Router Configuration Guide 23.3.R1
Router Configuration Guide 23.3.R1
Router Configuration Guide 23.3.R1
© 2023 Nokia.
Use subject to Terms available at: www.nokia.com/terms.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive and
aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed
or disclosed to any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product
purchased or licensed from any company within Nokia Group of Companies. Use this document
as agreed. You agree to notify Nokia of any errors you may find in this document; however, should
you elect to use this document for any purpose(s) for which it is not intended, You understand and
warrant that any determinations You may make or actions You may take will be based upon Your
independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product
names mentioned in this document may be trademarks of their respective owners.
© 2023 Nokia.
Router Configuration Guide Release 23.3.R1 Table of contents
Table of contents
1 Getting started................................................................................................................................... 13
1.1 About this guide........................................................................................................................ 13
1.2 Router configuration process.................................................................................................... 13
1.3 Conventions............................................................................................................................... 14
1.3.1 Precautionary and information messages...................................................................... 14
1.3.2 Options or substeps in procedures and sequential workflows........................................15
2 IP router configuration......................................................................................................................16
2.1 Configuring IP router command options................................................................................... 16
2.1.1 Interfaces......................................................................................................................... 16
2.1.1.1 Network interface.................................................................................................. 16
2.1.1.2 Network domains.................................................................................................. 16
2.1.1.3 System interface................................................................................................... 17
2.1.1.4 Unicast reverse path forwarding check................................................................ 17
2.1.1.5 QoS policy propagation using BGP......................................................................18
2.1.1.6 QPPB.....................................................................................................................20
2.1.1.7 QPPB and GRT lookup........................................................................................ 25
2.1.1.8 Configuring link delay........................................................................................... 27
2.1.2 Router ID......................................................................................................................... 28
2.1.3 Autonomous systems...................................................................................................... 28
2.1.4 Confederations................................................................................................................ 29
2.1.5 Proxy ARP.......................................................................................................................30
2.1.6 Exporting an inactive BGP route from a VPRN..............................................................30
2.1.7 DHCP relay..................................................................................................................... 31
2.1.8 Internet protocol versions................................................................................................31
2.1.8.1 IPv6 address format..............................................................................................32
2.1.8.2 IPv6 applications................................................................................................... 33
2.1.8.3 DNS....................................................................................................................... 35
2.1.8.4 Secure Neighbor Discovery.................................................................................. 36
2.1.8.5 SeND persistent CGAs......................................................................................... 37
2.1.8.6 IPv6 provider edge over MPLS (6PE).................................................................. 42
2.1.9 Static route resolution using tunnels...............................................................................43
2.1.9.1 Static route ECMP support................................................................................... 44
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
3 VRRP................................................................................................................................................. 115
3.1 VRRP overview....................................................................................................................... 115
3.2 VRRP components.................................................................................................................. 115
3.2.1 Virtual router..................................................................................................................116
3.2.2 IP address owner.......................................................................................................... 116
3.2.3 Primary and secondary IP addresses...........................................................................116
3.2.4 Virtual router..................................................................................................................116
3.2.5 Virtual router backup.....................................................................................................117
3.2.6 Owner and non-owner VRRP....................................................................................... 117
3.2.7 Configurable command options.................................................................................... 118
3.2.7.1 Virtual Router ID (VRID)..................................................................................... 118
3.2.7.2 Priority................................................................................................................. 118
3.2.7.3 IP Addresses.......................................................................................................119
3.2.7.4 Message interval and master inheritance...........................................................119
3.2.7.5 Skew time............................................................................................................120
3.2.7.6 Master Down Interval..........................................................................................120
3.2.7.7 Preempt Mode.....................................................................................................120
3.2.7.8 VRRP message authentication...........................................................................121
3.2.7.9 Authentication Data.............................................................................................122
3.2.7.10 Virtual MAC Address........................................................................................ 122
3.2.7.11 VRRP Advertisement Message IP Address List Verification.............................123
3.2.7.12 Inherit Master VRRP Router’s Advertisement Interval Timer........................... 123
3.2.7.13 IPv6 Virtual Router Instance Operationally Up................................................. 123
3.2.7.14 Policies.............................................................................................................. 123
3.3 VRRP priority control policies................................................................................................. 124
3.3.1 VRRP virtual router policy constraints.......................................................................... 124
3.3.2 VRRP virtual router instance base priority................................................................... 124
3.3.3 VRRP priority control policy delta in-use priority limit...................................................124
3.3.4 VRRP priority control policy priority events.................................................................. 124
3.3.4.1 Priority event hold-set timers.............................................................................. 125
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
4 Filter policies....................................................................................................................................149
4.1 ACL filter policy overview........................................................................................................149
4.1.1 Filter policy basics.........................................................................................................150
4.1.1.1 Filter policy packet match criteria....................................................................... 150
4.1.1.2 IPv4/IPv6 filter policy entry match criteria.......................................................... 150
4.1.1.3 MAC filter policy entry match criteria..................................................................153
4.1.1.4 IP exception filters.............................................................................................. 154
4.1.1.5 Filter policy actions............................................................................................. 154
4.1.1.6 Viewing filter policy actions.................................................................................163
4.1.1.7 Filter policy statistics...........................................................................................164
4.1.1.8 Filter policy logging............................................................................................. 164
4.1.1.9 Filter policy cflowd sampling...............................................................................165
4.1.1.10 Filter policy management..................................................................................165
4.1.2 Filter policy advanced topics.........................................................................................167
4.1.2.1 Match list for filter policies.................................................................................. 167
4.1.2.2 Filter policy scope and embedded filters............................................................ 169
4.1.2.3 Filter policy type..................................................................................................173
4.1.2.4 Rate limit and shared policer..............................................................................175
4.1.2.5 Filter policies and dynamic policy-driven interfaces........................................... 175
4.1.2.6 Primary and secondary filter policy action for PBR/PBF redundancy................. 177
4.1.2.7 Extended action for performing two actions at a time........................................ 179
4.1.2.8 Advanced VPRN redirection............................................................................... 180
4.1.2.9 Destination MAC rewrite when deploying policy-based forwarding.................... 181
4.1.2.10 Network port VPRN filter policy........................................................................ 182
4.1.2.11 ISID MAC filters................................................................................................ 182
4.1.2.12 VID MAC filters................................................................................................. 183
4.1.2.13 IP exception filters............................................................................................ 186
4.1.2.14 Redirect policies................................................................................................186
4.1.2.15 HTTP redirect (captive portal).......................................................................... 189
4.1.2.16 Filter policy-based ESM service chaining.........................................................193
4.1.2.17 Policy-based forwarding for deep packet inspection in VPLS.......................... 198
4.1.2.18 Storing filter entries...........................................................................................203
4.2 Configuring filter policies with CLI.......................................................................................... 204
4.2.1 Common configuration tasks........................................................................................ 204
4.2.1.1 Creating an IPv4 filter policy.............................................................................. 204
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
6 Cflowd............................................................................................................................................... 257
6.1 Cflowd overview...................................................................................................................... 257
6.1.1 Operation....................................................................................................................... 257
6.1.1.1 Version 8............................................................................................................. 259
6.1.1.2 Version 9............................................................................................................. 260
6.1.1.3 Version 10........................................................................................................... 260
6.1.2 Cflowd filter matching....................................................................................................260
6.2 Cflowd configuration process overview...................................................................................260
6.3 Configuration notes................................................................................................................. 261
6.4 Configuring cflowd with CLI.................................................................................................... 262
6.4.1 Cflowd configuration overview...................................................................................... 262
6.4.1.1 Traffic sampling................................................................................................... 262
6.4.1.2 Collectors.............................................................................................................263
6.4.2 Basic cflowd configuration............................................................................................ 264
6.4.3 Common configuration tasks........................................................................................ 265
6.4.3.1 Global cflowd components..................................................................................265
6.4.3.2 Enabling cflowd................................................................................................... 266
6.4.3.3 Configuring global cflowd....................................................................................266
6.4.3.4 Configuring cflowd collectors.............................................................................. 267
6.4.3.5 Specifying cflowd on an IP interface.................................................................. 280
6.4.3.6 Specifying sampling options in filter entries....................................................... 286
6.5 Cflowd configuration management tasks................................................................................ 288
6.5.1 Modifying global cflowd.................................................................................................288
6.5.2 Modifying cflowd collector command options............................................................... 289
6.6 FP acceleration for cflowd processing.................................................................................... 290
6.6.1 Configuring FP acceleration for cflowd processing...................................................... 291
6.6.2 Supported forwarding status codes.............................................................................. 291
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Table of contents
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Getting started
1 Getting started
Note: Unless otherwise indicated, CLI commands, contexts, and configuration examples in this
guide apply for both the MD-CLI and the classic CLI.
Note:
The SR OS CLI trees and command descriptions can be found in the following guides:
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command
Reference Guide (for both MD-CLI and Classic CLI)
• 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
Note:
Content previously found in this guide related to Segment Routing and PCE has been moved to
the 7750 SR and 7950 XRS Segment Routing and PCE User Guide.
Note:
This guide generically covers Release 23.x.Rx content and may contain some content that may
be released in later maintenance loads. See SR OS R23.x.Rx Software Release Notes, part
number 3HE 19269 000 x TQZZA for information about features supported in each load of the
Release 23.x.Rx software.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Getting started
1.3 Conventions
This section describes the general conventions used in this guide.
DANGER: Danger warns that the described activity or situation may result in serious personal
injury or death. An electric shock hazard could exist. Before you begin work on this equipment,
be aware of hazards involving electrical circuitry, be familiar with networking environments, and
implement accident prevention procedures.
WARNING: Warning indicates that the described activity or situation may, or will, cause
equipment damage, serious performance problems, or loss of data.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Getting started
Caution: Caution indicates that the described activity or situation may reduce your component or
system performance.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2 IP router configuration
2.1.1 Interfaces
Nokia routers use different types of interfaces for various functions. Interfaces must be configured with
information such as the interface type (network and system) and address. A port is not associated with a
system interface. An interface can be associated with the system (loopback address).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
uRPF is supported for both IPv4 and IPv6 on network and access. It is supported on any IP interface,
including base router, IES, VPRN, and subscriber group interfaces.
In strict mode, uRPF checks whether the incoming packet has a source address that matches a prefix in
the routing table, and whether the interface expects to receive a packet with this source address prefix.
In loose mode, uRPF checks whether the incoming packet has a source address that matches a prefix
in the routing table; loose mode does not check whether the interface expects to receive a packet with a
specific source address prefix.
Loose mode uRPF check is supported for ECMP, IGP shortcuts, and VPRN MP-BGP routes. Packets
coming from a source that matches any ECMP, IGP shortcut, or VPRN MP-BGP route passes the uRPF
check even when uRPF is set to strict mode on the incoming interface.
In the case of ECMP, this allows a packet received on an IP interface configured in strict uRPF mode to
be forwarded if the source address of the packet matches an ECMP route, even if the IP interface is not a
next-hop of the ECMP route or not a member of any ECMP routes. The strict-no-ecmp uRPF mode may
be configured on any interface that is known to not be a next-hop of any ECMP route. When a packet is
received on this interface, and the source address matches an ECMP route, the packet is dropped by
uRPF.
If there is a default route, the following is included in the uRPF check:
• A loose mode uRPF check always succeeds.
• A strict mode uRPF check only succeeds if the source address matches any route (including the default
route) where the next-hop is on the incoming interface for the packet.
Otherwise, the uRPF check fails.
If the source IP address matches a discard/blackhole route, the packet is treated as if it failed the uRPF
check.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2.1.1.6 QPPB
There are two main aspects of the QPPB feature:
• The ability to associate a forwarding-class and priority with specific routes in the routing table.
• The ability to classify an IP packet arriving on a specific IP interface to the forwarding-class and priority
associated with the route that best matches the packet.
[ex:/configure policy-options]
A:admin@node-2# info
community "gold" {
member "300:100" { }
}
policy-statement "qppb_policy" {
entry 10 {
from {
community {
name "gold"
}
protocol {
name [bgp]
}
}
action {
action-type accept
forwarding-class {
fc h1
priority high
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
}
}
}
A:node-2>config>router>policy-options# info
----------------------------------------------
community gold members 300:100
policy-statement qppb_policy
entry 10
from
protocol bgp
community gold
exit
action accept
fc h1 priority high
exit
exit
exit
The fc command is supported with all existing from and to match conditions in a route policy entry, with
any action other than reject, and with next-entry, next-policy, and accept actions. If a next-entry or next-
policy action results in multiple matching entries, then the last entry with a QPPB action determines the
forwarding class and priority.
A route policy that includes the fc command in one or more entries can be used in any import or export
policy, but the fc command has no effect except in the following contexts:
• MD-CLI
– VRF import policies
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
As shown, QPPB route policies support routes learned from RIP and BGP neighbors of a VPRN, as well as
for routes learned from RIP and BGP neighbors of the base/global routing instance.
QPPB is supported for BGP routes belonging to any of the following address families:
• IPv4 (AFI=1, SAFI=1)
• IPv6 (AFI=2, SAFI=1)
• VPN-IPv4 (AFI=1, SAFI=128)
• VPN-IPv6 (AFI=2, SAFI=128)
A VPN-IP route may match both a VRF import policy entry and a BGP import policy entry (if vpn-apply-
import is configured in the base router BGP instance). In this case, the VRF import policy is applied first,
then the BGP import policy, so the QPPB QoS is based on the BGP import policy entry.
This feature also provides the ability to associate a forwarding-class and, optionally, priority with IPv4 and
IPv6 static routes. This is achieved by specifying the forwarding class within the commands in the following
contexts. Use the commands in the following contexts to configure the forwarding class.
• MD-CLI
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Priority is optional when specifying the forwarding class of a static route, but when configured it can only be
deleted and returned to unspecified by deleting the entire static route.
Use the following command to show an additional line per route entry that displays the forwarding class
and priority of the route. When the qos command option is specified, the output includes an additional line
per route entry that displays the forwarding class and priority of the route. If a route has no forwarding class
and priority information, the third line is blank.
===============================================================================
Route Table (Router: Base)
===============================================================================
Dest Prefix Type Proto Age Pref
Next Hop[Interface Name] Metric
QoS
-------------------------------------------------------------------------------
10.1.5.0/24 Remote BGP 15h32m52s 0
PE1_to_PE2 0
h1, high
-------------------------------------------------------------------------------
No. of Routes: 1
===============================================================================
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• VPRN group-interfaces
When the qos-route-lookup command with the destination command option is applied to an IP interface
and the destination address of an incoming IP packet matches a route with QoS information, the packet
is classified to the FC and priority associated with that route. The command overrides the FC and priority/
profile determined from the SAP ingress or network QoS policy associated with the IP interface (see
section 5.7 for more information). If the destination address of the incoming packet matches a route with no
QoS information, the FC and priority of the packet remain as determined by the sap-ingress or network qos
policy.
Similarly, when the qos-route-lookup command with the source command option is applied to an IP
interface and the source address of an incoming IP packet matches a route with QoS information, the
packet is classified to the FC and priority associated with that route. The command overrides the FC and
priority/profile determined from the SAP ingress or network QoS policy associated with the IP interface. If
the source address of the incoming packet matches a route with no QoS information, the FC and priority of
the packet remain as determined by the SAP ingress or network QoS policy.
Currently, QPPB is not supported for ingress MPLS traffic on CsC PE’-CE’ interfaces or on network
interfaces, such as the following context.
Note:
QPPB based on a source IP address is not supported for ingress subscriber management traffic
on a group interface.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• The priority of a SAP ingress packet that matches a QPPB route depends on several factors. If the
de-1-out-profile flag is enabled in fc2 and the DE bit is set in the packet, priority is low regardless
of the QPPB priority or fc2 mapping to profile mode queue, priority mode queue, or policer. If fc2 is
associated with a profile mode queue, the packet priority is based on the explicitly configured profile
state of fc2 (in profile = high, out profile = low, undefined = high), regardless of the QPPB priority or fc1
configuration. If fc2 is associated with a priority mode queue or policer, the packet priority is based on
QPPB (unless DE=1). If no priority information is associated with the route, the packet priority is based
on the configuration of fc1. If fc1 mapped to a priority mode queue, the priority is based on DSCP/IP
prec/802.1p. If fc1 mapped to a profile mode queue, the priority is based on the profile state of fc1.
Table 2: QPPB interactions with SAP ingress QoS summarizes these interactions.
Priority mode Priority mode Ignored If DE=1 override then From new From original FC
queue queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
from original dot1p/
exp/DSCP mapping or
policy default
Policer Policer From new If DE=1 override then From new From original FC
base FC low otherwise from base FC and sub-class
unless QPPB, if no DEI or
overridden by QPPB overrides then
DE=1 from original dot1p/
exp/DSCP mapping or
policy default
Priority mode Policer From new If DE=1 override then From new From original FC
queue base FC low otherwise from base FC and sub-class
unless QPPB, if no DEI or
overridden by QPPB overrides then
DE=1 from original dot1p/
exp/DSCP mapping or
policy default
Policer Priority mode Ignored If DE=1 override then From new From original FC
queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
from original dot1p/
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Profile mode Priority mode Ignored If DE=1 override then From new From original FC
queue queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
follows original FC’s
profile mode rules
Priority mode Profile mode From new From QPPB, unless From new From original FC
queue queue base FC packet is marked in or base FC and sub-class
unless out of profile in which
overridden by case follows profile
DE=1 Default: high priority
Profile mode Policer From new If DE=1 override then From new From original FC
queue base FC low otherwise from base FC and sub-class
unless QPPB, if no DEI or
overridden by QPPB overrides then
DE=1 follows original FC’s
profile mode rules
Policer Profile mode From new From QPPB, unless From new From original FC
queue base FC packet is marked in or base FC and sub-class
unless out of profile in which
overridden by case follows profile
DE=1 Default: high priority
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
A:node-2>config>router# info
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "interface-name"
if-attribute
delay
static microseconds
exit
exit
no shutdown
exit
The static delay can be configured within the range 1 to 16777214 microseconds.
2.1.2 Router ID
The router ID, a 32-bit number, uniquely identifies the router within an autonomous system (AS) (see
Autonomous systems). In protocols such as OSPF, routing information is exchanged between areas—
groups of networks that share routing information. It can be set to be the same as the loopback address.
The router ID is used by both OSPF and BGP routing protocols in the routing table manager instance.
There are several ways to obtain the router ID. On each router, the router ID can be obtained in the
following ways.
• Define the router ID. Use the following command to define the value that becomes the router ID.
configure router
• Configure the system interface with an IP address. If the router ID is not manually configured in the
configure router context, the system interface acts as the router ID. Use the following command to
configure the system interface with an IP address.
• If neither the system interface nor router ID are implicitly specified, the router ID is inherited from the
last four bytes of the MAC address.
• The router can be obtained from the protocol level; for example, BGP.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2.1.4 Confederations
Configuring confederations is optional and should only be implemented to reduce the interior border
gateway protocol (IBGP) mesh inside an AS. An AS can be logically divided into smaller groupings called
sub-confederations and then assigned a confederation ID (similar to an autonomous system number).
Each sub-confederation has fully meshed IBGP and connections to other ASs outside of the confederation.
The sub-confederations have EBGP-type peers to other sub-confederations within the confederation. They
exchange routing information as if they were using IBGP. Command options such as next hop, metric, and
local preference are preserved. The confederation appears and behaves like a single AS.
Confederations have the following characteristics:
• A large AS can be sub-divided into sub-confederations.
• Routing within each sub-confederation is accomplished via IBGP.
• EBGP is used to communicate between sub-confederations.
• BGP speakers within a sub-confederation must be fully meshed.
• Each sub-confederation (member) of the confederation has a different AS number. The AS numbers
used are typically in the private AS range of 64512 to 65535.
To migrate from a non-confederation configuration to a confederation configuration requires a major
topology change and configuration modifications on each participating router. Setting BGP policies to
select an optimal path through a confederation requires other BGP modifications.
There are no default confederations. Router confederations must be explicitly created. Figure 2:
Confederation configuration shows an example of a confederation configuration.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
This ‟best-external” type of route advertisement is useful in active or standby multi-homing scenarios
because it can ensure that all PEs have knowledge of the backup path provided by the standby PE.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Field Description
Version 4-bit Internet Protocol version number = 6
Payload Length 16-bit unsigned integer; the length of payload, for example, the rest of the packet
following the IPv6 header, in octets; if the value is zero, the payload length is carried
in a jumbo payload hop-by-hop option
Next Header 8-bit selector; identifies the type of header immediately following the IPv6 header;
this field uses the same values as the IPv4 protocol field
Hop Limit 8-bit unsigned integer; decremented by 1 by each node that forwards the packet; the
packet is discarded if the hop limit is decremented to zero
Destination Address 128-bit address of the intended recipient of the packet (possibly not the ultimate
recipient if a routing header is present)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2001:0db8:0000:0000:0000:0000:0000:0000
Leading zeros must be omitted from each block in the address. A series of zeros can be replaced with a
double colon. For example:
2001:db8::
The double colon can only be used one time in an address.
The IPv6 prefix is the part of the IPv6 address that represents the network identifier, which appears at the
beginning of the address. The IPv6 prefix length, which begins with a forward slash (/), shows how many
bits of the address make up the network identifier. For example, the address 2001:db8:8086:6502::1/64
means that the first 64 bits of the address represent the network identifier; the remaining 64 bits represent
the node identifier.
Note:
IPv6 addresses and prefixes are displayed according to RFC 5952, A Recommendation for IPv6
Address Text Representation.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2.1.8.3 DNS
The DNS client is extended to use IPv6 as transport and to handle the IPv6 address in the DNS AAA
resource record from an IPv4 or IPv6 DNS server. An assigned name can be used instead of an IPv6
address because IPv6 addresses are more difficult to remember than IPv4 addresses.
When the redirect-vprn configuration is enabled, all packets have their URLs resolved through the
configured redirect-vprn service. Only a single redirect-vprn configuration is supported.
As a prerequisite for the DNS resolution through the VPRN, the VPRN DNS server must be configured
with at least a primary-dns IP address (IPv4 or IPv6). If the VPRN DNS server is not configured, all packet
resolution fails, even if the BOF DNS server is configured, because the redirect-vprn configuration forces
all packets through the redirect-vprn service for resolution.
The redirect-vprn command is not available at bootup, because the configuration is not loaded yet.
Until the redirect-vprn command is executed, all DNS resolution is possible only through the BOF DNS
configuration. The redirect-vprn configuration becomes active at runtime, after the configuration file is
loaded and the redirect-vprn command is executed.
If the redirect-vprn command is not configured, DNS resolution occurs as follows:
• The global routing packets use the BOF DNS server.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• The VPRN packets use the configured VPRN DNS server. If the VPRN DNS server is not configured,
the resolution occurs through the BOF DNS server.
For information about management VPRNs, see Node Management Using VPRN in the 7450 ESS,
7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN.
When SeND is enabled on a node, basic neighbor discovery messaging is changed as shown in Figure 8:
Neighbor discovery with and without SeND. In the example, PE-A needs to find the MAC address of PE-B.
1. PE-A sends an NS message to the solicited node multicast address for PE-B's address with the CGA
option, RSA signature option, timestamp option, and nonce option.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2. PE-B processes the NS message and, because it is configured for SeND operation, processes the
NS. PE-B validates the source address of the packet to ensure it is a valid CGA, then validate the
cryptographic signature embedded in the NS message.
3. PE-B generates an NA message, which is sent back to PE-A with the solicited bit, router bit set. The
source address is that of PE-B, while the destination address is that of PE-A from the NS message. The
timestamp is generated from PE-B, while the nonce is copied from PE-A's NS message.
4. PE-A receives the NA and completes similar checks as PE-B did.
If all steps process correctly, both nodes install each other’s addresses into their neighbor cache database.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Take the following into consideration when you configure the RSA key pairs:
• Because SeND only uses RSA key pairs, the command is refused if the imported key type is not RSA.
• Because SeND only supports key size 1024, the command is refused if the imported key size is not
1024.
• The password has to be specified when an offline generated file in pkcs12 format has to be imported.
• See the "RSA key pair rollover mechanism" section that follows for more information about key-rollover.
• Use the following command to create the file cfx:\system-pki\secureNdKey (fixed directory and
filename) and save the imported key in that file in encrypted per format same.
Take the following into consideration when you use the rollover mechanism:
• If CGAs exist that are generated based on an auto-generated or previously imported RSA key pair and
the key-rollover keyword is not specified, the secure-nd-import command is refused.
• If a secure-nd-import with key-rollover is requested while a previous key rollover is still being
handled, the new command is refused.
• If the secure-nd-import command is accepted, the imported RSA key pair is written to the file cfx:
\system-pki\secureNdKey and loaded to SeND. Existing CGAs, if any, are regenerated.
• While handling a key rollover, SeND keeps track of which interface uses which RSA key pair.
Temporarily, SeND can have two RSA key pairs in use. At all times, only the latest RSA key pair is
stored in the file cfx:\system-pki\secureNdKey. When the rollover is finished, the RSA key pair that is no
longer referred to, is deleted from SeND’s memory.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
HA
For the synchronization of the RSA key pair file in cfx:\system-pki\ used by SeND, use the following
commands for manual and automatic certificate synchronization:
• MD-CLI
To manually synchronize:
To automatically synchronize:
• classic CLI
To manually synchronize:
To automatically synchronize:
SeND also synchronizes the RSA key pair to the standby CPM.
The modifier used during the CGA generation is saved in the configuration file. The CGA itself is not
stored.
Based on the stored modifier and RSA key pair, the same CGA can be regenerated.
The modifier is needed to be sent out in ND messages.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
By storing the modifier in the configuration file, the user can also configure an offline generated modifier
(possibly with a security parameter > 1).
Example: Configure a SeND interface without modifiers (classic CLI)
A:node-2>config>router# info
#--------------------------------------------------
"IP Configuration"
#--------------------------------------------------
interface "itf1"
address 10.10.10.1/24
port 1/1/1
ipv6
secure-nd
no shutdown
A modifier is generated based on the actual RSA key pair (that is, imported or auto-generated). The
modifier is used to generate a link-local CGA. The modifier is saved in the interface configuration file.
exit
address 2000:1::/64
A modifier is generated based on the actual RSA key pair. The modifier is used to generate the global
CGA.
The modifier is stored in the interface configuration file.
Example: Configure a SeND interface with modifiers (classic CLI)
A:node-2>config>router# info
#--------------------------------------------------
"IP Configuration"
#--------------------------------------------------
interface "itf2"
address 10.10.10.2/24
port 1/1/2
ipv6
secure-nd
link-local-modifier 0xABCD
no shutdown
exit
address 3000:1::/64
A modifier is generated based on the actual RSA key pair. The modifier is used to generate the global
CGA.
The modifier is stored in the interface configuration file.
Example: Stored modifier (classic CLI)
The same offline generated modifier as the preceding link-local address is used for the generation of a
global address.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Another offline generated modifier (*) is used for the generation of a global address.
For an offline generated modifier, a check is performed to see if it is generated with the actual RSA key pair
and the security parameter applicable for the interface. If this check fails, the command is refused, unless
the command is triggered in the context of an exec of a config file. In that case, the modifier is replaced by
a new one that is generated based on the actual RSA key pair.
This command writes the RSA key pair to the file cfx:\system-pki\secureNdKey in encrypted der format.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
In the MD-CLI, if the tunnel-next-hop context is configured and resolution is set to none, the binding
to the tunnel is removed and resolution resumes in RTM to IP next-hops.
• classic CLI
In the classic CLI, if the tunnel-next-hop context is configured and resolution is set to disabled, the
binding to the tunnel is removed and resolution resumes in RTM to IP next-hops.
If the resolution is set to any, any supported tunnel type in the static route context is selected following
TTM preference.
