-client add server 192.2.3.4
> ntp-client add server 192.6.7.8
> ntp-client add server 192.9.10.11
Troubleshooting
Example:
> twamp show
+--------- TWAMP State Info -------+
| Parameter | Value |
+-----------------------+------------+
| Device Admin State | Disabled |
| Client | Disabled |
| Server | Disabled |
| Light Reflector | Disabled |
| Client HW Assist | On |
| Server HW Assist | On |
+-----------------------+------------+
+------------------------------------+
| Per Port TWAMP State Info |
+--------+-----------+---------------+
| Port | Admin | Operational |
+--------+-----------+---------------+
| 1 | Enabled | Disabled |
| 2 | Enabled | Disabled |
| 3 | Enabled | Disabled |
| 4 | Enabled | Disabled |
| 5 | Enabled | Disabled |
| 6 | Enabled | Disabled |
| 7 | Enabled | Disabled |
| 8 | Enabled | Disabled |
| 9 | Enabled | Disabled |
| 10 | Enabled | Disabled |
| 11 | Enabled | Disabled |
| 12 | Enabled | Disabled |
+--------+-----------+---------------+
At a Glance:
• Overview
• Benefits
• Configuration
• Troubleshooting
This chapter explains the implementation of the Multiple Spanning Tree Protocol (MSTP).
Overview
Multiple Spanning Tree Protocol (MSTP - IEEE 802.1Q-2005) is a standards based version of
creating multiple spanning trees where each VLAN has its own Multiple Spanning Tree
Instance (MSTI). Each instance has an independent spanning tree topology to provide
multiple forwarding paths for data traffic, enable load balancing and reduce the number
of spanning tree instances required to support a large number of VLANs. MSTP was
developed to replace Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol
(RSTP).
Like STP, defined in IEEE 802.1D, MSTP provides a loop-free topology in bridged networks
and delivers efficient reconfiguration (convergence) of the loop-free topology in the
event that a link fails. MSTP inherits its rapid transition mechanism from RSTP, defined in
IEEE 802.1W, to achieve fast convergence times.
NOTE: This implementation does not yet support MSTI configuration. By default, all
VLANs are mapped to the CIST.
Bridges
The bridge with the best priority among all STP, RSTP, and MSTP enabled network bridges
is called the CIST Root. The boundary bridge between regions becomes the CIST Regional
Root. If there are multiple boundary bridges, the one with the best cost to the CIST Root
becomes the CIST Regional Root. If all the bridges within a network are in one MST region,
the CIST Root is also the CIST Regional Root.
BPDUs
Like its predecessors, STP and RSTP, MSTP-enabled devices send out bridge protocol data
units (BPDUs) to detect topology changes in the network. BPDUs are sent when a device
is powered up, when a topology change is detected, and at regular intervals (every few
seconds). Thus, if a device fails, its neighbors realize that they have not received BPDUs
and initiate a spanning tree recalculation. When a device receives these BPDUs, it does
not forward them, but uses them to create its own BPDUs.
MSTP BPDUs carry the following information:
• Protocol Identifier - STP, RSTP, or MSTP.
• Protocol Version Identifier - STP (0), RSTP (2), or MSTP (3).
• BPDU Type - Configuration or topology change MSTP/RSTP BPDU.
CIST Flags - Identifies the message as a topology change, proposal, port role, learning,
forwarding, agreement, or topology change acknowledgement.
• CIST Root Identifier- the bridge priority and base MAC address of the device that the
transmitting device considers to be the CIST Root.
• CIST External Root Path Cost - an additive cost of all the links between the
transmitting bridge and the CIST Root bridge. A root path cost of 0 indicates this BPDU
came from the same region as the CIST Root, each device then adds its link cost
towards root to 0 and uses that cost when generating the new BPDU.
• CIST Regional Root Identifier- the bridge priority and base MAC address of the device
that the transmitting device considers to be the CIST Regional Root.
• CIST Port Identifier - The port priority and base MAC address of the port transmitting
the BPDU.
• Forward Delay (forward-delay) - Forward delay is the time taken before a root or
designated port starts forwarding after being selected and determined not to satisfy
the rapid transition condition. The operational value is set to the value distributed by
the root bridge via BPDU and the configured value is not set until this bridge becomes
the elected root bridge. The default value is 15.
• Message Age - The current age of the BPDU.
• Max Age- The BPDU life span.
• Hello Time - The time between two consecutive periodic BPDUs.
• Forward Delay - The time taken before a root or designated port starts forwarding
after being selected and determined not to satisfy the rapid transition condition.
• Version 1 Length - Indicates whether or not Version 1 (IEEE Standard 802.1G)
information is present. For MSTP, the value is 0 to indicate that no Version 1
information is present.
• Version 3 Length - The number of bytes that are to follow in the packet.
• MST Configuration Identifier - The “finger print” of the MSTP configuration for the
bridge, including the following:
• Configuration Id Format Selector- The format of the MST Configuration Identifier,
which is 0, the value defined for MSTP in the 802.1Q-2005 standard.
• Configuration Name- Configurable character string that uniquely identifies the
region. The default value is the device’s MAC address.
Port Roles
Based on the MSTP calculation for load balancing, ports in the CIST are assigned port
roles. The port roles are similar to the port roles in STP and RSTP.
Alternate Port Discarding (Blocking) Secondary port (Root Port being primary) that provides
an alternate path to the root bridge of he CIST should the
root port fail.
Designated Port Forwarding Port that provides the best path to the root bridge of the
CIST for the link.
Backup Port Discarding (Blocking) Port that provides a backup path to a LAN segment if the
Designated Port of the CIST fails.
CIST Regional Root Port Forwarding For MSTI only, this port provides connectivity from the
Region to a CIST Root that lies outside the Region.
NOTE: This implementation does not support the learning state as defined by the IEEE.
When a port is behaving as defined by the IEEE learning state, it will be in the blocking
state in this implementation.
Boundary Port
A boundary port connects an MST region to:
• A different MST region
• A single STP box
• A single RSTP box
At the boundary port of the region, MSTP configuration changes so that the control of the
STP state is per port. For this reason, MSTP calculated roles do not apply to its boundary
ports. Instead, the boundary port state is forced to be the same as the IST port state.
Network Convergence
When a MSTP bridge initializes, it claims itself as both the CIST Root and CIST Regional
Root via BPDU. When superior CIST Root information is received, it relinquishes its claim
as the CIST Root. When superior IST information is received, it then relinquishes its claim
as the CIST Regional Root. Finally, the MST region is converged when all bridges agree on
the same CIST Regional Root and all port roles are synchronized.
MSTP limits the scope of topology change. If any MSTI topology change is detected by the
non-boundary ports, it only triggers a MAC flush to the MSTI within the region. A topology
change detected by the boundary port, however, will trigger MAC flushes more widely.
When the network is converged, each MST region independently allocates any frames to
any given VLAN in a stable network. The CIST Root, Designated, and CIST Regional Root
ports forward data frames, and Alternate, Backup and Disabled ports do not.
Backward Compatibility
As designed by IEEE, MSTP is fully backward compatible with RSTP and STP. MSTP operates
with switches that support STP, RSTP, and traditional 802.1q through the selection of a
designated MSTP bridge to function as the representative of that entire region to the CST.
This enables MSTP regions composed of many switches and bridges to appear as a single
switch to other Ethernet switches and bridges in a network. BPDUs for the STP instances
are exchanged only between switches within an MSTP region. Since this information is not
propagated outside the MSTP region, switch CPU cycles are reduced. Also, keeping this
information within the region prevents network flapping and frequent network
reconvergence caused by link and port outages.
The MSTP uses version 3 BPDU which attaches the CIST and MSTI information at the end
of legacy STP and RSTP BPDUs. The CST takes care of the connectivity for all MST regions
and all the RSTP and STP bridges in the network. The MST region appears as a virtual
bridge cluster to adjacent STP or RSTP bridges (as well as to other MST regions.)
When an MST enabled bridge port receives an STP BPDU (version 0 BPDU) or an RSTP BPDU
(version 2 BPDU), it knows that it is at the boundary of the region. Based on the version
of the BPDU received, an MST enabled bridge will send the corresponding version of BPDU
to communicate with its counterpart. However, when its neighbor bridge switches its
force-version to MSTP, it will not force this link to MSTP automatically. A per port protocol
migration check will force the port to MSTP for a short period of time.
NOTE: MSTP backward compatibility supports RSTP mode and STP mode. However, it does
not support Ciena proprietary RSTP port based domain functionality.
Benefits
The main benefits of MSTP are:
• Scalability on large networks. Both STP and RSTP 802.1W allow the total BPDU
traversing of maximum 24 bridges from the root bridge. RSTP 802.1D/D4 (2003) allows
the BPDU traversing of maximum 40 bridges. Within an MST region, MSTP limits BPDU
traversing of maximum of 30 bridges, with no limit on the number of regions.
In case of ring topology, the number of bridges a BPDU can traverse is limited to the
maximum number of bridges configured on the ring, taking the worst case of link
failure into consideration. In a meshed topology, however, the maximum number of
bridges can be included in the topology is much more than the limit.
• Limited Topology changes. MSTP limits the topology change events as within the region
as possible. This makes a lot of sense, especially for large networks.
• Redundant links and load balancing. MSTP supports the assignment of a number of
VLANs to a single spanning tree instance, and multiple instances are supported within
each spanning tree region. These multiple Spanning Tree instances enable L2 networks
to have redundant physical links because VLANs can be assigned to different Virtual
bridges (spanning tree instances); this also enables load balancing.
Configuration
Assume a network with two regions, each with three bridges, separated by an RSTP
bridge.
1 4096
2 8192
3 12288
4 16384
5 20480
6 24576
7 28672
8 32768
9 36864
10 40960
11 45056
12 49152
13 53248
14 57344
15 61440
Example:
Assume for the network segment shown in Figure 20-1 that Bridge A is the CIST Root
bridge.
1. For Bridge A, set the CIST bridge priority as follows:
> mstp set cist bridge-priority 1
1 16
2 32
3 48
4 64
5 80
6 96
7 112
8 128
9 144
10 160
11 176
12 192
13 208
14 224
15 240
• Internal Path Cost (int-path-cost) - Sets the CIST internal root path cost for the
specified port(s). Allowable path cost values are 1-200000000. This sets the CIST
Internal Root Path Cost field in BPDUs transmitted from the specified port(s). This
value will not be used in the BPDU if dynamic internal path cost is enabled for the CIST
on the specified port(s). The default is 20000.
• Dynamic Internal Path Cost (dynamic-int-path-cost) - Enables or disables dynamic
internal port path cost calculations for the CIST for the specified port(s). When
enabled, the CIST Internal Root Path Cost field of BPDUs from the specified port(s) will
use a value internally calculated based on link rate (and possibly other factors). When
disabled, the configured int-path-cost value for the CIST for the specified port(s) will
be used.
Example:
For the network segment shown in Figure 20-1:
1. Set the MST Identifier for Bridges A, B, and C as follows:
> mstp set mst-cfg-id-name "MST Region 1" mst-cfg-id-rev-level 1
2. Verify the MST Identifier.
> mstp show mst-cfg-id
+--- MSTP MST Configuration Id Info -----------------------------------+
| Parameter | Value |
+-----------------------------------+----------------------------------+
| Configuration Name | MST Region 1 |
| Revision Level | 1 |
| Configuration Digest | 6EDEDB2C31B7A50DCEBFB6FFE47D5766 |
+-----------------------------------+----------------------------------+
• Hello Time (hello-time) - Hello time is the time between two consecutive periodic
BPDUs.The operational value is set to the value distributed by the root bridge via BPDU
and the configured value is not set until this bridge becomes the elected root bridge.
The minimum value of '1' is not recommended because the periodic BPDU sending takes
up the 1 per second transmit hold count allowance. When rapid convergence takes
place, only one BPDU is allowed to send within a second for a port delaying the explicit
handshake and rapid topology change. The default value is '2'.
• Loopback Blocking (loopback-blocking) - Loopback port blocking prevents data loops
by detecting their own BPDUs being looped back to them on the same port. The default
value is 'off', which is shown as 'disabled' with the mstp show bridge command.
• Maximum Age (max-age) - Maximum age limits the BPDU life span to limit the size of
the spanning tree. The default value is '20'.
• Maximum Hops (max-hops) - Maximum hops limits the number of hops for BPDUs. The
default is '20'.
• Path Cost Default (path-cost-def) - Path cost default controls the type of internal and
external path costs for the bridge. MSTP supports default path costs defined in
IEEE802.1D-1998 and IEEE802.1t-2001. The default value is 'stp8021t2001'.
• Transmit Hold Count (tx-hold-count) - Transmit hold count limits the number of BPDUs
a bridge can send per second. The default value is '6'.
Configuring Ports
You can manually adjust individual port settings, such as:
• Dynamic External Path Cost (dynamic-ext-path-cost) - Turns on or off dynamic
calculation of the external path cost. When set to 'on', the external port path cost is
calculated dynamically based on the port speed. When set to 'off', the external port
path cost is the value configured in the 'ext-path-cost' parameter.
• Edge Port (edge-port) - Setting the specified port to be consider an edge port allows
for rapid port state transition to the forwarding state. For 10/100 ports, the default
value for edge-port is 'on'. For other ports, the default is 'off'. Always configure GIG
link edge ports explicitly as edge ports. Rapid transition will fail otherwise. Another
alternative is to disable MSTP on the GIG link edge ports, though this is not the
preferred method.
• Migration Check (migration-check) - Triggers a migration check by the MSTP Port
Protocol Migration State Machine. This is a momentary configuration parameter,
setting it to 'on' will initiate the migration check and setting it to 'off' will have no
effect.
• External Path Cost (ext-path-cost) - Sets the external port path cost for the specified
port, which takes effect only if 'dynamic-ext-path-cost' is set to 'off'. The default value
is '20000'. Rather than configure the port path cost, it is recommended that you turn
on dynamic path cost to have MSTP select the best link(s) for forwarding.
• Point to Point MAC (point-point-mac) - Sets how to determine the link for the
specified port: auto (automatic mechanisms determine the link), force-true
(connected to a point-to-point link) or force-false (not connected to a point-to-point
link).
• Automatic Edge (auto-edge) - Sets MSTP to automatically identify the edge ports.
• Restricted Role (restricted-role) - When set to on, this attribute restricts the port
from becoming a root port, even if it has the best priority. The default is 'off'.
• Restricted Topology Change Notice (restricted-tcn) - When set to on, this attribute
restricts the port from forwarding topology change notices.
To configure ports:
mstp set port <PortNameList> [dynamic-ext-path-cost <on|off>][edge-port
<on|off>][migration-check][ext-path-cost <NUMBER: 1-200000000>][point-point-mac
<auto|force-false|force-true>][auto-edge <on|off>][restricted-role
<on|off>][restricted-tcn <on|off>]
Troubleshooting
To disable MSTP:
mstp disable
To enable MSTP:
mstp enable
Example:
> mstp show statistics
+--- MSTP Statistics -------------------------------+
| Port | Port Receive Statistics |
| Name | rxTcnBpdu| rxCfgBpdu| rxRstBpdu| rxMstBpdu|
+-------+----------+----------+----------+----------+
|1 | 0| 0| 0| 0|
|2 | 0| 0| 0| 0|
|3 | 0| 0| 0| 0|
|4 | 0| 0| 0| 0|
|5 | 0| 0| 0| 0|
|6 | 0| 0| 0| 0|
|7 | 0| 0| 0| 0|
|8 | 0| 0| 0| 0|
|9 | 0| 0| 0| 0|
|10 | 0| 0| 0| 0|
|11 | 0| 0| 0| 0|
|12 | 0| 0| 0| 0|
+-------+----------+----------+----------+----------+
| Port | Port Transmit Statistics |
| Name | txTcnBpdu| txCfgBpdu| txRstBpdu| txMstBpdu|
+-------+----------+----------+----------+----------+
|1 | 0| 0| 0| 120889|
|2 | 0| 0| 0| 0|
|3 | 0| 0| 0| 0|
|4 | 0| 0| 0| 0|
|5 | 0| 0| 0| 0|
|6 | 0| 0| 0| 0|
|7 | 0| 0| 0| 0|
|8 | 0| 0| 0| 0|
|9 | 0| 0| 0| 0|
|10 | 0| 0| 0| 0|
|11 | 0| 0| 0| 0|
|12 | 0| 0| 0| 120891|
+-------+----------+----------+----------+----------+
Example:
> mstp show port 1 statistics
+--- MSTP Port 1 Statistics ---------------------------------------------------+
| Statistic | Value |
+-----------------------------------+------------------------------------------+
| Received TCN BPDUs | 0 |
| Received CFG BPDUs | 0 |
| Received RST BPDUs | 3 |
| Received MST BPDUs | 3 |
| | |
| Transmitted TCN BPDUs | 0 |
| Transmitted CFG BPDUs | 0 |
| Transmitted RST BPDUs | 0 |
| Transmitted MST BPDUs | 36627 |
+-----------------------------------+------------------------------------------+
Example:
> mstp show port 1 state-machine
+--- MSTP Port 1 Info ---------------------------------------------------------+
| Parameter | Value |
+-----------------------------------+------------------------------------------+
| Name | 1 |
| Port Status | up |
| Port Uptime | 0000D19:52:40 |
| | |
| MSTP Enable | enabled |
| External Path Cost | |
| Admin Value | 20000 |
| Oper Value | 200000 |
| Dynamic Ext Path Cost | on |
| Edge Port | |
| Auto Edge | true |
| Admin Value | true |
| Oper Value | false |
| Point-to-Point MAC | |
| Admin Value | auto |
| Oper Value | true |
| Restricted Role | false |
| Restricted Tcn | false |
| | |
| Port State Machine Info | |
| Port State Machine Variables | |
| txCount | 1 |
| operEdge | false |
| portEnabled | true |
| infoInternal | false |
| newInfo | false |
| newInfoMsti | false |
| rcvdInternal | false |
| rcvdBpdu | false |
| rcvdRSTP | false |
| rcvdSTP | false |
| rcvdTcAck | false |
| rcvdTcn | false |
| sendRSTP | true |
| tcAck | false |
| mcheck | false |
| autoEdge | true |
| Port State Machine Timers | |
| mdelayWhile | 0 |
| helloWhen | 2 |
| edgeDelayWhile | 0 |
| Port State Machine States | |
| Port Protocol Migration State | SENSING |
| Port Receive State | RECEIVE |
| Port Transmit State | IDLE |
| Bridge Detection State | NOT_EDGE |
+-----------------------------------+------------------------------------------+
+--- MSTP Port 1 CIST Info ---------+------------------------------------------+
| MSTP State | forwarding |
| Role | designated |
| Port Priority | 8 |
| Internal Path Cost | |
| Admin Value | 20000 |
| Oper Value | 200000 |
| Dynamic Int Path Cost | on |
| | |
| CIST Designated Times | |
| Message Age | 0 |
| Max Age | 20 |
| Forward Delay | 15 |
| Remaining Hops | 20 |
| | |
| CIST Designated Priority Vector | |
| Root Port Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| External Path Cost | 0 |
| Regional Root Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| Internal Path Cost | 0 |
| Designated Bridge Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| Designated Root Id | (0x8001) |
| Priority | 8 |
| Port | 1 |
| | |
| CIST Message Times | |
| Message Age | 1 |
| Max Age | 20 |
| Forward Delay | 15 |
| Hello Time | 2 |
| Remaining Hops | 20 |
| | |
| CIST Message Priority Vector | |
| Root Port Id | |
| Priority | 15 (0xFFFF) |
| Mac Address | FF-FF-FF-FF-FF-FF |
| External Path Cost | 4294967295 |
| Regional Root Id | |
| Priority | 15 (0xFFFF) |
| Mac Address | FF-FF-FF-FF-FF-FF |
| Internal Path Cost | 4294967295 |
| Designated Bridge Id | |
| Priority | 15 (0xFFFF) |
| Mac Address | FF-FF-FF-FF-FF-FF |
| Designated Root Id | (0xFFFF) |
| Priority | 15 |
| Port | 4095 |
| | |
| CIST Port Times | |
| Message Age | 0 |
| Max Age | 20 |
| Forward Delay | 15 |
| Hello Time | 2 |
| Remaining Hops | 20 |
| | |
| CIST Port Priority Vector | |
| Root Port Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| External Path Cost | 0 |
| Regional Root Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| Internal Path Cost | 0 |
| Designated Bridge Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| Designated Root Id | (0x8001) |
| Priority | 8 |
| Port | 1 |
| | |
| CIST Root Path Priority Vector | |
| Root Port Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| External Path Cost | 0 |
| Regional Root Id | |
| Priority | 1 (0x1000) |
| Mac Address | 00-02-A1-30-7C-40 |
| Internal Path Cost | 0 |
| Designated Bridge Id | |
| Priority | 1 (0x1000) |
At a Glance:
• Overview • RAM Log
• Principles of Operation • Command Log
• Syslog • Troubleshooting
• Flash Log
This chapter provides explanations for how events generate messages to different types
of logs on a Ciena device and describes the various options available to view and/or
configure these event logging messages.
Overview
The system software supports the following types of logs SAOS:
• Syslog: Messages sent to collectors which are added (configured) via the SAOS CLI.
• Flash log: Text messages written to flash files.
• RAM log: Text messages written to RAM files.
• Command log: Entries of commands issued from the CLI.
Messages are written to the logs with timestamps based upon the system time settings,
of local or UTC. A variety of log filters can be created to specify which events need to be
logged and where they should be logged to.
Principles of Operation
In SAOS, every event can be logged to the logs listed above. An event manager converts
events to messages and traps.
Events are generated by any component of the software that is programmed to generate
logging information.
To display a list of system events, run any of the following CLI commands:
• > syslog show system-events
• > log flash show system-events
NOTE: The log flash show system-events, log ram show system
events, and the syslog show system-events commands list system events that
apply to multiple platforms, including events that are not supported by devices running
this system software.
Example:
> syslog show system-events
+ EVENTS ---------------------------------------------------------------------+
| Mgr: bcastContainment |
| Event Sev | Syslog Sev| Event # | Event |
+-----------+-----------+-----------------------------------------------------+
| warning | warning | 0x10001 | Broadcast containment filter %d(%s) is dro|
| warning | warning | 0x10002 | Broadcast containment filter %d(%s) has st|
+-----------------------------------------------------------------------------+
| Mgr: blade |
| Event Sev | Syslog Sev| Event # | Event |
+-----------+-----------+-----------------------------------------------------+
| info | info | 0x20001 | Blade Operational State changed |
| major | alert | 0x20003 | Line Blade Faulted |
| info | info | 0x20004 | Blade Admin State Changed on Slot %d |
| info | info | 0x20005 | Blade package version incorrect |
| minor | error | 0x20006 | POST Error code 0x%08x : %s |
| config | notice | 0x20007 | Blade manager config entry add slot: %d ca|
| config | notice | 0x20008 | Blade manager config entry remove slot: %d|
| config | notice | 0x20009 | Blade manager set slot: %d, admin state to|
| config | notice | 0x2000B | Blade manager set installed image slot: %d|
| config | notice | 0x2000C | Blade manager set installed slot: %d, pac|
+-----------------------------------------------------------------------------+
...
+-----------------------------------------------------------------------------+
To display the event severity to Syslog severity mapping, run any of the
following CLI commands:
• > syslog show severity-mapping
• > log flash show severity-mapping
• > log ram show severity-mapping
Example:
> syslog show severity-mapping
The “dying gasp” behavior is highly desirable. The capability to differentiate at the
Network Operations Center between a power failure and a device failure is important for
the operator.
If a system failure occurs, devices will do the following:
• Generate an event on any administrative reboot, either forced reboot or reset to
factory defaults and indicate the reason.
• Attempt to generate an event on any system crash or unexpected reboot. There will
be some conditions where transmitting a notification is not possible.
• Attempt to generate an event when a power failure occurs.
The “dying gasp” event will have critical severity. The event can be saved to the internal
flash. The event will also generate a syslog message that will be delivered based on the
users syslog configuration. In addition, the system will generate an associated SNMP trap
(wwpLeosChassisDyingGaspNotification).
On system start-up a Cold Start trap is generated that includes the reason for the previous
shutdown. An event is generated at start-up to indicate that the system has started up.
Syslog
Syslog messages can be sent to the Syslog Server or a standard UNIX or NT-type Syslog
daemon. Configuring Syslog enables configuration events, system error messages,
interface status, security alerts, and environmental conditions to be centrally logged and
analyzed.
The Syslog server, if operationally enabled will transmit Syslog messages to the specified
IP address(es) and port numbers. It will only transmit messages greater than or equal to
the minimum severity and less than or equal to the maximum severity. The user can also
specify which Syslog facility they wish system events to be generated for. This is typically
used on the server side to separate events arriving at the server from multiple sources.
Since Syslog servers can be configured via DHCP, the user can also configure the default
collector attributes for minimum severity, maximum severity, UDP port, and facility.
