Getting started
About this guide
This guide describes details pertaining to Integrated Services Adapters (ISAs) and Extended Services Appliances (ESAs) and the services they provide. ISA may refer to ISA2 or an ESA-VM unless otherwise specified.
This guide is organized into functional chapters and provides concepts and descriptions of the implementation flow, as well as Command Line Interface (CLI) syntax and command usage.
The topics and commands described in this document apply to the:
-
7450 ESS
-
7750 SR
-
Virtualized Service Router
For a list of unsupported features by platform and chassis, and for services supported by ISAs and ESAs, see the SR OS R22.x.Rx Software Release Notes, part number 3HE 18412 000 x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ depending on supported functionality and user configuration.
-
7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
-
7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command Reference Guide (for both MD-CLI and Classic CLI)
-
7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
ISA and ESA configuration process
The ESA is specialized hardware that hosts ESA Virtual Machines (ESA-VMs). Each ESA-VM is configured as an integrated service type. ESA extends the proven Integrated Services Adapter (ISA) system implementation architecture and related control processing module (CPM) functions on the 7750 SR systems to include ESA-VM-based virtual ISA (v-ISA) functionality.
ISA and ESA configurations and supported features lists the ISA and ESA configurations with descriptions and their supported functionalities.
Configuration | Description | Supported features |
---|---|---|
mda type: isa2-aa esa vm-type: aa |
Application Assurance |
|
mda type: isa2-bb esa vm-type: bb |
Broadband |
|
mda type: isa2-tunnel esa vm-type: tunnel |
IP tunnels |
|
mda type: isa2-video |
Video |
|
Configuration details is a summary of the ISA and ESA virtual machines (ESA-VMs) guide structure by task. Specific configuration details for a software area, CLI syntax and command usage to configure parameters for each function are contained within each section.
Area | Task | Section |
---|---|---|
Application Assurance |
Configure Application Assurance entities |
|
IP tunnels |
Determine IPsec deployment requirements |
|
Configure IPsec |
||
L2TPV3 tunnels |
Configure the L2TPV3 control plane |
|
Configure public SAP |
||
Configure private SAP |
||
Video services |
Configure video services components |
|
Configure REF/FCC video components |
||
Network Address Translation |
Configure NAT on SR |
|
Configure NAT on VSR |
||
TCP MSS adjustment |
Configure TCP MSS adjustments for BB |
|
Configure TCP MSS adjustments for tunnel-ISA |
||
Configure AA TCP MSS adjustments |
Conventions
This section describes the general conventions used in this guide.
Precautionary and information messages
The following are information symbols used in the documentation.
Options or substeps in procedures and sequential workflows
Options in a procedure or a sequential workflow are indicated by a bulleted list. In the following example, at step 1, the user must perform the described action. At step 2, the user must perform one of the listed options to complete the step.
Options in a procedure
- User must perform this step.
- This step offers three options. User must perform one option to complete this
step.
- This is one option.
- This is another option.
- This is yet another option.
Substeps in a procedure or a sequential workflow are indicated by letters. In the following example, at step 1, the user must perform the described action. At step 2, the user must perform two substeps (a. and b.) to complete the step.
Substeps in a procedure
- User must perform this step.
- User must perform all substeps to complete this action.
- This is one substep.
- This is another substep.