The following tunnel types are supported in a static route context: LDP, RSVP-TE, Segment Routing (SR)
Shortest Path, and Segment Routing Traffic Engineering (SR-TE):
• LDP
The ldp command option instructs the code to search for an LDP LSP with a FEC prefix corresponding
to the address of the indirect next-hop. Both LDP IPv4 FEC and LDP IPv6 FEC can be used as the
tunnel next-hop. However, only an indirect next-hop of the same family (IPv4 or IPv6) as the prefix of
the route can use an LDP FEC as the tunnel next-hop. In other words, an IPv4 (IPv6) prefix can only be
resolved to an LDP IPv4 (IPv6) FEC.
• RSVP-TE
The rsvp-te command option instructs the code to search for the set of lowest metric RSVP-TE LSPs to
the address of the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static
route treats a set of RSVP-TE LSPs with the same lowest metric as an ECMP set.
The user has the option of configuring a list of RSVP-TE LSP names to be used exclusively instead
of searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the
static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric
value are selected.
A P2P auto-lsp that is instantiated via an LSP template can be selected in TTM when resolution is
set to any. However, it is not recommended to configure an auto-lsp name explicitly under the rsvp-
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
te node as the auto-generated name can change if the node reboots, which blackholes the traffic of the
static route.
• SR shortest path
When the sr-isis or sr-ospf command options are enabled, an SR tunnel to the indirect next-hop is
selected in the TTM from the lowest preference IS-IS or OSPF instance, and if many instances have the
same lowest preference, it is selected from the lowest numbered IS-IS or OSPF instance. Both SR-ISIS
IPv4 and SR-ISIS IPv6 tunnels can be used as tunnel next-hops. However, only an indirect next-hop
of the same family (IPv4 or IPv6) as the prefix of the route can use an SR-ISIS tunnel as a tunnel next-
hop. In other words, an IPv4 (IPv6) prefix can only be resolved to a SR-ISIS IPv4 (IPv6).
• SR-TE
The sr-te command option instructs the code to search for the set of lowest metric SR-TE LSPs to the
address of the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static
route treats a set of SR-TE LSPs with the same lowest metric as an ECMP set.
The user has the option of configuring a list of SR-TE LSP names to be used exclusively instead of
searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the
static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric
value are selected.
Realize that the resolution filter, under static-route entry, does not validate the provided lsp-name type of
the LSP against the requested filter context protocol type.
If one or more explicit tunnel types are specified using the resolution-filter command option, only these
tunnel types are selected again following the TTM preference.
The user must set resolution to filter to activate the list of tunnel-types configured under resolution-filter.
If disallow-igp is enabled, the static route is not activated using IP next-hops in RTM if no tunnel next-hops
are found in TTM.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• ECMP is supported when resolving concurrently in RTM and TTM multiple static routes of the same
prefix with multiple user-entered indirect tunnel next-hops. There is no support for mixing IP and tunnel
next-hops for the same prefix using different indirect next-hops. Tunnel next-hops are preferred over IP
next-hops.
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• BGP prefix with a BGP next hop resolved to a static route, which resolves to a set of tunnel next hops
toward an indirect next hop in RTM or TTM
• BGP prefix resolving to another BGP prefix, whose next hop is resolved to a set of ECMP tunnel next
hops with a static route in RTM or TTM or to IGP shortcuts in RTM
• IPv4 BGP-labeled unicast routes whose next hop resolves to a set of tunnels in TTM
• BGP-labeled IPv6 packets (6PE) resolving in TTM
This feature does not modify the route calculation: the same set of ECMP next hops is computed for a
prefix. The feature also does not change the hash routine; only the spraying of the flows over the tunnel
next hops is modified to reflect the normalized weight of each tunnel next hop.
Static route implementation supports ECMP over a set of equal-cost MPLS LSPs. The user can allow
automatic selection or specify the names of the equal-metric MPLS LSPs in TTM to be used in the ECMP
set. For more information, see Static route resolution using tunnels.
2.2.1 Weighted load balancing IGP, BGP, and static route prefix packets over IGP
shortcut
• OSPF
Use the following command to disable specific MPLS LSPs from being used in IGP shortcut or forwarding
adjacency:
• MD-CLI
• classic CLI
Use the following command to enable the weighted load balancing feature.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
When this command is enabled, packets of IGP, BGP, and static route prefixes resolved to a set of ECMP
tunnel next-hops are sprayed proportionally to the weights configured for each MPLS LSP in the ECMP
set.
Use the following command to configure a weight for each LSP.
Use the following command to configure the weight for an auto-LSP signaled via an LSP template.
There is no default weight value for an LSP. If any LSP in the ECMP set of a prefix does not have a
weight configured, the regular ECMP spraying for the prefix is performed. The user-entered weight is
normalized to the closest integer value that represents the number of entries in the ingress prefix hash
table assigned to the LSP for the purpose of spraying packets of all prefixes resolved to this LSP. The
higher the normalized weight, the more entries are assigned to the LSP, and the more packets are sent to
this LSP.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
5. Regular ECMP spraying is also applied if a prefix is resolved in RTM to an ECMP set that consists of a
mix of IP and tunnel next-hops.
6. This feature is not supported in the following contexts:
• Packets of BGP prefix with the BGP next-hop resolved in TTM to RSVP LSP (BGP shortcut).
• CPM generated packets, including OAM packets, which are looked-up in RTM and which are
forwarded over tunnel next-hops. These are forwarded using either regular ECMP or by selecting
one next-hop from the set.
2.2.1.4 Weighted load balancing static route packets over MPLS LSP
If the user enters, for the same static route, more LSP names with the same LSP metric than the value
of the router level ecmp command option, only the first configured LSPs equal to the ecmp value are
selected. The remaining tunnel next-hops for the route are not activated. When automatic MPLS LSP
selection is performed in TTM, the lowest tunnel ID is used as a tie-breaker among the same lowest metric
LSPs.
To perform weighted load-balancing over the set of MPLS LSPs, either when the LSP names are provided
or when auto-selection in TTM is performed, the user must also enable the weighted ECMP globally like for
static, IGP, and BGP prefixes resolving to IGP shortcuts.
Use the following command to enable weighted ECMP globally.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
2.2.2 Weighted load balancing for 6PE and BGP IPv4-labeled unicast routes
Use the following command to control the ECMP-like spraying for BGP-labeled IPv6 packets (6PE) and
BGP-labeled IPv4 unicast routes resolving to tunnels in TTM, where the maximum number of ECMP router
represents the maximum number of RSVP and SR-TE tunnels in the set representing equal-cost paths to
the BGP next hop.
Use the following command to configure weighted ECMP behavior, where the load-balancing weight of the
tunnel is considered in the packet spraying behavior.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• Without weighted-ecmp strict enforcement enabled, and if one or more interfaces within a wECMP
interface bundle does not have a load-balancing-weight weight configured, then the wECMP load-
balancing falls back to classic ECMP operation and equally sprays data-plane traffic across the
available interfaces.
• A special case of weighted-ecmp strict is when none of the available paths or next-hops have a load-
balancing-weight value associated. Then, the load-balancing falls back to the classic ECMP.
• weighted-ecmp strict is enabled in the router global context for IS-IS, OSPF, and OSPFv3. Other
routing technologies follow classic weighted-ecmp operation.
All FCs are mapped to set 1 as soon as the policy is created. The user can make changes to the mapping
of FCs as required. An FC, which is not added to the class-forwarding policy, is therefore always mapped
to set 1. At most, an FC can be mapped to a single forwarding set. One or more FCs can map to the same
set. Use the following command to configure the FC to a set other than set 1.
The user can indicate the initial default set by including the default-set command option. Use the following
command to configure the default-set command option.
The default forwarding set is used to forward packets of any FC in cases where all LSPs of the forwarding
set the FC maps to become operationally down. The router uses the user-configured default set as the
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
initial default set. Otherwise, the router elects the lowest numbered set as the default forwarding set in
a class-forwarding policy. When the last LSP in a default forwarding set goes into an operationally down
state, the router designates the next lowest-numbered set as the new default forwarding set.
A mapping to a class-forwarding policy and set is added to the existing CBF configuration of an RSVP-TE
or SR-TE LSP or to an LSP template. Use the following commands to perform this mapping function.
An MPLS LSP can map only to a single class-forwarding policy and forwarding set. Multiple LSPs can map
to the same policy and set. If they form an ECMP set, from the IGP shortcut perspective, packets of the
FCs mapped to this set are sprayed over these LSPs based on a modulo operation of the output of the
hash routine on the packet's headers and the number of LSPs in the set.
When the CBF feature is enabled, each application (BGP, CPM), when looking up a prefix in RTM, finds up
to 64 IP and tunnel next-hops. This lookup is split in two subsets:
• Subset 1— tunnel next-hops with new CBF information (FCs mapped to this LSP, default LSP (true/
false), CBF Policy ID>0, Set ID>0). This information is usable by both LDP and other applications.
• Subset 2— tunnel-next-hops with no CBF information and IP next-hops. Usable by all applications,
except that LDP uses tunnel next-hops only.
The BGP application performs a lookup in RTM for a prefix matching each BGP next-hop of a prefix. The
BGP application selects tunnels belonging to the class-forwarding sets in Subset 1 and for each BGP
next-hop of a prefix. The remaining tunnels, with no CBF configuration and the IP next-hops, are still
programmed to IOM. However, BGP and the data path uses them only when all the class-forwarding sets
are not available as described in the information that follows.
SR OS implements a hierarchical ECMP architecture for BGP prefixes in the data path. The first level is
the ECMP at the BGP next-hop level. The second level is ECMP at the resolved next-hop (IP or tunnel
next-hop) level. The CBF feature is independently applied to the set of resolved tunnel next-hops of each
BGP next-hop of a prefix. The user must make sure that the sets of LSPs that are used as IGP shortcuts to
reach each of the BGP next-hops have the appropriate FC mappings.
The following procedures are enforced in the CBF feature:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• The tunnels in the full next-hop ECMP set, with set size greater or equal to 1 and less than or equal
to 64, can use MPLS LSPs that terminate on multiple endpoints (BGP next-hop itself or otherwise) to
reach the next-hop of a BGP prefix. The existing ECMP tunnel and IP next-hop selection behavior,
when resolving a prefix over IGP shortcuts, continues to be used.
• If no LSP among the full ECMP set of a BGP next-hop has a class-forwarding policy configuration
assigned, then the set is considered inconsistent from a CBF perspective. No CBF-related information
is programmed in IOM and regular ECMP spraying over the full set occurs.
• If only a single class-forwarding policy is referenced by one or more LSPs in the full ECMP set of a
BGP next-hop, the full set is considered consistent from a CBF perspective, and the class-forwarding
policy is used to spray packets of each FC over the LSPs within each forwarding set. As a result of this
processing, only the LSPs that have been selected for forwarding traffic are programmed in IOM with
CBF information. The remaining LSPs and IP next-hops of the BGP next-hop, are also programmed in
IOM but without any CBF information associated and, therefore, is not used for CBF.
• If multiple class-forwarding policies are referenced by LSPs in the full ECMP set of a BGP next-hop, the
set is considered inconsistent from a CBF perspective. No CBF related information is programmed in
IOM and regular ECMP spraying over the full set occurs.
The following describes the fallback behavior in data path of the CBF feature:
• An FC, for which all LSPs in the forwarding set are operationally down, has its packets forwarded
over the default forwarding set. The default forwarding set is either the initial default forwarding set
configured by the user or the lowest numbered set in the class-forwarding policy that has one or more
LSPs in the operationally UP state. If the initial or subsequently elected default forwarding set has all its
LSPs operationally down, the next lower numbered forwarding set, which has at least one LSP in the
operationally up state, is elected as the default forwarding set.
• If all LSPs of all forwarding sets become operationally down, the router resumes regular ECMP spraying
on the remaining LSPs and IP next-hops in the full ECMP set.
• Whenever the first LSP in a forwarding set becomes operationally UP, the router triggers the re-election
of the default set and selects this set as the new default set, if it is the initial default set, otherwise, it
selects lowest numbered set.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
instance, the forwarding of BGP Keep-Alive packets over an LSP of the same set ID as that of the data
plane packets of the BGP prefixes destined for the same BGP next-hop.
• Weighted ECMP, at the transport tunnel level of BGP prefixes over IGP shortcuts, and the CBF feature
on a per-BGP next-hop basis are mutually exclusive. Specifically, if the user enables both weighted
ECMP and CBF, weighted ECMP applies as long as all the LSPs used as tunnel next-hops to reach the
BGP next-hop of a prefix have a user-configured weight. Otherwise, the CBF feature applies as per the
procedures described in Feature behavior.
Use the following commands to configure weighted ECMP and class-forwarding respectively.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• If Set 2 comes back up, then Set 2 is elected as the default class-forwarding set.
The following example shows class-forwarding as true, which enables the CBF feature for BGP and CPM
traffic. IGP shortcut is enabled in this IS-IS instance with both families IPv4 and IPv6 resolving to RSVP-TE
LSPs. Four LSPs exist in set 1, set 2, and set 3. The final LSP configuration has no CBF options for a total
of 64 LSPs to BB1.
Example: Class-based forwarding of IPv4 and IPv6 prefixes over IGP IPv4 shortcut (MD-
CLI)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
address 10.202.5.194
prefix-length 24
}
secondary 10.101.0.194 {
prefix-length 32
}
}
ipv6 {
address 2001:db8:a0b:12f0::1 {
prefix-length 64
}
}
}
interface "toSim213" {
port 1/1/2
ipv4 {
primary {
address 10.202.4.194
prefix-length 24
}
}
}
interface "toSim219" {
port 1/1/3
ipv4 {
primary {
address 10.202.8.194
prefix-length 24
}
}
}
[ex:/configure router "Base"]
A:admin@node-2# info
...
isis 0 {
igp-shortcut {
tunnel-next-hop {
family ipv4 {
resolution filter
resolution-filter {
rsvp true
}
}
family ipv6 {
resolution filter
resolution-filter {
rsvp true
}
}
}
}
}
[ex:/configure router "Base" mpls]
A:admin@node-2# info
cspf-on-loose-hop true
interface "system" {
}
interface "toSim199" {
}
interface "toSim213" {
admin-group ["olive"]
}
interface "toSim219" {
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
class-forwarding-policy "cbf1" {
fc be {
forwarding-set 1
}
fc l2 {
forwarding-set 1
}
fc af {
forwarding-set 2
}
fc l1 {
forwarding-set 2
}
fc h2 {
forwarding-set 2
}
fc ef {
forwarding-set 3
}
fc h1 {
forwarding-set 3
}
fc nc {
forwarding-set 3
}
}
path "empty" {
}
lsp "RSVP-TE_LSP-BB1-SET1" {
type p2p-rsvp
to 192.1.2.194
class-forwarding {
forwarding-set {
policy "cbf1"
set 1
}
}
primary "empty" {
}
}
lsp "RSVP-TE_LSP-BB1-SET2" {
type p2p-rsvp
to 192.1.2.194
class-forwarding {
forwarding-set {
policy "cbf1"
set 2
}
}
primary "empty" {
}
}
lsp "RSVP-TE_LSP-BB1-SET3" {
type p2p-rsvp
to 192.1.2.194
class-forwarding {
forwarding-set {
policy "cbf1"
set 3
}
}
primary "empty" {
}
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
lsp "RSVP-TE_LSP-B1[1..52]" {
type p2p-rsvp
to 192.1.2.194
primary "empty" {
}
}
Example: Class-based forwarding of IPv4 and IPv6 prefixes over IGP IPv4 shortcut (classic
CLI)
A:node-2>config>router# info
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "system"
address 192.0.2.194/32
ipv6
address 3ffe::a14:194/128
exit
exit
interface "toSim199"
address 10.202.5.194/24
secondary 10.101.0.194/32
port 1/1/1
ipv6
address 2001:db8:a0b:12f0::1/64
exit
exit
interface "toSim213"
address 10.202.4.194/24
port 1/1/2
exit
interface "toSim219"
address 10.202.8.194/24
port 1/1/3
exit
class-forwarding
// Enables CBF feature for BGP and CPM traffic
A:node-2>config>router>isis# info
----------------------------------------------
igp-shortcut
// Enables IGP shortcut in this ISIS instance with both families IPv4 and IPv6
resolving to RSVP-TE LSPs
tunnel-next-hop
family ipv4
resolution filter
resolution-filter
rsvp
exit
exit
family ipv6
resolution filter
resolution-filter
rsvp
exit
exit
exit
exit
----------------------------------------------
A:node-2>config>router>mpls# info
----------------------------------------------
class-forwarding-policy cbf1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
fc be forwarding-set 1
fc l2 forwarding-set 1
fc af forwarding-set 2
fc l1 forwarding-set 2
fc h2 forwarding-set 2
fc ef forwarding-set 3
fc h1 forwarding-set 3
fc nc forwarding-set 3
cspf-on-loose-hop
exit
interface "system"
exit
interface "toSim199"
exit
interface "toSim213"
admin-group "olive"
exit
interface "toSim219"
exit
path "empty"
exit
lsp "RSVP-TE_LSP-BB1-SET1[1..4]" // Four LSPs in Set1
to 192.0.2.194/32
cspf
class-forwarding
forwarding-set policy ‟cbf1” set 1
exit
primary "empty"
exit
exit
lsp "RSVP-TE_LSP-BB1-SET2[1..4]" // Four LSPs in Set2
to 192.0.2.194/32
cspf
class-forwarding
forwarding-set policy ‟cbf1” set 2
exit
primary "empty"
exit
exit
lsp "RSVP-TE_LSP-BB1-SET3[1..4]" // Four LSPs in Set3
to 192.0.2.194/32
cspf
class-forwarding
forwarding-set policy ‟cbf1” set 3
exit
primary "empty"
exit
exit
lsp "RSVP-TE_LSP-BB1[1..52]" //
Other LSP configuration with no CBF options for a total of 64 LSPs to BB1
to 192.0.2.194/32
cspf
primary "empty"
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• classic CLI
In this case, when the ARP entry for the next-hop is INVALID or not populated, the static route must remain
invalid/inactive. When an ARP entry for the next-hop is populated based on a gratuitous ARP received or
periodic traffic destined for it and the usual ARP who-has procedure, the static route becomes valid/active
and is installed.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• classic CLI
In this case, when the Neighbor Cache entry for next-hop is INVALID or not populated, the static
route must remain invalid/inactive. When an NC entry for next-hop is populated based on a neighbor
advertisement received, or periodic traffic destined for it and the usual NS/NA procedure, the static route
becomes valid/active and is installed.
The strip-label feature causes arriving MPLS encapsulated traffic to be stripped of all MPLS labels (up to
five) before processing the packet through Policy Based Routing (PBR) filters. Use the following command
to configure strip-label.
If the packets do not have an IP header immediately following the MPLS label stack after the strip, they
are discarded. Only MPLS encapsulated IP, IGP shortcuts, and VPRN over MPLS packets are processed.
However, IPv4 and IPv6 packets that arrive without any labels are supported on an interface with strip label
enabled.
The strip-label command operates in promiscuous mode. The router does not filter on the destination
MAC address of the Ethernet frames. In some network designs, multiple ports may be tapped and
combined into an interface toward the router. Promiscuous mode allows all of these flows to be processed
without requiring the destination MAC address to be updated to match the router address.
To associate an interface that is configured with the strip-label command with a port, the port must be
configured as single-fiber.
Packets subject to the strip-label action and mirrored (using mirrors or Lawful Intercept) contain the original
MPLS labels (and other L2 encapsulation) in the mirrored copy of the packet, as they appeared on the wire
when the mirror-dest type is the default type “ether”. If the mirror-dest type is “ip-only”, the mirrored copy
of the packet does not contain the original L2 encapsulation or the stripped MPLS labels.
This command is supported on:
• optical ports for the 7750 SR and 7450 ESS
• IOM3-XP cards for the 7750 SR and 7450 ESS
• null/dot1q encaps
• network ports
• IPv4
• IPv6
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
All other control plane packets that require an RTM lookup and knowledge of which destination is
reachable over the LDP shortcut continues to be forwarded over the IP next-hop route in RTM.
A:node-2>config>router>bgp>next-hop-res>shortcut-tunn# info
----------------------------------------------
family ipv4
resolution-filter
ldp
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
In order for weighted ECMP to be supported across the interface next-hops of an IS-IS or OSPF route the
following conditions must be met.
• All of the calculated ECMP next-hops must be interface next-hops.
• All of the calculated ECMP next-hop interfaces must have a non-zero load-balancing-weight value
configured in the following context. Use the commands in the following context to configure a non-zero
load-balancing-weight value.
By default, IS-IS or OSPF interfaces have a zero weight (no load-balancing-weight); non-zero values
must be configured explicitly. Values cannot be auto-derived.
In order for weighted ECMP to be supported across the interface next-hops of a static route the following
conditions must be met.
• All of the configured ECMP next-hops must be direct next-hops (resolved to an interface). The ECMP
next-hops are the next-hops with the lowest preference that also have the lowest metric.
• All of the configured ECMP next-hop interfaces must have a non-zero load-balancing-weight value
configured in the following context. Use the commands in the following context to configure a non-zero
load-balancing-weight value:
– MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
– classic CLI
By default, static route next-hops have a zero weight (no load-balancing-weight); non-zero values must
be configured explicitly. Values cannot be auto-derived. The ECMP next-hops are the next-hops with
the lowest preference that also have the lowest metric.
The load-balancing-weight commands in the IS-IS or OSPF and static route configuration trees accept a
value between 0 and 4294967295.
If an IPv4 or IPv6 BGP route has a BGP next-hop resolved by a static, IS-IS, or OSPF ECMP route and
ibgp-multipath is configured under BGP, traffic forwarded to the BGP next-hop is sprayed according to the
load-balancing-weights of the interface next-hops.
Note:
FRR for static route entries is only supported for IP traffic on FP-based platforms.
IP FRR for static route is supported in the base router and service VPRN contexts.
If the primary next-hop of the static route entry fails and the IP FRR backup next-hop is activated, then the
backup tag is applied to the static route and the configured preference and metric for the primary hop is
inherited. If the primary next-hop is activated again, then make-before-break functionality is used to avoid
any packet loss.
The following example shows the IP FRR configuration.
Example: MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
A:node-2>config>router# info
#--------------------------------------------------
"Static Route Configuration"
#--------------------------------------------------
static-route-entry 10.10.0.0/16
tag 20
backup-tag 100
next-hop 101.1.1.1
preference 100
backup-next-hop
address 50.1.1.2
exit
exit
exit
The logic behavior applied to the associated tag of the static route entry is summarized in the following
table.
UP UP UP 20
1
UP DOWN UP 20
1
DOWN UP UP 100
1
IGP export policies can use the tag and the backup-tag as match criteria when exporting a static route
entry using route policies. The export policies may introduce unique export properties for each tag (for
example, resulting in different IGP metrics) and may make an exported route more or less desirable when
the primary next-hop fails and the backup next-hop is activated.
The following limitations apply in the IP FRR for static route entries.
• Only the primary next-hop has IP FRR support. The backup next-hop has no IP FRR support if it
suddenly becomes unreachable.
• If multiple next-hops are configured with a backup for a static route entry, then IP FRR is activated if
there is only one remaining primary next-hop active. If multiple primary next-hops can be activated, then
the static route entry uses ECMP and the backup next-hop IP FRR functionality is not used.
• If the primary next-hop fails and the backup next-hop is used as the primary hop, then the backup next-
hop uses the configured backup tag (or 0, if not configured) and inherits the configured preference and
metric of the primary next-hop (or the default values, if not configured).
• The backup inherits the preference and the metric of the primary next-hop, however, it does not support
any of the features configured on the primary next-hop (for example, BFD, CPE check, LDP sync, and
so on) even when the backup becomes the active next-hop.
1 The tag value is based on the preceding IP FRR example configuration provided.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• If the primary next-hop of a static route entry, configured with a backup next-hop, is held down because
hold-down is configured on static routes, the backup next-hop is also held down and is not used for
traffic, even in cases where the backup-next-hop can be activated.
• The following tunnel types are supported:
– OSPF or ISIS shortcuts using RSVP-TE and SR-TE
– BGP VPN-v4/v6 or BGP shortcut routes over LDP, RSVP, SR-ISIS, SR-OSPF, LDPoRSVP, SR-TE,
GREv4, SR policy, MPLS forward policy, and RIB API
– backup-next-hop recursion through indirect next-hop static-route-entry with resolution filter for LDP,
RSVP, LDPoRSVP, SR-TE, SR-ISIS, SR-OSPF, SR policy, MPLS forward policy, or RIB API
• LDP-FRR using a static-route is not mutually supported in combination with static-route backup-next-
hop for the same static route.
• Any other backup-next-hop types are considered as non-supported. For example:
– Locally aggregated BGP routes
– BGP routes when the BGP next-hop is recursively resolved through another BGP route
– 6over4 tunnel
– GREv6 tunnel
– OSPF or IS-IS shortcuts using LDP, SR-ISIS, SR-OSPF, and LDPoRSVP (generic IGP shortcut
limitation not only for backup-next-hop)
– OSPF or IS-IS shortcuts over SR policy, MPLS forward policy, and RIB API (generic IGP shortcut
limitation not only for backup-next-hop)
– BGP-LU over LDP, RSVP, LDPoRSVP, SR-TE, SR-OSPF, SR-ISIS, SR policy, MPLS forward policy
and RIB API
– 4PE
– 6PE
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|C| |K|S| Reserved0 | Ver | Protocol Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum (optional) | Reserved1 (Optional) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key (optional) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number (Optional) |
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
All the fields of the GRE encapsulation in RFC 2890 are optional except for the base header (first 4 bytes).
The C, K, and S flags are used to indicate if the header includes the optional fields of Checksum (plus
Reserved field), Key, and Sequence Number. SR OS can process packets received with the base 4-byte
header or with the 8-byte header which includes the Key field. In other words, packets with the flags set to
{C=0, K=0/1, S=0}. Any other GRE header setting results in the packet being dropped.
When originating a GRE encapsulated packet, SR OS supports the following header formats:
1. The 4-byte base header {C=0, K=0, S=0} in the IP-over-GRE feature using a Port Cross Connect (PXC)
port (see GRE tunnel overview).
2. The 4-byte base header {C=0, K=0, S=0} in the IP-over-GRE feature using the Multiservice Integrated
Service Adapter.
See Section 4.1, IP Tunnel Overview, of the 7450 ESS, 7750 SR, and VSR Multiservice ISA and ESA
Guide.
3. The 4-byte base header {C=0, K=0, S=0} in the MPLS-over-GRE tunnel and SDP.
See 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide, the 7450 ESS,
7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN, and the 7450 ESS, 7750 SR,
7950 XRS, and VSR Services Overview Guide.
4. The 8-byte header which includes the Key field {C=0, K=1, S=0} in the filter-based GRE tunneling
feature (see Configuring filter-based GRE tunneling ).
The following rules apply to termination of IP-over-GRE and MPLS-over-GRE on a user-defined subnet.
• The termination of MPLS-over-GRE on the system interface address can be performed concurrently
and extends to terminating IP-over-GRE packets as well.
• A single GRE termination subnet is permitted per router. If the user attempts to configure another
subnet on another interface, the command is rejected.
• The GRE termination subnet length can be of maximum size of /16.
• The subnet of the primary IPv4 address of the numbered loopback interface or the numbered network
IP interface is used as the GRE termination subnet.
• When the GRE termination subnet is enabled on a numbered network IP interface, the packet can
be received from the interface itself and any other network IP interface as long as the target IPv4
termination subnet is reachable.
• The feature can terminate packets with the base 4-byte header {C=0, K=0, S=0} or with the 8-byte
header which includes the Key field {C=0, K=1, S=0}. Any other GRE header setting results in the
packet being dropped.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• For routers in the network to forward MPLS-over-GRE or IP-over-GRE packets to this router, the prefix
of the GRE subnet must be advertised in IGP or BGP. This is performed by adding the interface to IGP
or BGP. Alternatively, a static route is added to the other routers.