These defaults are applied to the user and DHCP configured collectors.
Each event generated by the SAOS software has a severity and a manager, and possibly a
port associated with it. Next is the type of information selected and/or filtered sent to
the syslog:
• Multiple collectors (external systems with IP address) may be configured (added) via
the SAOS CLI and/or via DHCP.
• Each collector added via the CLI has a configurable min-max severity range.
• Each collector added via the CLI has a configurable facility number.
• All events in the min-max range are sent to the collector.
• Each CLI configured collector may have a different min-max range.
• Collectors added via DHCP have a default min-max range which cannot be configured.
• Each collector can have only one min-max range.
The device allows configuration of the Syslog collector and global parameters shown in
the tables that follow.
Major This indicates a condition in the device that is service affecting and
requires urgent corrective action. It may indicate a condition that affects
a very small number of customers.
Minor This indicates the existence of a non-service affecting fault condition and
that corrective action should be taken in order to prevent a more serious
(for example, service affecting) fault. Such a severity can be reported, for
example, when the detected alarm condition is not currently degrading
the capacity of the managed object.
Debug The debug severity level indicates a class of events that are not intended
for normal operation of the device and are merely used for
troubleshooting. In general it is expected that these would be filtered.
Cleared The Cleared severity level indicates the clearing of one or more previously
reported alarms. An alarm with severity level “Cleared” can clear the
corresponding Critical, Major or Minor alarm.
Config The Config event indicates a configuration change. It is primarily used for
communicating configuration changes through the system and to external
entities.
Table 21-2 summarizes the mapping of SAOS event severities to standard Syslog
severities.
1 cleared debug 7
2 indeterminate debug 7
3 critical emergency 0
4 major alert 1
5 minor error 3
6 warming warning 4
7 config notice 5
8 info informational 6
9 debug debug 7
10 local debug 7
Oper State Enable, Disable, Unresolved The operational state is Enabled if both the global
Admin State for Syslog is Enabled, and the Admin state
of this collector is Enabled
Collector None x.x.x.x or valid hostname This identifies the IP Address of the Syslog collector
where the syslog messages will be sent.
Custom Prefix Empty String [15] This value is included as a prefix in the syslog message
Facility 3 Integer (0-23) Defines the facility code that will be sent on each
message for this collector
Min. Severity Alert Other, Debug, Informational, Defines the minimum severity that a message must be
Notice, Warning, Error, Alert, to be sent to this collector
Emergency
Max. Severity Emergency Other, Debug, Informational, Defines the maximum severity that a message can be
Notice, Warning, Error, Alert, to be sent to this collector
Emergency
UDP Port 514 Integer (0-65535) The UDP port that the syslog message will be
transmitted to on the collector IP Address
A mnemonic field has been added to syslog messages to help quantify events. This field
consists of three parts separated by dashes:
1. Source of the event
2. Event severity
3. Abbreviation of the event
For example, the mnemonic XCVR-3-OPTIC_REMOVED identifies that the source is the
Transceiver manager (XCVR) with an event severity of Error (3) and the event is that a
pluggable transceiver has been removed (OPTIC_REMOVED).
Example:
1. > syslog enable
2. > syslog add collector 12.14.16.12 min-severity error max-severity info udp-port 560
facility 1
3. > syslog enable collector 12.14.16.12
Flash Log
The system software logs various events (critical, reboot, power failure) to local flash
files.
The default severities for flash filtering are as follows:
- minimum: major
- maximum: critical
Each event generated by the system has a severity and a manager, and possibly a port
associated with it. You can configure flash log filters to select the type of events to be
sent to the flash log:
• Only one flash log exists.
• Multiple filters may be created for the flash log.
• Each filter specifies the min-max range, the source software manager and the source
port.
• All events in the min-max range that match the manager and port are sent to the
collector.
Table 21-4 provides a description of event filter attributes.
Min. Severity Major Debug, Info, Config, Defines the minimum severity
Warning, Minor, Major, that a message must be to be
Critical included in the log.
Max. Severity Critical Debug, Info, Config, Defines the maximum severity
Warning, Minor, Major, that a message must be to be
Critical included in the log
Port List Empty List of Port IDs This is a list of ports. For events
generated on ports, only events
on the ports in this list will be
included in the log
Configuration Example:
This example shows how to create and enable a flash log filter for DHCP options:
> log flash create filter dhcpOptions
> log flash add filter dhcpOptions dhcp-mgr options
> log flash set filter dhcpOptions min-severity debug
> log flash enable filter dhcpOptions
> log flash enable
NOTE: Creating a packet filter for all, ingress, or egress ip-pkt types can use 100% of the
CPU resulting in lockup and reboot.
Packet Decode Off On, Off When this attribute is On the packets
will be included in the log in decoded
format. This is less space efficient, but
much easier to read
Packet Groups IGMP, IP, LACP, LLDP, RSTP Defines the maximum severity of
messages to be included in the log
Port List Empty List of Port IDs This is a list of ports. For events
generated on ports, only events on the
ports in this list will be included in the
log
Configuration Example:
This example shows how to configure a flash log packet filter for LLDP.
> log flash create pkt-filter myLLDPPktFilter
> log flash add pkt-filter myLLDPPktFilter lldp-pkt all
> log flash set pkt-filter myLLDPPktFilter pkt-decode on
> log flash enable pkt-filter myLLDPPktFilter
Example of a summarized list of both flash log and flash log packet filters:
> log flash show
+------------------------ FLASH LOG STATE CONFIGURATION ----------------------+
| Admin State | enabled |
+------------------+----------------------------------------------------------+
Example:
> log flash view tail 5
January 2, 2000 17:02:09.000 ntwrk: :Vlan add port vlan 200 added port 3
January 2, 2000 17:02:09.000 ntwrk: :Vlan add port vlan 200 added port 4
January 2, 2000 17:02:16.000 chassis: DHCP IP 172.25.0.2 User dhcp:DHCP System
Time Offset Set, tJanuary 2, 2000 17:02:16.000 chassis: DHCP IP 172.25.0.2 User
dhcp:DHCP System Time Offset Set, tJanuary 2, 2000 17:02:28.000 snmp: :Cannot
ping gateway, cannot send cold trap but making an attempt
In addition, you can display the log files located in the /mnt/sysfs/log directory. These
default system event logs are accessible using the following CLI commands. In this
example, we can see at what time and for which reason the unit was reset.
Example:
> file
(file)> cd /mnt/sysfs/log
(file)> ls
Directory '/mnt/sysfs/log'
pdtrc.lo0
ipstrc.lo0
eventLog.6
eventLog.5
(file)> cat eventLog.5
------------ > BOOTING < ------------
21:55:50.252 chassis: Cli requested device REBOOT, Rebooting now
RAM Log
The system software logs events to local RAM files in addition to the local flash. The
default severities for RAM filter are as follows:
- minimum: major
- maximum: critical
The configuration and attributes of RAM log filters are similar to flash log filters:
• Only one RAM log exists.
• Multiple filters may be created for the RAM log.
• Each filter specifies the min-max range, the source software manager and the source
port.
• All events in the min-max range that match the manager and port are sent to the
collector.
NOTE: The RAM log is a temporary storage log file that will be erased when the unit is
rebooted.
You can configure event and packet filters for the RAM log with the same attributes
described for the flash log. With RAM logs, you can set a global notification attribute to
broadcast new entries to all active CLI sessions.
Configuration Example:
This example shows how to create and enable a RAM log filter for DHCP options:
> log ram create filter dhcpOptions
> log ram add filter dhcpOptions dhcp-mgr options
> log ram set filter dhcpOptions min-severity debug
> log ram enable filter dhcpOptions
> log ram enable
NOTE: Creating a packet filter for all, ingress, or egress ip-pkt types can use 100% of the
CPU resulting in lockup and reboot.
Configuration Example:
This example shows how to configure a ram log packet filter for LLDP.
> log ram create pkt-filter myLLDPPktFilter
> log ram add pkt-filter myLLDPPktFilter lldp-pkt all
> log ram set pkt-filter myLLDPPktFilter pkt-decode on
> log ram enable pkt-filter myLLDPPktFilter
Example of a summarized list of both flash log and flash log packet filters:
> log ram show
Example of all:
> log ram trace all
January 1, 2000 00:00:50.488 interface: :local interface is operationally enabl
ed
January 1, 2000 00:00:51.038 interface: :local interface is operationally enabl
ed
January 1, 2000 00:00:51.081 chassis: :AC power supply 1 failure
January 1, 2000 00:00:51.097 interface: :remote interface is operationally enab
led
January 1, 2000 00:00:56.952 lacpOptCheck() Total 0 signal sent
January 1, 2000 00:01:15.151 LLDP: lldpBAdmStateSET() to state 0
January 1, 2000 00:01:15.759 interface: :remote interface is operationally enab
led
January 1, 2000 00:01:15.798 interface: :remote interface is operationally enab
led
January 1, 2000 00:01:22.410 Software: saos-06-05-00-0027 Build 27
May 10, 2009 07:05:05.890 [UTC] config: Local RS-232 User gss:Config Save
May 10, 2009 07:05:46.971 [UTC] config: Local RS-232 User gss:Config Save
May 10, 2009 07:05:55.112 [UTC] chassis: Telnet IP 10.25.42.9 User su:System Se
ssion More Disable
May 10, 2009 07:05:55.316 [UTC] chassis: Telnet IP 10.25.42.9 User su:System Gl
obal Inactivity Timer Disable
May 11, 2009 16:55:55.139 [UTC] chassis: Telnet IP 10.25.42.9 User su:System Se
ssion More Disable
May 11, 2009 16:55:55.343 [UTC] chassis: Telnet IP 10.25.42.9 User su:System Gl
obal Inactivity Timer Disable
-----------------------------------
Command Log
The system logs user command history for monitoring system configuration performed
from the CLI. Each time a system goes into service, a header is written to the log
containing the system identifier and a timestamp. All subsequent commands (with some
exceptions) issued from the CLI are entered in chronological order up to 2500 entries, and
then the entries wrap to the beginning of the command log file. When commands contain
a password, the password will be masked to maintain security. This command log is stored
in the local flash file system, and each entry includes:
• Log ID - sequence identifier of the entry.
• User - Session, IP address of the user session, or user ID to indicate who issued the
command.
• User privilege level - access level of the user who issued the command.
• Timestamp - Timestamp of when the command was issued. This timestamp is stored
in UTC format, but the display format is determined by the system timestamp as set
with the system set timestamp command.
Currently, the system does not write entries to the command log for the following:
• Log on attempts, successful or failed.
• Commands run from the configuration file during startup.
• Commands contained within a file used in configuration augment commands.
You can display the command log, rerun commands entered into the log file, specify to
repeat a specific command, and disable or enable command logging.
NOTE: Limited users cannot display or repeat commands requiring super user access.
Examples:
> command-log show destination
Command Log Destination: flash
Repeating commands
If you need to rerun a command listed in the command log, you can repeat it by specifying
a sequence ID or repeat your last command. Also, you can repeat a specific command
without having to look up a sequence Identifier. When repeating commands, you can
specify a time interval (in the format N[yMwdhms]) and number of times to run the
command.
NOTE: The system does not support rerunning the command-log repeat command.
If you run command-log repeat my-last-command and the last command run was
command-log repeat, the system will rerun the command you ran prior to it. Also, if
you run command-log repeat and specify a sequence ID for the command-log
repeat command, it will fail with the error message “Cannot repeat command:
command-log repeat.”
To repeat a command
command-log repeat {sequence-id <numbers>|my-last-command|command <String>} [every
<DurationString>] [times <NUMBER: 1-4290261631>]
Example of my-last-command:
> command-log repeat my-last-command times 2
command-log show last 1m
8281: command-log show last 1m
8282: command-log show last 1m
command-log show last 1m
8281: command-log show last 1m
8282: command-log show last 1m
Troubleshooting
Example:
> log send msg “This is a test message.” severity critical
At a Glance:
• Overview • Configuring Port Traps and Servers
• Benefits • Configuring SNMPv3
• Configuring Global Attributes • Configuring RMON
• Configuring SNMPv1/v2c Community • Troubleshooting
Based Security
This chapter describes Simple Network Management Protocol (SNMP) and how to
configure it.
Overview
Simple Network Management Protocol (SNMP) governs the functions and management of
network devices and components called managed objects. SNMP provides the ability to
administer managed objects using a Network Management System (NMS) interface,
instead of the CLI. Examples of NMS interfaces are a Management Information Base (MIB)
browser or Ethernet Services Manager (ESM). The NMS interface acts as an SNMP manager
and sends messages to the device in the form of an SNMP Protocol Description Unit (PDU).
These messages are processed by the SNMP agent on the device.
NOTE: To optimize performance when retrieving large table views while browsing MIBs,
use SNMP v2 Get Bulk instead of SNMP Get.
SNMP Architecture
The system software supports SNMP versions v1, v2c, and v3. The SNMP architecture
includes the following components:
• Message dispatcher - The message dispatcher is responsible for sending and receiving
SNMP messages. When an SNMP request message is received, the Dispatcher
determines the SNMP version and then passes the message to the appropriate Message
Processing Model (SNMPv1, SNMPv2c, or SNMPv3). The Dispatcher is also responsible for
dispatching SNMP response messages to the NMS interface application.
• Community authentication - SNMPv1 and SNMPv2c support a community-based
security model. This model provides limited security based upon the configured
community name. No encryption or user authentication is provided. All SNMP messages
between Agent and manager contain “Community Name” in the plain text.
• User-based authentication - SNMPv3 supports a user-based security model. This
model requires users to provide a secret key for authentication and privacy. The
supported authentication protocols are Keyed Hashing for Message Authentication
Message Digest 5 (HMAC-MD5) and HMAC Secure Hash Algorithm 1 (SHA-1) algorithms.
Privacy is accomplished by encrypting and decrypting SNMPv3 packets with the Cipher
Block Chaining mode to the Data Encryption Standard (CBC-DES) algorithm.
• View-based access control- SNMPv3 provides additional security by limiting access to
specific managed objects.
• Protocol PDU operations - The Message Processing Subsystem handles the Protocol
PDU operations of preparing messages for sending and extracting data from received
messages. This system software version supports the SNMPv1 Message Processing Model
for SNMPv1 and SNMPv2 protocol operations.
• MIBs - The system software supports both standard and proprietary MIBS that store
configuration, operational state, and statistics information in the form of managed
objects. Each managed object is identified by an Object Identifier (OID) and exchanges
information between the MIB and the system software modules through an Application
Programming Interface (API). MIB files supported in this release include:
• BRIDGE-MIB.my
• ETHERLIKE-MIB.my
• IANA-ADDRESS-FAMILY-NUMBERS-MIB.my
• IANAifType-MIB.my
• IEEE8021-PAE-MIB.my
• IF-MIB.my
• LLDP_DOT1-MIB.my
• LLDP_DOT3-MIB.my
• RFC1213-MIB.my
• rfc1215.mib
• RFC-1215.my
• RMON2-MIB.my
• RMON-MIB.my
• SNMP-NOTIFICATION-MIB.my
• SNMPv2-MIB.my
• WWP-LEOS-8021X-MIB.my
• WWP-LEOS-BLADE-MIB.my
• WWP-LEOS-BROADCAST-CONTAINMENT-MIB.my
• WWP-LEOS-CFM-MIB.my
• WWP-LEOS-CHASSIS-MIB.my
• WWP-LEOS-COMMUNITY-MIB.my
• WWP-LEOS-DATAPLANE-MIB.my
• WWP-LEOS-DHCP-CLIENT-MIB.my
• WWP-LEOS-DNS-CLIENT-MIB.my
• WWP-LEOS-EXT-LAG-MIB.my
• WWP-LEOS-FEATURE-LICENSE-MIB.my
• WWP-LEOS-FILE-TRANSFER-MIB.my
• WWP-LEOS-FLOW-MIB.my
• WWP-LEOS-IGMP-MIB.my
• WWP-LEOS-IP-INTERFACE-MIB.my
• WWP-LEOS-L2CFT-MIB.my
• WWP-LEOS-LLDP-MIB.my
• WWP-LEOS-MSTP-MIB.my
• WWP-LEOS-MULTICAST-FILTER-MIB.my
• WWP-LEOS-NTP-CLIENT-MIB.my
• WWP-LEOS-OAM-MIB.my
• WWP-LEOS-PBT-MIB.my
• WWP-LEOS-OAM-MIB-MODULE.my
• WWP-LEOS-PING-MIB.my
• WWP-LEOS-PORT-MIB.my
• WWP-LEOS-PORT-STATS-MIB.my
• WWP-LEOS-PORT-XCVR-MIB.my
• WWP-LEOS-RADIUS-CLIENT.my
• WWP-LEOS-SSH-MIB.my
• WWP-LEOS-SW-XGRADE-MIB.my
• WWP-LEOS-SYSLOG-COLLECTOR-MIB.my
• WWP-LEOS-SYSTEM-CONFIG-MIB.my
• WWP-LEOS-SYSTEM-CONTROL-MIB.my
• WWP-LEOS-TACACS-CLIENT-MIB.my
• WWP-LEOS-TRAFFIC-PROFILE-MIB.my
• WWP-LEOS-TWAMP-MIB.my
• WWP-LEOS-USER-MIB.my
• WWP-LEOS-VLAN-TAG-MIB.my
• WWP-LEOS-VPLS-MIB.my
• WWP-PRODUCTS-MIB.my
Figure 22-1 illustrates the SNMPv1 & SNMPv2c agent and the SNMPv3 Engine
Architecture.
SNMPv1
SNMPv1 is defined by RFC1157 (SNMPv1), RFC1155 Structure of Management Information
Version 1 (SMIv1), RFC1212 and RFC1215. This version supports primitive data types based
on SMIv1 with the following operations:
• Get Request - manager requests the current value of a specified managed object from
the agent.
• Get Next Request - manager requests the current value of the next managed object
in the MIB from the agent.
• Set Request - manager requests the agent to set the value of the specified managed
object.
• Get Response - agent responds to a Get-Request, Get-Next-Request, or Set-Request
with the value of the managed object.
• Trap - agent notifies manager of system event.
The SNMPv1 message and Protocol Description Unit (PDU) format is shown in Figure 22-2:
SNMPv2c
SNMPv2c is defined by RFC1901, RFC3416 (SNMPv2), RFC2578 (SMIv2) and RFC2579. It
supports the same operations as SNMPv1 with additional support for the Get Bulk
(RFC3616) operation for efficient retrieval of large amounts of data. This version defines
a newer SNMPv2 Trap PDU format and supports data types based on SMIv2 including 64 bit
counters.
The SNMPv2c message and PDU format is shown in Figure 22-3:
SNMPv3
SNMPv3 uses the same PDU format and supports all operations that are defined in
SNMPv2c, but it is not considered a stand-alone protocol. Instead, it employs an
extensible framework that uses SNMPv2c information that is encapsulated in the SNMPv3
packet format.
Packet Format
The SNMPv3 packet format includes a message header, security parameters, and PDU
information as shown in Figure 22-4:
msgMaxSize Indicates the maximum message size that the sender can support.
• reportableFlag
• authFlag
• privFlag
msgSecurityModel Contains the security model that was used for security processing
upon message reception.
msgSecurityParameters Contains the security model specific data. This data is defined and
used only by the security model specified by msgSecurityModel.
scopedPDU Contains the normal PDU and information for identifying the
administratively unique context for processing the PDU.
CAUTION: SNMP will not respond to requests and will drop packets if a valid security
license key is not installed.
Once a valid security license key is installed, SNMP will enable encryption and
authentication. It will then accept SNMPv3 packets and allow the user to access the
device.
NOTE: A valid security license key is not required to allow SNMPv1, SNMPv2c, or SNMPv3
packets with a no authentication and privacy (noAuthNoPriv) security level setting.
For information on SNMP security levels, see the snmpSecurityLevel section on page 315.
Supported Concepts
Following is a list of the supported SNMPv3 concepts:
snmpEngineBoots Counts the number of times an SNMP engine has re-booted or re-
initialized since the snmpEngineID was last set. This counter is
initially set to zero.
snmpSecurityLevel Contains three security levels that rank from highest to lowest
respectively:
• authPriv
• authNoPriv
• noAuthNoPriv
Authoritative SNMP Engine Protects against message replay, message delay, and message
redirection.
Agent Discovery Used to first determine the snmpEngineID of the agent, and then
determines the snmpEngineBoots and snmpEngineTime.
• usmUserEngineID
• usmUserName
• usmUserAuthProtocol
• usmUserPrivProtocol
• vacmSecurityModel
• vacmSecurityName
• vacmGroupName
• vacmGroupName
• vacmAccessSecurityModel
• vacmAccessSecurityLevel
• vacmAccessReadViewName
• vacmAccessWriteViewName
• vacmAccessNotifyViewName
vacmAccessSecurityLevel contains three security levels that
rank from highest to lowest respectively:
• authPriv
• authNoPriv
• noAuthNoPriv
vacmViewTreeFamilyTable Specifies the following three views that are used in
vacmAccessTable:
• vacmViewTreeFamilyViewName
• vacmViewTreeFamilySubtree
• vacmViewTreeFamilyType
snmpTargetAddrTable Specifies the transport addresses that can either be used when
generating SNMP traps or allow SNMP requests that come from
specified IP addresses. snmpTargetAddrTable includes the
following information:
• snmpTargetAddrName
• snmpTargetAddrTAddress
• snmpTargetAddrTagList
• snmpTargetAddrParams
• snmpTargetParamsName
• snmpTargetParamsSecurityModel
• snmpTargetParamsSecurityName
• snmpTargetParamsSecurityLevel
• snmpCommunityIndex
• snmpCommunityName
• snmpCommunitySecurityName
• snmpCommunityTransportTag
Following is a list of the maximum number of SNMPv3 table entries that are supported
vacmSecurityToGroupTable 15
vacmAccessTable 15
vacmViewTreeFamilyTable 20
snmpTargetAddrTable 17
snmpTargetParamTable 15
snmpCommunityTable 18
coldStart SNMPv2-MIB.my
fallingAlarm RMON-MIB.my
linkDown IF-MIB.my
linkUp IF-MIB.my
lldpRemTablesChange LLDP-MIB.my
risingAlarm RMON-MIB.my
wwpFTransferCompletion WWP-LEOS-FILE-TRANSFER-MIB.my
wwpLeosBcastThresholdExceed WWP-LEOS-BROADCAST-CONTAINMENT-MIB.my
wwpLeosBladeStateChange WWP-LEOS-BLADE-MIB.my
wwpLeosCfmFaultTrap WWP-LEOS-CFM-MIB.my
wwpLeosCfmPbtFaultTrap WWP-LEOS-CFM-MIB.my
wwpLeosChassisDoorStatusChangeNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosChassisDyingGaspNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosChassisPowerSupplyStatusNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosChassisRebootNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosChassisTempNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosChassisSnmpStateNotification WWP-LEOS-CHASSIS-MIB.my
wwpLeosDhcpClientOptionDisabledNotification WWP-LEOS-DHCP-CLIENT-MIB.my
wwpLeosEthLinkUp WWP-LEOS-PORT-MIB.my
wwpLeosEthLinkDown WWP-LEOS-PORT-MIB.my
wwpLeosFlowL2SacHighThreshold WWP-LEOS-FLOW-MIB.my
wwpLeosFlowL2SacNormalThreshold WWP-LEOS-FLOW-MIB.my
wwpLeosImproperCmdInConfigFile WWP-LEOS-SYSTEM-CONFIG-MIB.my
wwpLeosIpInterfaceAddrChgNotification WWP-LEOS-IP-INTERFACE-MIB.my
wwpLeosMstpBridgeRootPortLostNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpNewRootNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpPortBackupNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpPortOperEdgeNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpPvstBpduReceivedNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpSelfLoopNotification WWP-LEOS-MSTP-MIB.my
wwpLeosMstpTopologyChangeNotification WWP-LEOS-MSTP-MIB.my
wwpLeosOamLinkEventTrap WWP-LEOS-OAM-MIB.my
wwpLeosPbtTunnelReversionNotification WWP-LEOS-PBT-MIB.my
wwpLeosCfmFaultTrapSet WWP-LEOS-CFM-MIB.my
wwpLeosCfmFaultTrapClear WWP-LEOS-CFM-MIB.my
wwpLeosSwXgradeBladePkgIncorrect WWP-LEOS-SW-XGRADE-MIB.my
wwpLeosSwXgradeOpCompletion WWP-LEOS-SW-XGRADE-MIB.my
wwpLeosSystemServiceModeChange WWP-LEOS-SYSTEM-CONFIG-MIB.my
RMON
With remote monitoring (RMON), you can enable a device to gather information related
to groups defined in the IEEE RFC 1757 and RFC 2021. Using a network monitoring device,
you can probe the network to retrieve this information by sampling SNMP MIB objects.