• The GRE termination subnet is not supported with the following interface types. If these interface types
are configured, the configuration of the gre-termination command option is rejected:
– unnumbered network IP interface
– IES interface
– VPRN interface
– CSC VPRN interface
• The configuration of the gre-termination command option is also rejected when applied to the system
interface, as the system interface supports the termination of MPLS-over-GRE packet on its /32 subnet
with no explicit configuration.
• This feature introduces full support of LER and LSR roles for the packet after the GRE encapsulation
is removed, regardless if the GRE termination was on the system interface address or the GRE
termination subnet.
• In an LSR role, this feature sprays the decapsulated packets over LAG and ECMP links by attempting
a hash on the SA/DA and Layer 4 ports of the inner IP header if the payload below the label stack
is IPv4 or IPv6. Otherwise, a hash is performed on the SA/DA of the outer IPv4 header of the GRE
encapsulation.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• If a match exists and the packet is not dropped, the application of ACL filter on the incoming interface
matches against the inner (payload) header of the received GRE-encapsulated packet.
• If a match does not exist, continue processing in the pipeline as an IPv4 packet. In this case, the
application of ACL filter on the incoming interface matches against the outer IPv4 header of the
received GRE-encapsulated packet.
This feature supports GRE/IPv4 encapsulation when the payload is MPLS, IPv4, or IPv6.
All MPLS egress LER and LSR features associated with the processed label are supported.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
option enabled on the incoming network IP interface. Use the following command to configure the LSR
hashing command option.
For more details, see LSR Hashing of MPLS-over-GRE Encapsulated Packet in section Changing Default
Per Flow Hashing Inputs of the 7450 ESS, 7750 SR, 7950 XRS, and VSR Interface Configuration Guide.
In Figure 11: GRE deployment using a PXC port example, the public network is typically an unsecured
network, such as public Internet, over which packets belonging to the private network in the diagram
cannot be transmitted natively. Inside the 7750 SR, a public service instance (IES or VPRN) connects to
the public network, and a private service instance (typically a VPRN) connects to the private network.
For GRE tunnels using PXC ports, the public and private services must be two different services,
and the PXC is the connection between the two services. Traffic from the public network may require
authentication and encryption inside an IPsec tunnel to reach the private network. In this way, the
authenticity, confidentiality, and integrity of private network access can be enforced. If authentication and
confidentiality are not required, then access to the private network may be provided through GRE or IP-IP
tunnels.
Traffic flows through PXC-based tunnels in the following ways:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• In the upstream direction (public to private), the encapsulated traffic is forwarded to a public tunnel
interface if the destination address matches the local or gateway address of a GRE tunnel. As the traffic
passes through the PXC port, the tunnel header is removed, the payload IP packet is delivered to the
private service, and from there, the traffic is forwarded again based on the destination address of the
payload IP packet.
• In the downstream direction (private to public), unencapsulated traffic belonging to the private service
is forwarded into the tunnel by matching a route with the GRE tunnel as next-hop. The route can be
configured statically, learned by running OSPF on the private tunnel interface or by running BGP over
the tunnel. After clear traffic is forwarded to the PXC port, it is encapsulated in the GRE header and
passed to the public service, and from there, the traffic is forwarded again based on the destination
address of the GRE header.
A:node-2>config>service# info
----------------------------------------------
ies 100 name "100" customer 1 create
no shutdown
interface "int-gre-tunnel-public" create
address 192.110.1.1/30
sap pxc-1.b:100 create //Public interface
description "Public Tunnel PXC SAP"
exit
exit
no shutdown
----------------------------------------------
[ex:/configure service]
A:admin@node-2# info
customer "200" {
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
vprn "200" {
customer "200"
bgp-ipvpn {
mpls {
admin-state enable
route-distinguisher "64496:1"
vrf-target {
community "target:64496:1"
}
}
}
interface "int-gre-tunnel-private" {
tunnel true
ip-mtu 1476
ipv4 {
addresses {
address 10.1.1.1 {
prefix-length 30
}
}
}
sap pxc.1.a:200 {
ip-tunnel "gre-tunnel-1" {
admin-state enable
delivery-service "100"
remote-ip-address 192.120.1.1
backup-remote-ip-address 192.120.1.2
local-ip-address 192.110.1.2
gre-header {
admin-state enable
key {
admin-state enable
send 123
receive 123
}
}
}
}
}
static-routes {
route 172.16.1.1/24 route-type unicast {
next-hop "10.1.1.2" {
}
}
}
}
A:node-2>config>service# info
----------------------------------------------
customer 200 name "200" create
exit
vprn 200 name "200" customer 200 create
no shutdown
interface "int-gre-tunnel-private" tunnel create
address 10.1.1.1/30
ip-mtu 1476
sap pxc.1.a:200 create
ip-tunnel "gre-tunnel-1" create
gre-header send-key 123 receive-key 123
source 192.110.1.2
remote-ip 192.120.1.1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
backup-remote-ip 192.120.1.2
delivery-service name "100"
no shutdown
exit
exit
exit
static-route-entry 172.16.1.1/24
next-hop 10.1.1.2
no shutdown
exit
exit
bgp-ipvpn
mpls
route-distinguisher 64496:1
vrf-target target:64496:1
no shutdown
exit
exit
exit
----------------------------------------------
Figure 12: Router Interface Encryption Packet Format (IPsec Transport Mode)
The protocol field in the IP header of an NGE packet is always set to ‟ESP”. Within an NGE domain,
the SPI that is included in the ESP header is always an SPI for the key group configured on the router
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
interface. Other fields in the IP header, such as the source and destination addresses, are not altered by
NGE router interface encryption. Packets are routed through the NGE domain and decrypted when the
packet leaves the NGE domain.
The group keys used on an NGE-enabled router interface provide encryption of broadcast and multicast
packets within the GRT. For example, OSPF uses a broadcast address to establish adjacencies, which can
be encrypted by NGE without the need to establish point-to-point encryption tunnels. Similarly, multicast
packets are also encrypted without point-to-point encryption tunnels.
In Figure 13: NGE Domain Transit, nodes A, B, C, and D have router interfaces configured with router
interface encryption enabled. Traffic is encrypted when entering the NGE domain using the key group
configured on the router interface and is decrypted when exiting the NGE domain. Traffic may traverse
multiple hops before exiting the NGE domain, yet decryption only occurs on the final node when the traffic
exits the NGE domain.
Various traffic types are supported and encrypted when entering the NGE domain, as illustrated by the
following items on node A in Figure 13: NGE Domain Transit:
• Item 1: Self-generated packets
These packets, which include all types of control plane and management packets such as OSPF, BGP,
LDP, SNMPv3, SSH, ICMP, RSVP-TE, and 1588, are encrypted.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
In a private IP/MPLS network NGE domain, all interfaces are owned by the user and there is no
intermediary service provider needed to interconnect nodes. Each interface is a point-to-point private link
between private nodes. When a new node is added to this type of NGE domain (node D in Figure 14:
Private IP/MPLS network NGE domain), the links that connect node D to the existing nodes in the NGE
domain (nodes A, B, and C) must be enabled with NGE router interface encryption. Links from the new
node to the existing nodes are enabled one at a time. The NSP NFM-P provides tools that simplify adding
nodes to the NGE domain and enabling NGE on their associated interfaces. In this type of NGE domain,
each interface is a direct link between two nodes and is not used to communicate with multiple nodes over
a broadcast medium offered by an intermediary network. Also, there are no NGE gateway nodes required
between the NSP NFM-P and new nodes entering the NGE domain.
Private over intermediary network NGE domains have nodes with links that connect to a service provider
network where a single link can communicate with multiple nodes over a Layer 3 service such as a VPRN.
In Figure 15: Private over intermediary network NGE domain, node A has NGE enabled on its interface
with the service provider and uses that single interface to communicate with nodes B and C, and eventually
with node D when node D has been added to the NGE domain. This type of NGE domain requires the
recognition of NGE gateway nodes that allow the NSP NFM-P to reach new nodes that enter the domain.
Node C is designated as a gateway node.
When node D is added to the NGE domain, it must first have the NGE domain key group downloaded
to it from the NSP NFM-P. The NSP NFM-P creates an NGE exception ACL on the gateway node, C, to
allow communication with node D using SNMPv3 and SSH through the NGE domain. After the key group
is downloaded, the NSP NFM-P enables router interface encryption on node D’s interface with the service
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
provider and node D is now able to participate in the NGE domain. The NSP NFM-P automatically removes
the IP exception ACL from node C when node D enters the NGE domain.
See Router interface NGE domain concepts for more information.
Key Description
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Key Description
Outbound packets are encrypted using the interface key group if not
already encrypted; inbound packets can be NGE-encrypted or clear text
4 Outside the NGE domain, the interface is not configured for NGE; any ESP
packets are IPsec packets
A router interface is considered to be inside the NGE domain when it has been configured with group-
encryption on the interface. When group-encryption is configured on the interface, the router can receive
unencrypted packets or NGE-encrypted packets from any configured key group on the router, but any other
type of IPsec-formatted packet is not allowed. If an IPsec-formatted packet is received on an interface that
has group-encryption enabled, it does not pass NGE authentication and is dropped. Therefore, IPsec
packets cannot exist within the NGE domain without first being converted to NGE packets. This conversion
requirement delineates the boundary of the NGE domain and other IPsec services.
When NGE router interface encryption is enabled and only an outbound key group is configured, the
interface can receive unencrypted packets or NGE-encrypted packets from any configured key group on
the router. All outbound packets are encrypted using the outbound key group if the packet was not already
encrypted further upstream in the network.
When NGE router interface encryption has been configured with both an inbound and outbound key group,
only NGE packets encrypted with the key group security association can be sent and received over the
interface.
When there is no NGE router interface encryption, the interface is considered outside the NGE domain
where NGE is not applied.
See the ‟NGE Packet Overhead and MTU Considerations” section in the 7450 ESS, 7750 SR, 7950 XRS,
and VSR Services Overview Guide for MTU information related to enabling NGE on a router interface.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
The inbound or outbound exception filter is used to allow specific packet flows through the NGE domain
in clear text, where there is an explicit inbound and outbound key group configured on the interface. The
behavior of the exception filter for each router interface configuration is as follows:
• NGE enabled, no inbound or outbound key group
In this scenario, the router does not encrypt outbound traffic, and so the outbound exception filter is not
applied. The router can still receive inbound NGE packets, so the exception filter is applied to inbound
packets. If the filter detects a match, clear text packets can be received and forwarded by the router.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
An IPsec packet enters the router from outside the NGE domain. When the router determines that the
egress interface to route the packet is inside an NGE domain, it selects an NGE router interface with one of
the following configurations.
• NGE enabled with no inbound or outbound key group configured
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
This link cannot forward the IPsec packet without adding the NGE ESP, but because nothing is
configured for the outbound key group, the packet must be dropped.
• NGE enabled with outbound key group configured and no inbound key group configured — the packet
originates outside the NGE domain, so the router adds an ESP header over the existing ESP and
encrypts the payload using the NGE domain keys for the configured outbound key group.
• NGE enabled with both inbound and outbound key groups configured — the packet originates outside
the NGE domain, so the router adds an ESP header over the existing ESP and encrypts the payload
using the NGE domain keys for the configured outbound key group.
OSPFv3 IPsec support also uses IPsec transport mode packets. These packets originate from the CPM,
which is considered outside the NGE domain; however, the above rules for encapsulating the packets with
an NGE ESP apply and allow these packets to successfully transit the NGE domain.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Multicast packets received from outside the NGE domain (Scenario 1) are processed similarly to multicast
packets received from inside the NGE domain (Scenarios 2a and 2b).
The processing rule is that multicast packets are always forwarded as clear text over the fabric. This
means that for Scenario 2b, when a multicast packet is received on an encryption-capable interface and
is NGE-encrypted, the packet is always decrypted first so that it can be processed in the same way as
packets in Scenarios 1 and 2a.
On egress, the following scenarios apply:
• Egressing an interface outside the NGE domain
Packets are processed in the same way as any multicast packets forwarded out a non-NGE interface.
• Egressing an NGE router interface and no inbound or outbound key group is configured
The router forwards these packets out from the egress interface without encrypting them because
there is no outbound key group configured. This behavior also applies to unicast packets in the same
scenario.
• egressing an NGE router interface with the outbound key group configured — the router encrypts the
multicast packet using the SPI keys of the outgoing SA configured in the key group. This behavior also
applies to unicast packets in the same scenario.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Assigning key groups to a router interface in steps 2 and 3 is similar to assigning key groups to SDPs or
VPRN-based services. An outbound key group cannot be configured for a router interface without first
enabling the group-encryption command.
When group-encryption is enabled and no inbound key group is configured, the router accepts NGE Layer
3 packets that were encrypted using keys from any security association configured in any key group on the
system. If the packet specifies a security association that is not configured in any key group on the node,
the packet is dropped.
The outbound key group references the key group to use when traffic egresses the router on the router
interface. The inbound key group is used to make sure ingress traffic is using the correct key group on
the router interface. If ingress traffic is not using the correct key group, the router counts these packets as
errors.
Procedure
Step 1. Enable NGE with the group-encryption command.
Step 2. Configure the outbound key group.
Step 3. Configure the inbound key group.
2.12.11 Router interface NGE and ICMP interactions over the NGE domain
Typically, ICMP works as expected over an NGE domain when all routers participating in the NGE domain
are NGE-capable; this includes running an NGE domain over a private IP/MPLS network. When an ICMP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
message is required, the NGE packet is decrypted first, and the original packet is restored to create a
detailed ICMP message using the original packet’s header information.
When the NGE domain crosses a Layer 3 service provider, or crosses over routers that are not NGE-
aware, it is not possible to create a detailed ICMP message using the original packet’s information, as
the NGE packet protocol is always set to ESP. Furthermore, the NGE router that receives these ICMP
messages drops them because the messages are not NGE-encrypted.
The combination of dropping ICMP messages at the NGE border node and the missing unencrypted
packet details in the ICMP information can cause problems with diagnosing network issues.
To help with diagnosing network issues, additional statistics are available on the interface to show whether
ICMP messages are being returned from a foreign node. The following statistics are included in the group
encryption NGE statistics for an interface:
• Group Enc Rx ICMP DestUnRch Pkts
• Group Enc Rx ICMP TimeExc Pkts
• Group Enc Rx ICMP Other Pkts
These statistics are used when clear text ICMP messages are received on an NGE router interface. The
Invalid ESP statistics are not used in this situation even though the packet does not have a correct NGE
ESP header. If there is no ingress exception ACL configured on the interface to allow the ICMP messages
to be forwarded, the messages are counted and dropped.
If more information is required for these ICMP messages, such as source or destination address
information, a second ICMP filter can be configured on the interface to allow logging of the ICMP
messages. If the original packet information is also required, an egress exception ACL can be configured
with the respective source or destination address information, or other criteria, to allow the original packet
to enter the NGE domain in clear text and determine which flows are causing the ICMP failures.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
The address associates the device’s system name with the IP system address. An IP address must be
assigned to each IP interface.
• system interface
This creates an association between the logical IP interface and the system (loopback) address. The
system interface address is the circuitless address (loopback) and is used by default as the router ID for
protocols such as OSPF and BGP.
• router ID
(Optional) The router ID specifies the router's IP address.
• autonomous system
(Optional) An autonomous system (AS) is a collection of networks that are subdivided into smaller, more
manageable areas.
• confederation
(Optional) This option creates confederation-autonomous systems within an AS to reduce the number of
IBGP sessions required within an AS.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
a letter, and is case-sensitive; for example, the interface name ‟1.1.1.1” is not allowed, but ‟int-1.1.1.1” is
allowed.
If the interface name already exists, the router changes the context to maintain that IP interface. If the
interface name already exists within another service ID or is an IP interface defined within the configure
router commands, an error occurs, and the context does not change to that IP interface.
To create an interface, the following basic configuration tasks must be performed:
• Assign a name to the interface.
• Associate an IP address with the interface.
• Associate the interface with a network interface or the system interface.
• Configure appropriate routing protocols.
A system interface and network interface must be configured.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Example: MD-CLI
A:node-2>config# info
. . .
#------------------------------------------
# Router Configuration
#------------------------------------------
router
interface "system"
address 10.10.10.103/32
exit
interface "to-104"
address 10.0.0.103/24
port 1/1/1
exit
exit
autonomous-system 100
confederation 1000 members 100 200 300
router-id 10.10.10.103
...
exit
isis
exit
...
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
[ex:/configure system]
A:admin@node-2# info
name "node-2"
location "Mt.View, CA, NE corner of FERG 1 Building"
coordinates "37.390, -122.05500 degrees lat."
A:node-2>config>system# info
#------------------------------------------
# System Configuration
#------------------------------------------
name "node-2"
location "Mt.View, CA, NE corner of FERG 1 Building"
coordinates "37.390, -122.05500 degrees lat."
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
A:node-2>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
interface "to-ALA-2"
address 10.10.24.4/24
port 1/1/1
egress
filter ip 10
exit
exit
...
#------------------------------------------
Use the commands in the following context to configure CPU protection policies.
For more information, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
The following example shows key group configuration for a router interface.
Example: classic CLI
A:node-2>config>router# info
----------------------------------------------
...
interface demo
group-encryption
encryption-keygroup 6 direction inbound
encryption-keygroup 6 direction outbound
exit
no shutdown
exit
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
number 100
seconds 10
}
unreachables {
number 100
seconds 10
}
}
}
A:node-2>config>router>if# info
----------------------------------------------
port 1/2/37
ipv6
exit
no shutdown
Use the commands in the following context to configure IPv6 on a router interface that you want to
configure differently from the default configuration.
A:node-2>config>router>if# info
----------------------------------------------
address 10.11.10.1/24
port 1/2/37
ipv6
address 2001:db8::1/24
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
----------------------------------------------
A:node-2>config>router# info
...
#--------------------------------------------------
echo "Static Route Configuration"
#--------------------------------------------------
static-route-entry 3ffe::c8c8:c802/128
indirect 10.200.200.2
shutdown
tunnel-next-hop
resolution disabled
exit
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
A:node-2>config>router# info
----------------------------------------------
...
interface "ip-1.1.1.1"
address 10.1.1.1/30
port 1/1/1
exit
...
----------------------------------------------
Both the IPv4 and IPv6 system addresses must be configured. The following example shows the
configuration of interface information.
Example: MD-CLI
A:node-2>config>router# info
----------------------------------------------
...
interface "system"
address 10.0.113.1/32
ipv6
address 3ffe::c8c8:c801/128
exit
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
area 0.0.0.0 {
interface "ip-1.1.1.1" {
}
interface "system" {
}
}
}
A:node-2>config>router# info
----------------------------------------------
...
ospf
area 0.0.0.0
interface "system"
exit
interface "ip-1.1.1.1"
exit
exit
exit
----------------------------------------------
A:node-2>config>router# info
----------------------------------------------
...
bgp
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
export "ospf3"
router-id 203.0.113.1
group "main"
family ipv4 ipv6
type internal
neighbor 203.0.113.2
local-as 1
peer-as 1
exit
exit
exit
...
----------------------------------------------
[ex:/configure policy-options]
A:admin@node-2# info
policy-statement "ospf3" {
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10 {
description "Entry From Protocol ospf3 To bgp"
from {
protocol {
name [ospf3]
}
}
to {
protocol {
name [bgp]
}
}
action {
action-type accept
}
}
}
A:node-2>config>router# info
----------------------------------------------
...
policy-options
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
...
----------------------------------------------
A:node-2>config>router# info
#--------------------------------------------------
"Static Route Configuration"
#--------------------------------------------------
static-route-entry 3ffe::c8c8:c801/128
indirect 10.0.113.1
...
exit
exit
exit
The following example shows the network interface configuration with both IPv4 and IPv6 addresses
configured.
Example: MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
ipv4 {
primary {
address 10.0.113.2
prefix-length 32
}
}
ipv6 {
address 3ffe::c8c8:c802 {
prefix-length 128
}
}
}
A:node-2>config>router# info
----------------------------------------------
...
interface "ip-1.1.1.2"
address 10.1.1.2/30
port 1/1/1
exit
interface "system"
address 10.0.113.2/32
ipv6
address 3ffe::c8c8:c802/128
exit
exit
----------------------------------------------
A:node-2>config>router# info
----------------------------------------------
...
ospf
area 0.0.0.0
interface "system"
exit
interface "ip-1.1.1.2"
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
exit
exit
exit
----------------------------------------------
A:node-2config>router# info
----------------------------------------------
...
bgp
export "ospf3"
router-id 203.0.113.2
group "main"
family ipv4 ipv6
type internal
neighbor 203.0.113.1
local-as 1
peer-as 1
exit
exit
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
[ex:/configure policy-options]
A:admin@node-2# info
policy-statement "ospf3" {
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10 {
description "Entry From Protocol ospf3 To bgp"
from {
protocol {
name [ospf3]
}
}
to {
protocol {
name [bgp]
}
}
action {
action-type accept
}
}
}
A:node-2>config>router# info
----------------------------------------------
...
policy-options
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• classic CLI
A:node-2>config>router>router-advert# info
----------------------------------------------
interface "n1"
prefix 2001:db8:3::/64
exit
use-virtual-mac
no shutdown
exit
----------------------------------------------
*A:node-2>config>router>router-advert# interface n1
*A:node-2>config>router>router-advert>if# prefix 2001:db8:3::/64
A:node-2>config>router>router-advert>if>prefix# info
----------------------------------------------
autonomous
on-link
preferred-lifetime 604800
valid-lifetime 2592000
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
----------------------------------------------
A:node-2>config>router# info
----------------------------------------------
#--------------------------------------------------
"IP Configuration"
#--------------------------------------------------
interface "test"
port 1/3/37
ipv6
exit
no shutdown
exit
A:node-2>config>router>if>ipv6$ info detail
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
----------------------------------------------
icmp6
packet-too-big 100 10
param-problem 100 10
redirects 100 10
time-exceeded 100 10
unreachables 100 10
exit
A:node-2>config>router>if# info
----------------------------------------------
address 10.11.10.1/24
port 1/3/37
ipv6
address 2001:db8::1/24
exit
----------------------------------------------
[ex:/configure policy-options]
A:admin@node-2# info
policy-statement "ospf3" {
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10 {
description "Entry From Protocol ospf3 To bgp"
from {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
protocol {
name [ospf3]
}
}
to {
protocol {
name [bgp]
}
}
action {
action-type accept
}
}
}
A:node-2>config>router# info
----------------------------------------------
...
policy-options
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
----------------------------------------------
– classic CLI
• A route policy statement and apply the specified prefix list. Use the commands in the following context
to configure a route policy statement and apply the specified prefix list:
– MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
– classic CLI
• In the policy statement entry to context, specify the host source address(es) for which ARP
requests can or cannot be forwarded to non-local networks, depending on the specified action.
• In the policy statement entry from context, specify network prefixes that ARP requests to be
forwarded or not forwarded depending on the action if a match is found. For more information
about route policies, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR Unicast Routing
Protocols Guide.
• Apply the policy statement to the proxy ARP configuration. Use the commands in the following context
to apply the policy statement to the proxy ARP configuration.
[ex:/configure]
A:admin@node-2# info
policy-options {
prefix-list "prefixlist1" {
prefix 10.20.30.0/24 type through {
through-length 32
}
}
policy-statement "ProxyARPpolicy" {
entry 10 {
from {
prefix-list ["prefixlist1"]
}
to {
prefix-list ["prefixlist2"]
}
action {
action-type reject
}
}
default-action {
action-type accept
}
}
}
A:node-2>config>router>policy-options# info
----------------------------------------------
prefix-list "prefixlist1"
prefix 10.20.30.0/24 through 32
exit
prefix-list "prefixlist2"
prefix 10.10.10.0/24 through 32
exit
...
policy-statement "ProxyARPpolicy"
entry 10
from
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
prefix-list "prefixlist1"
exit
to
prefix-list "prefixlist2"
exit
action reject
exit
default-action accept
exit
exit
...
----------------------------------------------
A:node-2>config>router>if# info
----------------------------------------------
address 192.0.2.59/24
local-proxy-arp
proxy-arp-policy "ProxyARPpolicy"
exit
----------------------------------------------
configure router
Use the commands in the following context, on the BGP protocol level, to define a BGP router ID.
Note: A router ID configured under the bgp router-id context is only used within BGP.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
If a new router ID is configured, protocols are not automatically restarted with the new router ID. The next
time a protocol is initialized, the new router ID is used. An interim period of time can occur when different
protocols use different router IDs. To force the new router ID, issue the shutdown and no shutdown
commands for each protocol that uses the router ID, or restart the entire router.
It is possible to configure SR OS to operate with an IPv6 only BOF and no IPv4 system interface address.
When configured in this manner, the user must explicitly define IPv4 router IDs for protocols such as OSPF
and BGP because there is no mechanism to derive the router ID from an IPv6 system interface address.
The following example shows a router ID configuration.
Example: MD-CLI
A:node-2config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
. . .
router-id 10.10.0.4
#------------------------------------------
Note:
• Confederations can be preconfigured before configuring BGP connections and peering.
• Each confederation can have up to 15 members.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
Example: MD-CLI
A:node-2>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.10.103/32
exit
interface "to-104"
address 10.0.0.103/24
port 1/1/1
exit
autonomous-system 100
confederation 2002 members 200 300 400
router-id 10.10.10.103
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
autonomous-system 100
router-id 10.10.10.103
interface "system" {
ipv4 {
primary {
address 10.10.10.103
prefix-length 32
}
}
}
interface "to-104" {
port 1/1/1
ipv4 {
primary {
address 10.0.0.103
prefix-length 24
}
}
}
A:node-2>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.10.103/32
exit
interface "to-104"
address 10.0.0.103/24
port 1/1/1
exit
exit
autonomous-system 100
router-id 10.10.10.103
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
• classic CLI
These cause an overload state in the IGP to trigger the traffic reroute by setting the overload bit in IS-IS
or setting the metric to maximum in OSPF. When PIM uses IS-IS or OSPF to find out the upstream router,
a next-hop change in the IS-IS or OSPF causes PIM to join the new path and prune the old path, which
effectively also reroutes the multicast traffic downstream as well as the unicast traffic.
When the problem is resolved, and the required compliment of SFMs become active in the router, the
overload condition is cleared, which causes the traffic to be routed back to the router.
The conditions to set overload are:
• 7750 SR-12/SR-7 and 7450 ESS-12/ESS-7 platforms: protocol sets overload if one of the SF/CPMs
fails
• 7750 SR-12e and 7950 XRS platforms: protocol sets overload if two SFMs fail (two SFMs belonging to
different SFM pairs on the XRS-40)
[ex:/configure system]
A:admin@node-2# info
name "node-2"
location "Mt.View, CA, NE corner of FERB 1 Building"
coordinates "37.390, -122.05500 degrees lat."
management-interface {
configuration-mode mixed
}
A:node-2>config>system# info
#--------------------------------------------------
echo "System Configuration"
#--------------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
name "node-2"
location "Mt.View, CA, NE corner of FERB 1 Building"
coordinates "37.390, -122.05500 degrees lat."
management-interface
configuration-mode mixed
exit
...
#--------------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
A:node-2>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.0.0.103/32
exit
interface "to-sr1"
address 10.0.0.25/24
port 1/1/2
exit
router-id 10.10.0.3
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
The following example shows the commands to remove a key group from a router interface.
Example: classic CLI
The following example shows that the key group configuration has been removed from a router interface.
Example: classic CLI
A:node-2>config>router# info
----------------------------------------------
...
interface demo
group-encryption
exit
no shutdown
exit
exit
...
----------------------------------------------
Use the following commands to change the key group on a router interface. The following example shows
the inbound and outbound key groups being changed from key group 6 to key group 8.
Example: classic CLI
The following example shows that the key group configuration has been changed for the router interface.
Example: classic CLI
A:node-2config>router# info
----------------------------------------------
...
interface demo
group-encryption
encryption-keygroup 8 direction inbound
encryption-keygroup 8 direction outbound
SPACER TEXT
Router Configuration Guide Release 23.3.R1 IP router configuration
exit
no shutdown
exit
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
3 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
The preempt command option can be set to false to prevent a backup virtual router with a better priority
value from becoming master when an existing non-owner virtual router is the current master. This is
determined on a first-come, first-served basis.
While master, a virtual router routes and originates all IP packets into the LAN using the physical MAC
address for the IP interface as the Layer 2 source MAC address, not the VRID MAC address. ARP packets
also use the parent IP interface MAC address as the Layer 2 source MAC address while inserting the
virtual router MAC address in the appropriate hardware address field. VRRP messages are the only
packets transmitted using the virtual router MAC address as the Layer 2 source MAC address.
• classic CLI
For owner virtual router instances, after you define the IP addresses that are advertised within VRRP
advertisement messages, this communicates the IP addresses that the master is advertising to backup
virtual routers receiving the messages. The specified unicast IPv4 address must be equal to one of the
existing IP addresses in the parental IP interface (primary or secondary) or the backup command fails.
For non-owner virtual router instances, the backup command for IPv4 or IPv6 creates an IP interface
IP address used for routing IP packets and communicating with the system, based on which access
command options are enabled (ntp-reply, ping-reply, telnet-reply, and ssh-reply). The specified unicast IPv4
address must exist on one of the local subnets of the parental IP interface. If the specified address does
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
not exist on one of the local subnets of the parental IP interface or if the specified address uses the same
IP address as the parental IP interface, the backup command fails.
The backup command must be executed successfully at least once before the virtual router instance can
enter the operational state.
The new interface IP address created with the backup command assumes the mask and command
options of the corresponding parent IP interface IP address. The unicast IPv4 address is only active when
the virtual router instance is operating in the master state. When not operating as master, the virtual router
instance acts as if it is operationally down. It does not respond to ARP requests made to the unicast IPv4
address, nor does it route packets received with its VRID-derived source MAC address. A non-master
virtual router instance always silently discards packets destined for the unicast IPv4 address. One virtual
router instance may only have one virtual router IP address from a parental local subnet. Multiple virtual
router instances can define a virtual router IP address from the same local subnet, as long as each IP
address is different.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
3.2.7.2 Priority
The priority value affects the interaction between this VRID and the same VRID of other virtual routers
participating on the same LAN. A higher-priority value defines a greater priority in becoming the virtual
router master for the VRID. The priority value can only be configured when the defined IP address on the
IP interface is different from the virtual router IP address (non-owner mode).
When the IP address on the IP interface matches the virtual router IP address (owner mode), the priority
value is fixed at 255, the highest value possible. This virtual router member is considered the owner of the
virtual router IP address. There can only be one owner of the virtual router IP address for all virtual router
members.
The priority value 0 is reserved for VRRP advertisement message purposes. It is used to tell other virtual
routers in the same VRID that this virtual router is no longer acting as master, triggering a new election
process. When this happens, each backup virtual router sets its master down timer equal to the skew time
value. This shortens the time until one of the backup virtual routers becomes master.
The current master virtual router must transmit a VRRP advertisement message immediately upon receipt
of a VRRP message with priority set to 0. This prevents another backup from becoming master for a short
period of time.
Non-owner virtual routers may be configured with a priority of 254 through 1. The default value is 100.
Multiple non-owners can share the same priority value. When multiple non-owner backup virtual routers
are tied (transmit VRRP advertisement messages simultaneously) in the election process, all attempts to
become master simultaneously. The one with the best priority wins the election. If the priority value in the
message is equal to the master’s local priority value, the primary IP address of the local master and of the
message is evaluated as the tie breaker. The higher IP address becomes master. (The primary IP address
is the source IP address of the VRRP advertisement message.)
The priority value is also used to determine when to preempt the existing master. If the preempt mode
value is true, VRRP advertisement messages from inferior (lower-priority) masters are discarded, causing
the master down timer to expire and causing the transition to master state.
The priority value also dictates the skew time added to the master timeout period.
3.2.7.3 IP Addresses
Each virtual router with the same VRID should be defined with the same set of IP addresses. These are
the IP addresses being used by hosts on the LAN as gateway addresses. Multi-netting supports 16 IP
addresses on the IP interface; up to 16 addresses can be assigned to a specific virtual router instance.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
locally configured advertisement interval setting. If the current master changes, the new master setting is
used. If the local virtual router becomes master, the locally configured advertisement interval is enforced.
If a VRRP advertisement message is received with an advertisement interval set to a value different from
the local value and the inherit command option is disabled, the message is discarded without processing.
The master virtual router on a VRID uses the advertisement interval to load the advertisement timer,
specifying when to send the next VRRP advertisement message. Each backup virtual router on a VRID
uses the advertisement interval (with the configured local priority) to determine the master down timer
value.
VRRP advertisement messages that are fragmented, or contain IP options (IPv4), or contain extension
headers (IPv6) require a longer message interval to be configured.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A backup router only attempts to become the master router if the preempt mode is true and the received
VRRP advertisement priority field is less than the virtual router in-use priority value.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
– Advertisement interval field – must be equal to the VRID configured advertisement interval
– Checksum field – must be valid
– Authentication data fields – must be ignored
VRRP messages not meeting the criteria are silently discarded.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
3.2.7.14 Policies
Policies can be configured to control VRRP priority with the virtual router instance. VRRP priority control
policies can be used to override or adjust the base priority value, depending on events or conditions within
the chassis.
The policy can be associated with more than one virtual router instance. The priority events within the
policy override or diminish the base priority dynamically affecting the in-use priority. As priority events clear
in the policy, the in-use priority can eventually be restored to the base priority value.
Policies can only be configured in the non-owner VRRP context. For non-owner virtual router instances, if
policies are not configured, then the base priority is used as the in-use priority.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
If the LAG transitions from one threshold to the next, the previous threshold priority value is subtracted
from the total delta sum while the new threshold priority value is added to the sum. The new sum is then
subtracted from the base priority and compared to the delta in-use priority limit to determine the new in-use
priority on the virtual router instance.
The following example shows a LAG degrade priority event and its interaction with the hold-set timer in
changing the in-use priority.
The following state and timer settings are used for the LAG events listed in Table 7: LAG events:
• User-defined thresholds: 2 ports down, 4 ports down, 6 ports down
• LAG configured ports: 8 ports
• Hold-set timer (hold-set): 5 seconds
1 One port up Event State Set - 8 ports down Cannot change until hold-set timer
expires
2 All ports up Event State Set - 8 ports down Still waiting for hold-set timer expiry
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
202 Seven ports Event State Set - 7 ports down Changed because of increase
down
Event Threshold 6 ports down —
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
The ping task is controlled by interval and size parameters that define how often the ICMP request
messages are transmitted and the size of each message. A historical missing reply command option
defines when the ping destination is considered unreachable.
When the host is unreachable, the host unreachable priority event is considered true or set. When the host
is reachable, the host unreachable priority event is considered false or cleared.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>router# info
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "base-1-1"
port 1/1/3:1
ipv6
address 2500::1/64 dad-disable
link-local-address fe80::1 dad-disable
vrrp 1
backup 2500::10
backup fe80::1:1
priority 130
ping-reply
message-interval 5
mac 00:00:5e:00:02:01
oper-group "op-v6LI-1"
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>router# info
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "base-1-2"
port 1/1/3:2
ipv6
address 2500:0:1::1 dad-disable
link-local-address fe80::1 dad-disable
vrrp 1
backup 2500:0:1::10
backup fe80::1:2
message-interval 40
priority 130
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
ping-reply
mac 00:00:5e:00:02:01
oper-group "op-v6LI-1"
bfd-enable name "100" interface "bfd-1-1" dst-ip 2000::2
exit
exit
no shutdown
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
3.7.1 General
• Creating and applying VRRP policies are optional.
• Backup command:
– The backup IP addresses must be on the same subnet. The backup addresses explicitly define
which IP addresses are in the VRRP advertisement message IP address list.
– In the owner mode, the backup IP address must be identical to one of the interface’s IP addresses.
The backup address explicitly defines which IP addresses are in the VRRP advertisement message
IP address list.
– For IPv6, one of the backup addresses configured must be the link-local address of the owner VRRP
instance.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
Example: VRRP policy configuration for the 7450 ESS (classic CLI)
A:node-2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 4/1/2
hold-set 43200
priority 100 delta
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
exit
port-down 4/1/3
priority 200 explicit
exit
lag-port-down 1
number-down 3
priority 50 explicit
exit
exit
host-unreachable 10.10.24.4
drop-count 25
exit
route-unknown 10.10.0.0/32
priority 50 delta
exit
exit
----------------------------------------------
Example: VRRP policy configuration for the 7750 SR and 7950 XRS (MD-CLI)
Example: VRRP policy configuration for the 7750 SR and 7950 XRS (classic CLI)
A:node-2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 4/1/2
hold-set 43200
priority 100 delta
exit
port-down 4/1/3
priority 200 explicit
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
lag-port-down 1
number-down 3
priority 50 explicit
exit
exit
host-unreachable 10.10.24.4
drop-count 25
exit
route-unknown 10.10.0.0/32
priority 50 delta
protocol bgp
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
}
vrrp 19 {
authentication-key "testabc hash2"
backup [10.10.36.2]
owner true
}
}
}
}
A:node-2>config>service# info
----------------------------------------------
...
ies 1 name "1" customer 1 create
interface "tuesday" create
address 10.10.36.2/24
sap 7/1/1.2.2 create
vrrp 19 owner
backup 10.10.36.2
authentication-key "testabc"
exit
exit
interface "testing" create
address 10.10.10.16/24
sap 1/1/55:0 create
vrrp 12
backup 10.10.10.15
policy 1
authentication-key "testabc"
exit
exit
no shutdown
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
prefix-length 28
}
vrrp 217 {
backup [10.152.2.222]
priority 254
ping-reply true
}
}
ipv6 {
link-local-address {
address fe80::d68f:1:221:fffd
duplicate-address-detection false
}
address 2001:db8:d68f:1:221::fffd {
prefix-length 64
}
vrrp 219 {
backup [fe80::d68f:1:221:ffff]
priority 254
ping-reply true
}
}
}
A:node-2>config>router>router-advert# info
----------------------------------------------
interface "Application-interface-101"
use-virtual-mac
no shutdown
exit
...
----------------------------------------------
A:node-2>config>service>ies# info
----------------------------------------------
description "Application VLAN 921"
interface "Application-interface-101" create
address 10.152.2.220/28
vrrp 217
backup 10.152.2.222
priority 254
ping-reply
exit
ipv6
address 2001:db8:D68F:1:221::FFFD/64
link-local-address fe80::d68f:1:221:fffd dad-disable
vrrp 219
backup fe80::d68f:1:221:ffff
priority 254
ping-reply
exit
exit
sap ccag-1.a:921 create
description "cross connect to VPLS 921"
exit
exit
no shutdown
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
interface "test1"
address 10.10.14.1/24
secondary 10.10.16.1/24
secondary 10.10.17.1/24
secondary 10.10.18.1/24
exit
interface "test2"
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc"
exit
exit
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
• preempt
• telnet-reply
• ssh-reply (IPv4 only)
• [no] shutdown
A:node-2>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
interface "system"
address 10.10.0.1/32
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
interface "testA"
address 10.123.123.123/24
exit
interface "testB"
address 10.10.14.1/24
secondary 10.10.16.1/24
secondary 10.10.17.1/24
secondary 10.10.18.1/24
exit
router-id 10.10.0.1
#------------------------------------------
A:node-2>config>vrrp# info
----------------------------------------------
policy 1
delta-in-use-limit 50
priority-event
port-down 1/1/2
hold-set 43200
priority 100 delta
exit
route-unknown 0.0.0.0/0
protocol isis
exit
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>service>ies# info
----------------------------------------------
interface "testing" create
address 10.10.10.16/24
sap 1/1/55:0 create
vrrp 12
backup 10.10.10.15
policy 1
authentication-key "testabc"
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
...
interface "test2"
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc"
exit
exit
#------------------------------------------
A:node-2>config>router# info
#------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
interface "if-test"
address 10.20.30.40/24
secondary 10.10.50.1/24
secondary 10.10.60.1/24
secondary 10.10.70.1/24
vrrp 1
backup 10.10.50.2
backup 10.10.60.2
backup 10.10.70.2
backup 10.20.30.41
ping-reply
telnet-reply
authentication-key "testabc" hash2
exit
exit
#-----------------------------------------
A:node-2>config>router# info
#------------------------------------------
interface "vrrpowner"
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc" hash2
exit
no shutdown
exit
#-----------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
A:node-2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 1/1/2
hold-set 43200
priority 100 delta
exit
port-down 1/1/3
priority 200 explicit
exit
host-unreachable 10.10.24.4
drop-count 25
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
Use the following command to show where VRRP policies are applies to an entity.
The following example shows where VRRP policies are applied to an entity.
Output example: MD-CLI
===============================================================================
VRRP Policies
===============================================================================
Policy Current Current Current Delta Applied Svc
Id Priority & Effect Explicit Delta Sum Limit Context
-------------------------------------------------------------------------------
1 200 Explicit 200 100 50 Yes
15 254 None None 1 No
32 100 None None 1 No
===============================================================================
===============================================================================
VRRP Policies
===============================================================================
Policy Current Current Current Delta Applied
Id Priority & Effect Explicit Delta Sum Limit
-------------------------------------------------------------------------------
1 200 Explicit 200 100 50 Yes
15 254 None None 1 No
32 100 None None 1 No
===============================================================================
*[ex:/configure vrrp]
A:admin@node-2# delete policy 1
*[ex:/configure vrrp]
A:admin@node-2# commit
*A:node-2>config>vrrp# no policy 1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 VRRP
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
4 Filter policies
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
A filter policy is applied to a packet in the ascending rule entry order. When a packet matches all the
command options specified in a filter entry’s match criteria, the system takes the action defined for that
entry. If a packet does not match the entry command options, the packet is compared to the next higher
numerical filter entry rule, and so on.
In classic CLI, if the packet does not match any of the entries, the system executes the default action
specified in the filter policy: drop or forward.
In MD-CLI, if the packet does not match any of the entries, the system executes the default action specified
in the filter policy: drop or accept.
For Layer 2, either an IPv4/IPv6 or MAC filter policy can be applied. For Layer 3 and network interfaces,
an IPv4/IPv6 policy can be applied. For R-VPLS service, a Layer 2 filter policy can be applied to Layer
2 forwarded traffic and a Layer 3 filter policy can be applied to Layer 3 routed traffic. For dual-stack
interfaces, if both IPv4 and IPv6 filter policies are configured, the policy applied are based on the outer
IP header of the packet. Non-IP packets do not affect an IP filter policy, so the default action in the IP
filter policy do not apply to these packets. Egress IPv4 QoS-based classification criteria are ignored when
egress MAC filter policy is configured on the same interface.
Additionally, platforms that support Network Group Encryption (NGE) can use IP exception filters. IP
exception filters scan all outbound traffic entering an NGE domain and allow packets that match the
exception filter criteria to transit the NGE domain unencrypted. See Router encryption exceptions using
ACLs for information about IP exception filters supported by NGE nodes.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
criteria may depend on hardware or filter direction. Nokia recommends not configuring a filter in a direction
or on hardware where a match criterion is not supported because this may lead to unwanted behavior.
Some match criteria may be grouped in match lists and may be autogenerated based on the router
configuration; see Filter policy advanced topics for more information.
IPv4 and IPv6 filter policies support three four filter types, including normal, source MAC, packet length,
and destination class, with each supporting a different set of match criteria.
The match criteria available using the normal filter type are defined in this section. Layer 3 match criteria
include:
• DSCP
Match the specified DSCP command option against the Differentiated Services Code Point/Traffic Class
field in the IPv4 or IPv6 packet header.
• source IP, destination IP, or IP
Match the specified source or destination IPv4 or IPv6 address prefix against the IP address field in the
IPv4 or IPv6 packet header. The user can optionally configure a mask to be used in a match. The ip
command can be used to configure a single filter-policy entry that provides non-directional matching of
either the source or destination (logical OR).
• flow label
Match the specified flow label against the Flow label field in IPv6 packets. The user can optionally
configure a mask to be used in a match. This operation is supported on ingress filters.
• protocol
Match the specified protocol against the Protocol field in the IPv4 packet header (for example, TCP,
UDP, IGMP) of the outer IPv4. ‟*” can be used to specify TCP or UDP upper-layer protocol match
(Logical OR).
• Next Header
Match the specified upper-layer protocol (such as, TCP, UDP, IGMPv6) against the Next Header field
of the IPv6 packet header. ‟*” can be used to specify TCP or UDP upper-layer protocol match (Logical
OR).
Use the following command to match against up to six extension headers.
Use the following command to match against the Next Header value of the IPv6 header.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Matches the specified value against the type field of the ICMP or ICMPv6 header of the packet. This
match is supported only for entries that also define the protocol or next-header match for the ICMP or
ICMPv6 protocol.
• source port number, destination port number, or port
Matches the specified port, port list, or port range against the source port number or destination port
number of the UDP, TCP, or SCTP packet header. An option to match either source or destination
(Logical OR) using a single filter policy entry is supported by using a directionless port. Source or
destination match is supported only for entries that also define protocol/next-header match for TCP,
UDP, SCTP, or TCP or UDP protocols. A non-initial fragment never matches an entry with non-zero port
criteria specified. Match on SCTP source port, destination port, or port is supported on ingress filter
policy.
• TCP ACK, TCP CWR, TCP ECE, TCP FIN, TCP NS, TCP PSH, TCP RST, TCP SYN, TCP URG
Matches the presence or absence of the TCP flags defined in RFC 793, RFC 3168, and RFC 3540 in
the TCP header of the packet. This match criteria also requires defining the protocol/next-header match
as TCP in the filter entry. TCP CWR, TCP ECE, TCP FIN, TCP NS, TCP PSH, TCP URG are supported
on FP4 and FP5-based line cards only. TCP ACK, TCP RST, and TCP SYN are supported on all FP-
based cards. When configured on other line cards, the bit for the unsupported TCP flags is ignored.
• tcp-established
Matches the presence of the TCP flags ACK or RST in the TCP header of the packet. This match
criteria requires defining the protocol/next-header match as TCP in the filter entry.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
The filter searches to match destination MAC address frames. The user can optionally configure a mask
to be used in a match.
• 802.1p frames
The filter searches to match 802.1p frames. The user can optionally configure a mask to be used in a
match.
• Ethernet II frames
The filter searches to match Ethernet II frames. The Ethernet type field is a two-byte field used to
identify the protocol carried by the Ethernet frame.
• source access point
The filter searches to match frames with a source access point on the network node designated in the
source field of the packet. The user can optionally configure a mask to be used in a match.
• destination access point
The filter searches to match frames with a destination access point on the network node designated in
the destination field of the packet. The user can optionally configure a mask to be used in a match.
• specified three-byte OUI
The filter searches to match frames with the specified three-byte OUI field.
• specified two-byte protocol ID
The filter searches to match frames with the specified two-byte protocol ID that follows the three-byte
OUI field.
• ISID
The filter searches to match for the matching Ethernet frames with the 24-bit ISID value from the PBB I-
TAG. This match criterion is mutually exclusive of all the other match criteria under a specific MAC filter
policy and is applicable to MAC filters of type ISID only. The resulting MAC filter can only be applied on
a BVPLS SAP or PW in the egress direction.
• inner-tag or outer-tag
The filter searches to match Ethernet frames with the non-service delimiting tags, as described in the
VID MAC filters section. This match criterion is mutually exclusive of all other match criteria under a
specific MAC filter policy and is applicable to MAC filters of type VID only.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Traffic can be dropped based on IPv4 packet length or IPv6 payload length by specifying a packet
length or payload length value or range within the drop filter action (the IPv6 payload length field
does not account for the size of the fixed IP header, which is 40 bytes).
This filter action is supported on ingress IPv4 and IPv6 filter policies only, if the filter is configured on
an egress interface the packet-length or payload-length match condition is always true.
This drop condition is a filter entry action evaluation, and not a filter entry match evaluation. Within
this evaluation, the condition is checked after the packet matches the entry based on the specified
filter entry match criteria.
Packets that match a filter policy entry match criteria and the drop packet-length-value or payload-
length-value are dropped. Packets that match only the filter policy entry match criteria and do not
match the drop packet-length-value or drop payload-length value are forwarded with no further
matching in following filter entries.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
– IPv4 TTL and IPv6 hop limit conditional drop
Traffic can be dropped based on a IPv4 TTL or IPv6 hop limit by specifying a TTL or hop limit value
or range within the drop filter action.
This filter action is supported on ingress IPv4 and IPv6 filter policies only. If the filter is configured on
an egress interface the packet-length or payload-length match condition is always true.
This drop condition is a filter entry action evaluation, and not a filter entry match evaluation. Within
this evaluation, the condition is checked after the packet matches the entry based on the specified
filter entry match criteria.
Packets that match filter policy entry match criteria and the drop TTL or drop hop limit value are
dropped. Packets that match only the filter policy entry match criteria and do not match the drop TTL
value or drop hop limit value are forwarded with no further match in following filter entries.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
– pattern conditional drop
Traffic can be dropped when it is based on a pattern found in the packet header or data payload.
The pattern is defined by an expression, mask, offset type, and offset value match in the first 256
bytes of a packet.
The pattern expression is up to 8 bytes long. The offset-type command identifies the starting point
for the offset value and the supported offset-type command options are:
• layer-3: layer 3 IP header
• layer-4: layer 4 protocol header
• data: data payload for TCP or UDP protocols
• dns-qtype: DNS request or response query type
The content of the packet is compared with the expression/mask value found at the offset type and
offset value as defined in the filter entry. For example, if the pattern is expression 0xAA11, mask
0xFFFF, offset-type data, offset-value 20, the filter entry compares the content of the first 2 bytes in
the packet data payload found 20 bytes after the TCP/UDP header with 0xAA11.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
This drop condition is a filter entry action evaluation, and not a filter entry match evaluation. Within
this evaluation, the condition is checked after the packet matches the entry based on the specified
filter entry match criteria.
Packets that match a filter policy's entry match criteria and the pattern, are dropped. Packets that
match only the filter policy's entry match criteria and do not match the pattern, are forwarded without
a further match in subsequent filter entries.
This filtering capability is supported on ingress IPv4 and IPv6 policies using FP4-based line cards,
and cannot be configured on egress. A filter entry using a pattern, is not supported on FP2 or FP3-
based line cards. If programmed, the pattern is ignored and the action is forward.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
• drop extracted traffic
Traffic extracted to the CPM can be dropped using ingress IPv4 and IPv6 filter policies based on
filter match criteria. Any IP traffic extracted to the CPM is subject to this filter action, including routing
protocols, snooped traffic, and TTL expired traffic.
Packets that match the filter entry match criteria and extracted to the CPM are dropped. Packets that
match only the filter entry match criteria and are not extracted to the CPM are forwarded with no further
match in the subsequent filter entries.
Cflowd, log, mirror, and statistics apply to all traffic matching the filter entry, regardless of the drop or
forward action.
• forward
Allows users to accept traffic to ingress or egress the system and be subject to regular processing.
• accept a conditional filter action
Allows users to accept a conditional filter action. Use the following commands to configure a conditional
filter action:
– MD-CLI
– classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
– The content of the packet is compared with the expression/mask value found at the offset type
and offset value defined in the filter entry. For example, if the pattern is expression 0xAA11, mask
0xFFFF, offset-type data, and offset-value 20, then the filter entry compares the content of the first 2
bytes in the packet data payload found 20 bytes after the TCP/UDP header with 0xAA11.
This accept condition is a filter entry action evaluation, and not a filter entry match evaluation. Within
this evaluation, the condition is checked after the packet matches the entry based on the specified
filter entry match criteria. Packets that match a filter policy's entry match criteria and the pattern,
are accepted. Packets that match only the filter policy's entry match criteria and do not match the
pattern, are dropped without a further match in subsequent filter entries.
This filtering capability is supported on ingress IPv4 and IPv6 policies using FP4-based line cards
and cannot be configured on egress. A filter entry using a pattern is not supported on FP2 or FP3-
based line cards. If programmed, the pattern is ignored and the action is drop.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
• FC
Allows users to mark the forwarding class (FC) of packets. This command is supported on ingress IP
and IPv6 filter policies. This filter action can be combined with the rate-limit action.
Packets matching this filter entry action bypass QoS FC marking and are still subject to QoS queuing,
policing and priority marking.
The QPPB forwarding class takes precedence over the filter FC marking action.
• rate limit
This action allows users to rate limit traffic matching a filter entry match criteria using IPv4, IPv6, or
MAC filter policies.
If multiple interfaces (including LAG interfaces) use the same rate-limit filter policy on different FPs,
then the system allocates a rate limiter resource for each FP; an independent rate limit applies to each
FP.
If multiple interfaces (including LAG interfaces) use the same rate-limit filter policy on the same FP,
then the system allocates a single rate limiter resource to the FP; a common aggregate rate limit is
applied to those interfaces.
Note that traffic extracted to the CPM is not rate limited by an ingress rate-limit filter policy while any
traffic generated by the router can be rate limited by an egress rate-limit filter policy.
rate-limit filter policy entries can coexist with cflowd, log, and mirror regardless of the outcome of the
rate limit. This filter action is not supported on egress on 7750 SR-a.
Rate limit policers are configured with MBS equals CBS equals 10 ms of the rate and high-prio-only
equals 0.
Interaction with QoS: Packets matching an ingress rate-limit filter policy entry bypass ingress QoS
queuing or policing, and only the filter rate limit policer is applied. Packets matching an egress rate-limit
filter policy bypass egress QoS policing, normal egress QoS queuing still applies.
– Kilobits-per-second and packets-per-second rate limit
The rate-limit action can be defined using kilobits per second or packets per second supported on
both ingress and egress filter policies. The packets per second rate limit is not supported using a
MAC filter policy and not supported on 7750 SR-a.
– IPv4 packet-length and IPv6 payload-length conditional rate limit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Traffic can be rate limited based on the IPv4 packet length and IPv6 payload length by specifying
a packet-length value or payload-length value or range within the rate-limit filter action. The IPv6
payload-length field does not account for the size of the fixed IP header, which is 40 bytes.
This filter action is supported on ingress IPv4 and IPv6 filter policies only and cannot be configured
on egress access or network interfaces.
This rate-limit condition is part of a filter entry action evaluation, and not a filter entry match
evaluation. It is checked after the packet is determined to match the entry based on the configured
filter entry match criteria.
Packets that match a filter policy’s entry match criteria and the rate-limit packet-length value or rate-
limit payload-length value are rate limited. Packets that match only the filter policy’s entry match
criteria and do not match the rate-limit packet-length value or rate-limit payload-length value are
forwarded with no further match in subsequent filter entries.
Cflowd, logging, and mirroring apply to all traffic matching the ACL entry regardless of the outcome
of the rate limiter and regardless of the packet-length value or payload-length value.
– IPv4 TTL and IPv6 hop-limit conditional rate limit
Traffic can be rate limited based on the IPv4 TTL or IPv6 hop-limit by specifying a TTL or hop-limit
value or range within the rate-limit filter action using ingress IPv4 or IPv6 filter policies.
The match condition is part of action evaluation (for example, after the packet is determined to
match the entry based on other match criteria configured). Packets that match a filter policy entry
match criteria and the rate-limit ttl or hop-limit value are rate limited. Packets that match only the
filter policy entry match criteria and do not match the rate-limit ttl or hop-limit value are forwarded
with no further matching in the subsequent filter entries.