RMON supports four of the groups defined in IEEE RFC 1757:
• Alarm - The alarm group monitors system variables periodically, taking samples and
comparing them to the configured thresholds (rising and/or falling). A user defined
event is generated when a threshold has been crossed.
• Event - With the event group you can create an event and define an action to take
when an alarm occurs. RMON on all devices supports the configuration of up to 28
entries for statistics, alarms, events, and history.
• History - The history group is a set of periodical statistical samples saved during a
defined period of time for a port. Data provided can subsequently be reviewed.
• Statistics - Ethernet statistics are retrieved and measured by the probes for each of
the configured Ethernet ports on the device.
RMON supports one of the groups defined in IEEE RFC 2021:
• User History - Periodic samples of user specified history.
Benefits
SNMP provides the basis to manage network devices through interfaces other than the
CLI, including configuration, notification of system events, and RMON.
• System location
• Link up and down traps status
• CFM fault traps status
Setting Contact, Location, Link Up and Down Traps, and CFM Fault Traps
In addition to the operational status, you can set the following attributes:
• Contact - The contact field is a 1-63 character string, such as a department name and
phone number. If the string includes spaces, enclose it with quotes. By default, the
contact is “Customer Support, World Wide Packets”.
• Location - The location field is a 1-63 character string, such as an address. If the string
includes spaces, enclose it with quotes. By default, the location is “Not Specified”.
• Enhanced link up and link down trap - When enabled, proprietary link up and down
traps are sent by the device. By default, the proprietary link up and link down traps
are disabled.
• Standard link up and link down trap - When enabled, standard link up and down traps
are sent by the device. By default, standard link up and link down traps are enabled.
• CFM fault trap - When enabled, CFM faults are sent by the device. By default, the CFM
fault traps are disabled.
Example:
> snmp set contact "Customer Support, World Wide Packets" enhancement-link-up-down-trap
disable location "Spokane Valley, USA" std-link-up-down-trap enable
Example:
> snmp show
Example:
> snmp add community MyCommunity ip 1.1.1.1 permission read-write
Example:
> snmp remove community MyCommunity ip 1.1.1.1
Example:
> snmp set community MyCommunity ip 1.1.1.1 permission read-only
Example:
> snmp show communities
+--------------------+--------------------+--------------------------------+
| IP Address | Host Name | Community Name | Permissions |
+--------------------+--------------------+-----------------+--------------+
| 0.0.0.0 | | public | read-only |
| 0.0.0.0 | | private | read-write |
| 1.1.1.1 | | MyCommunity | read-only |
+--------------------+--------------------+-----------------+--------------+
Example:
> snmp add trap-server 1.1.1.4 community MyCommunity
Example:
> snmp remove trap-server 1.1.1.4 community MyCommunity
Example:
> snmp show trap-server
Example:
> snmp port-traps disable port 10
Example:
> snmp port-traps enable port 10
Example:
> snmp show port-traps
+------PORT TRAP TABLE------+
| PortName | State |
+----------------+----------+
| 1 | Enable |
| 2 | Enable |
| 3 | Enable |
| 4 | Enable |
| 5 | Enable |
| 6 | Enable |
| 7 | Enable |
| 8 | Enable |
| 9 | Enable |
| 10 | Enable |
+----------------+----------+
Configuring SNMPv3
This section identifies default table entries and sample configurations that are supported.
Private V1 Private
Public V2 Public
Private V2 Private
To create a user:
snmp create user <String[32]> {auth-protocol <noauth|md5|sha>} [priv-protocol
<nopriv|des>] [priv-password <String[64>] [auth-password <String[64]>] [auth-
secret <String[40]>] [priv-secret <String[40]>]
Example:
> snmp create user user1 auth-protocol md5 priv-protocol noPriv auth-password
mypassword
To display users:
snmp show user
Example:
> snmp show user
+-----------------------+--------------+--------------+
| UserName | AuthProt | PrivProt |
+-----------------------+--------------+--------------|
| user1 | md5 | noPriv |
| public | noAuth | noPriv |
| private | noAuth | noPriv |
+-----------------------+--------------+--------------+
To delete a user:
snmp delete user <String[32]>
Example:
> snmp show user
Example:
+----------------+----------------+----------------+----------------+
| CommunityIndex | CommunityName | SecName | TransportTag |
+----------------+----------------+----------------|----------------+
| comm1 | mycommunity | user1 | |
| t0000000 | public | public | anywhereTag |
| t0000001 | private | private | anywhereTag |
+----------------+----------------+----------------|----------------+
Example:
+-----------------------+----------+------------------+
| UserName | SecModel | GroupName |
+-----------------------+----------+------------------+
| user1 | v1 | group1 |
| public | v1 | public |
| private | v1 | private |
| public | v2c | public |
| private | v2c | private |
+-----------------------+----------+------------------+
Example:
> snmp create access-entry group1 sec-model v1 sec-level noAuth read-view viewtree1
+------------+----------+----------+----------+-----------+-----------+
| GroupName | SecModel | SecLevel | ReadView | WriteView | NotifView |
+------------+----------+----------+----------+-----------+-----------+
| group1 | v1 | noAu | viewtree1| | |
| public | v1 | noAu | V12cView | | V12cView |
| public | v2c | noAu | V12cView | | V12cView |
| private | v1 | noAu | V12cView | V12cView | V12cView |
| private | v2c | noAu | V12cView | V12cView | V12cView |
+------------+----------+----------+----------+-----------+-----------+
Example:
+---------------------------+-----------------------+----------+
| ViewTreeName | SubTree | Type |
+---------------------------+-----------------------+----------+
| V12cView | iso | include |
| V12cView | snmpResearch | exclude |
| viewtree1 | mgmt | include |
+---------------------------+-----------------------+----------+
Example:
+--------------+---------------+---------------+----------------+---------+
| TargetName | IPAddress | ParamName | Tags | Udp Port|
+--------------+---------------+---------------+----------------+---------+
| TRAPS | 10.10.10.10 | TRAPS | TrapTag | 162 |
| anywhere | 0.0.0.0 | none | anywhereTag | 0 |
+--------------+---------------+---------------+----------------+---------+
Example:
+---------------------------+--------------------------+--------+--------+
| TargetParamName | SecurityName | Sec | MP |
| | | Model | Model |
+---------------------------+--------------------------+--------+--------+
| TRAPS | public | v1 | 0 |
+---------------------------+--------------------------+--------+--------+
Configuring Traps
1. Create an entry in the snmpTargetAddrTable.
Example:
> snmp create target target1 addr 192.168.15.30 param-name param1 tag TrapTag
+----------------+---------------+----------------+-------------+----------+
| TargetName | IPAddress | ParamName | Tags | Udp Port |
+----------------+---------------+----------------+-------------+----------+
| anywhere | 0.0.0.0 | none | anywhereTag | 0 |
| target1 | 192.168.15.30 | param1 | TrapTag | 162 |
+----------------+---------------+----------------+-------------+----------+
Example:
Example:
+-----------------------+----------+------------------+
| UserName | SecModel | GroupName |
+-----------------------+----------+------------------+
| user1 | v1 | group1 |
| public | v1 | public |
| private | v1 | private |
| public | v2c | public |
| private | v2c | private |
+-----------------------+----------+------------------+
Example:
+---------------------------+-----------------------+----------+
| ViewTreeName | SubTree | Type |
+---------------------------+-----------------------+----------+
| trap | mgmt | include |
| V12cView | iso | include |
| V12cView | snmpResearch | exclude |
+---------------------------+-----------------------+----------+
Example:
> snmp create access-entry group1 sec-model v1 sec-level noAuth read-view trap
notify-view trap
+-------------+-----------+----------+----------+-----------+-----------+
| GroupName | SecModel | SecLevel | ReadView | WriteView | NotifView |
+-------------+-----------+----------+----------+-----------+-----------+
| group1 | v1 | noAuth | trap | | trap |
| public | v1 | noAuth | V12cView | | V12cView |
| public | v2c | noAuth | V12cView | | V12cView |
| private | v1 | noAuth | V12cView | V12cView | V12cView |
| private | v2c | noAuth | V12cView | V12cView | V12cView |
+-------------+-----------+----------+----------+-----------+-----------+
Example:
> snmp create community-index target1 community comm1 sec-name user1 transport-tag
TrapTag
+----------------+----------------+-------------+---------------+
| CommunityIndex | CommunityName | SecName | TransportTag |
+----------------+----------------+-------------|---------------+
| t0000000 | public | public | anywhereTag |
| t0000001 | private | private | anywhereTag |
| target1 | comm1 | user1 | TrapTag |
+----------------+----------------+-------------+---------------+
Example:
> snmp set community-index target1 community comm1 sec-name user1 transport-tag
anywhereTag
Example:
> snmp create user SNMPv3_User auth-protocol md5 priv-protocol des auth-password
SNMPv3_password1 priv-password SNMPv3_password2
+---------------------------------+--------------+--------------+
| UserName | AuthProt | PrivProt |
+---------------------------------+--------------+--------------|
| public | noAuth | noPriv |
| private | noAuth | noPriv |
| SNMPv3_User | md5 | des |
+---------------------------------+--------------+--------------|
Example:
+---------------------------+-----------------------+----------+
| ViewTreeName | SubTree | Type |
+---------------------------+-----------------------+----------+
| V12cView | iso | include |
| V12cView | snmpResearch | exclude |
| SNMPv3_view | mgmt | include |
+---------------------------+-----------------------+----------+
Example:
+--------------+-----------+----------+----------+-----------+-----------+
| GroupName | SecModel | SecLevel | ReadView | WriteView | NotifView |
+--------------+-----------+----------+----------+-----------+-----------+
| public | v1 | noAuth | V12cView | | V12cView |
| public | v2c | noAuth | V12cView | | V12cView |
| private | v1 | noAuth | V12cView | V12cView | V12cView |
| private | v2c | noAuth | V12cView | V12cView | V12cView |
| SNMPv3_Group | usm | AuthWtPv | V3View | V3View | V3View |
+--------------+-----------+----------+----------+-----------+-----------+
Example:
+-----------------------+----------+------------------+
| UserName | SecModel | GroupName |
+-----------------------+----------+------------------+
| public | v1 | public |
| private | v1 | private |
| public | v2c | public |
| private | v2c | private |
| SNMPv3_User | v3 | SNMPv3_Group |
+-----------------------+----------+------------------+
Example:
> snmp set user SNMPv3_User auth-protocol md5 priv-protocol des auth-password
SNMPv3_password1 priv-password SNMPv3_password2
Example:
> snmp create notify myNotifyName notify-tag myNotifyTag notify-type trap
Example:
> snmp set notify notify myNotifyName notify-tag myNotifyTag notify-type
notification
Example:
> snmp delete notify myNotification
Example:
> snmp show notify
+----------------+------------------+-------------------+
|NotificationName| Notification Tag | Notification Type |
+----------------+------------------+-------------------+
|Traps |TrapTag |1 |
|myNotifyName |myNotifyTag |2 |
+----------------+------------------+-------------------+
Configuring RMON
Configuring Alarms
When you configure alarms, you define a set of parameters that will be compared to
object values and network activities. When the alarm threshold is crossed, an event is
generated and the samples will be written to a log.
Two types of sampling can be configured: absolute sampling which compares the data to
the set threshold; delta sampling which compares two consecutive samplings and
compares the difference against the threshold.
Rising and falling thresholds allow the administrator to define boundaries (high and low)
and create a warning if these boundaries are crossed. For example, an alarm will be
triggered if the amount of packets going trough a port is higher than expected (rising
threshold) or below normal (falling threshold).
A number of attributes need to be defined in order to describe an alarm:
• data source - indicate the interface OID (example: 1.3.6.1.2.1.16.1.1.1.5).
• index - the index in the alarm table.
• owner - name of the owner (optional).
• sample-type - absolute or delta.
• interval - time interval in seconds used to compare samples and send alarm.
• startup-alarm - defines the condition required to trigger alarm (rising, falling or both).
• falling-event-index - set index for falling event.
• rising-event-index - set index for rising event.
• falling-threshold - minimum value (related the particular interface MIB object being
monitored) against which samplings are compared.
• rising-threshold - maximum value (related to the particular interface MIB object being
monitored) against which samplings are compared.
Example:
This example adds an alarm entry to monitor the amount of traffic entering a port and
create an event when the throughput is under 100 Mbps or above 900 Mbps:
> rmon alarm add data-source 1.3.6.1.2.1.16.1.1.1.5 index 1 interval 30 owner Admin
sample-type absolute startup-alarm both falling-event-index 1 falling-threshold 100
rising-event-index 1 rising-threshold 900
Example:
> rmon show alarm-index 1
+-------------RMON ALARM STATISTICS-----------------------+
| Index | Parameter | Value |
+--------+---------------+--------------------------------+
| 1 | OID | etherStatsPkts |
| | Type | Absolute |
| | Interval (sec)| 30 |
| | Rising Limit | 900 |
| | Falling Limit | 100 |
| | Rising Index | 1 |
| | Falling Index | 1 |
| | Owner | Admin |
+--------+---------------+--------------------------------+
Example:
> rmon alarm remove alarm-index 1
Configuring Events
An event notifies you when an alarm is triggered. When you create an a event, the
following attributes apply:
• index - creates an index for the event in the event table
• description - describe the event
• type - indicate the type of event created and where the information is sent: none, log
snmp-trap, log-and-snmptrap.
• community - create a community or refer to an existing community (optional)
• owner - indicate event’s owner (optional)
Example:
> rmon event add index 1 description Test type log community Network1 owner Admin
Example:
> rmon show event-table
+----------------------RMON EVENT STATISTICS--------------------------+
| Index | Description | Event Type | Community | Owner |
+-------+-----------------------+--------------+------------+---------+
| 1 | Test | log | Network1 | Admin |
+-------+-----------------------+--------------+------------+---------+
Example:
> rmon event remove index 1
Configuring History
With the history group, you can monitor and store port Ethernet statistics. A bucket is one
sample of data collection during a distinct time interval. A number of attributes need to
be defined to configure the history group:
• data source - indicate the interface OID (example: 1.3.6.1.2.1.16.1.1.1.5).
• index - the index in the history table.
Example:
> rmon history add data-source 1.3.6.1.2.1.16.1.1.1.5 index 1 interval 12 num-buckets 78 owner
Admin
Example:
> rmon show history
+---------------------RMON HISTORY STATISTICS----------------------+
| Index | OID | Req-buckets | Interval | Owner |
+-------+--------------------+-------------+----------+------------+
| 1 | etherStatsPkts | 78 | 12 | Admin |
+-------+--------------------+-------------+----------+------------+
Example:
> rmon history remove index 1
Configuring Statistics
The statistics group (defined in RFC1757) provides information about data received over
a device ports. This information is a list of raw statistics. These statistic counters are
either based on frames or bytes passing through the port.
Statistics attributes include:
• data source - indicate the interface OID in the format ifIndex.100xx where xx is the
port number (example: ifindex.10001).
• index - the index is a unique number corresponding to a row in the table.
• owner - indicate history entry’s owner (optional).
Example:
> rmon statistics add index 1 data-source ifIndex.10001 owner Admin
Example:
> rmon show statistics
+----------RMON STATISTICS-------------+
| Index | OID | Owner |
+-------+-----------------+------------+
| 1 | ifIndex.10001 | Admin |
+-------+-----------------+------------+
Example:
> rmon statistics remove index 1
Example:
> rmon usr-history add-object index 1 control-index 1 sample-type absolute object snmpInPkts.0
Example:
> rmon history add data-source 1.3.6.1.2.1.16.1.1.1.5 index 1 interval 12 num-buckets 78 owner
Admin
Example:
> rmon show user-history
+----------RMON USER HISTORY CONTROL TABLE----------------------------------+
| index | object |requested | granted | interval | owner | File |
| | | buckets | buckets | | | Logging|
+-------+--------+----------+---------+----------+-----------------+--------+
| 1 | 1 | 50| 50 | 1800 | | no |
+-------+--------+----------+---------+----------+-----------------+--------+
Example:
> rmon usr-history remove-object index 1 control-index 1
Example:
> rmon usr-history remove-control index 1
Troubleshooting
Example:
> configuration show
...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! SNMP CONFIG:
!
snmp port-traps disable port 1
snmp port-traps disable port 2
snmp port-traps disable port 3
snmp port-traps disable port 4
snmp port-traps disable port 5
snmp port-traps disable port 6
snmp port-traps disable port 7
snmp port-traps disable port 8
snmp port-traps disable port 9
snmp port-traps disable port 10
snmp set contact "Customer Support, Ciena +1 (509) 242-9000"
snmp set location "Spokane Valley, USA"
snmp set enhancement-link-up-down-trap enable
rmon usr-history add-control index 1
rmon usr-history add-object index 1 object snmpInPkts.0 control-index 1 sample-type absolute
At a Glance:
• Overview • Benefits
• Connectivity Fault Management • Configuration
This chapter details the implementation of Provider Backbone Transport (PBT) in the core
of a Ciena network. A basic understanding of the IEEE 802.1Q, 802.1ad, and 802.1ah
standards is assumed. In addition, it is highly recommended that CFM (IEEE 802.1ag) be
used to monitor the PBT service to warn if any faults occur in the service.
A software license key is required to activate PBT. Contact Ciena Sales to obtain a license
key.
Overview
Provider Backbone Transport (PBT) can be considered as an extension to what is known as
Provider Backbone Bridging (PBB) or Carrier Ethernet. PBT allows providers to create
point-to-point, primary and backup Ethernet tunnels and specify the path that traffic will
take across their Ethernet metro networks. These paths reserve appropriate bandwidth
and support the provisioned QoS metrics. However, PBT is unique in that it actually
disables some Ethernet features in order to accomplish its goal of delivering traffic.
VLAN Tagging
The IEEE 802.1Q standard specifies a mechanism for adding tags to Ethernet frames. This
tagging allows an Ethernet network to be divided into virtual networks or VLANs.
Generally, individual customers in a provider’s network are identified by unique VLAN IDs.
Additionally, each customer typically uses VLAN IDs in their own network to differentiate
between service types (for example, data or VoIP) and possibly to distinguish between
departments. This three-tier hierarchy allows separate domains for the service provider,
customer and individual enterprise departments.
Given the 12-bit size of the VLAN field in an Ethernet frame, the number of available
VLAN IDs is limited to 4,096. In a large provider network, the number of customers could
easily exceed 4,000, exhausting the available VLAN IDs very quickly. To help improve
network scalability, two standards have been introduced to support this hierarchical
approach, IEEE 802.1ad and IEEE 802.1ah.
Q-in-Q
The IEEE 802.1ad (also known as Q-in-Q, stacked VLANs, or Provider Bridges), extends the
original concept of VLAN tags by specifying a new provider-administered 802.1Q tag (Q-
tag) that wraps or encapsulates the original customer packet in an additional header. This
allows the service provider to administer their own tags to identify individual customer
networks, while the first (original) Q-tag is unique within the customer’s own network.
This then allows for overlap between the customer and provider VLAN IDs since the
customer Q-tag is hidden while it is transported through the provider network. However,
while this Q-in-Q approach supports a three-tiered hierarchy and frees up additional VLAN
IDs, the service provider can still only create 4,094 customer VLANs. Scalability is still an
issue as 4,000 tags is simply insufficient for large metropolitan networks. This
shortcoming is addressed by the second standard, IEEE 802.1ah.
PBT has emerged to further address limitations related to scalability and reliability. PBT
may be deployed in place of PBB or may run in parallel with PBB. In both cases, PBT
eliminates the need for backbone core devices to perform learning and flooding. Instead,
point-to-point tunnels to transport L2VPNs are provisioned. Rather than using MSTP to
prevent loops, the tunnels are used to traffic engineer the provider backbone network.
A PBT tunnel is unidirectional and is set up to ingress on a local node at one edge of the
provider backbone and to terminate on a remote device at the other end of the backbone.
This tunnel transports encapsulated subscriber frames from the local node to the remote
node. A second tunnel is then configured in the opposite direction to ingress the remote
node and terminate on the local node. This serves as the transport for the reverse traffic.
A tunnel pair together make a bidirectional pipe referred to as a PBT trunk.
PBT tunnels are set up to transport Ethernet Virtual Circuits (IEEE 802.1ad), with the
subscriber frames encapsulated using 802.1ah MAC-in-MAC encapsulation. Tunnels are
then identified by the Backbone Destination Address (B-DA) and the Backbone Tag (B-Tag).
In Figure 23-1, the highlighted fields are added to the frame to identify tunnels and to
identify flood domains and interconnects.
Tunnel Identifier
Tunnel Identifier
Since the tunnels are point-to-point, PBT can also achieve recovery times approaching 50
ms. Providers can set up primary and protection PBT paths and then leverage Carrier
Ethernet OAM standard CFM (IEEE 802.1ag) to monitor the tunnels. This provides fault
notifications in milliseconds and thus carrier-grade failover times can be achieved.
Figure 23-2 shows an example PBT network with the core provider network in the center
and 3 access networks attached to the core. In the core, primary tunnels are configured
(solid lines) as well as backup tunnels (dotted lines) in order to provide resiliency and
greater utilization of the backbone network. Again, in the core, there is no loop detection
and no learning.
The system software supports configuration of a maximum of 64 PBT trunks. This allows
for 32 ingress tunnels and 32 egress tunnels. However, one PBT tunnel may be used to
transport multiple subscriber services. In addition, one virtual circuit must be created for
each service instance. A maximum of 127 virtual circuits are supported by one PBT
tunnel. PBT tunnels may also be configured across link aggregation ports.
Figure 23-3 depicts two Provider Bridged networks interconnected by a PBT network.
Two customer Layer 2 Virtual Private networks are shown traversing primary and backup
PBT tunnels through the core network.
Traffic from Customer A originates at its Site 1. The Provider Bridge encapsulates the
customer traffic by adding a Subscriber S-Tag containing the configured S-VID value of 100
reserved for Customer A within its domain. This traffic is then sent to the Provider
Backbone Edge Bridge A (PBEB-A).
PBEB-A has been configured to assign Customer A traffic (S-VID=100) to a 24-bit Instance
Service Identifier (I-SID) value of 10,000. This I-SID value is associated with a primary and
a backup PBT tunnel. Each primary and backup tunnel is identified using the combination
of a PBEB Destination MAC address and a Backbone-VID (B-VID). This is a significant
difference between PBT and PBB. In PBB, B-VIDs represent flood domains that
interconnect multiple Provider Bridged networks. In PBT, B-VIDs together with B-DAs
identify which tunnel the frame will use.
In our example, the PBEB-A encapsulates S-VID 100 traffic by adding the B-DA value for
PBEB-D, a B-SA value for PBEB-A, a B-VID value of 4001 (primary tunnel), and the I-SID
value of 10,000. This MAC header encapsulated traffic is forwarded to Provider Backbone
Core Bridge-C (PBCB-C). PBCB-C has been configured to not learn or flood traffic on B-VID
4001, which has been reserved for PBT use. The fact that PBT does not learn or flood is
an important point. Each PBCB device must be provisioned with forwarding database
entries in order to properly forward traffic within the tunnels.
The PBCB-C forwarding table learns an entry for the combination of PBEB-D, B-VID 4001
and the traffic is forwarded on the particular port in the direction of PBEB-D. PBEB-D
receives the traffic and removes the MAC header encapsulation. Since the S-VID values
are only locally significant to the Provider Bridged network, a provider has the flexibility
to translate the S-VID value. In our example, PBEB-D has been configured to associate I-
SID 10,000 with S-VID 110.
In this illustration, traffic from the tunnel is de-encapsulated and the S-VID is remapped
to the value of 110. The traffic is forwarded to the provider bridge attached to Customer
A’s Site 2. The S-Tag encapsulation is removed by the PB device and the original customer
frame from Site 1 is delivered to Site 2.
NOTE: It should also be noted that the PBT service tag is 22 Bytes in length and this needs
to be taken into account when calculating available bandwidth. For example, when
sending a 64-Byte packet at 100% of line rate through a PBT tunnel, each 64-Byte frame
is actually 86 Bytes long (64 + 22).
up Tu
ck n ne
Ba l
MEP A MEP B
Ingress PBT
Primary Tunnel
Edge Bridge
Egress PBT
MEP C MEP D Edge Bridge
It should be noted that once a failover occurs (switching the path from the primary to the
backup tunnel), the default behavior is for the provisioned primary tunnel to become the
backup tunnel unless tunnel reversion is configured using the pbt set tunnel-
reversion command. The tunnel-reversion command will automatically revert traffic
back to the provisioned primary tunnel once it is up and the reversion hold timer is
completed (pbt set reversion-hold-time).
Example:
> pbt set tunnel-reversion off
> pbt set reversion-hold-time 3000
Manual reversion allows the network operator to control when or if the reversion will take
place (such as late at night or on a weekend) so that the impact to the service is
minimum. Manual reversion also prevents flapping between the two tunnels if the primary
is not entirely stable. Automatic tunnel reversion is useful if the backup tunnel is inferior
to the primary tunnel. Thus, failback occurs automatically.