Cflowd, logging, and mirroring apply to all traffic matching the ACL entry regardless of the outcome
of the rate-limit value and the ttl-value or hop-limit-value.
– pattern conditional rate limit
Traffic can be rate limited when it is based on a pattern found in the packet header or data payload.
The pattern is defined by an expression, mask, offset type, and offset value match in the first 256
bytes of a packet. The pattern expression is up to 8 bytes long. The offset-type command identifies
the starting point for the offset value and the supported offset-type command options are:
• layer-3: layer 3 IP header
• layer-4: layer 4 protocol header
• data: data payload for TCP or UDP protocols
• dns-qtype: DNS request or response query type
The content of the packet is compared with the expression/mask value found at the offset-type
command option and offset value defined in the filter entry. For example, if the pattern is expression
0xAA11, mask 0xFFFF, offset-type data, and offset value 20, then the filter entry compares the
content of the first 2 bytes in the packet data payload found 20 bytes after the TCP/UDP header with
0xAA11.
This rate limit condition is a filter entry action evaluation, and not a filter entry match evaluation.
Within this evaluation, the condition is checked after the packet matches the entry based on the
specified filter entry match criteria.
Packets that match a filter policy's entry match criteria and the pattern, are rate limited. Packets that
match only the filter policy's entry match criteria and do not match the pattern, are forwarded without
a further match in subsequent filter entries.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
This filtering capability is supported on ingress IPv4 and IPv6 policies using FP4 and FP5-based line
cards and cannot be configured on egress. A filter entry using a pattern is not supported on FP2 or
FP3-based line cards. If programmed, the pattern is ignored and the system forwards the packet.
Cflowd, logging, and mirroring apply to all traffic matching this filter entry regardless of the pattern
value.
– extracted traffic conditional rate limit
Traffic extracted to the CPM can be rate limited using ingress IPv4 and IPv6 filter policies based on
filter match criteria. Any IP traffic extracted to the CPM is subject to this filter action, including routing
protocols, snooped traffic, and TTL expired traffic.
Packets that match the filter entry match criteria and are extracted to the CPM are rate limited by this
filter action and not subject to distributed CPU protection policing.
Packets that match only the filter entry match criteria and are not extracted to the CPM are
forwarded with no further match in the subsequent filter entries.
Cflowd, logging, and mirroring apply to all traffic matching the ACL entry regardless of the outcome
of the rate limit or the extracted conditional match.
• Forward Policy-based Routing and Policy-based Forwarding (PBR/PBF) actions
Allows users to allow ingress traffic but change the regular routing or forwarding that a packet would
be subject to. The PBR/PBF is applicable to unicast traffic only. The following PBR or PBF actions are
supported (See Configuring filter policies with CLI for more information):
– egress PBR
Enabling egress-pbr activates a PBR action on egress, while disabling egress-pbr activates a PBR
action on ingress (default).
The following subset of the PBR actions (defined as follows) can be activated on egress: redirect-
policy, next-hop router, and ESI.
Egress PBR is supported in IPv4 and IPv6 filter policies for ESM only. Unicast traffic that is subject
to slow-path processing on ingress (for example, IPv4 packets with options or IPv6 packets with
hop-by-hop extension header) does not match egress PBR entries. Filter logging, cflowd, and mirror
source are mutually exclusive of configuring a filter entry with an egress PBR action. Configuring
pbr-down-action-override, if supported with a specific PBR ingress action type, is also supported
when the action is an egress PBR action. Processing defined by pbr-down-action-override does
not apply if the action is deployed in the wrong direction. If a packet matches a filter PBR entry and
the entry is not activated for the direction in which the filter is deployed, the system forwards the
packet. Egress PBR cannot be enabled in system filters.
– ESI
Forwards the incoming traffic using VXLAN tunnel resolved using EVPN MP BGP control plane to
the first service chain function identified by ESI (Layer 2) or ESI/SF-IP (Layer 3). Supported with
VPLS (Layer 2) and IES/VPRN (Layer 3) services. If the service function forwarding cannot be
resolved, traffic matches an entry and action forward is executed.
For VPLS, no cross-service PBF is supported; that is, the filter specifying ESI PBF entry must be
deployed in the VPLS service where BGP EVPN control plane resolution takes place as configured
for a specific ESI PBF action. The functionality is supported in filter policies deployed on ingress
VPLS interfaces. BUM traffic that matches a filter entry with ESI PBF is unicast forwarded to the
VTEP:VNI resolved through PBF forwarding.
For IES/VPRN, the outgoing R-VPLS interface can be in any VPRN service. The outgoing interface
and VPRN service for BGP EVPN control plane resolution must again be configured as part of ESI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
PBR entry configuration. The functionality is supported in filter policies deployed on ingress IES/
VPRN interfaces and in filter policies deployed on ingress and egress for ESM subscribers. Only
unicast traffic is subject to ESI PBR; any other traffic matching a filter entry with Layer 3 ESI action is
subjected to action forward.
When deployed in unsupported direction, traffic matching a filter policy ESI PBR/PBF entry is subject
to action forward.
– lsp
Forwards the incoming traffic onto the specified LSP. Supports RSVP-TE LSPs (type static or
dynamic only), MPLS-TP LSPs, or SR-TE LSPs. Supported for ingress IPv4/IPv6 filter policies and
only deployed on IES SAPs or network interfaces. If the configured LSP is down, traffic matches the
entry and action forward is executed.
– mpls-policy
Redirects the incoming traffic to the active instance of the MPLS forwarding policy specified by
its endpoint. This policy is applicable on any ingress interface (egress is blocked). The traffic is
subject to a plain forward if no policy matches the one specified, or if the policy has no programmed
instance, or if it is applied on non-L3 interface.
– next-hop address
Changes the IP destination address used in routing from the address in the packet to the address
configured in this PBR action. The user can configure whether the next-hop IP address must be
direct (local subnet only) or indirect (any IP). This functionality is supported for ingress IPv4/IPv6
filter policies only, and is deployed on Layer 3 interfaces. If the configured next-hop is not reachable,
traffic is dropped and a ‟ICMP destination unreachable” message is sent. If indirect is not specified
but the IP address is a remote IP address, traffic is dropped.
interface
Forwards the incoming traffic onto the specified IPv4 interface. Supported for ingress IPv4 filter
policies in global routing table instance. If the configured interface is down or not of the supported
type, traffic is dropped.
– redirect policy
Implements PBR next-hop or PBR next-hop router action with the ability to select and prioritize
multiple redirect targets and monitor the specified redirect targets so PBR action can be changed if
the selected destination goes down. Supported for ingress IPv4 and IPv6 filter policies deployed on
Layer 3 interfaces only. See section Redirect policies for further details.
– remark DSCP
Allows a user to remark the DiffServ Code Points (DSCP) of packets matching filter policy entry
criteria. Packets are remarked regardless of QoS-based in- or out-of-profile classification and QoS-
based DSCP remarking is overridden. DSCP remarking is supported both as a main action and as
an extended action. As a main action, this functionality applies to IPv4 and IPv6 filter policies of any
scope and can only be applied at ingress on either access or network interfaces of Layer 3 services
only. Although the filter is applied on ingress the dscp remarking effectively performed on egress. As
an extended action, this functionality applies to IPv4 and IPv6 filter policies of any scope and can be
applied at ingress on either access or network interfaces of Layer 3 services, or at egress on Layer 3
subscriber interfaces.
– router
Changes the routing instance a packet is routed in from the upcoming interface’s instance to the
routing instance specified in the PBR action (supports both GRT and VPRN redirect). It is supported
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
for ingress IPv4/IPv6 filter policies deployed on Layer 3 interfaces. The action can be combined with
the next-hop action specifying direct/indirect IPv4/IPv6 next hop. Packets are dropped if they cannot
be routed in the configured routing instance. See section ‟Traffic Leaking to GRT” in the 7450 ESS,
7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN for more information.
– SAP
Forwards the incoming traffic onto the specified VPLS SAP. Supported for ingress IPv4/IPv6 and
MAC filter policies deployed in VPLS service. The SAP that the traffic is to egress on must be in the
same VPLS service as the incoming interface. If the configured SAP is down, traffic is dropped.
– sdp
Forwards the incoming traffic onto the specified VPLS SDP. Supported for ingress IPv4/IPv6 and
MAC filter policies deployed in VPLS service. The SDP that the traffic is to egress on must be in the
same VPLS service as the incoming interface. If the configured SDP is down, traffic is dropped.
– srte-policy
Redirects the incoming traffic to the active instance of the SR-TE forwarding policy specified by
its endpoint and color. This policy is applicable on any ingress interface (egress is blocked). The
traffic is subject to a plain forward if no policy matches the one specified, or if the policy has no
programmed instance, or if it is applied on non-L3 interface.
– vprn-target
Redirects the incoming traffic in a similar manner to combined next-hop and LSP redirection actions,
but with greater control and slightly different behavior. This action is supported for both IPv4 and
IPv6 filter policies and is applicable on ingress of access interfaces of IES/VPRN services. See Filter
policy advanced topics for further details.
• ISA forward processing actions
ISA processing actions allow users to allow ingress traffic and send it for ISA processing as per
specified ISA action. See Configuring filter policies with CLI for command details. The following ISA
actions are supported:
– GTP local breakout
Forwards matching traffic to NAT instead of being GTP tunneled to the mobile user’s PGW or
GGSN. The action applies to GTP-subscriber-hosts. If filter is deployed on other entities, action
forward is applied. Supported for IPv4 ingress filter policies only. If ISAs performing NAT are down,
traffic is dropped.
– NAT
Forwards matching traffic for NAT. Supported for IPv4/IPv6 filter policies for Layer 3 services in GRT
or VPRN. If ISAs performing NAT are down, traffic is dropped.
For classic CLI options, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command
Reference Guide.
For MD-CLI options, see 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference
Guide.
– reassemble
Forwards matching packets to the reassembly function. Supported for IPv4 ingress filter policies
only. If ISAs performing reassemble are down, traffic is dropped.
– TCP for MSS adjustment
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Forwards matching packets (TCP SYN) to an ISA BB group for MSS adjustment. In addition to the
IP filter, the user also needs to configure the MSS adjust group under the Layer 3 service to specify
the group ID and the new segment-size.
• HTTP redirect
Implements the HTTP redirect captive portal. HTTP GET is forwarded to CPM card for captive portal
processing by router. See the HTTP redirect (captive portal) section for more information.
• ignore match
This action allow the user to disable a filter entry, as a result the entry is not programmed in hardware.
In addition to the preceding actions:
• A user can select a default action for a filter policy. The default action is executed on packets subjected
to an active filter when none of the filter’s active entries matches the packet. By default, filter policies
have default action set to drop but the user can select a default action to be forward instead.
• A user can override default action applied to packets matching a PBR/PBF entry when the PBR/PBF
target is down using pbr-down-action-override. Supported options are to drop the packet, forward
the packet, or apply the same action as configured for the filter policy's default action. The override
is supported for the following PBR/PBF actions. For the last three actions, the override is supported
whether in redundancy mode or not.
– forward ESI (Layer 2 or Layer 3)
– forward SAP
– forward SDP
– forward next-hop indirect router
– forward vprn-target
Table 8: Default behavior when a PBR/PBF target is down defines default behavior for packets
matching a PBR/PBF filter entry when a target is down.
Forward redirect-policy Forward when destination tests are enabled and the
best destination is not reachable
Forward redirect-policy Drop when destination tests are not enabled and the
best destination is not reachable
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
show filter ip
show filter ipv6
show filter mac
This section describes the key information displayed as part of the output for the preceding show
commands, and how to interpret the information.
From a configuration point of view, the show command output displays the main action (primary and
secondary), as well as the extended action.
The ‟PBR Target Status” field shows the basic information that the system has of the target based on
simple verification methods. This information is only shown for the filter entries which are configured
in redundancy mode (that is, with both primary and secondary main actions configured), and for ESI
redirections. Specifically, the target status in the case of redundancy depends on several factors; for
example, on a match in the routing table for next-hop redirects, or on VXLAN tunnel resolution for ESI
redirects.
The ‟Downloaded Action” field specifically describes the action that the system performs on the packets
that match the criterion (or criteria). This typically depends on the context in which the filter has been
applied (whether it is supported or not), but in the case of redundancy, it also depends on the target status.
For example, the downloaded action is the secondary main action when the target associated with the
primary action is down. In the nominal (for example, non-failure condition) case the ‟Downloaded Action”
reflects the behavior a packet is subject to. However, in transient cases (for example, in the case of a
failure) it may not be able to capture what effectively happens to the packet.
The output also displays relevant information such as the default action when the target is down (see
Table 8: Default behavior when a PBR/PBF target is down) as well as the overridden default action when
pbr‑down‑action‑override has been configured.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
There are situations where, collectively, this information does not capture what effectively happens to the
packet throughout the system. Use the following commands to perform advanced checks and display
accurate packet fates.
The criteria for determining when a target is down. While there is little ambiguity on that aspect when the
target is local to the system performing the steering action, ambiguity is much more prominent when the
target is distant. Therefore, because the use of effective-action triggers advanced tests, a discrepancy
is introduced compared to the action when effective-action command option is not used. This is, for
example, be the case for redundant actions.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• Upon activation of a summary, a mini-table with source and destination address and count is created for
each type (IPv4, IPv6, and MAC).
• Every received log packet (because of filter match) is examined for source or destination address.
• If the log packet (source/destination address) matches a source/destination address entry in the mini-
table, from a packet received previously, the summary counter of the matching address is incremented.
• If source or destination address of the log messages does not match an entry already present in the
table, the source/destination address is stored in a free entry in the mini-table.
• In case the mini-table has no more free entries, only total counter is incremented.
• At expiry of the summarization interval, the mini-table for each type is flushed to the syslog destination.
Operational note
Conditional action match criteria filter entries for TTL, hop limit, packet length, and payload length support
logging and statistics when the condition is met, allowing visibility of filter matched and action executed. If
the condition is not met, packets are not logged and statistics against the entry are not incremented.
• classic CLI
If an IP interface has cflowd sampling disabled, a user can enable cflowd sampling on a subset of flows by
configuring filter policy rules that match the flows and by enabling cflowd sampling as part of the filter policy
entry configurations. Use the following commands to enable cflowd sampling on a subset of flows:
• MD-CLI
• classic CLI
The preceding cflowd filter sampling behavior is exclusively driven by match criteria. The sampling logic
applies regardless of whether an action was executed (including evaluation of conditional action match
criteria, for example, packet length or TTL).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
SR OS supports entry copy and entry renumbering operations to assist in filter policy management.
Use the following commands to copy and overwrite filter entries.
The copy command allows overwriting of the existing entries in the destination filter by specifying the
overwrite command option when using the copy command. Copy can be used, for example, when
creating new policies from existing policies or when modifying an existing filter policy (an existing source
policy is copied to a new destination policy, the new destination policy is modified, then the new destination
policy is copied back to the source policy with overwrite specified).
Entry renumbering allows you to change the relative order of a filter policy entry by changing the entry ID.
Entry renumbering can also be used to move two entries closer together or further apart, thereby creating
additional entry space for new entries.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
4.1.2.1.1 Apply-path
The router supports the autogeneration of IPv4 and IPv6 prefix list entries for BGP peers which are
configured in the Base router or in VPRN services. Use the following commands to configure the
autogeneration of IPv6 or IPv4 prefix list entries.
This capability simplifies the management of CPM filters to allow BGP control traffic from trusted configured
peers only. By using the apply-path filter, the user can:
• specify one or more regex expression matches per match list, including wildcard matches (".*")
• mix auto-generated entries with statically configured entries within a match list
Additional rules are applied when using apply-path as follows:
• Operational and administrative states of a specific router configuration are ignored when auto-
generating address prefixes.
• Duplicates are not removed when populated by different auto-generation matches and static
configuration.
• Configuration fails if auto-generation of an address prefix results in the filter policy resource exhaustion
on a filter entry, system, or line card level.
4.1.2.1.2 Prefix-exclude
A prefix can be excluded from an IPv4 or IPv6 prefix list by using the prefix-exclude command.
For example, when the user needs to rate-limit traffic to 10.0.0.0/16 with the exception of 10.0.2.0/24, then
the following options are available.
By applying prefix-exclude, a single IP prefix list with two prefixes is configured:
Example: MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
ip-prefix-list "list-1" {
prefix 10.0.0.0/16 { }
prefix-exclude 10.0.2.0/24 { }
}
A:node-2>config>filter>match-list# info
----------------------------------------------
ip-prefix-list "list-1" create
prefix 10.0.0.0/16
prefix-exclude 10.0.2.0/24
exit
----------------------------------------------
Without applying prefix-exclude, all eight included subnets should be manually configured in the ip-prefix-
list. The following example shows the manual configuration of an IP prefix list.
Example: MD-CLI
A:node-2>config>filter>match-list# info
----------------------------------------------
ip-prefix-list "list-1" create
prefix 10.0.0.0/16
prefix 10.0.0.0/23
prefix 10.0.3.0/24
prefix 10.0.4.0/22
prefix 10.0.8.0/21
prefix 10.0.16.0/20
prefix 10.0.32.0/19
prefix 10.0.64.0/18
prefix 10.0.128.0/17
exit
----------------------------------------------
This is a time consuming and error-prone task compared to using the prefix-exclude command.
The filter resources, consumed in hardware, are identical between the two configurations.
A filter match-list using prefix-exclude is mutually exclusive with apply-path, and is not supported as a
match criterion in CPM filter.
Configured prefix-exclude prefixes are ignored when no overlapping larger subnet is configured in the
prefix-list. For example: prefix-exclude 1.1.1.1/24 is ignored if the only included subnet is 10.0.0.0/16.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Embedded
To simplify the management of filters sharing a common set of filter entries, the user can create a scope
embedded filter policy. This filter can then be included in (embedded into) a scope template, scope
exclusive, or scope system filter.
Using a scope embedded filter, a common set of filter entries can be updated in a single place and
deployed across multiple filter policies. The scope embedded is supported for IPv4 and IPv6 filter policies.
A scope embedded filter policy is not directly downloaded to a line card and cannot be directly referenced
in an interface. However, this policy helps the network user provision a common set of rules across
different filter policies.
The following rules apply when using a scope embedded filter policy:
• The user explicitly defines the offset at which to insert a filter of scope embedded in a template,
exclusive, or system filter. The embedded filter entry-id X becomes entry-id (X + offset) in the main filter.
• Multiple filter scope embedded policies can be included (embedded into) in a single filter policy of scope
template, exclusive, or system.
• The same scope embedded filter policy can be included in multiple filter policies of scope template,
exclusive, or system.
• Configuration modifications to embedded filter policy entries are automatically applied to all filter policies
that embed this filter.
• The system performs a resource management check when a filter policy of scope embedded is updated
or embedded in a new filter. If resources are not available, the configuration is rejected. In rare cases,
a filter policy resource check may pass but the filter policy can still fail to load because of a resource
exhaustion on a line card (for example, when other filter policy entries are dynamically configured
by applications like RADIUS in parallel). If that is the case, the embedded filter policy configured is
deactivated (configuration is changed from activate to inactivate).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• An embedded filter is never embedded partially in a single filter and resources must exist to embed
all the entries in a specific exclusive, template or system filter. However, an embedded filter may be
embedded only in a subset of all the filters it is referenced into, only those where there are sufficient
resources available.
• Overlapping of filter entries between an embedded filter and a filter of scope template, exclusive or
system filter can happen but should be avoided. It is recommended instead that network users use a
large enough offset value and an appropriate filter entry-id in the main filter policy to avoid overlapping.
In case of overlapping entries, the main filter policy entry overwrites the embedded filter entry.
• Configuring a default action in a filter of scope embedded is not required as this information is not used
to embed filter entries.
Figure 22: Embedded Filter Policy shows a configuration with two filter policies of scope template, filter 100
and 200 each embed filter policy 10 at a different offset:
• Filter policy 100 and 200 are of scope template.
• Filter policy 10 of scope embedded is configured with 4 filter entries: entry-id 10, 20, 30, 40.
• Filter policy 100 embed filter 10 at offset 0 and includes two additional static entries with entry-id 20010
and 20020.
• Filter policy 200 embed filter 10 at offset 10000 and includes two additional static entries with entry-id
100 and 110.
• As a result, filter 100 automatically creates entry 10, 20, 30, 40 while filter 200 automatically creates
entry 10010, 10020, 10030, 10040. Filter policy 100 and 200 consumed in total 12 entries when both
policies are installed in the same line card.
Example: Scope embedded filter configuration (MD-CLI)
[ex:/configure filter]
A:admin@node-2# info
...
ip-filter "10" {
scope embedded
entry 10 {
}
entry 20 {
}
entry 30 {
}
entry 40 {
}
}
ip-filter "100" {
scope template
entry 20010 {
}
entry 20020 {
}
embed {
filter "10" offset 0 {
}
}
}
ip-filter "200" {
scope template
entry 100 {
}
entry 110 {
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
embed {
filter "10" offset 10000 {
}
}
}
A:node-2>config>filter# info
----------------------------------------------
ip-filter 10 name "10" create
scope embedded
entry 10 create
exit
entry 20 create
exit
entry 30 create
exit
entry 40 create
exit
exit
ip-filter 100 name "100" create
scope template
embed-filter 10
entry 20010 create
exit
entry 20020 create
exit
exit
ip-filter 200 name "200" create
scope template
embed-filter 10 offset 10000
entry 100 create
exit
entry 110 create
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
System
The scope system filter policy provides the most optimized use of hardware resources by programming
filter entries after the line cards regardless of how many IPv4 or IPv6 filter policies of scope template or
exclusive use this filter. The system filter policy entries are not duplicated inside each policy that uses it,
instead, template or exclusive filter policies can be chained to the system filter using the chain-to-system-
filter command.
When a template of exclusive filter policy is chained to the system filter, system filter rules are evaluated
first before any rules of the chaining filter are evaluated (that is chaining filter's rules are only matched
against if no system filter match took place).
The system filter policy is intended primarily to deploy a common set of system-level deny rules and
infrastructure-level filtering rules to allow, block, or rate limit traffic. Other actions like, for example, PBR
actions, or redirect to ISAs should not be used unless the system filter policy is activated only in filters
used by services that support such action. The NAT action is not supported and should not be configured.
Failure to observe these restrictions can lead to unwanted behavior as system filter actions are not verified
against the services the chaining filters are deployed for. System filter policy entries also cannot be the
sources of mirroring.
System filter policies can be populated using CLI, SNMP, NETCONF, OpenFlow and FlowSpec. System
filter policy entries cannot be populated using RADIUS or Gx.
The following example shows the configuration of an IPv4 system filter:
• System filter policy 10 includes a single entry to rate limit NTP traffic to the Infrastructure subnets.
• Filter policy 100 of scope template is configured to use the system filter using the chain-to-system-
filter command.
Example: IPv4 system filter configuration (MD-CLI)
[ex:/configure filter]
A:admin@node-2# info
ip-filter "10" {
scope system
entry 10 {
description "Rate Limit NTP to the Infrastructure"
match {
protocol udp
dst-ip {
ip-prefix-list "Infrastructure IPs"
}
dst-port {
eq 123
}
}
action {
accept
rate-limit {
pir 2000
}
}
}
}
ip-filter "100" {
description "Filter scope template for network interfaces"
chain-to-system-filter true
}
system-filter {
ip "10" { }
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
A:node-2>config>filter# info
----------------------------------------------
ip-filter 10 name "10" create
scope system
entry 10 create
description "Rate Limit NTP to the Infrastructure"
match protocol udp
dst-ip ip-prefix-list "Infrastructure IPs"
dst-port eq 123
exit
action
rate-limit 2000
exit
exit
exit
ip-filter 100 name "100" create
chain-to-system-filter
description "Filter scope template for network interfaces"
exit
system-filter
ip 10
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Filter type source MAC is available for egress filtering on VPLS services only. R-VPLS endpoints are not
supported.
Dynamic filter entry embedding using Openflow, FlowSpec and VSD is not supported using this filter type.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
filter entry rate limit policer value per FP = (configured rate limit) * (number of active ports in the LAG
for this FP) / (number of active ports in the LAG)
• for mixed-speed LAGs and LAGs with a user-configured hash-weight
filter entry rate limit policer value per FP = (configured rate limit) * (sum of the weights of all active
ports for this FP) / (sum of the weights of all active ports in the LAG)
The shared policer feature is supported for IPv4 and IPv6 filter policies with the template or exclusive
scope, in ingress and egress directions.
Note:
• Rate limit policer entries embedded in template or exclusive filters follow the shared policer
command option from that filter.
• SR-a and VSR do not support the shared policer feature.
• In the MD-CLI configuration combinations with LAG per-link-hash, per-fp-egr-queuing, per-
fp-sap-instance, link-map-profile, adapt-qos mode port-fair, and ESM do not support the
shared policer feature.
• In the classic CLI, configuration combinations with LAG per-link-hash, per-fp-egr-queuing,
per-fp-sap-instance, link-map-profile, adapt-qos port-fair, and ESM do not support the
shared policer feature.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
BGP FlowSpec
BGP FlowSpec routes are associated with a specific routing instance (based on the AFI/SAFI and possibly
VRF import policies) and can be used to create filter entries in a filter policy dynamically.
Configure FlowSpec embedding using the following contexts:
• MD-CLI
• classic CLI
Note: These entry IDs are not necessarily sequential and do not necessarily follow the order
at which a rule is received.
• The user can configure the maximum number of FlowSpec filter entries in a specific filter policy at
the router or VPRN level using the ip-filter-max-size and ipv6-filter-max-size commands. This limit
defines the boundary for FlowSpec embedding in a filter policy (the offset and maximum number of IPv4
or IPv6 FlowSpec routes).
• When the user configures a template or exclusive filter policy, the router instance defined in the dynamic
filter entry for FlowSpec must match the router interface that the filter policy is applied to.
• When using a filter policy that defines system-wide rules, embedding FlowSpec entries from different
router instances is allowed and can be applied to any router interfaces.
• See section IPv4/IPv6 filter policy entry match criteria on embedded filter scope for recommendations
on filter entry ID spacing and overlapping of entries.
The following information describes the FlowSpec configuration that follows:
• The maximum number of FlowSpec routes in the base router instance is configured for 50,000 entries
using the ip-filter-max-size command.
• The filter policy 100 (template) is configured to embed FlowSpec routes from the base router instance
at offset 100,000. The offset chosen in this example avoids overlapping with statically defined entries
in the same policy. In this case, the statically defined entries can use the entry ID range 1-99999 and
149999-2M for defining static entries before or after the FlowSpec filter entries.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
A:node-2>config>router# info
----------------------------------------------
flowspec
ip-filter-max-size 50000
exit
----------------------------------------------
A:7750>config>filter# info
----------------------------------------------
ip-filter 100 name "100" create
embed-filter flowspec router "Base" offset 100000
exit
----------------------------------------------
OpenFlow
The embedded filter infrastructure is used to insert OpenFlow rules into an existing filter policy. See Hybrid
OpenFlow switch for more information. Policy-controlled auto-created filters are re-created on system
reboot. Policy controlled filter entries are lost on system reboot and need to be reprogrammed.
VSD
VSD filters are created dynamically using XMPP and managed using a Python script so rules can be
inserted into or removed from the correct VSD template or embedded filters. XMPP messages received
by the 7750 SR are passed transparently to the Python module to generate the appropriate CLI. See the
7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide for more information about
VSD filter provisioning, automation, and Python scripting details.
RADIUS or Diameter for subscriber management:
The user can assign filter policies or filter entries used by a subscriber within a preconfigured filter entry
range defined for RADIUS or Diameter. See the 7450 ESS, 7750 SR, and VSR Triple Play Service Delivery
Architecture Guide and filter RADIUS-related commands for more information.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
4.1.2.6 Primary and secondary filter policy action for PBR/PBF redundancy
In some deployments, users may want to specify a backup PBR/PBF target if the primary target is down.