NOTE: Please note that when configuring PBT reversion, tunnel reversion must be
enabled on all remote bridges and the reversion hold time must be set to the same value.
If reversion settings are not symmetrical, it can cause issues with indicating the
primary/backup tunnel and can cause delays in reversions.
Ciena supports the draft IEEE 802.1ag CFM including MAC ping, MAC traceroute, and CCM.
Using these powerful CFM tools, both service connectivity and PBT tunnel resiliency is
enhanced. In addition, CCM thresholds can be configured to fine-tune protection
switching.
el
nn
Tu
m ary
P ri
Ingress PBT C
Backup Tunnel
Edge Bridge
A
Dual homing is configured by specifying a unique MAC address and bridge name when
using the pbt remote-bridge create bridge-name command. This second
remote bridge is then specified when creating the backup tunnel.
For example, if the encap tunnel was down due to misconfiguration, the decap tunnel
could still be up and running. This would allow incoming traffic to be decapsulated, thus
providing only unidirectional traffic on the circuit. This creates a problem with devices
on the terminating end of the tunnels. They would accept all frames regardless of their
B-VID value.
To avoid this behavior, encap and decap tunnels should be tied together using the tunnel
pair create command. By pairing encap and decap tunnels, traffic on an interface is
dropped unless the B-VID is specifically configured. In addition, it synchronizes the
operational state of the two tunnels. When one tunnel goes down, encap or decap, CCMs
are sent over the interface to ensure that the device on the other end takes both tunnels
down. The tunnel state will remain down until the MEPs on the other devices have verified
connectivity.
In Figure 23-6, the encap tunnel on device B goes down. Device B then sends a CCM error
code to device A. Device A then takes down both the primary encap and decap tunnels
and a failover occurs to the backup tunnel.
Encap
Tunnel Tunnel
Pair Decap
B
Tunnel
el
nn
Tu
a ry
im
Pr
C
Backup Tunnel
To ensure synchronization between primary and backup tunnels, you can enable tunnel
synchronization. When tunnel synchronization is turned on for the primary tunnel, a
deactivation of either the primary or backup tunnel causes CCMs to be transmitted to the
inactive tunnel. This feature enables interoperability with devices running system
software 5.x. By default, tunnel synchronization is disabled.
Benefits
• Customer MAC address and other information is tunneled through the provider’s
network, enhancing security and scalability.
• Using specifically engineered paths or tunnels allows the provider to target maximum
utilization of the core network devices.
• The customer and Provider control domains are separated, allowing layer 2 control
frames to be transported through the provider’s network.
• 802.1ag CFM can be used to monitor tunnels and provide carrier-grade failover
detection.
Configuration
The following steps are used to configure PBT:
1. Prepare the device for PBT
2. PBT general configuration
3. Tunnel configuration
4. Tunnel protection (optional)
5. VC configuration
6. VS configuration
7. VS subscribers
8. CFM configuration (optional)
9. QoS (optional)
NOTE: On the CN 3960, only ports 11 and 12 can be used to configure tunnels for PBT.
NOTE: Please note that the license key used here is only an example. Contact Ciena Sales
to obtain a proper license key.
4. Make sure that MSTP is disabled either globally or on the individual encap and decap
tunnel ports.
> mstp disable
> mstp show
======== Bridge MSTP is DISABLED !!! ========
Configuring PBT
The following configurations are set on a single device as an example of configuring PBT
general parameters.
2. Configure the PBT bridge MAC that will be used as the B-SA in the frames.
> pbt set bridge-mac 00:02:a1:30:7c:80
NOTE: It is recommended that you manually set the B-SA PBT bridge MAC address. If you
do not set the B-SA PBT bridge MAC address, the system software will send the chassis
base MAC address as the B-SA. In the event of a hardware failure, the chassis base MAC
would change, requiring configuration changes on other devices configured to use this
device as a remote bridge. This setting needs to be unique from the B-SA for all devices.
3. Set the Ethertypes if needed. Ethertypes for services and PBT tunnels are
configurable for interoperability. The default is 0x88a8 for PBT tunnels and 0x88c8 for
services.
> pbt set tunnel-tag-ethertype 0x88a8
> pbt set service-tag-ethertype 0x88c8
NOTE: Please note that in order for PBT frames to be transmitted through a device,
the PBT ethertype must be set to 0x8100 (33024 decimal).
4. Reserve Bridge VLAN IDs (B-VIDs). Each incoming tunnel requires a unique B-VID.
> pbt reserve bvid 112-115
NOTE: The maximum number of B-VIDs that can be reserved is equal to the maximum
number of PBT tunnels, which is 32. If trying to reserve more than 32, the system
software generates the following error message: ERROR: reserving B-Vid, No
more resources available.
5. Configure remote bridge names for use in tunnels and virtual circuits. For operator
convenience, tunnel endpoints can be identified with names by associating a MAC address
with name. The subsequent Tunnel and VC configurations refer to the nodes by these
names.
> pbt remote-bridge create bridge-name sw1 bridge-mac 00:02:a1:37:bc:60
NOTE: Optionally a CoS policy and a Primary Code Point (PCP) value for the
encapsulated frames can also be configured using the tunnel encap set encap-
cos-policy and tunnel encap set encap-fixed-pcp commands.
2. Configure the decapsulation tunnel, providing the tunnel source node, the B-VID to
be used, and the NNI port on which the tunnel will ingress.
> tunnel decap create static-pbt frm-sw1 b-vid 115 src-bridge-name sw1 port 21
2. Create the virtual switch naming it and associating it with the PBT virtual circuit.
> virtual-switch ethernet create vs vs1 vc vc1
3. If desired, the CCM interval can be configured, but the interval must be the same on
both sides of the tunnel endpoints. The default is 1 second.
NOTE: Setting the CCM Interval to 4 milliseconds is not recommended for a production
environment, although it can be used for testing.
5. Verify that the MEP IDs at both ends of the tunnel are different. If they are the same,
change one of the MEP IDs.
> cfm mep show
> cfm remote-mep show
> cfm mep set service pbt1 port 21 mepid 2
Sample Configuration
The following configuration example displays the steps to configure a primary and a
backup PBT tunnel over the devices shown in Figure 23-7. It also employs CFM to monitor
the connection.
The following configuration assumes PBT mode has been enabled on the device and that
a valid PBT license key has been entered.
23 21 23 23
1 24 24 2
22 24
At a Glance:
• Overview • Configuring Link Layer Discovery
• Principles of Operation Protocol
• Feature Benefits • Troubleshooting
This chapter provides an overview of the Link Layer Discovery Protocol (LLDP) and
describes how to configure 802.1AB LLDP.
Overview
The Link Layer Discovery Protocol allows network equipment (i.e., stations, switches,
bridges, routers, etc.) to advertise their parameters for network topology discovery and
management. Traditional network management protocols, such as SNMP, running at key
locations, use layer 3 protocols to identify the devices connected to the network. The
Link Layer Discovery Protocol is a layer 2 protocol, allowing precise discovery of the
physical-link topology of the network. Devices act as LLDP agents, which drastically
increases the network discovery performance of SNMP applications, as well as any
system capable of accessing standard LLDP MIBs.
Principles of Operation
The system software supports LLDP as specified in the IEEE 802.1AB-2005 standard. Like
Rapid Spanning Tree Protocol (RSTP), LLDP is a link-constrained, layer 2 protocol. This
means that the exchange of LLDP messages only takes place between adjacent LLDP
agents (devices) on the network, unless control frame tunneling is used to tunnel the
LLDP PDUs through another device. LLDP agents communicate basic management
information with each other by exchanging Link Layer Discovery Protocol Data Units
(LLDPDUs). The information about a device, and its immediate neighbors is then
retrievable through the standard LLDP MIBs using SNMP. It is important to note that LLDP
operates only on physical ports.
As illustrated in Figure 24-1, LLDP Agent A exchanges LLDPDUs with LLDP Agent B and
Agent C, but not with Agent D since it is not directly connected to Agent A.
LLDP Agent B
LLDP Agent A
LLDP Agent C
LLDP Agent D
NOTE: Link Layer Discovery Protocol does not configure or control any traffic or devices
on the network. Its primary role is to report discovered information to higher-layer
management tools. It is not intended to act as a configuration protocol for remote
systems nor as a mechanism to signal control information between ports.
LLDP TLVs
The LLDPDU is a layer 2 packet that consists of an L2 source, destination, and an
Ethertype field, and 4 or more Type Length and Value fields (TLVs). The LLDP standard
specifies 9 common TLV fields, 4 of which are mandatory TLVs and the remaining 5 are
optional TLVs to carry information for broadcasting sender information.
Chassis ID TLV
Port ID TLV
TTL TLV
Optional TLVs
End of LLDPDU TLV
Periodic LLDPDUs are sent out at a user defined interval, however, LLDPDUs are also sent
whenever LLDP TLV data has changed. An SNMP notification is then generated after
changed data is received from a neighboring device. Upon receipt of this notification the
SNMP management application polls the LLDP MIB objects to determine what information
has changed.
Common TLVs
The system software supports all of the 9 common TLVs specified by the standard:
• Chassis ID TLV- The first TLV in an LLDPDU is mandatory and identifies the chassis. It
contains the 802 LAN station associated with the transmitting LLDP agent and supports
the “MAC Address” chassis ID subtype.
• Port ID TLV- The second TLV in an LLDPDU is mandatory and identifies the port
component that transmits the TLV. It supports the “Interface Alias” port ID subtype.
• Time To Live (TTL) TLV- The third TLV in an LLDPDU is mandatory and indicates the
number of seconds that the recipient LLDP agent is to regard the information
associated with this LLDPDU to be valid.
• Port Description TLV- This optional TLV is an alpha-numeric string that indicates the
port's description.
• System Name TLV- This optional TLV is an alpha-numeric string that indicates the
assigned name.
• System Description TLV- This optional TLV is an alpha-numeric string that indicates
the system description.
• System Capabilities TLV- This optional TLV identifies the primary functions of the
system and whether or not these primary functions are enabled. It supports the bridge
capability.
• Management Address TLV(s)- This optional TLV identifies the address associated with
the local LLDP agent that may be used to reach higher layer entities to assist discovery
by network management.
• End of LLDPDU TLV- This mandatory 2 octet TLV defines the end of LLDPDU with all 0
values.
• Link Aggregation TLV- advertises whether the link is capable of being aggregated,
whether the link is currently in an aggregation, and the port ID of the aggregation if it
is in an aggregation. LLDP advertises Link Agg TLV in the PDU but Link Aggregation is
not currently supported and is disabled.
• Maximum Frame Size TLV- advertises the maximum frame size capability.
Feature Benefits
Using LLDP for network topology discovery offers the following benefits to the
network provider:
• Accurate network topology discovery and management
• Support of standard tools using SNMP
• Multi-vendor interoperability.
Multi-vendor Interoperability.
LLDP is a standards-based protocol. Using LLDP rather than a proprietary topology
discovery protocol allows the network provider to interoperate with non-Ciena devices
that also support LLDP.
CAUTION: The default settings for LLDP should be sufficient to ensure proper topology
discovery in most networks. Since LE-NS ESM topology discovery relies on LLDP for higher
performance topology discovery, care should be taken when modifying the LLDP
configuration. In certain topologies, LLDP does not need to be forwarded (e.g., when
using non-LLDP devices such as hubs).
In the following configuration example, the user displays the state of port 10, then
disables LLDP on this port.
It should be noted as well that by using the lldp show port command, information
about the remote port (neighbor) can be seen in the LLDP Remote Port TLV section of the
output. This displays the MAC address, port number, and other information of the
connected remote port.
Configuration steps:
Step 3 (Optional) Verify the configuration of the port. lldp show [configuration]
|[statistics][port
<PhyPortNameList>
[configuration|statistics
]]
CLI Example:
1. > lldp show port 10
>lldp show port 10
+----------- LLDP Port Configuration -----------+
| | | Basic | Org Specific | |
| | Admin |TLV Type| Dot1 |Dot3| | |
| Port | State |123456789|1234567|1234| |Notif|
+------+-------+---------+-------+----+---+-----+
|10 | Tx-Rx |111111111|1 1111|1111| | Off |
+------+-------+---------+-------+----+---+-----+
Where: ||||||||| ||||||| ||||
Dot3 Type ||||||||| ||||||| |||+-- 4 Maximum Frame Size TlvTx
Dot3 Type ||||||||| ||||||| ||+-- 3 Link Aggregation TlvTx
Dot3 Type ||||||||| ||||||| |+-- 2 Power via MDI TlvTx
Dot3 Type ||||||||| ||||||| +-- 1 MacPhy Config TlvTx
Dot1 Type ||||||||| ||||||+-- 7 Protocol ID OAM TlvTx
Dot1 Type ||||||||| |||||+-- 6 Protocol ID Dot1X TlvTx
Dot1 Type ||||||||| ||||+-- 5 Protocol ID STP TlvTx
Dot1 Type ||||||||| |||+-- 4 Protocol ID LACP TlvTx
Dot1 Type ||||||||| ||+-- 3 VLAN Name TlvTx
Dot1 Type ||||||||| |+-- 2 Port&Protocol VLAN ID TlvTx
Dot1 Type ||||||||| +-- 1 Port VLAN ID TlvTx
Basic Type ||||||||+-- 9 Local Mgmt Address TlvTx
Basic Type |||||||+-- 8 Remote Mgmt Address TlvTx
Basic Type ||||||+-- 7 System Capabilities TlvTx
Basic Type |||||+-- 6 System Description TlvTx
Basic Type ||||+-- 5 System Name TlvTx
Basic Type |||+-- 4 Port Description TlvTx
Basic Type ||+-- 3 Time-to-Live TlvTx
Basic Type |+-- 2 Port ID TlvTx
Basic Type +-- 1 Chassis ID TlvTx
+-------------------------- LLDP Port Statistics --------------------------+
| Port | Out | In | InErrPkt| InError | Tlv | Unknown | AgedOut |
| | TotalPkt| TotalPkt|Discarded| Tlv |Discarded| Tlv | Total |
+------+---------+---------+---------+---------+---------+---------+---------+
|10 | 7| 8| 0| 0| 0| 0| 0|
+------+---------+---------+---------+---------+---------+---------+---------+
+----------------------- LLDP Local Bridge TLV ----------------------+
| TLV | Type | Value |
+------------+--------------+----------------------------------------+
| Chassis ID |MacAddr %| 0x0002A107A4A0 |
| TimeToLive | | 120 (second) |
| System Name| | CN 3911 |
| System Desc| | CN 3911 Service Delivery Switch |
Troubleshooting
+------------------------------------------------------------------------------+
| LLDP Neighbors |
+------------------------------------------------------------------------------+
| Remote Addr: 10.26.193.79 |
| System Name: 3911-Center-Ematar |
| System Desc: CN 3911 Service Delivery Switch |
+-------+----------------------------------------------------------------------+
| Local | Remote |
+-------+------+---------------------------------------------------------------+
| Port | Port | Info |
+-------+------+---------------------------------------------------------------+
| 5 | 27 | Chassis Id: 0002A1306B40 |
| | | Mgmt Addr: 172.16.233.214 |
| | | System Name: LE311-Center-Ematar |
| | | System Desc: LightningEdge (tm) LE-311v Access Concentrator |
+-------+------+---------------------------------------------------------------+
| 6 | 8 | Chassis Id: 0002A107B010 |
| | | Mgmt Addr: 10.26.193.56, 10.26.193.56 |
| | | System Name: 3920-Right-Ematar |
| | | System Desc: CN 3920 Service Delivery Switch |
+-------+------+---------------------------------------------------------------+
| 8 | 8 | Chassis Id: 0002A107AFC0 |
| | | Mgmt Addr: 10.26.193.55 |
| | | System Name: 3920-Left-Ematar |
| | | System Desc: CN 3920 Service Delivery Switch |
+-------+------+---------------------------------------------------------------+
At A Glance:
• Overview • Upgrading from a Previous Version
• Network connectivity of SAOS
• Release Compatibility • Backup Software Images
• Preparing Files for Upgrade
This chapter describes the procedure for upgrading and downgrading system software.
Overview
The upgrade of system software is driven by the use of software configuration files
created by the network administrator. The actual upgrade process takes about 10 minutes
for the device to execute. Device upgrades should take place in an organized manner, for
example, starting from the edge of the network and working toward the core, or starting
from the core and working toward to the edge.
Network connectivity
The system software upgrade process requires the device to have network connectivity
in order to download files and send notifications. You can use the serial console or the
remote interface for the upgrade. The remote interface must be configured properly
before the upgrade is started. The device must be able to communicate with the TFTP
server.
Release Compatibility
The following rules apply to software upgrade and downgrade:
• Release 6.1 can upgrade to 6.2.x but not to any other releases.
• Release 6.2.x can upgrade to 6.3.x but not to any other releases.
• Release 6.3.x will not downgrade to any other release.
• Release 6.4.x can downgrade to 6.3.1 but cannot downgrade to any other release.
• Release 6.3.1 can upgrade to any other software version.
• The device will not install unsupported software.
• Attempting to install unsupported software will cause an error message
root
ciena
artamir.xml
brego.xml default.cmd
le-xx.cmd startupCfg.cfg
saos-06-05-00-0043 le-2xx.cmd chassisCfg.cfg
le-4xx.cmd testCfg.cfg
le-4xx.xml
le-lnx.cml
le-06-05-00-0043.afs 0002a1xxyyzz.xml
le-06-05-00-0043.ker
le-06-05-00-0043.rfs
le-06-05-00-0043.tar.gz
le-132.cfe
le-lnx.xml
mainShellMenu.xml
mainShellMenu.xsl
pmf-saos-06-05-00-0043.xml
readme.txt
In Figure 25-1, the root directory refers to the directory that was chosen as the root
directory for the TFTP server. Operators are free to define the root directory however
they wish. All files and folders will be stored in one sub-directory off the root directory
named “ciena”. This directory has three sub-directories:
• packages: This directory has one sub-directory for each software package. Each
directory contains all the image files for all device types supported by the software
package. This folder also contains platform or board capability files. File names may
be changed, but the extensions may not be changed (i.e., .xml).
• cmd: Device command files. This directory contains command files and package meta
files for each platform class. Command files for specific devices may also exist in this
directory, such as <MACaddress>.xml.
• config: This directory contains configuration files such as startup-config, chassis-
config, etc.
Several files are required for the upgrade, which are summarized in the following table.
Also note that all file locations in this table are specified relative to the TFTP root folder.
Command File
The software package contains a generic platform class command file named le-lnx.xml.
This is a fully functional command file that does not require any modifications in order
to install the software package on the device. Command files can also be used to upgrade
or configure one or more devices.
<!--
Command files are used to install new software and/or load new configuration
files to one or many devices. Definitions in the command file are organized
by platform-class. You may define as many platform classes as you like
in a single command file.
The following example defines two platform classes and uses all possible attributes:
<XmlWwpCommandFile>
<XmlCmdPlatformClass name="CN3911"
version="saos-06-05-00-0043"
operation="upgrade"
serviceAffecting="yes">
</XmlCmdPlatformClass>
<XmlCmdPlatformClass name="brego"
configFilePath="myFolder/my-config-file.txt"
configFileRule="activate"
welcomeBanner="myBannerFile.txt"
licenseFile="myLicenseFile.txt"
<SshKeyFile name="user1.pk2"></SshKeyFile>
<SshKeyFile name="user2.pk2"></SshKeyFile>
<SshKeyFile name="user3.pk2"></SshKeyFile>
version="saos-06-05-00-0043"
packagePath="folder1/folder2/folder3"
operation="install"
serviceAffecting="no" >
</XmlCmdPlatformClass>
</XmlWwpCommandFile>
NOTE #1
DHCP can be used to run a command file. If a command file request
comes in from DHCP, the device will only run the command file once.
If another request comes in with the same command file name, the
device will ignore the request from DHCP. The name of the command
file is saved (last-command-file) and it may be reset by the user
via the shell or SNMP. The same is true for the configuration file.
NOTE #2
The License file format is shown here. Lines may appear in any order.
Any text following ! will be considered a comment.
Whitespace is ignored.
-->
<XmlWwpCommandFile>
<XmlCmdPlatformClass name="le-lnx"
version="saos-06-05-00-0043"
packagePath="ciena/packages/saos-06-05-00-0043"
operation="upgrade"
serviceAffecting="yes"
></XmlCmdPlatformClass>
<XmlCmdPlatformClass name="artamir"
version="saos-06-05-00-0043"
packagePath="ciena/packages/saos-06-05-00-0043"
operation="upgrade"
serviceAffecting="yes"
></XmlCmdPlatformClass>
<XmlCmdPlatformClass name="brego"
version="saos-06-05-00-0043"
packagePath="ciena/packages/saos-06-05-00-0043"
operation="upgrade"
serviceAffecting="yes"
></XmlCmdPlatformClass>
</XmlWwpCommandFile>
You can run command files from the CLI or with a DHCP server. To run the command file
from the command line:
> software run command-file <FileName> server <IpAddress>
CORRECT:
ciena/cmd/
ciena/packages/saos-<build>/
ciena/cmd/0002a1010203.xml
INCORRECT:
ciena/cmd (missing the slash “/” at the end of the path
If you specify only the path of the command file, the device will search the directory
for the most specific command file in the following order.
1. Device specific file named with its MAC address.
2. Platform class file for its platform, artimir.xml or brego.xml
3. Generic platform class file, le-lnx.xml
Once the most specific command file has been selected, the device runs the section of
the command file with the most specific platform class. So, if the command file has an
artimir section and an le-lnx section, the device will process the artimir section, and skip
the le-lnx section.
NOTE: For CN 3911 or CN 3920 devices running system software 6.3.1 or earlier, only the
device specific and generic platform files are supported. Also, the le-lnx platform class
must exist within the command file.
CAUTION: The instructions in this section assume you are upgrading from 6.3.1 or higher.
NOTE: After upgrading SAOS, configuration changes that are saved to the configuration
file may not be backwards compatible. If a downgrade occurs, such changes can cause
configuration errors after a re-boot.
• install
- Download the config file from the server.
- Store the file in the directory '/flash0/config'
- Store the new filename as 'default-load-file'
- Store the old file as 'last-config-file'
- This file will be loaded when the device is rebooted.
• activate
- Same behavior as install.
- In addition, the file is activated (loaded) immediately.
- This may require a reboot.
- Reboot will not occur unless “serviceAffecting” is specified.
• augment
- Download the config file.
- Augment the current system configuration with the commands in this file.
NOTE: If you intend to upgrade software AND system configuration with the same
command file, do NOT use 'activate' for the configFileRule.
Instead of using activate for the configFileRule when upgrading software AND system
configuration with the same command file, use one of the following combinations:
1. configFileRule=“install” operation=“install”
This combination installs a new configuration file in flash, installs new software, then
stops. The user must then activate the new software by rebooting device.
2. configFileRule=“install” operation=“activate”
Installs a new configuration file, installs the new software, then reboots the device.
3. configFileRule=“augmentAndSave” operation= “activate”
Augments the configuration, saves it, upgrades the software, then reboots the device.
The upgrade process begins immediately and may take up to 10 minutes to complete.
CAUTION: The upgrade process described in this section will cause the system to reboot
automatically.
Use the DHCP option 'bootfile' to run a command file. A fully qualified filename
(path1/path2/file.xml) can be used or a directory name such as “Path1/path2/” can be
specified. Path names MUST end with a slash to distinguish them from a file name. Some
examples:
• bootfile = “ciena/packages/saos-06-04-00-0032/”
• bootfile = “ciena/packages/saos-06-04-00-0032/command-06-03-00-0032.xml”
• bootfile = “cmd/my-command-file.xml”
If you specify a directory as the bootfile, the device will try to download the file MAC.xml
where MAC is the Ethernet MAC address of the device (i.e. 0002a1010203.xml). If that
fails, the device will try to download the file le-lnx.xml file.
NOTE: When a configuration file is processed due to a request from DHCP, the device will
save the filename (last-config-file) and it will not process the same file name twice. You
need to reset this file name in order to process the same configuration file a second time.
The same is true for the command file name as well.
It is highly recommended (but not required) to run the protect command after each
upgrade.
The software show command displays information for both flash image banks:
> software show
+------------------------------------------------------------------------------+
| Installed Package : saos-06-05-00-0040 |
| Running Package : saos-06-05-00-0040 |
| Application Build : 3507 |
| Package Build Info : Wed Feb 11 02:50:42 2009 shdbuilder tango.ciena.com |
| Running Kernel : 2.6.26.6-3507 |
| Running MIB version : 02-03-07-0005 |
+------------------------------------------------------------------------------+
| Running bank : B |
| Bank package version: saos-06-05-00-0040 |
| Bootloader version : 3454 |
| Bootloader status : valid |
| Standby bank : A |
| Bank package version: saos-06-05-00-0040 |
| Bootloader version : 3516 |
| Bootloader status : valid |
+------------------------------------------------------------------------------+
| Last command file: unknown |
| Last configuration file: unknown |
+------------------------------------------------------------------------------+
The following command will download and install software into flash but will not reboot
the device. The system will load the new software when the device is later rebooted or
power cycled:
> software install package saos-06-04-00-0134 server 1.2.3.4
Overview
The Command Line Interface (CLI) is a text-based command interface used to configure
the device and to view system information.
NOTE: The CLI hides commands depending on user access level, installed licenses, and
platform.
CAUTION: Commands not documented in this appendix should not be used. If you choose
to use them, you do so at your own risk as they can cause severe interruption of delivered
services and access to the device.
Access Levels
When a user account is created, it is assigned an access level. The CLI provides two access
levels, including:
• Limited User (lu) - able to execute commands that do not change the state of the
system in a significant way or change the configuration of the device.
• Super User (su) - includes all the privileges of the limited user and can make
significant system state changes, modify the device configuration, and perform
execute commands including creating user accounts.
username: su
password:
>
3. At the logon prompt, enter a user name and then a password to access the prompt,
for example:
username: su
password:
>
Command Schema
In order to provide consistency across all the commands, all CLI commands follow a basic
underlying schema or syntax:
<object> [<subobject>] <action> [instance] [<attributes>]
An <object> can identify a feature (e.g. multicast, epr, radius etc.) or a basic object (e.g.
module, VLAN, port, etc.). On the surface, these seem like completely mismatched
entities, however, if a device is considered to have an instance of each of these entities,
then both features and the basic system objects can be considered as objects.
A <subobject> subdivides a feature. For example, multicast has many sub-features in it
such as umf, epf, channel-stream, etc.
An <action> is a verb that describes the type of action that will occur on the
object/instance that is specified. Examples of actions are:
• create
• delete
• add
• remove
• set
• unset
• enable
• disable
• attach
• detach
Sub-menus
Objects and sub-objects have sub-menus. For example, from the top-level prompt, if you
enter system, the prompt changes to the system sub-menu and displays, (system)>.
The same is true for sub-features, such as system shell. At the (system)> prompt,
entering shell the prompt changes to the shell sub-menu under system and displays
(system/shell)>. To return to the top-level prompt from any sub-menu, type exit,
and press Enter.
Command Completion
The CLI supports partial command recognition. This means that you can enter the first
few characters that uniquely identify a command for the system to recognize it. For
example, for the sub-port commands, you can enter:
> vl
If you do not enter enough characters to uniquely identify the command, a shell parser
error will occur. For example:
> s
SHELL PARSER FAILURE: 's' - ambiguous input
This error occurs, because multiple commands begin with “s”. Pressing the Tab key
partially completes the command and displays the available commands. For example,:
>s
In addition, pressing space and then Tab twice at the end of the command string displays
available actions, objects, or sub-objects, for example:
>arp <Tab>
arp
>arp <Tab>
delete - delete arp entry
flush - flush arp cache for all interfaces
for - check if the ip address is in use
in-use - check if the ip address is in use
show - show arp information
After specifying the object, action, instance, and even attributes, you can press space
and then Tab to display additional parameters. For example,
>arp for
ip - IP address
Getting Help
To get more detail about available commands, enter ? or help at any prompt. A
command can also be followed by a space and a ? or help to get a list of valid
parameters for that command. For example, the following command lists all the valid
parameters for the arp command:
>arp
delete - delete arp entry
flush - flush arp cache for all interfaces
for - check if the ip address is in use
in-use - check if the ip address is in use
show - show arp information
In addition, you can display specific objects or search on specific keywords with the cli
search and show commands described in the cli command section of this chapter.
Command Response
In general, errors are generated for a configuration command only when the command is
unsuccessful. For example, if you run a delete command, the CLI responds without any
message and returns to the CLI prompt. Even if the object does not exist, the command
does not end in error, because the end result is that the specified object does not exist
in the system. Similarly, if you attempt set an attribute that is already set, the CLI
responds by returning you to the CLI prompt. If you attempt to create an object that
already exists, the CLI responds with an error to show the duplication.
server <IpAddress>
priority <NUMBER: 1-7>
dns <on|off>
description <String[31]>
Specifying IP Addresses
The format for the IpAddress is:
<IpAddress>=<NUMBER STRING: xxx.xxx.xxx.xxx, 0<=xxx<=255>
RFC 3696 (Application Techniques for Checking and Transformation of Names) describes
the above situation as follows:
“The LDH rule, as updated, provides that the labels (words or strings separated by
periods) that make up a domain name must consist of only the ASCII [ASCII] alphabetic
and numeric characters, plus the hyphen. No other symbols or punctuation characters are
permitted, nor is blank space. If the hyphen is used, it is not permitted to appear at either
the beginning or end of a label. There is an additional rule that essentially requires that
top-level domain names not be all- numeric.”
Additionally a fully qualified domain name may contain up to 255 characters including '.'
and must not be all digits.
Entering Names
When entering names or description the following rules apply:
• String length > 0
• First character may not be a space
• Last character may not be a space
• All characters are in the ASCII range 32…126
• The following characters are not allowed:
• "
• %
• *
• ?
• !
• Names are case-sensitive
Deprecated Commands
Some commands are designated as deprecated (obsolete). Deprecated commands are still
supported by the CLI and work for configuration. However, in a future release,
deprecated commands will no longer be supported. These commands can be identified in
the command list with the text “(DEPRECATED)”. In addition to commands, parameters
for some commands are designated as deprecated.
NOTE: All commands deprecated in past releases have been removed from this release
and are no longer supported.
Global Commands
Various global commands are supported that are common to the computing industry.
These commands do not follow the defined schema and use a standard UNIX-type
implementation. You can run these commands from any menu shell. Some global
commands related to file management are listed under the “file” command menu,
however, you do not have to type “file” preceding the commands.
Example:
> clear
exit Log off and end the Telnet session. su/lu 6.2
Example:
> exit
Goodbye.
ping [ip] <IpAddress> Ping the specified IP address. Attributes su/lu 6.0
are expressed as integers in the following
units:
Example:
> telnet 10.10.121.19
3911 00:02:A1:24:0E:30
SAOS is True Carrier Ethernet TM software.
3911 login: su
Password:
Goodbye.
>
traceroute [ip] <IpAddress> Performs a standard traceroute for the su/lu 6.0
specified ip address.
Example:
> traceroute ip 192.168.54.241
traceroute to 192.168.54.241 (192.168.54.241), 30 hops max, 40 byte packets
1: 192.168.54.241 4087 us 1811 us 1811 us
Protocol/Manager Commands
Protocol/Manager commands are those commands that configure system operation.
aggregation
Example:
> aggregation add agg lag21 port 1-4
Example:
> aggregation create agg lag22
Example:
> aggregation delete agg lag22
Example:
> aggregation enable
aggregation lacpmib set Sets the LACP MIB attributes for the su 6.4
agg <LagPortName[7]> specified aggregator port, including:
Example:
> aggregation lacpmib set agg ManLag1 admin-key 2050
aggregation lacpmib set Sets LACP MIB group attributes for the su 6.4
port <PhyPortName> specified physical ports, including:
Example:
> aggregation lacpmib set port 5 actor-admin-key 2050
Example:
> aggregation remove agg lag21 port 4
aggregation set marker-timeout <NUMBER: 0- Sets the marker timeout in milliseconds. su 6.4
1000> The default is 50(ms).
Example:
> aggregation set marker-timeout 100
aggregation set agg <LagPortName[7]> Displays the aggregation attributes for su 6.4
the aggregator port.
Example:
> aggregation set agg ManLag1 mode manual
aggregation set port <PhyPortNameList> agg- Sets the aggregation mode for the su 6.4
mode <lacp|manual> specified list of physical ports.
Example:
> aggregation set port 7 agg-mode lacp
aggregation show [member] [state] Shows general aggregation information. su/lu 6.4
Optionally, displays aggregation member
information and state.
Example:
> aggregation show state
+---------------------------- Aggregation State ----------------------------+
| Parameter | Value |
+--------------------------------+-------------------------------------------+
| Bridge Aggregation Admin | Disabled |
| Aggregation Group Created | 0 |
| Time Since Last Update | 003 days 19:56:01 |
| Time Since Last Selection | 001 days 21:37:11 |
| Marker Frame Timeout | 50 (ms) |
| Total Selection Sm Called | 21 |
+--------------------------------+-------------------------------------------+
aggregation show agg <LagPortName[7]> Displays information and mode for the su/lu 6.4
[info] [mode] specified aggregator port.
Example:
> aggregation show
aggregation show port <PhyPortNameList> Displays information and aggregation su/lu 6.4
[agg-mode] [info] mode for the specified list of physical
ports.
Example:
> aggregation show port 1 agg-mode
Physical Port configured in LACP mode
arp
Address resolution protocol (ARP) maps an IP address to a physical MAC address.
Example:
>arp delete ip 1.1.1.1
arp flush [intf <remote>] Flush the specified ARP entry from the su 6.0
ARP table.
Example:
>arp flush interface remote
arp for ip <IpAddress> Checks to see if the specified IP address su/lu 6.0
[interface <remote>] is in use.
Example:
>arp for ip 1.1.1.1
arp in-use ip <IpAddress> Checks to see if the specified IP address su/lu 6.0
[interface <remote>] is in use.
Example:
>arp in-use ip 1.1.1.1
arp set cachetime <60-3600> Configure the ARP timeout. su/lu 6.4.1
Example:
>arp set cachetime 200
arp show [intf <remote>] Shows ARP information with the optional su/lu 6.0
ability to specify an interface.
Example:
> arp show
blade
Example:
>blade show
broadcast-containment
NOTE: To enable broadcast containment commands, the Advanced Ethernet feature
license must be installed with the software license install command.
Example:
> broadcast-containment enable
Example:
> broadcast-containment disable
Example:
> broadcast-containment disable
Example:
> broadcast-containment create filter denial kbps 2000 port 1
Example:
> broadcast-containment delete filter
Example:
> broadcast-containment remove filter denial port 1
Example:
> broadcast-containment create filter denial kbps 2000 port 1
Example:
> broadcast-containment show
+--------- Broadcast Containment Globals --------+
| Parameter | Value |
+-------------------------+----------------------+
| Admin Status | Enabled |
+-------------------------+----------------------+
cfm
NOTE: To enable CFM commands, the Advanced OAM feature license must be installed
with the software license install command.
Example:
> cfm clear statistics
Example:
> cfm disable
Example:
> cfm enable
Example:
> cfm set ethertype 35272 rmep-hold-time 300000
Example:
> cfm linktrace clear
> cfm linktrace clear service CFM-1 mepid 12 statistics
cfm linktrace send service Sends a Linktrace Request message from su 6.2
<CFMServiceName> {local-mepid <NUMBER: a CFM service to a remote MEP.
1-8191> | port <PortName> [vlan <Vlan>]} Command attributes include:
[ttl <NUMBER: 1-255>] • Initial value for the Time To Live 6.2
(TTL) field, which limits the
number of hops that the Linktrace
Request message can propagate
through the network.
Example:
> cfm linktrace send service CFM-1 port 1 mepid 100
cfm linktrace send-mac service Sends a Linktrace Request message from su 6.2
<CFMServiceName> {local-mepid <NUMBER: a CFM service to a MAC address.
1-8191> | port <PortName> [vlan <Vlan>]} Command attributes include:
[ttl <NUMBER: 1-255>] • Initial value for the Time To Live 6.2
(TTL) field, which limits the
number of hops that the Linktrace
Request message can propagate
through the network.
Example:
> cfm linktrace send service CFM-1 mac 01:02:03:04:05:06
Example:
> cfm link-trace show
Example:
> cfm loopback clear
> cfm loopback clear service CFM-1 mepid 12 statistics
cfm loopback send service Sends a Loopback message from a CFM su 6.2
<CFMServiceName> {local-mepid <NUMBER: service and port to a remote MEP.
1-8191> | port <PortName> [vlan <Vlan>]} Command attributes include:
Example:
> cfm loopback send service CFM-1 port 1 mepid 100
cfm loopback send-mac service <String[16]> Send a Loopback Request message from a su 6.2
{local-mepid <NUMBER: 1-8191> | port CFM service and port to a MAC address.
<PortName> [vlan <Vlan>]}
Example:
> cfm loopback send service CFM-1 port 1 mac 01:02:03:04:05:06
Example:
> cfm loopback show
+-------------------------- LOOPBACK MESSAGE INFORMATION ---------------------------------+
| | Interface | Remote |Next LBM| Tx | Rx LBR |
| Service Name | | Mac Address |TransId | LBM |Order| OOO |
+-------------------------------+------------+-----------------+--------+-----+-----+-----+
|Remote |rmtEgress | | 1| 0| 0| 0|
+-------------------------------+------------+-----------------+--------+-----+-----+-----+
cfm delay clear [service <CFMServiceName>] Clears CFM delay statistics. Optionally, su 6.2
clears statistics for a specific service.
Example:
> cfm delay clear
> cfm delay clear service CFM-1 mepid 12 statistics
cfm delay cancel service <CFMServiceName> Cancels DMM to a remote MEP. su 6.3
{local-mepid <NUMBER: 1-8191> | port
<PortName> [vlan <Vlan>]}
Example:
> cfm delay cancel service Remote local-mepid 1 mepid 100
Example:
> cfm delay cancel service Remote local-mepid 1 mac 01:02:03:04:05:06
cfm delay send service <CFMServiceName> Sends DMMs to a remote MEP, specified su 6.3
{local-mepid <NUMBER: 1-8191> | port by the following attributes:
<PortName> [vlan <Vlan>]}
Example:
> cfm delay send service CFM-1 local-mepid 1 mepid 100
cfm delay send-mac service Sends DMMs to a remote MAC, specified su 6.3
<CFMServiceName> {local-mepid <NUMBER: by the following attributes:
1-8191> | port <PortName> [vlan <Vlan>]}
Example:
> cfm delay send-mac service CFM-1 local-mepid 1 mac 01:02:03:04:05:06
Example:
> cfm delay show
Example:
> cfm frame-loss clear
> cfm frame-loss clear service CFM-1 mepid 12 statistics
Example:
> cfm frame-loss cancel service CFM-1 local-mepid 1 mepid 100
cfm frame-loss cancel-mac service Cancels LMMs to a target MAC address su 6.3
<CFMServiceName> {local-mepid <NUMBER: specified by:
1-8191> | port <PortName> [vlan <Vlan>]}
Example:
> cfm frame-loss cancel
cfm frame-loss send service Sends LMMs to a remote MEP specified su 6.3
<CFMServiceName> {local-mepid <NUMBER: by:
1-8191> | port <PortName> [vlan <Vlan>]}
Example:
> cfm frame-loss send service CFM-1 local-mepid 1 mepid 100
cfm frame-loss send-mac service Sends LMM to target MAC address su 6.3
<CFMServiceName> {local-mepid <NUMBER: specified by:
1-8191> | port <PortName> [vlan <Vlan>]}
Example:
> cfm frame-loss send-mac service CFM-1 local-mepid 1 mac 00:11:22:33:44:55
Example:
> cfm frame-loss show
Example:
> cfm md set level 7 CustomerMD7
Example:
> cfm md show
cfm mep clear [service <CFMServiceName>] Clears CFM mep statistics. Optionally, su 6.2
clears statistics for a specific service.
Example:
> cfm mep clear
> cfm mep clear service CFM-1 mepid 12 statistics
Example:
> cfm mep create service CFM-1 port 1 type down mepid 200
Example:
> cfm mep delete service CFM-1 port 1
Example:
> cfm mep disable service CFM-1 port 1
Example:
> cfm mep enable service CFM-1 port 1
cfm mep set {local-mepid <NUMBER: 1-8191> Set MEP attributes for the specified su 6.2
| port <PortName> [vlan <Vlan>]} service and port, including:
Example:
> cfm mep set service CFM-1 port 1 type up
Example:
> cfm mep show
Example:
> cfm mip-ccm-db enable
cfm mip clear Clears MIP statistics for all or a specific su 6.2
[service <String[16]> CFM service.
port <PortName>]
statistics
Example:
> cfm mip clear statistics
Example:
> cfm mip create vlan 1001 port 5
Example:
> cfm mip delete vlan 1001 port 5
cfm mip set Sets the MD level for the specified MIP. su 6.2
Example:
> cfm mip set vlan 1001 port 5 level 1
cfm mip show Show a list of all MIP, or the MIPs for a su 6.2
[vlan <VlanId> port <PortName>] specific VLAN and port.
Example:
> cfm mip show
cfm mip-ccm-db show [vlan <VlanId>] Shows the MIP CCM database records for su/lu 6.2
all or the specified VLAN.
Example:
> cfm mip-ccm-db show
No MIP CCM database records found
Example:
> cfm remote-mep clear service VLAN#1001 mepid 100 statistics
Example:
> cfm remote-mep create service CFM-1 mepid 200
Example:
> cfm remote-mep delete service VLAN#1001 mepid 100
Example:
> cfm remote-mep disable service VLAN#1001 mepid 100
Example:
> cfm remote-mep enable service VLAN#1001 mepid 100
Example:
> cfm remote-mep set service VLAN#1001 mepid 100 hold-state lock
cfm remote-mep show Show a list of all Remote MEPs. su/lu 6.2
Optionally, displays:
Example:
> cfm remote-mep show
+------------------------------ CFM REMOTE MEPS -------------------------------+
| | | |State|Total |Seq |Last |Fault|
|Service |Mepid|Mac Address |Ad|Op|Rx CCM |Error|Seq Num |F|M|R|
+----------------+-----+-----------------+--+--+---------+-----+---------+-+-+-+
|VS-CFM-1 |2 |00:00:00:00:00:00|en|hd|0 |0 |0 |X| | |
+----------------+-----+-----------------+--+--+---------+-----+---------+-+-+-+
cfm remote-mep unset service <CfmService> Clear a Remote MEP mac address. su 6.3.1
mepid <#> mac
Example:
> cfm service clear statistics
cfm service clear Clear CFM service statistics for all or a su 6.2
[service <String[16]>] specified service.
statistics
Example:
> cfm service clear statistics
cfm service create Create a CFM Service with the following su 6.2, 6.5
attributes:
Example:
> cfm service create vlan 1001
Example:
> cfm service delete service VLAN#1001
Example:
> cfm service disable service VLAN#1001
Example:
> cfm service enable service VLAN#1001
Example:
> cfm service set service VLAN#1001 ccm-interval 1min
cfm service show Show a list of all CFM Services, or su/lu 6.2
detailed information for a single CFM
Service.
Example:
> cfm service show
+--------------------------------- CFM SERVICES ------------------------------+
| | | | | | | MEPs | Service Faults |
|Name |Type|Service Network |Vid |Lvl|Adm|Loc|Rem|XC|CC|RM|PS|RD|IS|
+----------------+----+----------------|----+---|---+---+---+--+--+--+--+--+--+
|VLAN#1001 |VLAN|VLAN#1001 |1001|3 |dis|0 |0 | | | | | | |
+----------------+----+----------------|----+---|---+---+---+--+--+--+--+--+--+
cfm stack show [vlan <VlanId>] Display CFM port stacks for all or the su 6.2
specified VLAN.
Example:
> cfm stack show
cfm show [statistics] Show the global CFM configuration or su/lu 6.2
statistics.
Example:
> cfm stack show
+------------ CFM GLOBAL CONFIGURATION -------------+
| Parameter | Value |
+-------------------------------+-------------------+
| Admin State | Disabled |
| Ethertype | 0x8902 |
| Remote MEP Hold Time (ms) | 10000 |
| CCMs/sec Avail | 4998 |
| Total Rx Frames | 0 |
| Total Tx Frames | 0 |
+-------------------------------+-------------------+
chassis
Example:
>chassis post enable
Example:
>chassis post enable
Example:
>chassis post show
POST is enabled.
POST Results: No errors detected.
Example:
>chassis set temperature-high-threshold 45
Example:
> chassis show attributes
cli
Example:
> cli search keyword password
user create user <String> password <String>
user set user <String> nopassword
user set user <String> password <String>
Example:
>cli show
arp delete ip
arp flush intf remote
arp for ip interface remote
arp in-use ip interface remote
arp show intf remote
blade show
chassis post disable
chassis post enable
chassis post show
chassis set
chassis show
clear
cli search keyword
cli show
configuration augment
configuration install
configuration list
configuration reset-config-restore-warning
configuration reset-to-factory-defaults
configuration save filename
configuration set
configuration show
device-archive save
device-archive show
Press any key to continue (Q to quit)
command-log
Example:
>commmand-log disable
Example:
>commmand-log enable
command-log show Displays the CLI command log with the su/lu 6.5
following options:
Example:
> command-log show recent
8274: command-log show today from-time 13:34 to-time 19:34:00 verbose
8275: command-log show recent verbose
8279: command-log repeat my-last-command times 2
8280: command-log repeat my-last-command times 2
8281: command-log show last 1m
8282: command-log show last 1m
8283: command-log repeat my-last-command times 2
8287: command-log repeat sequence-id 8279
8297: dhcp client lease renew
8301: command-log show
Example:
> command-log repeat my-last-command times 2
command-log show last 1m
8281: command-log show last 1m
8282: command-log show last 1m
command-log show last 1m
8281: command-log show last 1m
8282: command-log show last 1m
configuration
Example:
> configuration augment filename myConfig.cfg server 192.168.76.100
Example:
> configuration install filename myConfig.cfg server 192.168.76.100
Example:
> configuration list
+-----------------------------------------------------------------------------+
| Configuration Files |
+-----------------------------------------------------------------------------+
| startup-config |
+-----------------------------------------------------------------------------+
| Default Save File: startup-config |
| Default Load File: startup-config |
|+-----------------------------------------------------------------------------+
Example:
> configuration reset-config-restore-warning
Example:
> configuration reset-to-factory-defaults
Example:
> configuration save
[lines <NUMBER: 0 - 40>] • Indicates how many text lines you 6.0
want to view above and below the
search line.
Example:
> configuration search string aging lines 5
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! AGING and LEARNING CONFIG:
!
flow aging set time 1800
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! STATIC MAC CONFIG:
!
!
Example:
> configuration set default-save-filename myConfig default-load-filename myConfig
Example:
>configuration show
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! NETWORK CONFIG: vlans
!
vlan create vlan 69
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! EVENT LOG MANAGER:
!
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! CHASSIS CONFIG:
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! SYSTEM CONFIG:
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! INTERFACE CONFIG:
!
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! PORT CONFIG: ports
!
port set port 9 speed hundred auto-neg off
port set port 10 speed hundred auto-neg off
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Press any key to continue (Q to quit)
device-archive
Example:
> device-archive clear
device-archive save Writes the device archive parameters the su/lu 6.0
default device archive file
Example:
> device-archive save
Example:
> device-archive show
dhcp
Example:
> dhcp client disable
Example:
> dhcp client enable
dhcp client lease renew Renews the lease for the DHCP client. su 6.0
Example:
> dhcp client lease renew
Example:
> dhcp client options set tftp-server off
dhcp client set Sets the DHCP client global attributes: su 6.0
Example:
> dhcp client set discovery-interval 10
dhcp client show Displays the current DHCP client state su 6.0
and DHCP/BOOTP options state.
Optionally, displays one or more of the
following:
Example:
> dhcp client show
dns client
Example:
> dns-client add server 10.10.10.12
dns-client disable [server <IpAddress>] Disables DNS Client globally or for the su 6.2
specified server.
Example:
> dns-client add server 10.25.34.11
dns-client enable [server <IpAddress>] Enables DNS Client globally or for the su 6.2
specified server.
Example:
> dns-client enable server 10.25.34.11
dns-client remove server <IpAddress> Removes DNS Client server IP address su 6.2
from the DNS list.
Example:
> dns-client remove server 10.25.34.13
Example:
> dns-client resolve ip ciena.com
dns-client set Sets the DNS domain name or server IP su/lu 6.2
{[domain-name <String[63]>]| address and priority.
[server <IpAddress> priority <NUMBER: 1-3>]}
Example:
> dns-client set domain-name ciena.com server 10.25.34.11 priority 1
Example:
> dns-client sh ser
+--------------------- DNS CLIENT SERVER CONFIGURATION --------------------+
| IP Address | Config | Admin | Oper | User | DHCP |
| | State | State | State | Priority | Priority |
+------------------+-----------+----------+----------+----------+----------+
|10.25.34.11 | dhcp | Enabled | Enabled | | 1 |
|10.25.34.12 | dhcp | Enabled | Enabled | | 2 |
+------------------+-----------+----------+----------+----------+----------+
Example:
> dns-client unset domain-name ciena.com
dot1x
Command Description Security Release
Level Introduced
dot1x auth clear [port <PhyPortNameList>] Clears all dot1x authenticator statistics su 6.4
statistics globally or for the specified ports.
Example:
> dot1x auth clear port 16 statistics
dot1x auth disable port <PhyPortNameList> Disables dot1x authenticator on the su 6.4
specified ports.