SR OS allows the configuration of a primary action as part of a single filter policy entry. The secondary
action can only be configured if a primary action is configured.
Use the commands in the following contexts to configure a primary action.
For Layer 2 PBF redundancy, the user can configure the following redundancy command options. Use the
forward sap, forward sdp, secondary forward sap, or secondary forward sdp options in the following
contexts to configure Layer 2 PBF redundancy.
For Layer 3 PBR redundancy, a user can configure any of the following actions as a primary action and
any (either same or different than primary) of the following as a secondary action. Furthermore, none of the
command options need to be the same between primary and secondary actions. Although the following
commands pertain to IPv4 , similar command options also apply to IPv6.
Use the commands in the following contexts to configure forward actions:
• MD-CLI
• classic CLI
When primary and secondary actions are configured, PBR/PBF uses the primary action if its target is
operationally up, or it uses the secondary action if the primary PBR/PBF target is operationally down. If
both targets are down, the default action when the target is down (see Table 8: Default behavior when a
PBR/PBF target is down), according to the primary action, is used, unless the pbr-down-action-override
command is configured.
When PBR/PBF redundancy is configured, the user can use sticky destination functionality for a redundant
filter entry. When sticky destination is configured, the functionality mimics that of sticky destination
configured for redirect policies.
Use the following commands to configure sticky destination.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Use the following commands to force a switchover from the secondary to the primary action when sticky
destination is enabled and secondary action is selected.
The following example shows the partial output of the command as applicable for PBF redundancy.
Output example
…
Primary Action : Forward (SAP)
Next Hop : 1/1/1
Service Id : Not configured
PBR Target Status : Does not exist
Secondary Action : Forward (SAP)
Next Hop : 1/1/2
Service Id : Not configured
PBR Target Status : Does not exist
PBR Down Action : Forward (pbr-down-action-override)
Downloaded Action : None
Dest. Stickiness : 1000 Hold Remain : 0
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
The user may specify an LSP toward the BGP next-hop. If no LSP is specified, the system uses the MPLS-
based tunnel that resolves the next-hop, if any. This redirection does not operate with SRv6 tunnels.
This redirection capability operates whether the service instance is BGP-VPN or EVPN-IFL.
This action is resilient in that it tracks events affecting the redirection at the service level and reacts to
those events. The system performs the redirection as long as the system can reach the target BGP
next-hop using the correct service label. If the redirection cannot be performed (for example, if no LSP
is available, the peer is down, or there is no more specific labeled route), the system switches to the
secondary action if one has been defined, otherwise it performs normal forwarding. The system can also
be configured to perform drop instead of forward, using pbr-down-action-override. A maximum of 8k of
unique (3-tuple {bgp-nh, router, adv-prefix}) redirection targets can be tracked.
Figure 23: Layer 2 policy-based forwarding (PBF) redirect action shows a deployment.
When enabled, all unicast packets have their destination MAC rewritten to the user-configured value on a
Layer 2 switch VPLS SAP. Multicast and broadcast packets are unaffected. The feature:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• Is supported for regular and split-horizon group Ethernet SAPs in a regular VPLS Service
• Is expected to be deployed on a SAP that faces far-end IP interface (either a SAP that is the target of
PBF action, as shown in Figure 23: Layer 2 policy-based forwarding (PBF) redirect action, or a VPLS
SAP of a downstream Layer 2 switch that is connected to a far-end router—not shown).
• Applies to any unicast egress traffic including LI and mirror.
Restrictions:
The following command is mutually exclusive with the SAP MAC ingress and egress loopback feature:
• MD-CLI
• classic CLI
Restrictions
Network port Layer 3 service-aware filters do not support FlowSpec and LI (cannot use filter inside LI
infrastructure nor have LI sources within the VPRN filter).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
type of frames that contains a local ISID. The ISID filters are applied as required on a per B-SAP or B-PW
basis, only in the egress direction.
The ISID match criteria are exclusive with any other criteria under mac-filter. A new mac-filter type
attribute is defined to control the use of ISID match criteria and must be set to ISID to allow the use of ISID
match criteria.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
VID filters are available on Ethernet SAPs for Epipe, VPLS, or I-VPLS including eth-tunnel and eth-ring
services.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• classic CLI
Using this command in combination with VID filters is not recommended. The outer tag is the only tag
available for filtering on egress for frames arriving from MPLS SDPs or from PBB services, even though
additional tags may be carried transparently.
Figure 25: Port groups shows a customer use example where some VLANs are prevented from ingressing
or egressing specific ports. In the example, port A sap 1/1/1:1.* would have a filter as shown in the
following example, while port A sap 1/1/1:2.* would not.
The following example shows the configuration of the MAC filter command options that apply to port A sap
1/1/1:1.*.
Example: MD-CLI
[ex:/configure filter]
A:admin@node-2# info
...
mac-filter "4" {
default-action accept
type vid
entry 1 {
match {
outer-tag {
tag 30
mask 4095
}
}
action {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
drop
}
}
}
A:node-2>config>filter# info
----------------------------------------------
mac-filter 4 name "4" create
default-action forward
type vid
entry 1 create
match frame-type ethernet_II
outer-tag 30 4095
exit
action drop
exit
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
In some deployments, it may not be necessary to switch from a currently active, most-preferred redirect-
policy destination when a new more-preferred destination becomes available. Use the following command
to enable sticky destination functionality to support such deployments.
When enabled, the currently active destination remains active unless it goes down or a user forces the
switch. Use the following command to force the switch.
Note:
• When the manual switchover to most-preferred destination is executed as described in the
preceding information, the hold-time-up is stopped.
• When the timer value is changed, the new value takes immediate effect and the timer is
restarted with the new value (or expired if no-hold-time-up is configured).
Note:
The unicast-rt-test command fails when performed in the context of a VPRN routing instance
when the destination is routable only through grt-leak functionality. ping-test is recommended in
these cases.
Feature restrictions
The following items are feature restrictions:
• Redirect policy is supported for ingress IPv4 and IPv6 filter policies only.
• Different platforms support different scale for redirect policies. Contact your local Nokia representative
to ensure the planned deployment does not exceed recommended scale.
• classic CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
– When a PBR destination is up, the PBR lookup is performed in the redirect policy's configured
routing instance. When that instance differs from the incoming interface where the filter policy using
the specific redirect policy is deployed, the PBR action is equivalent to forward next-hop router filter
policy action.
– When all PBR destinations are down (or hardware does not support action router), the system will
simply forward the packet and the PBR lookup is performed in the routing instance of the incoming
interface where the filter policy using the specific redirect policy is deployed.
– Any destination tests configured are executed in the routing context specified by the redirect policy.
– Changing router configuration for a redirect policy brings all destinations with a test configured down.
The destinations are brought up after the test confirms reachability based on the new redirect policy
router configuration.
• Redirect policy with router disabled or with router not supported (legacy):
– When a PBR destination is up, the PBR lookup is performed in the routing instance of the incoming
interface where the filter policy using the specific redirect policy is deployed.
– When all PBR destinations are down, the system will simply forward the packet and the PBR lookup
is performed in the routing instance of the incoming interface where the filter policy using the specific
redirect policy is deployed.
– Any destination tests configured are always executed in the Base router instance regardless of the
router instance of the incoming interface where the filter policy using the specific redirect policy is
deployed.
Restrictions
Only unicast-rt-test and ping-test are supported when redirect-policy router is enabled.
SR OS combines the reachability test results (either TRUE or FALSE) from each of the bound destinations
and forms a master test result which prevails over each independent result. The combined result can be
obtained by applying either an AND function or an OR function. For the AND function, all destinations
must be UP (reachability test result equals TRUE) for each destination to be considered UP. Conversely, a
single destination must be DOWN for each to be considered DOWN; for the OR case, a single destination
needs to be UP for each destination to be considered UP. Apart from the master test, which overrides the
test result of each destination forming a binding, redirect policies are unaltered. For stickiness capability,
switching toward a more-preferred destination in a specified redirect policy does not occur until the timers
(if any) of each of the associated destinations have expired.
There is no specific constraint about destinations that can be bound together. For example, it is possible
to bind destinations of different address families (IPv4 or IPv6), destinations with no test, destinations with
multiple tests, or destinations of redirect policies which are administratively down. However, some specific
scenarios exist when binding redirect policies:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
• A destination that is in the Administratively down state is considered DOWN (that is, as if its test result
was negative, even if no test had been performed).
• An Administratively down redirect policy is equivalent to a policy with all destinations in an
Administratively down state. The system performs a simple forward.
• A destination with no test is considered always UP.
• If a destination has multiple tests, all tests must be positive for the destination to be considered UP
(logical AND between its own tests results).
• Destination tests are performed even if a redirect policy has not been applied (that is, not declared as
an action of a filter which itself has been applied).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
common open DNS servers provide the most security, allowing, alternatively, UDP -port 53 alone is
another option.
• entry 20: Allows HTTP TCP port 80 traffic to the portal landing page defined as a prefix-list. The TCP
port directionality indicates an HTTP request. Optionally, the user can create an additional entry to allow
TCP port 443 in case the landing page uses both HTTP and HTTPS.
• entry 30: Redirects all TCP port 80 traffic, other than entry 20, to the landing page URL http://
www.mydomain/com/redirect.html?subscriber=$SUB&ipaddress=$IP&mac=$MAC&location=$SAP .
• entry 40: Drops explicitly any other IP flows, as in the following configuration example.
Example: Redirect HTTP filter configuration (MD-CLI)
[ex:/configure filter]
A:admin@node-2# info
ip-filter "10" {
entry 10 {
description "Allow DNS Traffic to DNS servers"
match {
protocol udp
ip {
ip-prefix-list "dns-servers"
}
dst-port {
eq 53
}
}
action {
accept
}
}
entry 20 {
description "Allow HTTP traffic to redirect portal"
match {
protocol tcp
ip {
ip-prefix-list "portal-servers"
}
dst-port {
eq 80
}
}
action {
accept
}
}
entry 30 {
description "HTTP Redirect all other TCP 80 flows"
match {
protocol tcp
dst-port {
eq 80
}
}
action {
http-redirect {
url "http://www.mydomain/com/redirect.html?
subscriber=$SUB&ipaddress=$IP&mac=$MAC&location=$SAP."
}
}
}
entry 40 {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
A:node-2>config>filter# info
----------------------------------------------
ip-filter 10 name "10" create
entry 10 create
description "Allow DNS Traffic to DNS servers"
match protocol udp
dst-ip ip-prefix-list "dns-servers"
dst-port eq 53
exit
action
forward
exit
exit
entry 20 create
description "Allow HTTP traffic to redirect portal"
match protocol tcp
dst-ip ip-prefix-list "portal-servers"
dst-port eq 80
exit
action
forward
exit
exit
entry 30 create
description "HTTP Redirect all other TCP 80 flows"
match protocol tcp
dst-port eq 80
exit
action
http-redirect "http://www.mydomain/com/redirect.html?
subscriber=$SUB&ipaddress=$IP&mac=$MAC&location=$SAP."
exit
exit
entry 40 create
description "Drop anything else"
action
drop
exit
exit
exit
----------------------------------------------
Also, the router supports two redirect scale modes that are configurable at the system level. The
optimized-mode improves the number of HTTP redirect sessions supported by system as compared to if
optimized mode is disabled.
Example: Optimized-mode configuration (MD-CLI)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Figure 28: Upstream ESM ACL policy-based service chaining shows upstream VAS service chaining
steering using filter policies. Upstream subscriber traffic entering Res-GW is subject to the subscriber's
ingress ACL filter assigned to that subscriber by a policy server. If the ACL contains VAS steering rules, the
VAS-rule-matching subscriber traffic is steered for VAS processing over a dedicated to-from-access VAS
interface in the same or a different routing instance. After the VAS processing, the upstream traffic can be
returned to Res-GW by a to-from-network interface (shown in Figure 28: Upstream ESM ACL policy-based
service chaining) or can be injected to WAN to be routed toward the final destination (not shown).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Figure 29: Downstream ESM ACL-policy based service chaining shows downstream VAS service chaining
steering using filter policies. Downstream subscriber traffic entering Res-GW is forwarded to a subscriber-
facing line card. On that card, the traffic is subject to the subscriber's egress ACL filter policy processing
assigned to that subscriber by a policy server. If the ACL contains VAS steering rules, the VAS rule-
matching subscriber's traffic is steered for VAS processing over a dedicated to-from-network VAS interface
(in the same or a different routing instance). After the VAS processing, the downstream traffic must be
returned to Res-GW via a ‟to-from-network” interface (shown in Figure 29: Downstream ESM ACL-policy
based service chaining) to ensure the traffic is not redirected to VAS again when the subscriber-facing line
card processes that traffic.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Ensuring the correct configuration for the VAS interface type, for upstream and downstream traffic
redirected to a VAS and returned after VAS processing, is critical for achieving loop-free network
connectivity for VAS services.
Use the commands in the following contexts to configure the VAS interface type and command options,
which are described in the preceding information.
• deployments that use two separate interfaces for VAS connectivity (which is recommended, and
required if local subscriber-to-subscriber VAS traffic support is required):
– to-from-access
• upstream traffic arriving from subscribers over access interfaces must be redirected to a VAS
PBR target reachable over this interface for upstream VAS processing
• downstream traffic destined for subscribers after VAS processing must arrive on this interface, so
that the traffic is subject to regular routing but is not subject to Application Assurance diversion,
nor to egress subscriber PBR
• the interface must not be used for downstream pre-VAS traffic; otherwise, routing loops occur
– to-from-network
• downstream traffic destined for subscribers arriving from network interfaces must be redirected to
a VAS PBR target reachable over this interface for downstream VAS processing
• upstream traffic after VAS processing, if returned to the router, must arrive on this interface so
that regular routing can be applied
• deployments that use a single interface for VAS connectivity (optional, no local subscriber-to-subscriber
VAS traffic support):
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
– to-from-both
• both upstream traffic arriving from access interfaces and downstream traffic arriving from the
network are redirected to a PBR target reachable over this interface for upstream/downstream
VAS processing
• after VAS processing, traffic must arrive on this interface (optional for upstream), so that the traffic
is subject to regular routing but is not subject to AA diversion, nor to egress subscriber PBR
• the interface must be used for downstream pre-VAS traffic, otherwise, routing loops occur
The ESM filter policy-based service chaining allows users to do the following:
• Steer upstream and downstream traffic per-subscriber with full ACL-flow-defined granularity without the
need to specify match conditions that identify subscriber or tier-of-service
• Steer both upstream and downstream traffic on a single Res-GW
• Flexibly assign subscribers to tier-of-service by changing the ACL filter policy a specific subscriber uses
• Flexibly add new services to a subscriber or tier-of-service by adding the subscriber-independent filter
rules required to achieve steering
• Achieve isolation of VAS steering from other ACL functions like security through the use of embedded
filters
• Deploy integrated Application Assurance (AA) as part of a VAS service chain—both upstream and
downstream traffic is processed by AA before a VAS redirect
• Select whether to use IP-Src/IP-Dst address hash or IP-Src/IP-Dst address plus TCP/UDP port hash
when LAG/ECMP connectivity to DC is used. Layer 4 inputs are not used in hash with IPv6 packets with
extension headers present.
ESM filter policy-based traffic steering supports the following:
• IPv4 and IPv6 steering of unicast traffic using IPv4 and IPv6 ACLs
• use of an action forward redirect-policy filter or an action forward next-hop router filter for IP steering
with TCAM-based load-balancing, -to-wire, and sticky destination
• use of an action forward ESI SF-IP VAS interface router filter for an integrated service chaining solution
Operational notes
The following operational notes apply:
• Downstream traffic steered toward a VAS on the subscriber-facing IOM is reclassified (FC and profile)
based on the subscriber egress QoS policy, and is queued toward the VAS based on the network
egress QoS configuration. Packets sent toward VAS do not have DSCP remarked (because they are
not yet forwarded to a subscriber). DSCP remarking based on subscriber's egress QoS profile only
applies to traffic ultimately forwarded to the subscriber (after VAS or not subject to VAS).
• If mirroring of subscriber traffic is configured using ACL entry/subscriber/SAP/port mirror, the mirroring
applies to traffic ultimately forwarded to subscriber (after VAS or not subject to VAS). Traffic that is being
redirected to VAS cannot be mirrored using an ACL filter implementing PBR action (the same egress
ACL filter entry being a mirror source and specifying egress PBR action is not supported).
• Use dedicated ingress and egress filter policies to prevent accidental match of an ingress PBR entry
on egress, and the other way around, that results in forwarding or dropping of traffic matching the entry
(based on the filter's default action configuration).
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Restrictions
The following restrictions apply:
• This feature is not supported with HSMDAs on subscriber ingress.
• This feature is not supported when the traffic is subject to non-AA ISA on Res-GW.
• Traffic that matches an egress filter entry with an egress PBR action cannot be mirrored, cannot be
sampled using cflowd, and cannot be logged using filter logging while being redirected to VAS on a sub-
facing line card.
• This feature is not supported with LAC/LNS ESM (PPPoE subscriber traffic encapsulated into or de-
encapsulated from L2TP tunnels).
• This feature is not supported for system filter policies.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure service]
A:admin@node-2# info
...
vpls "10" {
admin-state enable
customer "1"
service-mtu 1400
fdb {
static-mac {
mac 00:00:00:31:11:01 {
sap 1/1/21:1
}
mac 00:00:00:31:12:01 {
sap 1/1/22:1
}
mac 00:00:00:31:13:05 {
sap 1/1/23:5
}
}
}
split-horizon-group "dpi" {
residential true
}
split-horizon-group "split" {
}
sap 1/1/21:1 {
split-horizon-group "split"
fdb {
mac-learning {
learning false
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
}
}
}
sap 1/1/22:1 {
split-horizon-group "dpi"
stp {
admin-state disable
}
fdb {
mac-learning {
learning false
}
}
}
sap 1/1/23:5 {
}
}
A:node-2>config>service# info
----------------------------------------------
...
vpls 10 customer 1 create
service-mtu 1400
split-horizon-group "dpi" residential-group create
exit
split-horizon-group "split" create
exit
stp
shutdown
exit
sap 1/1/21:1 split-horizon-group "split" create
disable-learning
static-mac 00:00:00:31:11:01 create
exit
sap 1/1/22:1 split-horizon-group "dpi" create
disable-learning
static-mac 00:00:00:31:12:01 create
exit
sap 1/1/23:5 create
static-mac 00:00:00:31:13:05 create
exit
no shutdown
exit
...
----------------------------------------------
[ex:/configure filter]
A:admin@node-2# info
mac-filter "100" {
default-action accept
entry 10 {
log 101
match {
dot1p {
priority 7
}
}
action {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
forward {
sap {
vpls "10"
sap-id 1/1/22:1
}
}
}
}
}
...
A:node-2>config>filter# info
----------------------------------------------
...
mac-filter 100 create
default-action forward
entry 10 create
match
dot1p 7 7
exit
log 101
action forward sap 1/1/22:1
exit
exit
...
----------------------------------------------
[ex:/configure service]
A:admin@node-2# info
...
vpls "10" {
admin-state enable
customer "1"
service-mtu 1400
fdb {
static-mac {
mac 00:00:00:31:11:01 {
sap 1/1/21:1
}
mac 00:00:00:31:12:01 {
sap 1/1/22:1
}
mac 00:00:00:31:13:05 {
sap 1/1/23:5
}
mac 00:00:00:31:15:05 {
sap 1/1/5:5
}
}
}
split-horizon-group "dpi" {
residential true
}
split-horizon-group "split" {
}
spoke-sdp 3:5 {
}
sap 1/1/21:1 {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
admin-state enable
split-horizon-group "split"
fdb {
mac-learning {
learning false
}
}
}
sap 1/1/22:1 {
split-horizon-group "dpi"
stp {
admin-state disable
}
fdb {
mac-learning {
learning false
}
}
}
sap 1/1/5:5 {
split-horizon-group "split"
ingress {
filter {
mac "100"
}
}
}
}
...
Example: MAC filter added to the VPLS service configuration (classic CLI)
A:node-2>config>service# info
----------------------------------------------
...
vpls 10 customer 1 create
service-mtu 1400
split-horizon-group "dpi" residential-group create
exit
split-horizon-group "split" create
exit
stp
shutdown
exit
sap 1/1/5:5 split-horizon-group "split" create
ingress
filter mac 100
exit
static-mac 00:00:00:31:15:05 create
exit
sap 1/1/21:1 split-horizon-group "split" create
disable-learning
static-mac 00:00:00:31:11:01 create
exit
sap 1/1/22:1 split-horizon-group "dpi" create
disable-learning
static-mac 00:00:00:31:12:01 create
exit
sap 1/1/23:5 create
static-mac 00:00:00:31:13:05 create
exit
spoke-sdp 3:5 create
exit
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
no shutdown
exit
....
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Note:
The filter resource management task on the CPM controls the maximum number of filter entries
per FP. If the user attempts to go over the scaling limit, the system returns an interactive error
message. This mechanism is independent from the overload state of the FP CAM.
Resolving overload
The overload condition should be resolved by the network user before adding new entries or policies in the
affected FP CAM.
To identify the affected policy, the system logs the overload event providing slot number, FP number, and
impacted CAM. Use the following command to identify policy and policy entries in the system that cannot
be programmed on a specific FP CAM.
To resolve the overload condition, the network user can remove the newly added entries from the affected
policy or assign a different policy.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
A:node-2>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Example: IPv4 filter entry configuration to sample in cflowd ACL mode (MD-CLI)
Example: IPv4 filter entry configuration to sample in cflowd ACL mode (classic CLI)
A:node-2>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
filter-sample
interface-disable-sample
match
exit
action forward redirect-policy redirect1
exit
----------------------------------------------
Within a filter entry, you can also specify that traffic matching the associated IPv4 filter entry is not sampled
by cflowd if the IPv4 interface is set to cflowd interface mode.
Example: IPv4 filter entry configuration not to sample in cflowd ACL mode (MD-CLI)
Example: IPv4 filter entry configuration not to sample in cflowd ACL mode (classic CLI)
A:node-2>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
description "no-91"
no filter-sample
no interface-disable-sample
match
exit
action forward redirect-policy redirect1
exit
----------------------------------------------
[ex:/configure filter]
A:admin@node-2# info
...
mac-filter "90" {
description "filter-west"
scope exclusive
}
*[ex:/configure filter]
A:admin@cses-V27# info detail
...
mac-filter "90" {
...
type normal
...
}
A:node-2>config>filter# info
----------------------------------------------
...
mac-filter 90 create
description "filter-west"
scope exclusive
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
type normal
exit
----------------------------------------------
[ex:/configure filter]
A:admin@node-2# info
mac-filter "90" {
description "filter-wan-man"
scope template
type isid
entry 1 {
description "drop-local-isids"
match {
isid {
range {
start 100
end 1000
}
}
}
action {
drop
}
}
entry 2 {
description "allow-wan-isids"
match {
isid {
value 150
}
}
action {
accept
}
}
}
A:node-2>config>filter# info
----------------------------------------------
mac-filter 90 create
description "filter-wan-man"
scope template
type isid
entry 1 create
description "drop-local-isids"
match
isid 100 to 1000
exit
action drop
exit
entry 2 create
description "allow-wan-isids"
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
match
isid 150
exit
action forward
exit
A:node-2>config>filter>mac-filter# info
----------------------------------------------
default-action forward
type vid
entry 1 create
match frame-type ethernet_II
outer-tag 85 4095
exit
action drop
exit
entry 2 create
match frame-type ethernet_II
outer-tag 43 4095
exit
action drop
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure filter]
A:admin@node-2# info
...
mac-filter "90" {
entry 1 {
description "allow-104"
match
action {
drop
}
}
}
A:node-2>config>filter# info
----------------------------------------------
mac-filter 90 create
entry 1 create
description "allow-104"
match
exit
action drop
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure filter]
A:admin@node-2# info
ip-exception "1" {
description "IP-exception"
}
A:node-2>config>filter# info
----------------------------------------------
...
ip-exception 1 create
description "IP-exception"
scope template
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
}
}
}
A:node-2>config>filter>ip-except# info
----------------------------------------------
description "exception-main"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.10/32
exit
exit
----------------------------------------------
Use the commands in the following context to create an IPv6 exception filter policy.
*[ex:/configure filter]
A:admin@node-2# info
ipv6-exception "1" {
description "IPv6-exception"
}
*A:node-2>config>filter# info
----------------------------------------------
...
ipv6-exception 1 create
description "IPv6-exception"
exit
...
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
----------------------------------------------
Within an exception filter policy, configure exception entries that contain criteria against which ingress and
network traffic is matched. Packets that match the entry criteria are allowed to transit the IPsec domain in
cleartext.
Configure the following to create an IPv6 exception entry:
1. Enter an exception filter entry ID. The system does not dynamically assign a value.
2. Specify matching criteria.
Use the commands in the following context to configure IPv6 exception filter matching criteria.
The following example shows an IPv6 exception entry matching criteria configuration.
Example: MD-CLI
A:node-2>config>filter>ipv6-except# info
----------------------------------------------
description "exception-main"
entry 1 create
match
dst-ip 2001:db8::1/128
src-ip 2001:db8::2/128
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure filter]
A:admin@node-2# info
...
match-list {
ip-prefix-list "IPv4-Deny-List" {
description "IPv4-Deny-list"
prefix 10.0.0.0/21 { }
prefix 10.254.0.0/24 { }
}
}
ip-filter "ip-edge-filter" {
scope template
filter-id 10
entry 10 {
match {
src-ip {
ip-prefix-list "IPv4-Deny-List"
}
}
action {
drop
}
}
}
A:node-2>config>filter# info
----------------------------------------------
match-list
ip-prefix-list "IPv4-Deny-List" create
description "IPv4-Deny-list"
prefix 10.0.0.0/21
prefix 10.254.0.0/24
exit
exit
ip-filter 10 name "ip-edge-filter" create
scope template
entry 10 create
match
src-ip ip-prefix-list "IPv4-Deny-List"
exit
action
drop
exit
exit
exit
---------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
spoke SDP —
spoke SDP —
VPLS mesh SDP, spoke SDP, SAP VPLS mesh SDP, spoke SDP, SAP
Network interface —
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Example: IP and MAC filters assigned to an ingress and egress SAP and spoke SDP
(classic CLI)
A:node-2>config>service>epipe# info
----------------------------------------------
sap 1/1/1 create
ingress
filter ip 10
exit
egress
filter mac 92
exit
exit
spoke-sdp 8:8 create
ingress
filter ip ‟epipe sap default filter”
exit
egress
filter mac 91
exit
exit
no shutdown
----------------------------------------------
A:node-2>config>service# info
----------------------------------------------
ies 1001 name "1001" customer 1 create
interface "testA" create
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
address 192.22.1.1/24
ipv6
exit
sap 2/1/3:0 create
ingress
filter ipv6 100
exit
egress
filter ipv6 100
exit
exit
no shutdown
exit
----------------------------------------------
A:node-2>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
...
interface "to-104"
address 10.0.0.103/24
port 1/1/1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
ingress
filter ip 10
exit
egress
filter ip ‟default network egress policy”
exit
exit
...