Example:
> dot1x auth disable port 16
dot1x auth enable port <PhyPortNameList> Enables dot1x authenticator on the su 6.4
specified ports.
Example:
> dot1x auth enable port 16
dot1x auth pae-port-reauth port Causes the PAE state machine to re- su 6.4
<PhyPortNameList> authenticate the port.
Example:
> dot1x auth pae-port-reauth port 16
dot1x auth set port <PhyPortNameList> Sets 802.1x authenticator port su 6.4
attributes, including:
Example:
> dot1x auth set port 16 mode auto
Example:
> dot1x auth show stats
Example:
> dot1x disable
Example:
> dot1x enable
Example:
> dot1x pae-port-initialize port 16
Example:
> dot1x show
dot1x supp clear [port <PhyPortNameList>] Clears all dot1x supplicant statistics or su 6.4
statistics for the specified ports.
Example:
> dot1x supp clear port 10 statistics
dot1x supp disable port <PhyPortNameList> Disable dot1x supplicant on the specified su 6.4
ports.
Example:
> dot1x supp disable port 10
dot1x supp enable port <PhyPortNameList> Enable dot1x supplicant on the specified su 6.4
ports.
Example:
> dot1x supp enable port 10
dot1x supp set port <PhyPortNameList> Set the attributes for the supplicant, su 6.4
including:
Example:
> dot1x supp set port 10 authentication-period 50
dot1x supp show [stats]|[port Shows 802.1x supplicant information for su/lu 6.4
<PhyPortNameList>] all or the specified ports. Optionally,
shows supplicant statistics for all ports.
Example:
> dot1x supp show stats
dot1x supp unset port <PhyPortNameList> Clears supplicant user name and/or su 6.4
{[password], [username]} password.
Example:
> dot1x supp unset port 10 username User1 password mysecret
eoam
NOTE: To enable EOAM commands, the Advanced OAM feature license must be installed
with the software license install command.
Example:
> eoam clear statistics
eoam disable [port <PhyPortNameList>] Disables EOAM globally or, if a list of su 6.2
ports is specified, the administrative
state of the specified ports is set to
Disabled.
Example:
> eoam disable port 15
eoam enable [port <PhyPortNameList>] Enables EOAM globally. If a list of ports is su 6.2
specified the administrative state of the
specified ports is set to Enabled.
Example:
> eoam enable port 15
eoam loopback stop port <PhyPortNameList> Stops OAM loopback on the specified su 6.2
port. This command is not saved as part
of configuration.
Example:
> eoam loopback stop port 15
eoam loopback start port <PhyPortNameList> Starts OAM loopback on the specified su 6.2
port. The port may or may not
successfully enter loopback, because it
depends on negotiation with the peer.
This command not saved as part of
configuration.
Example:
> eoam loopback start port 15
Example:
> eoam loopback ignore port 7
Example:
> eoam loopback process port 15
eoam loopback show [port Show the current loopback statistics for su/lu 6.2
<PhyPortNameList>] the entire switch or the specified ports.
Example:
> eoam loopback show port 15
eoam set port <PhyPortNameList> Sets the port attributes, including: su 6.2
Example:
> eoam set port 15 dying-gasp on
Example:
> eoam show link-events
file
The CLI includes several commands for directory/file manipulation. These commands do
not follow the defined CLI schema but instead use a standard UNIX-type implementation:
FileName = <String[127]>
DirName = <String[127]>
Example:
> file cat /mnt/sysfs/archive/default.arc
SYSTEM_UPTIME_SEC=1359
HIGH_TEMP_DEGC=0
HIGH_TEMP_VIOLATIONS=0
LOW_TEMP_DEGC=50
LOW_TEMP_VIOLATIONS=0
SOFT_REBOOT_COUNT=0
TOTAL_REBOOT_COUNT=0
UNKNOWN_ARCHIVE_PARAM=2
Example:
> file cd /mnt/sysfs/archive
file chmod <NUMBER: 0,2,4,6> <FileName> Changes the access mode of the specified su 6.0
file.
0 - No access allowed
2 - Write
4 - Read only
6 - Read/write
Example:
> file cd /mnt/sysfs/archive
Example:
> file cp /mnt/sysfs/archive/default.arc /mnt/sysfs/archives/02-14-08.arc
file ls [-la] [<DirName>] Lists files in the working directory or a su/lu 6.0
specific directory.
Example:
> file mkdir myDir
Example:
> file mv /mnt/sysfs/archives/02-14-08.arc /tmp/02-14-08.arc
file pwd The pwd command displays the present su/lu 6.0
working directory.
Example:
> file pwd
/
Example:
> file rm /mnt/sysfs/archives/02-14-08.arc
file rmdir [-f] <DirName> The rmdir command removes a directory su 6.0
or multiple directories.
Example:
> file rmdir myDir
Example:
> file rmtree myDirTree
file tget <IpHost> <RemoteFileName> Gets a file from a TFTP server. su 6.0
<LocalFileName>
file tput <IpHost> <RemoteFileName> Sends a file to a remote TFTP server. su/lu 6.0
<LocalFileName>
Example:
> file tput 192.168.10.161 default.arc default.arc
flow
Example:
> flow aging disable
Example:
> flow aging enable
Example:
> flow aging set time 300
Example:
> flow aging show
set mode <payload | transport> • payload—do not use IFG in the 6.4
calculations.
• transport—use IFG in the
calculations.
Example:
> flow bw-calculation-mode set mode payload
flow mac-addr find mac <MacAddress> Finds the specified MAC address. Options su/lu 6.0
include:
Example:
> flow mac-addr find mac 00:01:aa:bb:dd:ff
Example:
> flow access-control create port 5 max-dynamic-macs 16000 forward-unlearned on
Example:
> flow access-control delete port 5
flow access-control show Displays access control for all ports. su 6.3
Example:
> flow access-control show
+-----------------------------+
| Access Control |
|-----------------------------|
| Port | MAC | Learned |
| Name | Limit | |
+---------+---------+---------+
| 1 | 16000 | 0 |
| 2 | 16000 | 0 |
| 3 | 16000 | 0 |
| 4 | 16000 | 0 |
| 5 | 16000 | 0 |
| 6 | 16000 | 0 |
| 7 | 16000 | 0 |
| 8 | 16000 | 0 |
| 9 | 16000 | 0 |
| 10 | 16000 | 0 |
+---------+---------+---------+
flow cpu-rate-limit clear Clears CPU rate limiting statistics for the su 6.4
specified port.
{statistics} 6.4
Example:
> flow cpu-rate-limit clear port 15 statistics
Example:
> flow cpu-rate-limit disable port 15
Example:
> flow cpu-rate-limit enable port 15
flow cpu-rate-limit set Sets the CPU rate limits, in Packets Per su 6.4
Second (PPS), for the port and packet
classes, including the following
parameters:
Example:
> flow cpu-rate-limit set port 15 twamp 300
flow cpu-rate-limit show Displays CPU rate limiting global status. su/lu 6.4
Optionally, displays:
Example:
> flow cpu-rate-limit show port 1
+------------------------------------+
| Packets Per Second Rate Limits |
| Port | Packet Class | PPS Rate |
+------+-----------------+-----------+
| 15 | Bootp/DHCP | 5 |
| 15 | CFM | 50 |
| 15 | CFT | 250 |
| 15 | Dot 1X | 5 |
| 15 | EOAM | 5 |
| 15 | EPR ARP | 5 |
| 15 | IGMP | 5 |
| 15 | INET/IP | 700 |
| 15 | LACP | 5 |
| 15 | LLDP | 5 |
| 15 | MPLS | 5 |
| 15 | MSTP | 5 |
| 15 | PE ARP | 5 |
| 15 | PVST | 5 |
| 15 | RSTP | 5 |
| 15 | Loopback | 5 |
| 15 | Remote Loopback | 5 |
| 15 | TWAMP TST | 100 |
| 15 | TWAMP RSP | 250 |
| 15 | Default | 500 |
+------+-----------------+-----------+
flow cpu-rate-limit unset Resets CPU rate limits to the default su 6.4
rates:
Example:
> flow cpu-rate-limit unset port 15 twamp
Example:
> flow mac-addr flush vlan 127
flow mac-addr show Displays all dynamic and static MAC su/lu 6.0
address entries. Optionally, displays:
[vlan <VlanList> [mac <MacAddress>|table- • All entries for a specific VLAN, a 6.0
count]] specific MAC address within the
specified VLAN, or a count of all
entries for the specified VLAN.
Example:
> flow mac-addr show
Example:
> flow show aging
flow static-mac add Adds a static mac entry to the table with su 6.0
the following attributes:
Example:
> flow static-mac add mac 00:11:22:33:44:55 port 5 vlan 127
flow static-mac remove Adds a static mac entry to the table with su 6.0
the following attributes:
Example:
> flow static-mac remove mac 00:11:22:33:44:55 port 5 vlan 127
flow static-mac show Adds a static mac entry to the table with su 6.0
the following attributes:
Example:
> flow static-mac show
+-------- FLOW STATIC-MAC TABLE --------+
| VLAN | Address | Port |
+--------+-------------------+----------+
| 127 | 00:11:22:33:44:55 | 5 |
| 127 | 00:33:33:33:33:33 | 3 |
+--------+-------------------+----------+
interface
Example:
> interface ip-acl add ip 10.10.10.100 netmask 255.255.255.255
interface ip-acl clear statistics Clears the global and IP-ACL entry su 6.4
statistics counters.
Example:
> interface ip-acl clear statistics
Example:
> interface ip-acl enable
Example:
> interface ip-acl disable
Example:
> interface ip-acl import
Example:
> interface ip-acl remove ip 10.10.10.100 netmask 255.255.255.255
interface ip-acl set [ip <IPAddress>] [netmask Updates an IP-ACL entry. su 6.4
<IPAddress>] [port <PortNameList>]
Example:
> interface ip-acl remove ip 10.10.10.100 netmask 255.255.255.0
interface ip-acl show Displays the current state of the IP-ACL su/lu 6.4
facility and the individual IP-ACL entries.
Example:
> interface ip-acl show
Example:
> interface local disable
Example:
> interface local enable
Example:
> interface local set ip 1.2.3.4
Example:
> interface remote disable
Example:
> interface remote enable
Example:
> interface remote set ip 1.2.3.4
Example:
> interface remote show
interface route add Adds a route to the routing table with the su 6.0
following attributes:
Example:
> interface route add gateway 172.16.233.0 genmask 255.255.255.0
interface route remove Removes a route from the routing table su 6.0
specified by the following attributes:.
Example:
> interface route remove gateway 172.16.233.0
Example:
>interface route show
interface serial-console disable Disables login access to the serial console su 6.0
interface.
Example:
> interface serial-console disable
interface serial-console enable Enables login access to the serial console su 6.0
interface.
Example:
> interface serial-console enable
interface serial-console show Displays the status of the serial console su/lu 6.0
interface.
Example:
> interface serial-console show
+----------------serial console---------------+
| Parameter | Value |
+----------------------+----------------------+
| serial login | disabled |
+----------------------+----------------------+
Example:
> interface show gateway
lldp
Link Layer Discovery Protocol (LLDP) commands.
Example:
>lldp clear port 1 statistics
Example:
>lldp disable
Example:
>lldp enable
Example:
>lldp set msg-interval 60
lldp set port <PhyPortNameList> Sets the per port attributes, including: su 6.1
Example:
>lldp set port 3/1 mode disable notification off
Example:
>lldp show port 1 configuration
+----------- LLDP Port Configuration -----------+
| | | Basic | Org Specific | |
| | Admin |TLV Type| Dot1 |Dot3| | |
| Port | State |123456789|1234567|1234| |Notif|
+------+-------+---------+-------+----+---+-----+
|1 | Tx-Rx |111111111|1 1111|1111| | Off |
+------+-------+---------+-------+----+---+-----+
Where: ||||||||| ||||||| ||||
Dot3 Type ||||||||| ||||||| |||+-- 4 Maximum Frame Size TlvTx
Dot3 Type ||||||||| ||||||| ||+-- 3 Link Aggregation TlvTx
Dot3 Type ||||||||| ||||||| |+-- 2 Power via MDI TlvTx
Dot3 Type ||||||||| ||||||| +-- 1 MacPhy Config TlvTx
Dot1 Type ||||||||| ||||||+-- 7 Protocol ID OAM TlvTx
Dot1 Type ||||||||| |||||+-- 6 Protocol ID Dot1X TlvTx
Dot1 Type ||||||||| ||||+-- 5 Protocol ID STP TlvTx
Dot1 Type ||||||||| |||+-- 4 Protocol ID LACP TlvTx
Dot1 Type ||||||||| ||+-- 3 VLAN Name TlvTx
Dot1 Type ||||||||| |+-- 2 Port&Protocol VLAN ID TlvTx
Dot1 Type ||||||||| +-- 1 Port VLAN ID TlvTx
Basic Type ||||||||+-- 9 Local Mgmt Address TlvTx
Basic Type |||||||+-- 8 Remote Mgmt Address TlvTx
Basic Type ||||||+-- 7 System Capabilities TlvTx
Basic Type |||||+-- 6 System Description TlvTx
Basic Type ||||+-- 5 System Name TlvTx
Basic Type |||+-- 4 Port Description TlvTx
Basic Type ||+-- 3 Time-to-Live TlvTx
Basic Type |+-- 2 Port ID TlvTx
Basic Type +-- 1 Chassis ID TlvTx
lldp tlvtx set port <PhyPortNameList> Sets the per port TLV transmit su 6.1
parameters, including:
Example:
> lldp tlvtx set port 1 system-cap on
lldp tlvtx show Displays the LLDP TLV transmit su/lu 6.1
[port <PhyPortNameList>] configuration information for all or
specified ports.
Example:
>lldp tlvtx show
+- LLDP Config -+
| | Basic |
| |TLV Type|
| Port |123456789|
+------+---------+
|1 |111111111|
|2 |111111111|
|3 |111111111|
|4 |111111111|
|5 |111111111|
|6 |111111111|
|7 |111111111|
|8 |111111111|
|9 |111111111|
|10 |111111111|
+------+---------+
Where: |||||||||
||||||||+-- 9 Local Mgmt Address TlvTx
|||||||+-- 8 Remote Mgmt Address TlvTx
||||||+-- 7 System Capabilities TlvTx
|||||+-- 6 System Description TlvTx
||||+-- 5 System Name TlvTx
|||+-- 4 Port Description TlvTx
||+-- 3 Time-to-Live TlvTx
|+-- 2 Port ID TlvTx
+-- 1 Chassis ID TlvTx
lldp tlvtx-dot1 set port <PhyPortNameList> Sets the 802.1 per port TLV transmit su 6.1
parameters, including:
Example:
> lldp tlvtx-dot1 set port 1 port-vlan-id off
lldp tlvtx-dot1 show Displays the LLDP 802.1 TLV transmit su/lu 6.2
[port <PhyPortNameList>] configuration information for all or
specified ports.
Example:
>lldp tlvtx-dot1 show
+ LLDP Config +
| |Org Spe|
| | Dot1 |
| Port |1234567|
+------+-------+
|1 |1 1111|
|2 |1 1111|
|3 |1 1111|
|4 |1 1111|
|5 |1 1111|
|6 |1 1111|
|7 |1 1111|
|8 |1 1111|
|9 |1 1111|
|10 |1 1111|
+------+-------+
Where: |||||||
||||||+-- 7 Protocol ID OAM TlvTx
|||||+-- 6 Protocol ID Dot1X TlvTx
||||+-- 5 Protocol ID STP TlvTx
|||+-- 4 Protocol ID LACP TlvTx
||+-- 3 VLAN Name TlvTx
|+-- 2 Port&Protocol VLAN ID TlvTx
+-- 1 Port VLAN ID TlvTx
lldp tlvtx-dot3 set port <PhyPortNameList> Sets the 802.1 per port TLV transmit su 6.2
parameters, including:
Example:
> lldp tlvtx-dot3 set port 1 link-agg off
lldp tlvtx-dot3 show Displays the LLDP 802.3 TLV transmit su/lu 6.1
[port <PhyPortNameList>] configuration information for all or
specified ports.
Example:
> lldp tlvtx-dot3 show
+ LLDP Config +
| |Org Spe|
| | Dot3 |
| Port |1234 |
+------+-------+
|1 |1111 |
|2 |1111 |
|3 |1111 |
|4 |1111 |
|5 |1111 |
|6 |1111 |
|7 |1111 |
|8 |1111 |
|9 |1111 |
|10 |1111 |
+------+-------+
Where: ||||
|||+-- 4 Maximum Frame Size TlvTx
||+-- 3 Link Aggregation TlvTx
|+-- 2 Power via MDI TlvTx
+-- 1 MacPhy Config TlvTx
log
Example:
> log flash add filter myFilter blade-mgr all
log flash add pkt-filter Adds packet types or ports to a flash log su 6.1
<LogFlashPacketFilterName[15]> pkt-filter, including:
Example:
> log flash add pkt-filter myPktFilter lldp-pkt all
Example:
> log flash clear
log flash log flash create filter Creates a flash log filter with the su 6.1
<LogFlashFilterName[15]> following attributes:
Example:
> log flash create filter myFilter min-severity debug
log flash create pkt-filter Creates a flash log packet filter with the su 6.1
<LogFlashPacketFilterName[15]> following packet types:
Example:
> log flash create pkt-filter myPktFilter
Example:
> log flash delete filter myFilter
log flash delete pkt-filter Deletes a flash log packet filter. su 6.1
<LogFlashPacketFilterName[15]>
Example:
> log flash delete pkt-filter myPktFilter
Example:
> log flash disable pkt-filter myPktFilter
Example:
> log flash enable pkt-filter myPktFilter
log flash remove filter Removes attributes from a log flash su 6.1
<LogFlashFilterName[15]> filter, including:
Example:
> log flash remove filter myFilter blade-mgr all
log flash remove pkt-filter Remove packet types from a packet su 6.1
<LogFlashPacketFilterName[15]> filter, including:
Example:
> log flash create pkt-filter myPktFilter
log flash set filter <LogFlashFilterName[15]> Set severity attributes for a flash log su 6.1
filter, including:
Example:
> log flash set filter filter myFilter min-severity info
log flash set pkt-filter Set attributes for a flash log pkt-filter su 6.1
<LogFlashPacketFilterName[15]>
Example:
> log flash set pkt-filter myFilter min-severity info
log flash show Displays a summary of global flash log su/lu 6.1
configuration. Optionally, displays:
Example:
> log flash show
log flash view Display the entries made to flash since su/lu 6.1
the last time this command was entered.
Options include:
[tail <NUMBER: 1-100>]| • The 'tail' attribute will display the 6.1
last number of lines specified.
Example:
> log flash view tail 5
January 2, 2000 17:02:09.000 ntwrk: :Vlan add port vlan 200 added port 3
January 2, 2000 17:02:09.000 ntwrk: :Vlan add port vlan 200 added port 4
January 2, 2000 17:02:16.000 chassis: DHCP IP 172.25.0.2 User dhcp:DHCP System
Time Offset Set, tJanuary 2, 2000 17:02:16.000 chassis: DHCP IP 172.25.0.2 User
dhcp:DHCP System Time Offset Set, tJanuary 2, 2000 17:02:28.000 snmp: :Cannot
ping gateway, cannot send cold trap but making an attempt
log ram add filter <LogRamFilterName[15]> Adds attributes to a ram log filter, su 6.2
including:
Example:
> log ram add filter myFilter blade-mgr all
log ram add pkt-filter Adds packet types or ports to a ram log su 6.2
<LogRamPacketFilterName[15]> pkt-filter, including:
Example:
> log ram add pkt-filter myPktFilter lldp-pkt all
Example:
> log ram clear
log ram log ram create filter Creates a ram log filter with the su 6.2
<LogRamFilterName[15]> following attributes:
Example:
> log ram create filter myFilter min-severity debug
log ram create pkt-filter Creates a ram log packet filter with the su 6.2
<LogRamPacketFilterName[15]> following packet types:
Example:
> log ram create pkt-filter myPktFilter
Example:
> log ram delete filter myFilter
log ram delete pkt-filter Deletes a ram log packet filter. su 6.2
<LogRamPacketFilterName[15]>
Example:
> log ram delete pkt-filter myPktFilter
Example:
> log ram disable pkt-filter myPktFilter
Example:
> log ram enable pkt-filter myPktFilter
log ram remove filter Removes attributes from a log ram filter, su 6.2
<LogRamFilterName[15]> including:
Example:
> log ram remove filter myFilter blade-mgr all
log ram remove pkt-filter Remove packet types from a packet su 6.2
<LogRamPacketFilterName[15]> filter, including:
Example:
> log ram create pkt-filter myPktFilter
log ram set filter <LogRamFilterName[15]> Set severity attributes for a ram log su 6.2
filter, including:
Example:
> log ram set filter filter myFilter min-severity info
log ram set pkt-filter Set attributes for a ram log pkt-filter su 6.2
<LogRamPacketFilterName[15]>
Example:
> log ram set pkt-filter myFilter min-severity info
log ram set global-notify <on|off> Enables or disables broadcasting of RAM su 6.5
log entries to all active CLI sessions.
Example:
> log ram set global-notify on
log ram show Displays a summary of global ram log su/lu 6.2
configuration. Optionally, displays:
Example:
> log ram show
log ram trace Activates and displays the RAM trace su/lu 6.2
buffer to monitor current entries as they
occur. To exit the RAM trace buffer
commands, press Ctrl+C.
Example:
> log ram trace
(trace activated)
May 6, 2009 14:14:26.604 chassis: Telnet IP 1.90.90.24 User su:System Session More Enable
--break--
> log ram trace all
January 1, 2000 00:00:39.880 interface: :local interface is operationally enabled
January 1, 2000 00:00:40.344 interface: :remote interface is operationally enabled
January 1, 2000 00:00:40.882 interface: :local interface is operationally enabled
January 1, 2000 00:00:46.121 Software: saos-06-03-00-0091 Build 91
January 1, 2000 00:00:48.632 interface: :remote interface is operationally enabled
January 1, 2000 00:00:56.045 interface: DHCP IP 10.10.121.2 User root:remote interface is
operationally enabled
January 1, 2000 00:01:01.069 chassis: DHCP IP 10.10.121.2 User root:DC power supply 1 failure
-----------------------------------
log send Sends a message for flash and RAM log su 6.4
files to test filters, specified by:
Example:
> log reset-to-factory-default
Example:
> log reset-to-factory-default
mstp
NOTE: To enable MSTP commands, the Advanced Ethernet feature license must be
installed with the software license install command.
Example:
> mstp clear port 1 statistics
Example:
> mstp disable port 1
Example:
> mstp enable port 1
[max-age <NUMBER: 6-40>], • Maximum age limits the BPDU life 6.3
span to limit the size of the
spanning tree. The default value
is '20'.
Example:
> mstp set mst-cfg-id-name "MST Region 1" mst-cfg-id-rev-level 1
mstp set cist bridge-priority <NUMBER: 0-15> The bridge-priority assigned to the CIST su 6.3
for the bridge is used in the priority
component of the CIST Bridge Identifier
of BPDUs transmitted from this bridge.
Example:
> mstp set cist bridge-priority 1
mstp set port <PortNameList> Sets options for the specified ports, su 6.3
including:
[ext-path-cost <NUMBER: 1-200000000>] • Sets the external port path cost 6.3
for the specified port, which
takes effect only if 'dynamic-ext-
path-cost' is set to 'off'. The
default value is '20000'.
Example:
> mstp set port 2 dynamic-ext-path-cost on
mstp set cist-port Set the CIST port parameters, including: su 6.3
[int-path-cost <NUMBER: 1-200000000>], • Sets the CIST internal root path 6.3
cost for the specified port(s).
Allowable path cost values are 1-
200000000. This sets the CIST
Internal Root Path Cost field in
BPDUs transmitted from the
specified port(s). This value will
not be used in the BPDU if
dynamic internal path cost is
enabled for the CIST on the
specified port(s). The default is
20000.
Example:
> mstp set cist-port dynamic-int-path-cost on
Example:
> mstp show
mstp show port <PortNameList> Displays the CIST information for the su/lu 6.3
specified port(s). Optionally, displays:
Example:
> mstp show port 2 statistics
Example:
> mstp show mst-cfg-id
multicast-services
NOTE: To enable Multicast Services, the Advanced Ethernet feature license must be
installed with the software license install command.
Example:
> multicast-services create vlan 778
Example:
> multicast-services delete vlan 778
Example:
> multicast-services disable vlan 777
Example:
> multicast-services enable vlan 777
Example:
> multicast-services igmp-snooping disable
Example:
> multicast-services igmp-snooping enable
Example:
> multicast-services igmp-snooping reset vlan 778 default-router-port
Example:
> multicast-services igmp-snooping set query-engine on
Example:
> multicast-services server-port add vlan 778 port 10
multicast-services server-port remove Removes a port from a server port group. su 6.1
Example:
> multicast-services server-port remove vlan 778 port 10
Example:
> multicast-services show brief
+-----------------------------------------------------------------------------+
| Multicast-Services: Global Enable |
+-----+-----+-----+---+-----+------+------+------+------+---------------------+
| | | | | WMF |Router|Chan |IGMP |Router|Linger|Total | |
| VLAN|Multi|Snoop|UMF|LIAMS| Port |Stream|Groups|Groups|Groups|Member| |
+-----+-----+-----+---+-----+------+------+------+------+---------------------+
| 777|enabl|disab| F |DDDDD| UNKN | 10 | 10 | 10 | 0 | 0| |
| 778|enabl|disab| F |DDDDD| UNKN | 0 | 0 | 0 | 0 | 0| |
+-----+-----+-----+---+-----+------+------+------+------+---------------------+
multicast-services show configuration Displays all configuration settings for all su/lu 6.1
VLANs or specified VLANs.
Example:
> multicast-services show configuration vlan 777
+----------------------------------------------------+------------------------+
| MULTICAST CONFIGURATION VLAN 777 VLAN#777 |
+----------------------------------------------------+------------------------+
| Global Multicast Services | enable |
| Multicast Services | enable |
| UMF | flood |
| WKM Local Control | flood |
| WKM Adhoc | flood |
| WKM St-Multicast | flood |
| WKM SDP-SAP | flood |
| WKM Internetwork Control | flood |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURATION (general) |
+----------------------------------------------------+------------------------+
| IGMP Snooping | disable |
| IGMP Server Topology | centralized |
| IGMP Query Engine | off |
| IGMP Leave Mode | fast |
| L2 Packet Priority | 7 |
| Robustness | 1 |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURATION (proxy query) |
+----------------------------------------------------+------------------------+
| Proxy Query Interval (s) | 125 |
| Proxy Query Response Interval (ds) | 50 |
| Proxy Query Delay (ds) | 10 |
| Proxy Query Source Address | 0.0.0.0 |
| Last Member Query Interval (ds) | 10 |
+----------------------------------------------------+------------------------+
| IGMP CONFIGURATION (router) |
+----------------------------------------------------+------------------------+
| Router Query Interval (s) | 250 |
| Linger Timeout (s) | 120 |
| Active Linger Timeout (s) | 30 |
| Minimum Query Response Interval (ds) | 50 |
| Group Address Range (start) | 0.0.0.0 |
| Group Address Range (end) | 0.0.0.0 |
| Default Router Port | 0 |
+----------------------------------------------------+------------------------+
multicast-services show everything Displays all multicast configuration and su/lu 6.1
status for all VLANs or specified VLANs.
Example:
> multicast-services show everything
+----------------------------------------------------+------------------------+
| MULTICAST CONFIGURATION VLAN 777 VLAN#777 |
+----------------------------------------------------+------------------------+
...
| IGMP CONFIGURATION (general) |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| IGMP CONFIGURATION (proxy query) |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| IGMP CONFIGURATION (router) |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| IGMP Operational Status VLAN 777 VLAN#777 |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| EXTERNAL IGMP QUERIER (router) | |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| MULTICAST GROUP STATUS |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
| IGMP STATISTICS |
+----------------------------------------------------+------------------------+
...
+----------------------------------------------------+------------------------+
multicast-services show group-status Displays status of all multicast groups for su/lu 6.1
all VLANs. Optionally, displays:
Example:
> multicast-services show group-status
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.001| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.002| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.003| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.004| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.005| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.006| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.007| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.008| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.009| act |stat|router| 14 | 0d 17h 22m 22s| |
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.010| act |stat|router| 14 | 0d 17h 22m 22s| |
+-----------------------------------------------------------------------+
+-----------------------------------------------------------------------+
multicast-services show groups Displays multicast groups for all VLANs su/lu 6.1
and ports. Optionally, displays multicast
groups for:
Example:
> multicast-services show groups
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.001| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.002| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.003| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.004| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.005| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.006| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.007| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.008| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.009| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.010| act |stat|router| 14 | 0d 17h 35m 43s| |
+----+---------------+-----+----+------+-------+----------------+-------+
multicast-services show status Shows multicast status for all VLANs. su/lu 6.1
Optionally displays status for:
Example:
> multicast-services show groups
+----+---------------+-----+----+------+-------+----------------+-------+
|VLAN|IP address |state|type|source|members| uptime |timeout|
+----+---------------+-----+----+------+-------+----------------+-------+
| 777|225.001.000.001| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.002| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.003| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.004| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.005| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.006| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.007| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.008| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.009| act |stat|router| 14 | 0d 17h 35m 43s| |
| 777|225.001.000.010| act |stat|router| 14 | 0d 17h 35m 43s| |
+----+---------------+-----+----+------+-------+----------------+-------+
Example:
> multicast-services umf drop vlan 777
multicast-services umf flood vlan <VlanList> Disables UMF on the specified VLAN(s). su 6.1
Example:
> multicast-services umf flood vlan 777
ntp-client
Example:
> ntp-client add server 192.83.249.31
ntp-client disable [server <IpAddress>] Disables the NTP client or disables the su 6.1
specified server IP address or host name
from being used for date and time
polling.
Example:
> ntp-client disable server 192.83.249.31
ntp-client enable [server <IpAddress>] Disables or enables NTP globally or for su 6.1
the specified server IP address or host
name.
Example:
> ntp-client enable server 192.83.249.31
Example:
> ntp-client remove server 192.83.249.31
Example:
> ntp-client set mode polling polling-interval 64
ntp-client md5-auth add Adds an NTP MD5 key plain text entry su 6.2
with the following attributes:
Example:
> ntp-client md5-auth add key-id 1 md5 myNTPkey
ntp-client md5-auth secret Adds a secret NTP MD5 encrypted key su 6.2
entry with the following attributes:
Example:
> ntp-client md5-auth secret key-id 5 md5 3bf313a5
Example:
> ntp-client md5-auth disable
Example:
> ntp-client md5-auth enable
ntp-client md5-auth import filename <String> Imports NTP MD5 keys from a file. su 6.2
Example:
> ntp-client md5-auth import filename myKeyFile.key
Example:
> ntp-client md5-auth remove key-id 7
ntp-client md5-auth show Displays the NTP state and MD5 key su/lu 6.2
entries.
Example:
> ntp-client md5-auth show
ntp-client show Displays the NTP state and server su/lu 6.1
configurations or the following options:
Example:
> ntp-client show
PBT
NOTE: PBT is not supported on the CN 3911 and CN 3920.
Example:
> pbt remote-bridge create bridge-name sw1 bridge-mac 00:02:a1:37:bc:60
Example:
> pbt remote-bridge delete bridge-name sw1
pbt remote-bridge show Displays a list of all remote bridge su/lu 6.4
entries.
Example:
> pbt remote-bridge show
pbt remote-bridge show bridge-name Displays information pertaining to the su/lu 6.4
<PbtBridge> specified remote bridge.
Example:
> pbt remote-bridge show bridge-name sw1
Example:
> pbt release bvid 112-115
pbt reserve bvid <VlanIdList> Reserves a set of Vlan IDs to be used for su 6.4
the tunnel BVIDs.
Example:
> pbt reserve bvid 112-115
pbt set bridge-mac <MacAddress> Sets the bridge mac address to be used by su 6.4
the device for PBT.
Example:
> pbt set bridge-mac 00:02:a1:30:7c:80
pbt set reversion-hold-time <NUMBER: 0- Sets the tunnel reversion hold timer 6.4
4294967295> value in milliseconds, which is the length
of time before traffic is restored from
the backup to primary, after the primary
tunnel is back up.
Example:
> pbt set reversion-hold-time 4000
pbt set service-tag-ethertype <NUMBER: Sets the value for the PBT Service su 6.4
2049-65535> EtherType tag. In order for PBT frames to
transit on devices other than the LE-
311v, set the tag value to '8100'. Also, set
the Acceptable frame type mode to 'all'
(port set port <PortNameList>
{[acceptable-frame-type <all|tagged-
only>]).
Example:
> pbt set service-tag-ethertype 0x88c8
pbt set tunnel-reversion <on|off> Turns on or off tunnel reversion, which 6.4
restores traffic from the backup to the
primary, after the primary tunnel is back
up. It is recommended that tunnel
reversion settings, on or off and
reversion delay time, are configured
the same on all remote bridges. The
default tunnel reversion value is 'off'.
Example:
> pbt set tunnel-reversion on
pbt set tunnel-tag-ethertype <NUMBER: 2049- Sets the value for the PBT Tunnel su 6.4
65535> EtherType tag.
Example:
> pbt set tunnel-tag-ethertype 0x88a8
Example:
> pbt show
port
Example:
>port disable port 1
port enable port <PortNameList> Enables or disables the specified port(s). su 6.0
Example:
>port enable port 1
Example:
> port monitor statistics active
<Screen clears>
port monitor port <PortName> Monitors a summary of current, total, or su/lu 6.5
{statistics|total-statistics|throughput} throughput statistics for a specific port.
Optionally, you can:
Example:
> port monitor port 1 statistics active delay 10
<Screen clears>
INFO: Waiting 10 seconds for display. Abort with CTRL-c
port set port <PortNameList> Sets the attributes for the specified port, su 6.0
including:
Example:
>port set port 1 ingress-to-egress-qmap myrcosmap1
Example:
>port show
+-----------------------------------------------------------------------------+
| Port Table | Operational Status | Admin Config |
|--------+--------+----+--------------+----+---+-------+----+----+-------+----|
| Port | Port | | Link State | | | |Auto| | |Auto|
| Name | Type |Link| Duration |XCVR|STP| Mode |Neg |Link| Mode |Neg |
|--------+--------+----+--------------+----+---+-------+----+----+-------+----|
| 1 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena |1000/FD| On |
| 2 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena |1000/FD| On |
| 3 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena |1000/FD| On |
| 4 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena |1000/FD| On |
| 5 |10/100/G|Down| 0d 0h 0m 0s| |FWD|1000/FD| On |Ena |1000/FD| On |
| 6 |10/100/G|Down| 0d 0h 0m 0s| |FWD|1000/FD| On |Ena |1000/FD| On |
| 7 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena |1000/FD| On |
| 8 |10/100/G|Down| 0d 0h 0m 0s| |FWD|1000/FD| On |Ena |1000/FD| On |
| 9 |10/100/G| Up | 0d 0h 0m 0s| |FWD| 100/FD| On |Ena | 100/FD| On |
| 10 |10/100/G|Down| 0d 0h 0m 0s| |FWD| 100/FD| On |Ena | 100/FD| On |
+--------+--------+----+--------------+----+---+-------+----+----+-------+----+
port show {statistics|total- Displays a summary of current, total, or su/lu 6.0 statistics,
statistics|throughput} throughput statistics for all ports. 6.5 total-
Optionally, you can: statistics and
throughput
Example:
> port show statistics active
port show port <PortName> Display details or capabilities for the su/lu 6.0
specified port.
Example:
>port show port 1
port show port <PortName> {statistics|total- Displays a summary of current, total, or su/lu 6.0 statistics,
statistics|throughput} throughput statistics for a specific port. 6.5 total-
Optionally, you can: statistics and
throughput
Example:
> port show port 1 statistics active
Example:
> port state-mirror-group add group PSMG1 src-port 3,4 dst-port 1,2,5,6
port state-mirror-group create group Creates a Port State Mirror Group. su 6.2
<PortStateMirrorGroupName[15]>
Example:
> port state-mirror-group create group PSMG1
port state-mirror-group delete group Deletes a Port State Mirror Group. su 6.2
<PortStateMirrorGroupName[15]>
Example:
> port state-mirror-group delete group PSMG1
port state-mirror-group remove group Deletes ports from a Port State Mirror su 6.2
<PortStateMirrorGroupName[15]> port group.
<PortNameList>
Example:
> port state-mirror-group remove group PSMG1 port 1-3
port state-mirror-group rename group Renames a Port State Mirror Group. su 6.2
<PortStateMirrorGroupName[15]> name
<String[15]>
Example:
> port state-mirror-group rename group PSMG1 name Group1
port state-mirror-group set group Sets the attributes for a Port State Mirror su 6.2
<PortStateMirrorGroupName[15]> Group, including:
Example:
> port state-mirror-group set group PSMG1 type bi-directional
port state-mirror-group show Displays Port State Mirror Group su/lu 6.2
[group <PortStateMirrorGroupName[15]>] configurations for all PSMGs or a
specified group.
Example:
> port state-mirror-group show
port unset port <PortNameList>{ Clears the egress mirror or ingress su 6.0
<egress-mirror|ingress-mirror} mirror.
Example:
>port unset port 1 ingress-mirror
Example:
> port xcvr show
+----+-----+-----+---------Transceiver-Status------------+----------------+----+
| |Admin| Oper| |Ether Medium & |Diag|
|Port|State|State| Vendor Name & Part Number |Connector Type |Data|
+----+-----+-----+---------------------------------------+----------------+----+
|9 |Ena | |WORLDWIDEPACKETS XCVR-100D53 Rev10 |1000BASE-LX/LC |Yes |
|10 |Ena | |WORLDWIDEPACKETS XCVR-100D53 Rev10 |1000BASE-LX/LC |Yes |
+----+-----+-----+---------------------------------------+----------------+----+
port xcvr show port <PhyPortNameList> Displays transceiver information about su 6.0
the specified port including:
Example:
> port xcvr show port 10 state
+----+-----+-----+---------Transceiver-Status------------+----------------+----+
| |Admin| Oper| |Ether Medium & |Diag|
|Port|State|State| Vendor Name & Part Number |Connector Type |Data|
+----+-----+-----+---------------------------------------+----------------+----+
|10 |Ena | |WORLDWIDEPACKETS XCVR-100D53 Rev10 |1000BASE-LX/LC |Yes |
+----+-----+-----+---------------------------------------+----------------+----+
radius
Example:
> radius add server 10.10.10.100 priority 1
Example:
> radius disable
Example:
> radius enable server 10.10.10.100
Example:
> radius remove server 10.10.10.100
radius set server <IpHost> { Updates the host priority, UDP port, or 6.3.1
[priority <NUMBER:1-8>], server use.
[udp-port <NUMBER:1-65535>],
[use-for <all|dot1x|user-login>]}
Example:
> radius set key 2manysecrets retries 2 timeout 2
radius set server <IpHostRadius> Sets the RADIUS server attributes, su 6.3
including:
Example:
> radius set server 10.10.10.100 use-for user-login
Example:
> radius show
+-- RADIUS ATTRIBUTES --+
| Parameter | Value |
+-------------+---------+
| Admin State | Enabled |
| Oper State | Enabled |
| Retries | 3 |
| Timeout | 1 |
| Key | ******* |
| Search type | Cached |
+-------------+---------+
+---------------------------------------------------+
| IP Address : 10.10.10.100 |
| Access Requests : 971 |
| Access Rejects : 0 |
| Access Accepts : 971 |
| Access Challenges : 0 |
| Access Retransmission : 0 |
| Bad Autheticators : 0 |
| Pending Requests : 0 |
| Packets Dropped : 0 |
| Malformed Responses : 0 |
+---------------------------------------------------+
rmon
Example:
> rmon alarm add data-source 1.3.6.1.2.1.16.1.1.1.5 index 1 interval 30 owner Admin sample-
type absolute startup-alarm both falling-event-index 1 fallingthreshold 100 rising-event-index
1 rising-threshold 900
rmon alarm remove index <NUMBER:1-65535> Removes the specified Ethernet statistics su 6.2
entry.
Example:
> rmon alarm remove index 1
Example:
> rmon event add index 1 description Test type log community Network1 owner
Admin
rmon event remove index <NUMBER:1-65535> Removes the specified Ethernet statistics su 6.2
entry.
Example:
> rmon event remove index 1
Example:
> rmon history add data-source 1.3.6.1.2.1.16.1.1.1.5 index 1 interval 12 num-
buckets 78 owner Admin
rmon history remove index <NUMBER:1- Removes the specified Ethernet statistics su 6.2
65535> entry.
Example:
> rmon history remove index 1
Example:
> rmon show event-table
WARNING: This CLI output may take few minutes, depends on the number of entries
Example:
> rmon show event-table
WARNING: This CLI output may take few minutes, depends on the number of entries
Example:
> rmon statistics add data-source ifindex.10001 index 1
rmon statistics remove index <NUMBER:1- Removes the specified Ethernet statistics su 6.2
65535> entry.
Example:
> rmon statistics add data-source ifindex.10001 index 1
rmon usr-history add-object Adds an SNMP object to the user history su 6.2
table. The control-index points to the
control record created with the usr-
history add-control
command.
Example:
> rmon usr-history add-object index 1 control-index 1 sample-type absolute object snmpInPkts.0
Example:
> rmon usr-history remove-object index 1 control-index 1
Example:
> rmon usr-history add-control index 1
rmon usr-history remove-control Removes a user history control record. su 6.2
Example:
> rmon usr-history remove-control index 1
snmp
NOTE: To allow SNMPv3 packets with an authentication only security level setting
(authNoPriv) or an authentication with privacy security level setting (authPriv), the
Advanced Security feature license must be installed with the software license
install command.
Example:
>snmp add community MyCommunity ip 1.1.1.1 permission read-only
Example:
>snmp add trap-server 1.2.3.4 community MyCommunity
snmp create user <String[32]> Creates a user entry and its su 6.2
authentication and privacy protocol
attributes, including:
Example:
> snmp create user user1 auth-protocol md5 priv-protocol noPriv auth-password mypassword
snmp create viewtree <String[32]> Creates a view tree entry specified by: su 6.2
Example:
> snmp create viewtree SNMPv3_view sub-tree mgmt type include
snmp create access-entry <String[32]> Creates an access policy for the specified su 6.2
group name with the following
attributes:
Example:
> snmp create access-entry group1 sec-model v1 sec-level noAuth read-view trap notify-view trap
snmp create target <String[32]> Creates a target (trap receiver) entry su 6.2
with the following options:
Example:
> snmp create target TRAPS addr 10.10.10.10 param-name TRAPS
Example:
> snmp create community-index comm1 community mycommunity sec-name user1
Example:
> snmp delete user user1
Example:
> snmp delete viewtree SNMPv3_view
snmp delete target <String[32]> Deletes a target (trap receiver) entry. su 6.2
Example:
> snmp delete target TRAPS
Example:
> snmp delete target-param Target1
snmp delete access-entry <String[32]> Deletes access entry with specified group su 6.2
name and attributes, including:
Example:
> snmp delete access-entry group1 sec-model v1 sec-level noAuth
snmp delete community-index <String[32]> Deletes the mapping between the su 6.2
specified community name and its
corresponding SNMPv3 security group
name (access entry).
Example:
> snmp delete community-index comm1
Example:
>snmp disable
Example:
>snmp enable
snmp port-traps disable port <PortNameList> Disables port-based traps for the su 6.0
specified ports.
Example:
>snmp port-traps disable port 10
snmp port-traps enable port <PortNameList> Enables port-based traps for the su 6.0
specified ports.
Example:
>snmp port-traps enable port 10
Example:
>snmp remove community MyCommunity 1.1.1.1
snmp remove(DEPRECATED) trap-server Removes an SNMP trap server from the su 6.0
<IpAddress> specified community.
community <CommunityName>
Example:
>snmp remove trap-server 1.2.3.4 community MyCommunity
snmp security-to-group attach user <String> Attaches a user to a group with a su 6.2
specified security model. Attributes
include:
Example:
> snmp security-to-group attach user user1 sec-model v1 group group1
snmp security-to-group detach user <String> Detaches a user from a group with a 6.2
sec-model <v1|v2c|v3> specified security model.
Example:
> snmp security-to-group detach user user1 sec-model v1
snmp set community(DEPRECATED) Sets the permissions for the specified IP su 6.0
<CommunityName> ip <IpAddress> permission address and community
<read-only|read-write>
Example:
>snmp set community MyCommunity ip 1.1.1.1 permission read-write.
Example:
> snmp set contact "Customer Support, Ciena"
Example:
> snmp show
+----------------------SNMP GLOBAL CONFIGURATION-------------------------+
| Parameter | Value |
+-----------------------------+------------------------------------------+
| Operational status | Enable |
| System Contact | Customer Support, Ciena |
| System Location | Not Specified |
| Standard link-up-down trap | Enable |
| Enhanced link-up-down trap | Disable |
| L2 Sac Trap State | On |
| CFM Trap State | Enable |
| Unknown Security Models | 0 |
| Invalid Messages | 0 |
| Unknown PDU Handlers | 0 |
| UnSupported Security Levels | 0 |
| Not In Time Windows | 0 |
| Unknown User Names | 0 |
| Unknown Engine IDs | 0 |
+-----------------------------+------------------------------------------+
software
Example:
> software install package saos-06-04-00-0134 server 10.10.10.10 service-disruption allow
Example:
> software license install file license.txt server 172.16.172.100
Example:
> software license show
+-----------------------------------------------------------------------------+
| | | License | | Sequence | Days |
| Feature Name |Status | Domain | Admin | Number | Remain|
+------------------------------+-------+---------+-------+------------+-------+
| Base-Features |enable | | 00000 | 0000000000 | 00356 |
| Advanced-Security |enable |CN 3911 | 00002 | 0999999999 | 00356 |
| Advanced-Etherenet |enable |CN 3911 | 00002 | 0999999999 | 00356 |
| Advanced-OAM |enable |CN 3911 | 00002 | 0999999999 | 00356 |
+------------------------------+-------+---------+-------+------------+-------+
| Feature Name | License Key |
+-----------------------------------------------------------------------------+
| Base-Features | |
| Advanced-Security | X3CBI8SQ0JZAB1 |
| Advanced-Ethernet | X8CBI8SQ0JZAB4 |
| Advanced-OAM | XBCBI8SQ0JZAB5 |
+-----------------------------------------------------------------------------+
software license uninstall Uninstall license key for the specified su 6.2
feature-name <FeatureName> feature name.
software protect Duplicate all the image files from the su 6.4.1
running bank to make an identical copy
of image files in the standby bank. Note
that this feature is only available on the
CN 3940, CN 3960, and CN 5140.
Example:
>software report-sequence run command-file le-lnx.xml server 1.2.3.4
Example:
>software report-sequence upgrade package saos-06-00-01-0016 server 1.2.3.4
software reset Resets the last command and config files su 6.0
so that an upgrade will be triggered on
the next DHCP lease renew.
{[last-config-file] 6.0
[last-command-file]} 6.0
Example:
>software reset last-config-file last-command-file
Example:
>software run command-file le-lnx.xml server 1.2.3.4
Example:
>software show
+------------------------------------------------------------------------------+
| Software Information Slot #01 |
+------------------------------------------------------------------------------+
| Installed Package : saos-06-03-00-0077 |
| Running Package : saos-06-03-00-0077 |
| Package Build Info : Fri Sep 19 01:56:07 2008 shdbuilder tango.ciena.com |
| Running Kernel : Build 2 |
| Bootloader Version : 1.2.6 |
| Running MIB version : 02-03-04-0021 |
+------------------------------------------------------------------------------+
| Last command file: unknown |
| Last configuration file: unknown |
+------------------------------------------------------------------------------+
Example:
>software software upgrade package saos-06-03-00-0016 package-path ciena\packages\saos-06-03-
00-0016 server 1.2.3.4 service-disruption allow
NOTE: This operation cannot be interrupted once it has started.
WORKING: downloading file pmf-saos-06-03-00-0016.xml to /ram/pmf-saos-06-03-00-0016.xml
WORKING: downloading file pmf-saos-06-03-00-0016.xml to /ram/pmf-saos-06-03-00-0016.xml
...
ssh
NOTE: To enable SSHv2 commands, the Advanced Security feature license must be
installed with the software license install command.
Example:
> ssh-server add client 10.10.10.15
Example:
> ssh-server disable
Example:
> ssh-server enable
Example:
> ssh-server key generate
Example:
> ssh-server set authentication-retries 2 listener port 10
Example:
> ssh-server remove client 10.10.10.15
Example:
> ssh show
syslog
Example:
> syslog add collector 192.168.10.63 severity debug
syslog create collector <IpHost> Creates a Syslog collector with the su 6.2
following attributes:
Example:
> syslog create collector 192.168.10.63 severity
emergency,alert,critical,error,warning,notice,info,debug udp-port 1044
Example:
> syslog delete collector 192.168.10.63
syslog disable [collector <IpHostSyslog>] Globally disable Syslog. If the collector su 6.2
option is used, Syslog is only disabled on
the specified collector.
Example:
> syslog disable collector 192.168.10.63
syslog enable [collector <IpHostSyslog>] Globally enable Syslog. If the collector su 6.2
option is used, Syslog is only enabled on
the specified collector.
Example:
> syslog enable collector 192.168.10.63
syslog remove collector <IpHostSyslog> Removes one or more Syslog collector su 6.2
severity levels sent to the specified
collector.