#------------------------------------------
Example: IPv4 and IPv6 filters applied to an interface at ingress and egress (MD-CLI)
Example: IPv4 and IPv6 filters applied to an interface at ingress and egress (classic CLI)
A:node-2>config>router>if# info
----------------------------------------------
port 1/1/1
ipv6
address 3FFE::101:101/120
exit
ingress
filter ip 2
filter ipv6 1
exit
egress
filter ip 2
filter ipv6 1
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure filter]
A:admin@node-2# info
redirect-policy "redirect1" {
admin-state enable
destination 10.10.10.104 {
priority 105
}
destination 10.10.10.105 {
admin-state enable
priority 95
ping-test {
timeout 30
drop-count 5
}
}
destination 10.10.10.106 {
admin-state enable
priority 90
}
}
A:node-2>config>filter# info
----------------------------------------------
redirect-policy "redirect1" create
destination 10.10.10.104 create
priority 105
exit
no shutdown
exit
destination 10.10.10.105 create
priority 95
ping-test
timeout 30
drop-count 5
exit
no shutdown
exit
destination 10.10.10.106 create
priority 90
exit
no shutdown
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
The GRE tunnel template defines the command options to create the GRE header used to encapsulate
matching IP traffic:
• One or more destination IP addresses must be defined in the GRE tunnel template.
– If more than one destination is configured, traffic is hashed across all available destinations.
– GRE-Tunnel-templates using IPv6 transport are limited to a single destination address.
– Traffic is routed to the selected destination address based on the route table in the forwarding
context of the IP filter.
• The source address can be configured to any address and is not validated against a local IP address on
the local router.
• The optional GRE key command option can be populated with the ifIndex of the ingress interface on
which the matching IP packet was received.
• An optional template command, skip-ttl-decrement, allows the TTL of the encapsulated IP packet not
to be decremented when encapsulated into the GRE header.
The following example shows the configuration for an IPv4-based GRE tunnel template and an IPv6-based
GRE tunnel template.
Example: MD-CLI
[ex:/configure filter]
A:admin@node-2# info
ip-filter "1" {
entry 1 {
pbr-down-action-override forward
action {
}
}
}
entry 2 {
action {
forward {
gre-tunnel "greTunnel_ipv4"
}
}
}
}
ip-filter "2" {
entry 1 {
action {
forward {
gre-tunnel "greTunnel_ipv6"
}
}
}
}
gre-tunnel-template "greTunnel_ipv4" {
description "10.20.1.5"
ipv4 {
source-address 10.20.1.3
destination-address 9.9.9.9 { }
destination-address 10.20.1.5 { }
destination-address 13.13.13.13 { }
}
}
gre-tunnel-template "greTunnel_ipv6" {
ipv6 {
source-address 3ffe::a14:100
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
gre-key if-index
destination-address 3ffe::a01:102 { }
}
}
A:node-2>config>filter# info
----------------------------------------------
...
gre-tunnel-template "greTunnel_ipv4" create
description "10.20.1.5"
ipv4
source-address 10.20.1.3
destination-address 9.9.9.9
destination-address 10.20.1.5
destination-address 13.13.13.13
exit
exit
gre-tunnel-template "greTunnel_ipv6" create
ipv6
gre-key if-index
source-address 3ffe::a14:100
destination-address 3ffe::a01:102
exit
exit
ip-filter 1 name "1" create
entry 1 create
action
exit
pbr-down-action-override forward
exit
entry 2 create
action
forward gre-tunnel "greTunnel_ipv4"
exit
exit
exit
ip-filter 2 name "2" create
entry 1 create
action
forward gre-tunnel "greTunnel_ipv6"
exit
exit
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
sequence may need to be rearranged. Entries should be numbered from the most explicit to the least
explicit.
Example: Renumbering filter policy entries (MD-CLI)
Example: Original filter numbers and updated filter numbers configuration (MD-CLI)
[ex:/configure filter]
A:admin@node-2# info
...
ip-filter "11" {
description "filter-main"
scope exclusive
entry 10 {
description "no-91"
filter-sample true
interface-sample false
match {
src-ip {
address 10.10.10.103/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
forward {
redirect-policy "redirect1"
}
}
}
entry 20 {
match {
src-ip {
address 10.10.0.100/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
entry 30 {
match {
src-ip {
address 10.10.0.200/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
accept
}
}
entry 40 {
match {
src-ip {
address 10.10.10.106/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
}
...
----------------------------------------------
[ex:/configure filter]
A:admin@node-2# info
...
ip-filter "11" {
description "filter-main"
scope exclusive
entry 1 {
match {
src-ip {
address 10.10.10.106/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
entry 10 {
match {
src-ip {
address 10.10.0.100/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
entry 15 {
description "no-91"
filter-sample true
interface-sample false
match {
src-ip {
address 10.10.10.103/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
forward {
redirect-policy "redirect1"
}
}
}
entry 30 {
match {
src-ip {
address 10.10.0.200/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
accept
}
}
}
...
*A:node-2>config>filter>ip-filter# renum 10 15
*A:node-2>config>filter>ip-filter# renum 20 10
*A:node-2>config>filter>ip-filter# renum 40 1
Example: Original filter numbers and updated filter numbers configuration (classic CLI)
A:node-2>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
filter-sample
interface-disable-sample
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward redirect-policy redirect1
exit
entry 20 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
entry 40 create
match
dst-ip 10.10.10.91/24
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
src-ip 10.10.10.106/24
exit
action drop
exit
exit
...
----------------------------------------------
A:node-2>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "filter-main"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 10 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 15 create
description "no-91"
filter-sample
interface-disable-sample
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward redirect-policy
redirect1
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
[ex:/configure filter]
A:admin@node-2# info
ip-filter "11" {
description "New IP filter info"
scope exclusive
entry 1 {
match {
src-ip {
address 10.10.10.106/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
entry 2 {
description "new entry"
match {
dst-ip {
address 10.10.10.104/32
}
}
action {
drop
}
}
entry 10 {
match {
src-ip {
address 10.10.0.100/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
drop
}
}
entry 15 {
description "no-91"
match {
src-ip {
address 10.10.10.103/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
accept
}
}
entry 30 {
match {
src-ip {
address 10.10.0.200/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
accept
}
}
}
A:node-2>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "New IP filter info"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
description "new entry"
match
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
dst-ip 10.10.10.104/32
exit
action drop
exit
entry 10 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 15 create
description "no-91"
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
exit
...
----------------------------------------------
*[ex:/configure service]
A:admin@node-2# epipe 5
After you have removed the filter from the SAPs network interfaces, you can delete the filter. The following
example shows the deletion of a filter.
Example: Deleting a filter (MD-CLI)
*[ex:/configure filter]
A:admin@node-2# delete ip-filter 11
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
Example: Removing the filter from an SAP network interface (classic CLI)
In classic CLI, use the no filter command in all contexts where the filter is used to remove the filter.
*A:node-2>config>service# epipe 5
*A:node-2>config>service>epipe# sap 1/1/2:3
*A:node-2>config>service>epipe>sap# ingress
*A:node-2>config>service>epipe>sap>ingress# no filter
After you have removed the filter from the SAPs network interfaces, you can delete the filter. The following
example shows the deletion of a filter.
Example: Deleting a filter (classic CLI)
*A:node-2>config>filter# no ip-filter 11
*[ex:/configure filter]
A:admin@node-2# redirect-policy redirect1
[ex:/configure filter]
A:admin@node-2# info
redirect-policy "redirect1" {
admin-state enable
description "New redirect info"
destination 10.10.10.104 {
admin-state enable
description "New redirect info"
priority 105
ping-test {
timeout 20
drop-count 7
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
}
destination 10.10.10.105 {
admin-state enable
priority 95
ping-test {
timeout 30
drop-count 5
}
}
}
A:node-2>config>filter# info
----------------------------------------------
...
redirect-policy "redirect1" create
description "New redirect info"
destination 10.10.10.104 create
priority 105
ping-test
timeout 20
drop-count 7
exit
no shutdown
exit
destination 10.10.10.105 create
priority 95
ping-test
timeout 30
drop-count 5
exit
no shutdown
exit
no shutdown
exit
...
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
*[ex:/configure filter]
A:admin@node-2# ip-filter 11
*[ex:/configure filter]
A:admin@node-2# delete redirect-policy redirect1
*A:node-2>config>filter# ip-filter 11
*A:node-2>config>filter>ip-filter# entry 1
*A:node-2>config>filter>ip-filter>entry# action forward redirect-policy "redirect2"
*A:node-2>config>filter>ip-filter>entry# exit
*A:node-2>config>filter>ip-filter# exit
*A:node-2>config>filter# no redirect-policy "redirect1"
A:node-2>config>filter>ip-filter# info
----------------------------------------------
description "This is new"
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
scope exclusive
entry 1 create
filter-sample
interface-disable-sample
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action forward redirect-policy redirect2
exit
entry 2 create
description "new entry"
...
----------------------------------------------
*[ex:/configure filter]
A:admin@node-2# copy ip-filter 11 to ip-filter 12
[ex:/configure filter]
A:admin@node-2# info
ip-filter "11" {
description "This is new"
scope exclusive
entry 1 {
match {
src-ip {
address 10.10.10.106/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
}
entry 2 {
...
ip-filter "12" {
description "This is new"
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Filter policies
scope exclusive
entry 1 {
match {
src-ip {
address 10.10.10.106/24
}
dst-ip {
address 10.10.10.91/24
}
}
action {
drop
}
}
entry 2 {
...
A:node-2>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "This is new"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
...
ip-filter 12 create
description "This is new"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
...
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
rule can be assigned for packets that do not match specific rules. These packets can be dropped,
forwarded, or sent to the OpenFlow controller.
To enable rules in an H-OFS on an existing service router interface, a user must:
1. Create one or more ingress line card policies.
2. Assign those line card ingress filter policies to the 7450 ESS, 7750 SR, 7950 XRS, and VSR service
router interfaces.
3. Embed an H-OFS instance into those line card policies.
4. Program OF rules as required.
OpenFlow can be embedded in IPv4/IPv6 ACL filter policies deployed on:
• Layer 3 IES service interfaces
• Layer 3 network interfaces in base router context
• Layer 3 VPRN service interfaces, including those with NAT
• Layer 2 VPLS service interfaces
• IES/VPRN r-VPLS service interfaces, including those with NAT
• System ACL filters
OpenFlow functionality can be enabled with no effect on forwarding performance. Users can move
from CLI/SNMP programmed steering rules to OpenFlow operational model in service without service
disruption.
The control channel is routed via the GRT, meaning that the controller must be reachable via GRT, or
it may be routed via a VPRN. VPRN support requires that a loopback interface corresponding to each
OpenFlow switch, reachable via the VPRN, is configured in the VPRN. Then, the VPRN service ID or name
and the corresponding OpenFlow control channel loopback address are specified in the OpenFlow switch
control channel configuration.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
• classic CLI
For backward compatibility, GRT-only mode of operation is default but, because multi-service mode
is a functional superset, Nokia recommends operating in multi-service mode whenever possible. The
user can change the mode in which an H-OFS instance operates; however, the H-OFS instance must
be administratively disabled first. This purges all the rules forcing the OF controller to reprogram the
switch instance after it is re-enabled in a new mode. SR OS supports both H-OFS modes of operation
concurrently for different switch instances.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
Multi-service modes of operation uses part of the FlowTable cookie field (higher-order 32 bits) to provide
the enhanced functionality; the lower-order FlowTable cookie bits are fully controlled by the OF controller.
Table 10: Multi-service mode — higher-order bit flow table cookie encoding depicts higher-order bit Flow
Table cookie encoding used when operating in the multi-service mode of operation.
Table 10: Multi-service mode — higher-order bit flow table cookie encoding
sros-cookie Name sros-cookie Type sros-cookie Value FlowTable Entry Interpretation Based
(Bits 63...60) (Bits 59...32) on the sros-cookie
To enable multi-service mode of operation, a user must embed the OF switch in an ACL filter policy, and
because multi-service H-OFS supports a mix of VPRN, VPLS, GRT, and system rules, an additional scope
of embedding must be selected.
Use the commands in the following contexts to embed the OF switch in an ACL filter policy. (GRT scope is
used by default.)
• MD-CLI
In the MD-CLI, use the embed openflow grt, embed openflow vpls, embed openflow vprn, or
embed openflow system options in the following contexts.
• classic CLI
In the classic CLI, use the embed-filter open-flow service or embed-filter open-flow system options
in the following contexts.
After embedding H-OFS instance, an ACL policy contains rules specific to a VPRN or VPLS service
instance or to a GRT or to a system filter policy. Therefore, the ACL filter policy can only be used in the
scope defined by H-OFS embedding.
Rules programmed by an OF controller with GRT, system, and service cookies specified are accepted
even if the H-OFS instance is not embedded by a filter activated in a specific context. Rules programmed
by an OF controller with a service cookie specified, when the service ID is not one of the supported service
types, or when the service with the specified ID does not exist, are rejected with an error returned back
to the controller. If an H-OFS is embedded into a line card policy with a specific service context, the
embedding must be removed before that service is deleted.
The following table summarizes the main differences between the two modes of operation.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
Restrictions
• See the SR OS R23.x.Rx Software Release Notes for a full list of GRT, IES, VPRN, and VPLS
interfaces that support OF control for multi-service mode.
• The 7450 ESS, 7750 SR, 7950 XRS, and VSR H-OFS always requires an sros-cookie to be provided
for FlowTable operations and fails any operation without the cookie when the switch-defined-cookie
command is enabled.
• OF no-match-action is not programmed in hardware for system filters, because system filters are
chained to other filter policies and no-match-action would break the chaining.
• An H-OFS instance does not support overlapping of priorities (flow_priority value) within a single sros-
cookie (type plus value). The supported values for priority differ based on a value for switch-defined-
cookie:
– H-OFS with the switch-defined-cookie command disabled
• Valid flow_priority_range 1 to max-size – 1
• flow_priority_value 0 is reserved (no match action)
– H-OFS with the switch-defined-cookie command enabled
• Valid flow_priority_range 1 to 65534
• flow_priority_value 0 is reserved (no match action)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
• flow_priority must map to a valid filter ID. The following items show how flow_priority is mapped to a
filter policy entry ID:
– H-OFS with the switch-defined-cookie command disabled
filter entry ID = max-size – flow_priority + embedding offset
– H-OFS with the switch-defined-cookie command enabled
filter entry ID = 65535 – flow_priority + embedding offset
• When multiple H-OFS instances are embedded into a single ACL filter, no two H-OFS instances can
program the same filter entry ID.
• classic CLI
See SR OS H-OFS port and VLAN encoding for required encoding of port and VLAN IDs.
The SR OS H-OFS supports a mix of rules with service scope and with SAP scope. For VPLS SAPs, an
H-OFS instance must be embedded twice: after for the VPLS service and after for the SAP if both service-
level and SAP-level rules are to be activated.
The following example shows the activation of service-level and SAP-level rules inside a single ACL policy.
Example: MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
A:node-2>config>filter>ip-filter# info
----------------------------------------------
scope exclusive
embed-filter open-flow "ofs1" service 5 offset 100
embed-filter open-flow "ofs1" sap 1/1/2:2 offset 200
----------------------------------------------
Restrictions
• Because an H-OFS instance does not support overlapping priorities within a single sros-cookie (type
plus value), the priority for rules applicable to different SAPs within the same VPLS service must not
overlap.
• Masking is not supported when adding a new flow table rule with a port and VLAN ID match.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
The auto-created embedded filters can be viewed through CLI but cannot be modified or deleted through
filter policy CLI/SNMP. The user can see the above embedded filters under show filter context, including
the details about the filters, entries programmed, interface association, statistics, and so on.
For an H-OFS with the switch-defined-cookie command enabled, embedded filters are created for each
unique context in the H-OFS instead.
Figure 32: OF flow table mapping to router or switch service infrastructure example — switch-defined-
cookie disabled
The router allows mixing H-OFS rules from one or more H-OFS instances in a single filter policy. Co-
existence of H-OFS rules in a single policy with CLI or SNMP programmed rules or BGP FlowSpec
programmed rules in a single line card filter policy is also supported. When a management interface and an
OF controller flow entry have the same filter policy entry, the management interface-created entry overrides
the OF controller-created entry; see the embedded filter functional description. For mixing of the rules from
multiple management entities, the controller should not program an entry in its Flow Table that would match
all traffic, because this would stop evaluation of the filter policy.
The router supports HA for the OF Flow Table content and statistics. On an activity switch, the channel
goes down and is reestablished by the newly active CPM. ‟Fail secure mode” operation takes place during
channel reestablishment (OpenFlow rules continue to be applied to the arriving traffic). The OF controller
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
is expected to resynchronize the OF table when the channel is reestablished. On a router reboot or H-
OFS instance shutdown, H-OFS Flow Table rules and statistics are purged. An H-OFS instance cannot be
deleted unless the H-OFS instance is first removed from all embedding filter policies.
Operational notes
Consider the following operational notes:
• Flow Table statistics displayed through the CLI debugging tools are read in real time from hardware.
However, to protect the system, executing CLI debugging tool commands within 5 s returns the same
statistics for any flow that had its statistics read from hardware within the last 5 s. Use the following
command to display flow table statistics.
• When retrieving FlowTable statistics at scale, Nokia recommends to either use bulk requests, or to pace
single entry requests to obtain the balance between stats real-time accuracy and CPM activity.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
• classic CLI
Auxiliary connections use the same transport as the main connection. The switch handles any requests
over any established channel and respond on the same channel even if a specific requested auxiliary
channel is available.
The H-OFS instance uses the packet-in connection for packet-in functionality by default and expects (but
does not require) the controller to use the statistics channel for statistics processing by default.
The switch uses the auxiliary channels (packet-in for packet-in-specific requests and statistics for statistics-
specific requests) as long as they are available. If they are not available, the switch uses the next available
auxiliary channel. If none of the auxiliary channels are available, the main channel is used.
Auxiliary connections can be enabled or disabled without shutting down the switch.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
RSVP LSP: LPT: 0100, LPT-S: 0000 (tunnel), LPT-V: RSVP TE Tunnel ID
MPLS-TP LSP: LPT: 0100, LPT-S: 0000 (tunnel), LTP-V: MPLS-TP Tunnel Number
SR-TE LSP: LPT: 0100, LPT-S: 0000 (tunnel), LTP-V: SR-TE LSP Index
GRT instance: LPT: 0100, LPT-S: 0001 (L3 routing instance), LPT-V: 0
VPRN Id: LPT: 0100, LPT-S: 0001 (L3 routing instance), LPT-V: VPRN Service ID for a
VPRN instance configured on the system, NAT: LPT 0100, LPT-S: 0020 (NAT), LPT-V: 0
OF is limited to a 24-bit service ID value range (a subset of VPRN IDs supported by the SR OS system).
Logical port values other than RSVP-TE LSP, SR-TE LSP, and MPLS-TP LSP require H-OFS with the
switch-defined-cookie command enabled. Only tunnel-encoded ports are stored in the H-OFS logical port
table. Therefore, functionality such as retrieving statistics per port is not available for logical ports that are
not stored in the H-OFS logical port table.
NULL tag, dot1Q tag, inner QinQ tag VlanId Outer QinQ tag VlanId
OXM_OF_VLAN_VID OFL_OUT_VLAN_ID (Experimenter field uses same
encoding as OXM_OF_VLAN_VID)
The following table shows how OF programmed values are translated to SR OS SAPs.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ALU_AXN_REDIRECT_TO_NEXTHOP: 2
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
flow_mod:
instruction= OFPIT_WRITE_ACTION/OFPIT_APPLY_ACTION,
action= OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_NEXTHOP),
encoding:
struct alu_axn_redirect_to_nhopv4{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type; /* Type = 1 for Nhop*/
uint8_t flags; /* flags is 0-7 bits:
Bit 0 = Ipv4,
Bit 1 = Ipv6,
Bit 2 = indirect
*/
uint8_t pad[2];
uint32_t ipaddr; /* ipv4 addr */
unit8_t pad[0]; /* Not needed */
}; ASSERT(sizeof(alu_axn_redirect_to_nhopv4) == 16)
struct alu_axn_redirect_to_nhopv6{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type; /* Type = 1 for Nhop*/
uint8_t flags; /* flags is 0-7 bits:
Bit 0 = Ipv4,
Bit 1 = Ipv6,
Bit 2 = indirect
*/
uint8_t pad[2];
uint128_t ip6addr; /* ipv6 addr */
unit8_t pad[4]; /* Make total len multiple of 8 */
}; ASSERT(sizeof(alu_axn_redirect_to_nhopv6) == 32)
In case of erroneous programming, the following experimenter-specific errors are returned to the controller.
enum alu_err_exp_class{
ALU_ERR_CLASS_RD_TO_SDP = 0,
ALU_ERR_CLASS_RD_TO_NHOP = 1,
}
enum alu_err_subtype_redirect_to_nhop
{
ALU_ERR_RN_INVALID_FLAGS = 0
ALU_ERR_RN_INVALID_ARGS = 1
ALU_ERR_RN_INVALID_ADDR = 2
}
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding GRT or VPRN Service ID as described in the SR OS H-OFS logical
port section.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
Because a 24-bit value is used to encode the VPRN service ID in the logical port, redirection to a VPRN
service with a service ID above that range is not supported.
ALU_IPD_EXPERIMENT_ID:0X000025BA
ALU_AXN_REDIRECT_TO_NEXTHOP:2
flow_mod:
Instruction 1:
instruction=OFPIT_WRITE_ACTION/OFPIT_APPLY_ACTION
action=OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_NEXTHOP),
Encoding as described in the Redirect to IP next-hop section (indirect flag must be set).
Instruction 2:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding GRT or VPRN Service ID as described in the SR OS H-OFS logical
port section.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_ESI_L2)
encoding:
struct alu_axn_redirect_to_ESI_L2{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 3 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 0 = L2,
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L2) == 24)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_ESI_L3)
encoding:
struct alu_axn_redirect_to_ESI_L3_V4{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 3 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 1 = L3 (ipv4)
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint32_t sf-ip; /* v4 address of sf-ip */
uint32_t ifIndex; /* interface id*/
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V42) == 32)
struct alu_axn_redirect_to_ESI_L3_V6{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 1 for Nhop*/
uint8_t flags; /* flags is 0-7 bits:
Value = 2 = L3 (ipv6)
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint128_t sf-ip; /* v6 address of sf-ip */
uint32_t ifIndex; /* interface id*/
uint8_t pad[4];
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V6) == 48)
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_ESI_L3)
encoding:
struct alu_axn_redirect_to_ESI_L3_V4{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 2 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 2 = L3 (ipv4)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
*/
uint8_t esi[10];
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint32_t vas-ip; /* v4 address of sf-ip */
uint32_t ifIndex; /* vas interface id*/
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V4) == 24)
struct alu_axn_redirect_to_ESI_L3_V6{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 2 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 4 = L3 (ipv6)
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint128_t vas-ip; /* v6 address of sf-ip */
uint32_t ifIndex; /* vas interface id*/
uint8_t pad[4]
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V6) == 40)
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
The port uses SR OS LOGICAL port encoding RSVP-TE, SR-TE, or MPLS-TP LSP as described in the SR
OS H-OFS logical port section.
An LSP received in a flow rule is compared against those in the H-OFS logical port table. If the table does
not contain the LSP, the rule programming fails. Otherwise, the rule is installed in an ACL filter. As long as
any path within the LSP is UP, the redirect rule forwards unicast IPv4 or IPv6 traffic on the current best LSP
path by adding an LSP transport label and, in the case of IPv6 traffic, also adding an explicit NULL label.
When an LSP in the H-OFS logical port table goes down, the OF switch removes the LSP from its logical
port table and notifies the controller of that fact if the logical port status reporting is enabled. It is up to the
OF controller to decide whether to remove rules using this LSP. If the rules are left in the flow table, the
traffic that was to be redirected to this LSP instead is subject to a forward action for this flow rule. If the
controller does not remove the entries and the system reuses the LSP identified for another LSP, the rules
left in the flow table start redirecting traffic onto this new LSP.
In some deployments, an SDN controller may need to learn from the router H-OFS logical ports status. To
support this function, the OF switch supports optional status reporting using asynchronous OF protocol
messages for ports status change.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
The port uses SR OS LOGICAL port encoding as described in the SR OS H-OFS logical port section.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
Action 1:
action type: OFPAT_OUTPUT,
The port uses encoding as described in the SR OS H-OFS port and VLAN encoding section.
Action 2:
action type=OFPAT_SET_FIELD
OXM TLVs encode SAP VLANs as described in the SR OS H-OFS port and VLAN encoding section:
- OXM_OF_VLAN_VID
- OFL_OUT_VLAN_ID (optional)
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ALU_AXN_REDIRECT_TO_SDP: 1
flow_mod:
instruction= OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTIONS,
action= OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_SDP),
encoding:
struct alu_axn_redirect_to_sdp{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type; /* Type = 0 for SDP*/
uint8_t flags; /
* Flags that can be used to denote info(reserved)*/
uint16_t sdp-id; /* Sdp-id*/
uint32_t vcId; /* Vc-id*/
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
In case of erroneous programming, the following experimenter-specific errors are returned to the controller:
enum alu_err_exp_class
{
ALU_ERR_CLASS_RD_TO_SDP = 0,
ALU_ERR_CLASS_RD_TO_NHOP = 1,
}
enum alu_err_redirect_to_sdp
{
ALU_ERR_RS_INVALID_FLAGS = 0
ALU_ERR_RS_INVALID_ARGS = 1
ALU_ERR_RS_INVALID_SDP_ID = 2
ALU_ERR_RS_INVALID_VC_ID = 3
}
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
Action 1:
action type: OFPAT_EXPERIMENTER
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ExpType= ALU_AXN_REDIRECT_TO_NEXTHOP,
Action 2:
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding RSVP-TE, MPLS-TP LSP, or segment routing, as described in SR
OS H-OFS logical port section.
Action 3 (optional): to redirect to a different VPRN
Action 3:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
Encoding:
struct alu_axn_redirect_to_vprn {
uint16_t type; /* OFPAT_EXPERIMENTER => ff ff */
uint16_t len;
uint32_t experimenter; /
* Vendor specific experimenter id => 00 00 25 ba */
uint8_t exp_axn_type; /* type => 03 */
uint8_t exp_axn_flags; /* flag => any value is accepted */
uint8_t pad[2]; /* pad => 00 00 */
uint32_t vprn; /* vrpn svc id */
};ASSERT(sizeof(alu_axn_redirect_to_vprn) == 16)
Action 4:
action type: OFPAT_SET_FIELD
Field is an IP destination address. Subnet masks are not supported in the set_field instruction.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= NORMAL
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
• classic CLI
Three possible no-match actions are supported: drop, fall-through (packets are forwarded with regular
processing by the router), and packet-in.
The packet-in action causes packets that do not match entries in the flow table, as programmed by the
OpenFlow controller, to be extracted and sent to the controller in a flow-controlled manner. Because
EQUAL is supported, packet-in messages are sent to all controllers in the UP state. To protect the
controller, only the first packet of a specific 5-tuple flow (source IP address, destination IP address, source
port, destination port, protocol) to which the no-match action is applied is sent to the controller. This 5-
tuple flow context ages out after 10 s. Each switch instance maintains contexts for up to 8192 outstanding
packet-in messages to the controller. If the packet-in action is used, an auxiliary channel should be enabled
for packet-in processing. Use the following command to enable the packet-in processing:
• MD-CLI
• classic CLI
A count of packets to which packet-in is applied is also available through the OpenFlow channel statistics.
flow_mod:
instruction type: OFPIT_METER
action type: with the meterId.
The meters are configured using meter modification messages, and are configured before the flow
messages are sent with meter instruction.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Hybrid OpenFlow switch
*/
uint32_t holdTime; /* Value between 0-65535 seconds for
sticky dest */
};
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
6 Cflowd
6.1.1 Operation
Figure 34: Basic cflowd steps shows the basic operation of the cflowd feature. This sampled flow is only
used to describe the basic steps that are performed. It is not intended to specify implementation.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Generates a variable export record, depending on user configuration and sampled traffic type (IPv4,
IPv6, or MPLS), for each individual flow captured.