Example:
> syslog remove collector 192.168.10.63 severity debug
Example:
> syslog send event 0x30001
Example:
> syslog set collector 192.168.10.63 facility 23
Example:
> syslog show
syslog show severity-mapping Displays the complete list of event lu/su 6.2
severities and how they map to Syslog
severities.
Example:
> syslog show severity-mapping
syslog show system-events Displays the complete list of all possible lu/su 6.2
system events. Note, this list Includes
events not supported on this platform.
Example:
> syslog show system-events
+ EVENTS ---------------------------------------------------------------------+
| Mgr: bcastContainment |
| Event Sev | Syslog Sev| Event # | Event |
+-----------+-----------+-----------------------------------------------------+
| warning | warning | 0x10001 | Broadcast containment filter %d is droppin|
| warning | warning | 0x10002 | Broadcast containment filter %d has stoppe|
+-----------------------------------------------------------------------------+
...
| info | info | 0x2B004D| Bridge is new root for the specified MSTI |
| info | info | 0x2B004F| Topology change has occurred, port %d CIST|
| info | info | 0x2B0050| Topology change has occurred, port %d MSTI|
+-----------------------------------------------------------------------------+
syslog show collector <IpHostSyslog> Displays the configuration information lu/su 6.2
for the specified collector.
Example:
> syslog show collector 192.168.10.63
syslog unset collector <IpHostSyslog> custom- Clears the custom prefix for the specified su 6.2
prefix collector.
Example:
> syslog unset collector 192.168.10.63 custom-prefix myPrefix
system
Example:
>system set date 07-12-12
system shell set Configure the global default settings for su 6.0
all shell sessions, including:
Example:
> system shell set more off
Example:
> system shell show
+--------- Shell Settings -----------------+
| Parameter | Value |
+-----------------------------+------------+
| Global more | on |
| Global more lines | 0 |
| Global inactivity timer | off |
| Global inactivity timeout | 10 min |
+-----------------------------+------------+
system show [date] [host-name] [load-query] Displays time and load-query by default. su/lu 6.0
[time] [time-offset] [uptime] Optionally, displays only the specified
system information.
Example:
> system show host-name
system state-dump tftp-server <IpAddress> Dump system state to a file on tftp server su 6.0
file-name <FileName>
Example:
> system state-dump tftp-server 192.168.2.3 file-name StateDump.txt
Writing system info
Writing interface info
Writing chassis info
Writing module info
Writing port info
Writing device ID info
Writing fan info
Writing power info
Writing archive info
Writing alarm info
Writing system config
Writing log files
File StateDump.txt transferred to tftp server 192.168.2.3
Example:
> system unset host-name
tacacs
NOTE: To enable TACACS+ commands, the Advanced Security feature license must be
installed with the software license install command.
Example:
> tacacs add server 10.10.10.100
tacacs clear [server <IP address or host Clears TACACS+ statistics globally or per su 6.3
name>] statistics server.
Example:
> tacacs clear server 10.10.10.100 statistics
tacacs disable [server <IP address or host Disables TACACS+ globally or per server. su 6.3
name>]
Example:
> tacacs disable server 10.10.10.100
tacacs enable [server <IP address or host Enables TACACS+ globally or per server. su 6.3
name>]
Example:
> tacacs enable server 10.10.10.100
tacacs remove server <IP address or host Removes a TACACS+ server from the list su 6.3
name> of authentication servers.
Example:
> tacacs remove server 10.10.10.100
[server <IP address or host name> [priority • Adds a server to the list of 6.3
<NUMBER: 1...8>][tcp-port <NUMBER: TACACS+ servers using either the
1...65535>]]} IP address or DNS host name.
Optionally, the priority or TCP
port of a server.
Example:
> tacacs set key 543432
Example:
> tacacs show statistics
{[add server <IP address or host name> • Adds up to 8 servers to the list of 6.3
[priority <NUMBER: 1...8>][tcp-port TACACS+ authentication servers
<NUMBER: 1...65535>]], using either their IP address or DNS
host name. Optionally, sets the
priority or TCP port of a server.
[clear server <IP address or host name> • Clears TACACS+ statistics. 6.3
statistics],
[disable [server <IP address or host name>]], • Disables TACACS+ authentication 6.3
or an authentication server.
[enable [server <IP address or host name>]], • Enables TACACS+ authentication 6.3
or authentication server.
[remove server <IP address or host name>], • Removes a server from the 6.3
TACACS+ authentication server
list.
[set server <IP address or host name> • Sets the TACACS+ server priority 6.3
[priority|tcp-port]], or TCP port.
Example:
> tacacs authentication enable
{[add server <IP address or host name> • Adds up to 8 servers to the list of 6.3
[priority <NUMBER: 1...8>][tcp-port TACACS+ authorization servers
<NUMBER: 1...65535>]], using either their IP address or DNS
host name. Optionally, sets the
priority or TCP port of a server.
[clear server <IP address or host name> • Clears TACACS+ statistics. 6.3
statistics],
[disable [server <IP address or host name>]], • Disables TACACS+ authorization 6.3
or authorization server.
[enable [server <IP address or host name>]], • Enables TACACS+ authorization or 6.3
authorization server.
[remove server <IP address or host name>], • Removes a server from the 6.3
TACACS+ authorization server
list.
[set server <IP address or host name> • Sets the TACACS+ server priority 6.3
[priority|tcp-port]], or TCP port.
Example:
> tacacs authorization clear server 10.10.10.200 statistics
{[add server <IP address or host name> • Adds up to 8 servers to the list of 6.3
[priority <NUMBER: 1...8>][tcp-port TACACS+ accounting servers using
<NUMBER: 1...65535>]], either their IP address or DNS host
name. Optionally, sets the
priority or TCP port of a server.
[clear server <IP address or host name> • Clears TACACS+ statistics. 6.3
statistics],
[disable [server <IP address or host name>]], • Disables TACACS+ accounting or 6.3
accounting server.
[enable [server <IP address or host name>]], • Enables TACACS+ accounting or 6.3
accounting server. When
accounting is enabled, an
Accounting start message is sent.
Each server in server list is tried
until one responds.
[remove server <IP address or host name>], • Removes a server from the 6.3
TACACS+ accounting server list.
[set server <IP address or host name> • Sets the TACACS+ server priority 6.3
[priority|tcp-port]], or TCP port.
Example:
> tacacs accounting set session on
Example:
> tacacs syslog enable
telnet-server
A total of 10 users are allowed with no more than 9 limited users at any time.
Example:
> telnet-server disable
Example:
> telnet-server enable
Example:
> telnet-server set max-limited-users 2 max-super-users 3
Example:
> telnet-server show
+----TELNET GLOBAL CONFIGURATION--+
| Parameter | Value |
+-------------------+--------------+
| Server | enable |
| Max Limited User | 5 |
| Max Super User | 5 |
| Max System Logins | 10 |
+-------------------+--------------+
traffic-profiling
NOTE: To enable traffic-profiling commands, the Advanced Ethernet feature license must
be installed with the software license install command.
Example:
> traffic-profiling enable
Example:
> traffic-profiling disable
traffic-profiling set port <PortName> Sets the following per-port attributes, su 6.2
including:
Example:
> traffic-profiling set port 1 mode standard-vlan
traffic-profiling show Displays global and per port status of su/lu 6.2
traffic profiling. Optionally, displays:
Example:
> traffic-profiling show port 1
traffic-profiling standard-profile clear Clear statistics for all standard profiles. su 6.2
statistics
Example:
> traffic-profiling standard-profile clear statistics
traffic-profiling standard-profile create Creates a standard profile table with the su 6.2
following attributes:
Example:
> traffic-profiling standard-profile create port 1 profile 1 cir 3000 pir 3200 dot1dpri 0,1,2
traffic-profiling standard-profile delete Deletes the standard profile specified by: su 6.2
Example:
> traffic-profiling standard-profile delete port 1 STD#1
traffic-profiling standard-profile set Sets the attributes for the standard su 6.2
profile, including:
Example:
> traffic-profiling standard-profile set port 1 profile 1 dot1dpri 1
traffic-profiling standard-profile show Displays a list of all standard traffic su/lu 6.2
profiles. Optionally, displays:
Example:
>traffic-profiling standard-profile show port 1
+--------------------------- STANDARD PROFILE TABLE ---------------------------+
| Port | Profile | BW (Kbps) | CLASSIFIERS |
| |ID| Name | CIR | PIR | |
+--------+--+---------------+-------+-------+----+-----------------------------+
| 1 |1 |STD#1 |128 |128 | IPP| 1 |
| | DSC| 1 |
+--------+--+---------------+-------+-------+----+-----------------------------+
| 1 |2 |STD#2 |0 |256 | |
+--------+--+---------------+-------+-------+----+-----------------------------+
Example:
> traffic-profiling standard-profile unset port 1 STD#1 dot1dpri 2
traffic-services
NOTE: To enable traffic-services commands, the Advanced Ethernet feature license must
be installed with the software license install command.
Example:
> traffic-services queuing congestion-avoidance-profile create profile myprofile1
Example:
> traffic-services queuing congestion-avoidance-profile create profile myprofile1
Example:
> traffic-services queuing congestion-avoidance-profile delete myprofile1
Example:
> traffic-services queuing congestion-avoidance-profile rename profile myprofile1 name
myprofilenew
Example:
> traffic-services queuing congestion-avoidance-profile set profile myprofile green-threshold
40
Example:
> traffic-services queuing congestion-avoidance-profile set profile myprofile tcp-green-
threshold 40
Example:
> traffic-services queuing congestion-avoidance-profile show
traffic-services queuing egress-port-queue- Sets the following options for a queue in su 6.4
group set queue <NUMBER: 0-7> the queue group. Note that queue 7 is
typically reserved for CPU-Sourced
traffic and should not be changed.
Example:
> traffic-services queuing egress-port-queue-group set queue 0 port 9 scheduler-weight 100
traffic-services queuing egress-port-queue- Sets the scheduler algorithm and shaper su 6.4
group set port <PortQueueGroup> rate for the egress port queue group.
Example:
> traffic-services queuing egress-port-queue-group set port 3 scheduler-algorithm round-robin
shaper-rate 1200
Example:
> traffic-services queuing egress-port-queue-group show port 9
Example:
> traffic-services queuing egress-port-queue-group unset queue 4 port 12 congestion-avoidance-
profile
Example:
> traffic-services queuing queue-map create rcos-map custom-map-11
Example:
> traffic-services queuing queue-map delete rcos-map custom-map-1
Example:
> traffic-services queuing queue-map rename rcos-map custom-map-11 name custom-map-1new
traffic-services queuing queue-map set rcos- Sets an attribute in an R-CoS map. su 6.4
map <String[15]>
Example:
> traffic-services queuing queue-map set rcos-map myrcos-map rcos 0 queue 3
Example:
> traffic-services queuing queue-map show custom-map-11
twamp
NOTE: To enable TWAMP commands, the Advanced Ethernet feature license must be
installed with the software license install command.
Example:
> twamp client clear statistics
Example:
> twamp client disable
Example:
> twamp client enable
twamp client session create Creates a Mini-WIPM session with the su 6.3
following attributes:
Example:
> twamp client session create name myTest host 192.168.12.345 cos-policy ipprec
ipprec 7 type fixed
twamp client session delete Deletes a Mini-WIPM session specified by: su 6.3
Example:
> twamp client session delete name myTest
twamp client session set Sets the attributes for the Mini-WIPM su 6.3
session as follows:
Example:
> twamp client session create name myTest host 192.168.12.345 cos-policy ipprec
ipprec 7 type fixed
Example:
> twamp client show
Example:
> twamp client test name myTest
Example:
> twamp disable port 5-8
Example:
> twamp enable port 5-8
Example:
> twamp set port 5678
Example:
> twamp show
+--------- TWAMP State Info -------+
| Parameter | Value |
+-----------------------+------------+
| Device Admin State | Disabled |
+-----------------------+------------+
+------------------------------------+
| Per Port TWAMP State Info |
+--------+-----------+---------------+
| Port | Admin | Operational |
+--------+-----------+---------------+
| 1 | Enabled | Disabled |
| 2 | Enabled | Disabled |
| 3 | Enabled | Disabled |
| 4 | Enabled | Disabled |
| 5 | Enabled | Disabled |
| 6 | Enabled | Disabled |
| 7 | Enabled | Disabled |
| 8 | Enabled | Disabled |
| 9 | Enabled | Disabled |
| 10 | Enabled | Disabled |
+--------+-----------+---------------+
Example:
> twamp unset port
Example:
> twamp disable
Example:
> twamp light enable
twamp server clear session <Session ID: 1-10> Forces a Mini-WIPM session with the su 6.3
TWAMP Server to shut down.
Example:
> twamp server clear session 1
Example:
> twamp disable
Example:
> twamp light enable
user
A user name must have a minimum of 1 character and a maximum of 16 characters. A
password may have from 0 to 16 characters.
Example:
> user auth clear
Example:
> user auth show
-------------- Authorization Providers ----------------------+
| Method | Called | Success | Failure | Skipped | Scope |
-+----------+---------+---------+---------+---------+--------+
| local | 5 | 4 | 1 | 0 | all |
-+----------+---------+---------+---------+---------+--------+
Example:
> user auth set priority 1 method tacacs scope remote
Example:
> user create super1 access-level super password s1033807
Example:
> user delete super1
user set user <String[16]> Updates the user’s attributes, including: su 6.0
Example:
> user set super1 password s38new1
Example:
> user show
+--------- USER ACCOUNT TABLE -----+-------+
| Username | Privilege | Flags |
+------------------+---------------+-------+
| MIS | super | P |
| data | limited | P |
| su | super | DP |
| user | limited | D |
+------------------+---------------+-------+
Example:
> user who
+------------------+---------+----------+-----------------------------+
| Username |Idle Time| Pid | Terminal |
+------------------+---------+----------+-----------------------------+
| su | 0m | 131204 | /telnet_192.168.3.153:1287 |
| su | 0m | 196735 | /telnet_192.168.3.153:1116 |
+------------------+---------+----------+-----------------------------+
user whoami Display your user name and access level. su/lu 6.0
Example:
> user whoami
username: su access-level: super
user kill pid <ProcessID> Ends the user session for the specified su 6.0
process ID. To find the process ID, use the
user who command.
> all-but-me Ends all user sessions except for the 6.4
current login.
Example:
> user kill pid 196735
virtual-circuit
Commands for configuring and viewing Ethernet Virtual Circuits (VCs).
Example:
> virtual-circuit clear statistics
Example:
> virtual-circuit ethernet create vc vc1 vlan 1000
Example:
> virtual-circuit ethernet delete vc vc1
virtual-circuit ethernet set Sets the VLAN for the specified Ethernet su 6.2
{vc <VirtualCircuitEthernetName[15]>} {vlan virtual circuit.
<Vlan>}
Example:
> virtual-circuit ethernet set vc vc1 vlan 2000
virtual-circuit ethernet set port Sets the VLAN Ethernet type and policy su 6.2
<PortNameList> for the specified ports.
Example:
> virtual-circuit ethernet set port vlan-ethertype 9100
virtual-circuit ethernet show Shows the list of Ethernet virtual circuits su/lu 6.2
[vc <VirtualCircuitEthernetName[15]>] (VCs), the details of a specified Ethernet
[statistics] VC, statistics for all Ethernet VCs or
statistics for a specified Ethernet VC.
Note that VC statistics are based on pre-
congestion avoidance measurements,
and require known DAs for statistics to
increment.
The CN 3940 and CN 5140 have a
statistics limit of 32 VCs, while the
CN 3960 statistics can support 128 VCs.
Example:
> virtual-circuit ethernet show
+------ ETHERNET VIRTUAL CIRCUIT TABLE -----+
| Name | VLAN |
+-----------------+-------------------------+
| vc1 | 2000 |
+-----------------+-------------------------+
Example:
> virtual-circuit rename vc1 vc2000
virtual-circuit show Shows the port ether type virtual circuit su/lu 6.2
[vc <VirtualCircuitName[15]>] [statistics] info and the Ethernet virtual circuit
tables. Optionally, shows all or specified
virtual circuit statistics.
Example:
> virtual-circuit show
+------ ETHERNET VIRTUAL CIRCUIT TABLE -----+
| Name | VLAN |
+-----------------+-------------------------+
| vc1 | 2000 |
+-----------------+-------------------------+
virtual-switch
Commands for configuring and displaying virtual switch (VS) instances.
CAUTION: When a port is added to a per-port virtual switch instance, the existing VLAN
configuration for that port will be removed. A port cannot be a member of a regular VLAN
while participating in a VPLS.
Example:
> virtual-switch add reserved-vlan 1000
Example:
> virtual-switch l2-cft disable
Example:
> virtual-switch l2-cft enable
Example:
> virtual-switch l2-cft protocol add vs cft-vs ctrl-protocol rstp disposition forward
Example:
> virtual-switch l2-cft protocol remove vs cft-vs ctrl-protocol rstp
virtual-switch l2-cft protocol set vs Sets the disposition of a control protocol su 6.3
<VirtualSwitchName[15]>] to an L2 control frame tunneling instance
for the specified virtual switch.
Example:
> virtual-switch l2-cft protocol set vs cft-vs ctrl-protocol rstp discard
Example:
> virtual-switch l2-cft vs cft-vs set priority 3 tunnel-method l2pt
virtual-switch l2-cft show [vs Shows a summary of L2 control frame su/lu 6.2
<VirtualSwitchName[15]>] tunneling instances or details of L2
control tunneling instance for a specified
virtual switch.
Example:
> virtual-switch l2-cft show vs cft-vs
[encap-fixed-dot1dpri <NUMBER: 0-7>]} The priority setting for fixed COS policy. 6.2
Example:
> virtual-switch ethernet add vs vs150 port 5 vlan 2 encap-cos-policy fixed encap-fixed-
dot1dpri 1
Example:
> virtual-switch ethernet create vs cft-vs vc cft-vc
Example:
> virtual-switch ethernet delete vs cft-vs
Example:
> virtual-switch ethernet remove vs cft-vs port 1
Example:
> virtual-switch ethernet set port vs cft-vs encap-fixed-dot1dpri 6
Example:
> virtual-switch ethernet set vs cft-vs vc cft-vc
virtual-switch ethernet show [vs Shows the list of Ethernet virtual su/lu 6.2
<VirtualSwitchName[15]>] switches or the details of a specified
Ethernet virtual switch. Optionally,
shows the statistics for all virtual
switches or for the specified virtual
switch.
Example:
> virtual-switch ethernet show
virtual-switch ethernet unset vs Removes the primary virtual circuit for su 6.2
<VirtualSwitchName[15]> vc an Ethernet virtual switch.
Example:
> virtual-switch ethernet unset vs cft-vs vc cft-vc
virtual-switch remove reserved-vlan Remove VLANs from the list of reserved su 6.2
<VlanIdList> VLANs.
Example:
> virtual-switch remove reserved-vlan 1000
Example:
> virtual-switch rename vs cft-vs name vs1
virtual-switch show [vs Shows list of reserved VLANs and virtual su/lu 6.2
<VirtualSwitchName[15]>] switches or details of a specified virtual
switch.
Example:
> virtual-switch show
vlan
NOTE: A maximum of 500 VLANs are supported without an Advanced Ethernet (AE)
license, and up to 4094 VLANs with an AE license.
Example:
> vlan add vlan 300 port 1,5
vlan create vlan <VlanIdList> [name Creates a VLAN. You can optionally su 6.0
<String[31]>] specify a name for the VLAN. If no VLAN
name is specified, a default name will be
assigned with the form of “VLAN#<VLAN-
id>. For example if the VLAN ID is 1000
the VLAN name will be “VLAN1000”.
Example:
> vlan create vlan 300
vlan delete <VlanList> Deletes a VLAN, VLAN name, VLAN range su 6.0
or VLAN list. A VLAN can only be deleted
if it has no members.
Example:
> vlan create vlan 300
vlan remove vlan <VlanList> port Removes a port from a VLAN or removes su 6.0
<PortNameList> a VLAN ID tag from a port in a VLAN
Example:
> vlan remove vlan 300 port 1
vlan rename vlan <VlanList> name Renames the specified VLAN. su 6.0
<String[31]>
Example:
> vlan rename vlan 300 MyVlanName
vlan show [port <PortNameList>|vlan “VLAN show” displays the VLAN table. su/lu 6.0
<VlanList>] Optionally, displays the VLANs to which
the specified belongs or displays
information for the specified VLAN.
Example:
> vlan show
+------------------------------------------------+
|VLAN| | Ports 1|
| ID | VLAN Name |1234567890|
+----+--------------------------------+----------|
| 127|Mgmt |xxxxxxxxxx|
| 300|VLAN#300 | |
| 777|VLAN#777 | |
+----+--------------------------------+----------+
vlan show [port <PortNameList>|vlan Displays a summary of VLAN statistics. su/lu 6.0
<VlanList>] statistics Optionally, displays statistics for the
specified port(s) or VLAN(s).
Example:
> vlan show vlan 127 statistics
For technical support, contact Ciena using any of the following methods.
Internet Site
Additional contact information and general product support can be accessed on the Ciena Web
site:
www.portal.ciena.com
E-mail Address
ciena24@ciena.com
Phone +1-509-242-9378
Fax +1-509-242-9001
Mailing Address
Ciena Corporation
Linthicum, MD 21090
The terms defined in this glossary may or may CCM (Continuity Check Message) control frames are
not be found in this manual but are generally sent and received across PBT tunnels by CFM to
monitor for faults.
found throughout Ciena documentation.
CFM (Connectivity Fault Management) monitors the
status of services that extend across two or more
A devices and provides fault notifications.
Active refers to the Control Module that is ChannelStream A ChannelStream is a collection of
operationally controlling the system. user-defined multicast groups that are flooded to all
ports in a VLAN, bringing these streams far down into
Alarm is classified as either an audible or visible the network before they are requested by an IGMP
warning notice that is triggered by an event or error host, thus reducing latency.
condition.
CIR (Committed Information Rate) is a designated
value that represents the minimum guaranteed
B bandwidth for network traffic flows that are
BCB (Backbone Core Bridge) transmitted and received under normal operating
conditions.
B-DA (Backbone Destination Address) added to PBT
frames to identify the PBT tunnel and flood domain C-MAC (Customer MAC Address)
interconnects. Command File contains a set of instructions on how
BEB (Backbone Edge Bridge) to deliver the various system software to devices.
B-MAC (Backbone MAC Address) Condition refers to an occurrence within the system
that exists for a period of time that may be of
Backup is a redundancy state mode indicating that interest to the user or operator. A condition that
the Standby Control Module is ready to manage the persists for an extended period of time may be re-
system in the event that the Active Control Module classified as an Event.
should failover.
CoS (Class of Service) divides services into different
Broadcast Containment prevents services from levels of priority in order make forwarding decisions
being disrupted by broadcast storms by creating when network congestion occurs.
Broadcast Containment filters and applying them to
VLANs or virtual switches. CPE (Customer Premises Equipment)
Broadcast Storm occurs when a large number of C-VID (Customer VLAN ID) 801.1Q Customer VLAN
broadcast packets are unnecessarily propagated tag.
across a network which can degrade performance or C-VLAN (Customer VLAN)
even deny service. Broadcast storms are often
associated with denial-of-service attacks, network
reconvergence, and loops in the network. D
B-SA (Backbone Source Address) DEI (Drop Eligibility Indicator)
B-TAG (Backbone Tag) DMAC (Destination MAC Address)
B-VID (Backbone VLAN ID) DP (Drop Preference)
DSCP (Differentiated Services Code Point)
C
CBS (Committed Burst Rate) is the maximum number E
of kilobytes that can ingress at the maximum
interface speed in order to remain in conformance EBS (Excess Burst Size) is the maximum number of
kilobytes that can ingress at the maximum interface
with the CIR.
T
TLS (Transparent LAN Services) allows two or more
LANs that are separated geographically to be made
to appear as one single LAN.
Tunnel A logical connection that carries virtual
circuits.
U
UMF (Unknown Multicast Filtering) filters all
multicast streams that are not controlled by IGMP
snooping in order to prevent these streams from
being flooded to all ports on the device.
V
Virtual Circuit is a logical connection used to carry a
service.
Virtual Interface provides the binding between a
logical interface and a virtual switch.
Virtual Switch A logical forwarding or flood domain.
VLAN (Virtual Local Area Network) is a logical
element used to group resources that have a
common set of requirements together, regardless of
where they are located physically.
VPLS (Virtual Private LAN Service) is a class of VPN
that allows the connection of multiple sites in a
single bridged domain over a provider managed MPLS
network.
VoIP (Voice over Internet Protocol)
VPN (Virtual Private Network) allows a subscriber to
seamlessly connect networks at various locations
and make them appear and behave as if they were
on the same physical network.
W
WMF (Well-known Multicast Filtering) allows
configured router protocols or other special
addresses in the multicast range (referred to as well-
known multicast groups) to be forwarded when UMF