• Version 10 (IPFIX)
Generates a variable export record, depending on user configuration and sampled traffic type (IPv4,
IPv6, or MPLS), for each individual flow captured.
Figure 35: V5, V8, V9, V10, and flow processing shows V5, V8, V9, and V10 flow processing.
As flows are expired from the active flow cache, the export format must be determined, either V5, V8, V9,
and V10.
• If the export format is V5 or V9 and V10, no further processing is performed and the flow data is
accumulated to be sent to the external collector.
• If the export format is V8, the flow entry is added to one or more of the configured aggregation matrices.
• As the entries within the aggregate matrices are aged out, they are accumulated to be sent to the
external flow collector in V8 format.
The sample rate and cache size are configurable values. The cache size default is 64K flow entries.
A flow terminates when one of the following conditions is met:
• When the inactive timeout period expires (default: 15 s). A flow is considered terminated when no
packets are seen for the flow for n seconds.
• When an active timeout expires (default: 30 s). Default active timeout is 30 min. A flow terminates
according to the time duration, regardless of whether there are packets coming in for the flow.
• When the user executes a clear cflowd command.
• When other measures are met that apply to aggressively age flows as the cache becomes too full (such
as overflow percent).
6.1.1.1 Version 8
There are several different aggregate flow types including:
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
• AS matrix
• destination prefix matrix
• source prefix matrix
• prefix matrix
• protocol/port matrix
Version 8 is an aggregated export format. As individual flows are aged out of the raw flow cache, the
data is added to the aggregate flow cache for each configured aggregate type. Each of these aggregate
flows are also aged in a manner similar to the method the active flow cache entries are aged. When an
aggregate flow is aged out, it is sent to the external collector in the V8 record format.
6.1.1.2 Version 9
Version 9 format is a more flexible format and allows for different templates or sets of cflowd data to be
sent based on the type of traffic being sampled and the template set configured.
Version 9 is interoperable with RFC 3954, Cisco Systems NetFlow Services Export Version 9.
6.1.1.3 Version 10
Version 10 is a new format and protocol that interoperates with the specifications from the IETF as the IP
Flow Information Export (IPFIX) standard. Like V9, the V10 format uses templates to allow for different data
elements about a flow that is to be exported and to handle different type of data flows, such as IPv4, IPv6,
and MPLS.
Version 10 is interoperable with RFC 5101 and 5102.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
There are three modes in which cflowd can be enabled to sample traffic on an interface:
• Cflowd interface – where all traffic entering a specified port is subjected to sampling at the configured
sampling rate
• Cflowd interface plus – the definition of IP filters that specify an action to disable sampling, where traffic
that matches these filter entries is not subject to cflowd sampling
Use the following commands to disable sampling as part of the IP filter configuration:
– MD-CLI
– classic CLI
• Cflowd ACL – where IP filters must be created with entries containing the action filter-sampled. In this
mode, only traffic matching these filter entries is subject to the cflowd sampling process.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
• IP next hop
• BGP next hop
• ICMP type and code
• IP version
• source prefix (from routing)
• destination prefix (from routing)
• MPLS label stack from label 1 to 6
Within the raw flow cache, the following characteristics are used to identify an individual flow:
• ingress interface
• source IP address
• destination IP address
• source transport port number
• destination transport port number
• IP protocol type
• IP ToS byte
• virtual router ID
• ICMP type and code
• direction
• MPLS labels
SR OS implementation allows cflowd to be enabled at the interface level or as an action to a filter. By
enabling cflowd at the interface level, all IP packets forwarded by the interface are subject to cflowd
analysis. By setting cflowd as an action in a filter, only packets matching the specified filter are subject to
cflowd analysis. This provides the network user greater flexibility in the types of flows that are captured.
6.4.1.2 Collectors
A collector defines how data flows should be exported from the flow cache. A maximum of five collectors
can be configured. Each collector is identified by a unique IP address and UDP port value. Each collector
can only export traffic in one version type: V5, V8, V9, or V10.
The command options within a collector configuration can be modified or the defaults retained.
The autonomous-system-type command defines whether the autonomous system information to be
included in the flow data is based on the originating AS or external peer AS of the flow.
6.4.1.2.1 Aggregation
V8 aggregation allows for flow data to be aggregated into larger, less granular flows. Use aggregation
commands to specify the type of data to be collected. These aggregation types are only applicable to flows
being exported to a V8 collector.
The following aggregation schemes are supported:
• AS matrix
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Flows are aggregated based on source and destination AS and ingress and egress interface.
• protocol port
Flows are aggregated based on the IP protocol, source port number, and destination port number.
• source prefix
Flows are aggregated based on source prefix and mask, source AS, and ingress interface.
• destination prefix
Flows are aggregated based on destination prefix and mask, destination AS, and egress interface.
• source-destination prefix
Flows are aggregated based on source prefix and mask, destination prefix and mask, source and
destination AS, ingress interface, and egress interface.
• raw
Flows are not aggregated and are sent to the collector in a V5 record.
[ex:/configure cflowd]
A:admin@node-2# info detail
## apply-groups
## apply-groups-exclude
admin-state enable
analyze-gre-payload false
analyze-l2tp-traffic false
analyze-v4overv6-traffic false
cache-size 6553
export-mode automatic
inband-collector-export-only false
overflow 1
template-retransmit 600
use-vrtr-if-index false
active-flow-timeout 1800
inactive-flow-timeout 15
sample-profile 1 {
## apply-groups
## apply-groups-exclude
sample-rate 1000
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
[ex:/configure cflowd]
A:admin@node-2# info detail
...
admin-state enable
...
cache-size 65536
...
overflow 1
...
template-retransmit 600
...
active-flow-timeout 1800
inactive-flow-timeout 15
sample-profile 1 {
...
sample-rate 1000
}
[ex:/configure cflowd]
A:admin@node-2# info
...
overflow 10
...
active-flow-timeout 1800
inactive-flow-timeout 10
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
sample-profile 1 {
sample-rate 100
}
[ex:/configure cflowd]
A:admin@node-2# info
...
overflow 10
...
active-flow-timeout 1800
inactive-flow-timeout 10
sample-profile 1 {
sample-rate 100
}
collector 10.10.10.1 port 2000 {
description "AS info collector"
version 8
aggregation {
as-matrix true
raw true
}
}
collector 10.10.10.2 port 5000 {
description "Neighbor collector"
autonomous-system-type peer
version 8
aggregation {
protocol-port true
source-destination-prefix true
}
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
...
A:node-2>config>cflowd# info
-----------------------------------------
inactive-flow-timeout 10
overflow 10
sample-profile 1 create
sample-rate 100
exit
collector 10.10.10.1:2000 version 8
description "AS info collector"
aggregation
as-matrix
raw
exit
exit
collector 10.10.10.2:5000 version 8
description "Neighbor collector"
aggregation
protocol-port
source-destination-prefix
exit
autonomous-system-type peer
exit
[ex:/configure cflowd]
A:admin@node-2# info
...
collector 10.10.10.9 port 2000 {
description "v9collector"
template-set mpls-ip
version 9
}
A:node-2>config>cflowd# info
----------------------------------------------
...
collector 10.10.10.9:2000 version 9
description "v9collector"
template-set mpls-ip
exit
----------------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Each flow exported to a collector configured for either V9 or V10 formats is sent using one of the flow
template sets listed in Table 15: Template sets.
Table 16: Basic IPv4 template to Table 23: MPLS transport template list the fields in each template listed in
Table 15: Template sets.
IPv4 Nexthop 15
BGP Nexthop 18
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
IsMulticast
2 206
Ingress VRFID
2 234
Egress VRFID
2 235
IPv4 Nexthop 15
BGP Nexthop 18
Ingress Interface 10
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
IsMulticast
2 206
Ingress VRFID
2 234
Egress VRFID
2 235
IPv6 Nexthop 62
IPv4 Nexthop 15
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
Protocol 4
ToS 5
IP version 60
Direction 61
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IsMulticast
2 206
Ingress VRFID
2 234
Egress VRFID
2 235
IPv6 Nexthop 62
IPv4 Nexthop 15
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
Protocol 4
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IP version 60
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
MPLS_TOP_LABEL_TYPE 46
MPLS_TOP_LABEL_ADDR 47
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IsMulticast
2 206
Ingress VRFID
2 234
Egress VRFID
2 235
End Time 21
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IPv4 Nexthop 15
IPv6 Nexthop 62
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
To address Table 22: L2-IP (Ethernet) flow template, only one Ethernet (L2-IP) flow template is supported
and exported to IPFIX (V10) collectors.
Packet Count 2
Byte Count 1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Src Port 7
Dest Port 11
Protocol 4
ToS 5
IP Version 60
VRF ID 234
Ingress Interface 10
Packet Count 2
Byte Count 1
Direction 61
MPLS_TOP_LABEL_TYPE 46
MPLS_TOP_LABEL_ADDR 47
MPLS Label-1 70
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Field name
3 Field ID
Ingress ID 252
Egress ID 253
Ingress VRF ID
4 234
Egress VRF ID
4 235
Protocol
4 4
ToS
4 5
When the preceding command is configured, the following requirements must be met to enable traffic
sampling on the interface:
• Enable cflowd.
• Ensure at least one cflowd collector is configured and enabled.
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
• Use the commands in the following context to configure sampling as unicast or multicast, as well as the
type and direction of the sampling. By default, the direction is ingress-only.
• Use the following commands to prevent specific types of traffic from being sampled when interface
sampling is enabled. The filter must be applied to the service or network interface on which the traffic to
be omitted is to ingress the system.
– MD-CLI
– classic CLI
Depending on the sampling type command option selected, either acl or interface, cflowd extracts traffic
flow samples from an IP filter or an interface for analysis. All packets forwarded by the interface are
analyzed according to the cflowd configuration.
The acl command option must be selected to enable traffic sampling on an IP filter. Cflowd must be
enabled in at least one IP filter entry. Use the following command to enable cflowd sampling on an IP filter
entry:
• MD-CLI
• classic CLI
The interface command option must be selected to enable traffic sampling on an interface. If cflowd is not
enabled, traffic sampling does not occur on the interface.
When enabled on a service interface, cflowd collects routed traffic flow samples through a router for
analysis. Cflowd is supported on IES and VPRN service interfaces only. Layer 2 traffic is excluded. All
packets forwarded by the interface are analyzed according to the cflowd configuration. On the interface
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
level, cflowd can be associated with a filter (ACL) or an IP interface. Layer 2 cflowd ingress sampling is
supported on VPLS and Epipe SAPs.
Byte 1
Input ifIndex 10
Output ifIndex 14
IP version 60
IP Src Port 7
IP Dst Port 11
IP proto 4
IP tcpflags 6
IP min TTL 52
IP max TTL 53
IP tos 5
Flow Direction 61
IP icmp type/code 32
Forwarding status 89
Byte 1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Output ifIndex 14
IP version 60
IP Src Port 7
IP Dst Port 11
IP proto 4
IP tcpflags 6
IP min TTL 52
IP max TTL 53
IP tos 5
Flow Direction 61
Forwarding status 89
Input ifIndex 10
Output ifIndex 14
Packet 2
Byte 1
Flow Direction 61
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
Packet Count 2
Byte Count 1
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Input ifIndex 10
Output ifIndex 14
IP version 60
IP src Port 7
IP Dst Port 11
IP Proto 4
IP TCP flags 6
IP min TTL 52
IP TOS 5
IP icmp type/code 32
Forwarding status 89
Input ifIndex 10
Output ifIndex 14
IP version 60
IP src Port 7
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
IP Proto 4
IP TCP flags 6
IP min TTL 52
IP TOS 5
Forwarding status 89
• classic CLI
The preceding command to disable traffic sampling can be enabled or disabled as needed instead of
having to create numerous filter versions.
To enable an interface for filter traffic sampling, the following requirements must be met:
• Cflowd must be enabled globally.
• At least one cflowd collector must be configured and enabled.
• Use the commands in the following context on the IP interface that is used to configure sampling as
unicast or multicast. You must also select the ACL option.
• On the IP filter being used, you must explicitly enable filter sampling for the entries matching the traffic
that should be sampled. Use the following commands to configure filter sampling for the filter:
– MD-CLI
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
– classic CLI
• classic CLI
When the traffic sampling is disabled, traffic matching the associated IP filter entry is not sampled if the IP
interface is set to cflowd ACL mode. Use the following command to disable traffic sampling:
• MD-CLI
• classic CLI
6.4.3.6.2 Dependencies
For cflowd to be operational, the following requirements must be met:
• Cflowd must be enabled on a global level. If cflowd is disabled, any traffic sampling instances are also
disabled.
• At least one collector must be configured and enabled in order for traffic sampling to occur on an
enabled entity.
• If a specific collector UDP port is not identified, flows are sent to port 2055 by default.
Cflowd can also be dependent on the following entity configurations:
• Interface sampling configuration
• Service interfaces
• Filter configurations
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
The combination of interface and filter entry configurations determines whether flow sampling occurs.
Table 31: Cflowd configuration dependencies lists the expected results based on cflowd configuration
dependencies.
Interface Setting cflowd-parameter type Command ip-filter entry Setting Expected Results
Setting
IP-filter mode ACL filter-sample true (MD-CLI) Traffic matching is
sampled at specified
filter-sample (classic CLI)
rate
configure cflowd
*[ex:/configure cflowd]
A:admin@node-2# active-flow-timeout 3600
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
*[ex:/configure cflowd]
A:admin@node-2# inactive-flow-timeout 15
*[ex:/configure cflowd]
A:admin@node-2# overflow 2
*[ex:/configure cflowd]
A:admin@node-2# sample-profile 1
[ex:/configure cflowd]
A:admin@node-2# info detail
...
inactive-flow-timeout 15
...
*[ex:/configure cflowd]
A:admin@node-2# info
...
overflow 2
...
active-flow-timeout 3600
sample-profile 1 {
sample-rate 10
}
...
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
configure cflowd
If a specific collector UDP port is not identified, flows are sent to port 2055 by default.
The following example shows a basic cflowd configuration that has been modified.
Example: MD-CLI
[ex:/configure cflowd]
A:admin@node-2# info
...
overflow 2
...
active-flow-timeout 3600
sample-profile 1 {
sample-rate 10
}
collector 10.10.10.1 port 2000 {
description "AS info collector"
version 8
}
}
collector 10.10.10.2 port 5000 {
description "Test collector"
version 9
aggregation {
source-prefix true
raw true
}
}
A:node-2>config>cflowd# info
-----------------------------------------
active-flow-timeout 3600
overflow 2
sample-profile 1 create
sample-rate 10
exit
collector 10.10.10.1:2000 version 8
description "AS info collector"
exit
collector 10.10.10.2:5000 version 9
description "Test collector"
aggregation
source-prefix
raw
exit
exit
-----------------------------------------
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
The following example shows the configuration of FP acceleration for cflowd processing.
Example: MD-CLI
[ex:/configure]
A:admin@node-2# info
cflowd {
admin-state enable
...
inband-collector-export-only true
...
sample-profile 2 {
sample-rate 2000
metering-process fp-accelerated
}
collector 10.10.10.10 port 1 {
template-set fastpath
version 10
}
}
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Cflowd
Drop-ACL 130
Drop-Unroutable 131
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
7.4 Broadband Network Gateway (BNG) Control and User Plane Separation
(CUPS)
3GPP 23.007, Restoration procedures
3GPP 29.244, Interface between the Control Plane and the User Plane nodes
3GPP 29.281, General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)
BBF TR-459, Control and User Plane Separation for a Disaggregated BNG
BBF TR-459.2, Multi-Service Disaggregated BNG with CUPS: Integrated Carrier Grade NAT function
RFC 8300, Network Service Header (NSH)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 6712, Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management
Protocol (CMP)
RFC 7030, Enrollment over Secure Transport
RFC 7468, Textual Encodings of PKIX, PKCS, and CMS Structures
7.7 Ethernet
IEEE 802.1AB, Station and Media Access Control Connectivity Discovery
IEEE 802.1ad, Provider Bridges
IEEE 802.1ag, Connectivity Fault Management
IEEE 802.1ah, Provider Backbone Bridges
IEEE 802.1ak, Multiple Registration Protocol
IEEE 802.1aq, Shortest Path Bridging
IEEE 802.1ax, Link Aggregation
IEEE 802.1D, MAC Bridges
IEEE 802.1p, Traffic Class Expediting
IEEE 802.1Q, Virtual LANs
IEEE 802.1s, Multiple Spanning Trees
IEEE 802.1w, Rapid Reconfiguration of Spanning Tree
IEEE 802.1X, Port Based Network Access Control
IEEE 802.3ac, VLAN Tag
IEEE 802.3ad, Link Aggregation
IEEE 802.3ah, Ethernet in the First Mile
IEEE 802.3x, Ethernet Flow Control
ITU-T G.8031/Y.1342, Ethernet Linear Protection Switching
ITU-T G.8032/Y.1344, Ethernet Ring Protection Switching
ITU-T Y.1731, OAM functions and mechanisms for Ethernet based networks
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2 – TLS client, RSA public key
RFC 5425, Transport Layer Security (TLS) Transport Mapping for Syslog – RFC 3164 with TLS
RFC 5656, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer – ECDSA
RFC 5925, The TCP Authentication Option
RFC 5926, Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)
RFC 6398, IP Router Alert Considerations and Usage – MLD
RFC 6528, Defending against Sequence Number Attacks
RFC 7011, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow
Information
RFC 7012, Information Model for IP Flow Information Export
RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
RFC 7231, Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7232, Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests
RFC 7301, Transport Layer Security (TLS) Application Layer Protocol Negotiation Extension
RFC 7616, HTTP Digest Access Authentication
RFC 8446, The Transport Layer Security (TLS) Protocol Version 1.3
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 3956, Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address
RFC 3973, Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol Specification (Revised) –
auto-RP groups
RFC 4541, Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener
Discovery (MLD) Snooping Switches
RFC 4604, Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener
Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast
RFC 4607, Source-Specific Multicast for IP
RFC 4608, Source-Specific Protocol Independent Multicast in 232/8
RFC 4610, Anycast-RP Using Protocol Independent Multicast (PIM)
RFC 4611, Multicast Source Discovery Protocol (MSDP) Deployment Scenarios
RFC 5059, Bootstrap Router (BSR) Mechanism for Protocol Independent Multicast (PIM)
RFC 5186, Internet Group Management Protocol Version 3 (IGMPv3) / Multicast Listener Discovery
Version 2 (MLDv2) and Multicast Routing Protocol Interaction
RFC 5384, The Protocol Independent Multicast (PIM) Join Attribute Format
RFC 5496, The Reverse Path Forwarding (RPF) Vector TLV
RFC 6037, Cisco Systems' Solution for Multicast in MPLS/BGP IP VPNs
RFC 6512, Using Multipoint LDP When the Backbone Has No Route to the Root
RFC 6513, Multicast in MPLS/BGP IP VPNs
RFC 6514, BGP Encodings and Procedures for Multicast in MPLS/IP VPNs
RFC 6515, IPv4 and IPv6 Infrastructure Addresses in BGP Updates for Multicast VPNs
RFC 6516, IPv6 Multicast VPN (MVPN) Support Using PIM Control Plane and Selective Provider Multicast
Service Interface (S-PMSI) Join Messages
RFC 6625, Wildcards in Multicast VPN Auto-Discover Routes
RFC 6826, Multipoint LDP In-Band Signaling for Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Path
RFC 7246, Multipoint Label Distribution Protocol In-Band Signaling in a Virtual Routing and Forwarding
(VRF) Table Context
RFC 7385, IANA Registry for P-Multicast Service Interface (PMSI) Tunnel Type Code Points
RFC 7716, Global Table Multicast with BGP Multicast VPN (BGP-MVPN) Procedures
RFC 7761, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)
RFC 8279, Multicast Using Bit Index Explicit Replication (BIER)
RFC 8296, Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks –
MPLS encapsulation
RFC 8401, Bit Index Explicit Replication (BIER) Support via IS-IS
RFC 8444, OSPFv2 Extensions for Bit Index Explicit Replication (BIER)
RFC 8487, Mtrace Version 2: Traceroute Facility for IP Multicast
RFC 8534, Explicit Tracking with Wildcard Routes in Multicast VPN – (C-*,C-*) wildcard
RFC 8556, Multicast VPN Using Bit Index Explicit Replication (BIER)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 2410, The NULL Encryption Algorithm and Its Use With IPsec
RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 3526, More Modular Exponential (MODP) Diffie-Hellman group for Internet Key Exchange (IKE)
RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec
RFC 3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers
RFC 3947, Negotiation of NAT-Traversal in the IKE
RFC 3948, UDP Encapsulation of IPsec ESP Packets
RFC 4106, The Use of Galois/Counter Mode (GCM) in IPsec ESP
RFC 4109, Algorithms for Internet Key Exchange version 1 (IKEv1)
RFC 4301, Security Architecture for the Internet Protocol
RFC 4303, IP Encapsulating Security Payload
RFC 4307, Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
RFC 4308, Cryptographic Suites for IPsec
RFC 4434, The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
RFC 4543, The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH
RFC 4754, IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
RFC 4835, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload
(ESP) and Authentication Header (AH)
RFC 4868, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
RFC 4945, The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2 and PKIX
RFC 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume
Environments
RFC 5282, Using Authenticated Encryption Algorithms with the Encrypted Payload of the IKEv2 Protocol
RFC 5903, ECP Groups for IKE and IKEv2
RFC 5996, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 5998, An Extension for EAP-Only Authentication in IKEv2
RFC 6379, Suite B Cryptographic Suites for IPsec
RFC 6380, Suite B Profile for Internet Protocol Security (IPsec)
RFC 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 7296, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 7321, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating
Security Payload (ESP) and Authentication Header (AH)
RFC 7383, Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation
RFC 7427, Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 3623, Graceful OSPF Restart Graceful OSPF Restart – helper mode
RFC 3630, Traffic Engineering (TE) Extensions to OSPF Version 2
RFC 4222, Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance
RFC 4552, Authentication/Confidentiality for OSPFv3
RFC 4576, Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual
Private Networks (VPNs)
RFC 4577, OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks
(VPNs)
RFC 5185, OSPF Multi-Area Adjacency
RFC 5187, OSPFv3 Graceful Restart – helper mode
RFC 5243, OSPF Database Exchange Summary List Optimization
RFC 5250, The OSPF Opaque LSA Option
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5340, OSPF for IPv6
RFC 5642, Dynamic Hostname Exchange Mechanism for OSPF
RFC 5709, OSPFv2 HMAC-SHA Cryptographic Authentication
RFC 5838, Support of Address Families in OSPFv3
RFC 6549, OSPFv2 Multi-Instance Extensions
RFC 6987, OSPF Stub Router Advertisement
RFC 7471, OSPF Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric
for flex-algo, RSVP, SR-TE
RFC 7684, OSPFv2 Prefix/Link Attribute Advertisement
RFC 7770, Extensions to OSPF for Advertising Optional Router Capabilities
RFC 8362, OSPFv3 Link State Advertisement (LSA) Extensibility
RFC 8920, OSPF Application-Specific Link Attributes
7.24 OpenFlow
TS-007 Version 1.3.1, OpenFlow Switch Specification – OpenFlow-hybrid switches
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 8231, Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE
RFC 8253, PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element
Communication Protocol (PCEP)
RFC 8281, PCEP Extensions for PCE-initiated LSP Setup in a Stateful PCE Model
RFC 8408, Conveying Path Setup Type in PCE Communication Protocol (PCEP) Messages
RFC 8664, Path Computation Element Communication Protocol (PCEP) Extensions for Segment Routing
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol
RFC 2819, Remote Network Monitoring Management Information Base
RFC 2856, Textual Conventions for Additional High Capacity Data Types
RFC 2863, The Interfaces Group MIB
RFC 2864, The Inverted Stack Table Extension to the Interfaces Group MIB
RFC 2933, Internet Group Management Protocol MIB
RFC 3014, Notification Log MIB
RFC 3165, Definitions of Managed Objects for the Delegation of Management Scripts
RFC 3231, Definitions of Managed Objects for Scheduling Management Operations
RFC 3273, Remote Network Monitoring Management Information Base for High Capacity Networks
RFC 3410, Introduction and Applicability Statements for Internet Standard Management Framework
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management
Frameworks
RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
RFC 3413, Simple Network Management Protocol (SNMP) Applications
RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol
(SNMPv3)
RFC 3415, View-based Access Control Model (VACM) for the Simple Network Management Protocol
(SNMP)
RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)
RFC 3417, Transport Mappings for the Simple Network Management Protocol (SNMP) – SNMP over UDP
over IPv4
RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
RFC 3419, Textual Conventions for Transport Addresses
RFC 3498, Definitions of Managed Objects for Synchronous Optical Network (SONET) Linear Automatic
Protection Switching (APS) Architectures
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network
Management Framework
RFC 3592, Definitions of Managed Objects for the Synchronous Optical Network/Synchronous Digital
Hierarchy (SONET/SDH) Interface Type
RFC 3593, Textual Conventions for MIB Modules Using Performance History Based on 15 Minute Intervals
RFC 3635, Definitions of Managed Objects for the Ethernet-like Interface Types
RFC 3637, Definitions of Managed Objects for the Ethernet WAN Interface Sublayer
RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security
Model
RFC 3877, Alarm Management Information Base (MIB)
RFC 3895, Definitions of Managed Objects for the DS1, E1, DS2, and E2 Interface Types
RFC 3896, Definitions of Managed Objects for the DS3/E3 Interface Type
RFC 4001, Textual Conventions for Internet Network Addresses
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 4022, Management Information Base for the Transmission Control Protocol (TCP)
RFC 4113, Management Information Base for the User Datagram Protocol (UDP)
RFC 4220, Traffic Engineering Link Management Information Base
RFC 4273, Definitions of Managed Objects for BGP-4
RFC 4292, IP Forwarding Table MIB
RFC 4293, Management Information Base for the Internet Protocol (IP)
RFC 4631, Link Management Protocol (LMP) Management Information Base (MIB)
RFC 4878, Definitions and Managed Objects for Operations, Administration, and Maintenance (OAM)
Functions on Ethernet-Like Interfaces
RFC 7420, Path Computation Element Communication Protocol (PCEP) Management Information Base
(MIB) Module
RFC 7630, HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3
SFLOW-MIB revision 200309240000Z, sFlowMIB
7.35 Timing
GR-1244-CORE Issue 3, Clocks for the Synchronized Network: Common Generic Criteria
GR-253-CORE Issue 3, SONET Transport Systems: Common Generic Criteria
IEEE 1588-2008, IEEE Standard for a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems
ITU-T G.781, Synchronization layer functions
ITU-T G.813, Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.8261, Timing and synchronization aspects in packet networks
ITU-T G.8262, Timing characteristics of synchronous Ethernet equipment slave clock (EEC)
ITU-T G.8262.1, Timing characteristics of an enhanced synchronous Ethernet equipment slave clock
(eEEC)
ITU-T G.8264, Distribution of timing information through packet networks
ITU-T G.8265.1, Precision time protocol telecom profile for frequency synchronization
ITU-T G.8275.1, Precision time protocol telecom profile for phase/time synchronization with full timing
support from the network
RFC 3339, Date and Time on the Internet: Timestamps
RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
RFC 6038, Two-Way Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size
Features
RFC 8545, Well-Known Port Assignments for the One-Way Active Measurement Protocol (OWAMP) and
the Two-Way Active Measurement Protocol (TWAMP) – TWAMP
RFC 8762, Simple Two-Way Active Measurement Protocol – unauthenticated
RFC 8972, Simple Two-Way Active Measurement Protocol Optional Extensions – unauthenticated
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Router Configuration Guide Release 23.3.R1 Standards and protocol support
SPACER TEXT
Customer document and product support
Customer documentation
Customer documentation welcome page
Technical support
Product support portal
Documentation feedback
Customer documentation feedback