s Commands – Part IV
src-access-list
src-access-list
Syntax
src-access-list list-name
no src-access-list list-name
Context
[Tree] (config>system>security>snmp src-access-list)
Full Context
configure system security snmp src-access-list
Description
This command configures a list of source IP addresses used to validate SNMPv1 and SNMPv2c requests after the list is associated with one or more SNMPv1 and SNMPv2c communities.
A source access list referenced by one or more community instances is used to verify the source IP addresses of an SNMP request using the community, regardless of the VPRN/VRF interface (or "Base” interface) on which the request arrived. For example, if an SNMP request arrives on an interface in VPRN "100" but the request is referencing a community, the source IP address in the packet is validated against the source address list configured for the community. This occurs regardless of whether the request is destined to a VPRN interface address and the VPRN has SNMP access enabled, or the request is destined to the base system address via GRT leaking. If the source IP address of the request message does not match the IP address of any of the src-host entries contained in the list, the request is discarded and logged as an SNMP authentication failure.
Using source access list validation can impact the time it takes for an SR OS node to reply to an SNMP request. Nokia recommends keeping the lists short by including only the addresses that are needed, and to place SNMP managers that send the highest volume of requests, such as the NSP NFM-P, at the top of the list.
A maximum of 16 source access lists can be configured. Each source access lists can contain a maximum of 16 source hosts.
The no form of this command removes the named source access list. Users cannot remove a source access list that is referenced by one or more community instances.
Parameters
- list-name
-
Specifies the name or key of the source access list. This parameter must begin with a letter (a-z or A-Z).
Platforms
All
src-gsn
src-gsn
Syntax
src-gsn ip address
src-gsn ip-prefix-list ip-prefix-list-name
no src-gsn
Context
[Tree] (config>app-assure>group>gtp>gtp-fltr>imsi-apn-fltr>entry src-gsn)
Full Context
configure application-assurance group gtp gtp-filter imsi-apn-filter entry src-gsn
Description
This command configures a matching condition for the GSN IP address. The IP address value is checked only against the source IP address of the GTP packets that contain an APN IE or an IMSI IE.
Parameters
- ip address
-
Specifies a valid unicast address associated with the IMSI-APN filter entry.
- ip-prefix-list-name
-
Specifies an IP address prefix list for the source IP address match criteria, up to 32 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-host
src-host
Syntax
src-host host-name address ip-address
no src-host host-name
Context
[Tree] (config>system>security>snmp>src-access-list src-host)
Full Context
configure system security snmp src-access-list src-host
Description
This command configures a source IP address entry used to validate SNMPv1 and SNMPv2c requests.
The no form of this command removes the specified entry.
Parameters
- host-name
-
Specifies a name for the entry, up to 32 characters.
- ip-address
-
Specifies an allowed IPv4 or IPv6 source address for SNMP requests.
Platforms
All
src-ip
src-ip
Syntax
src-ip {ip-address/mask | ip-address netmask}
src-ip {ipv6-address | prefix-length}
no src-ip
Context
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>egr-ipv6>entry>match src-ip)
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>egr-ip>entry>match src-ip)
Full Context
configure subscriber-mgmt category-map category exhausted-credit-service-level egress-ipv6-filter-entries entry match src-ip
configure subscriber-mgmt category-map category exhausted-credit-service-level egress-ip-filter-entries entry match src-ip
Description
This command configures the source IP match condition.
The no form of this command reverts to the default.
Parameters
- ipv6-address
-
Specifies the IPv6 address (applies only to the 7750 SR).
- prefix-length
-
Specifies the prefix length (applies only to the 7750 SR).
- ip-address/mask
-
Specifies the IPv4 address and mask.
- netmask
-
Specifies the mask, expressed as a dotted quad.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
src-ip
Syntax
src-ip ip-address
no src-ip
Context
[Tree] (config>redundancy>mc>peer>mcr>l3ring>node>cv src-ip)
Full Context
configure redundancy multi-chassis peer mc-ring l3-ring ring-node connectivity-verify src-ip
Description
This command specifies the source IP address used in ring-node connectivity verification of this ring node.
The no form of this command reverts to the default.
Parameters
- ip-address
-
Specifies the source IP address used in ring-node connectivity verification of this ring node.
Platforms
All
src-ip
Syntax
src-ip ip-address
no src-ip
Context
[Tree] (config>redundancy>mc>peer>mcr>node>cv src-ip)
Full Context
configure redundancy multi-chassis peer mc-ring ring ring-node connectivity-verify src-ip
Description
This command specifies the source IP address used in the ring-node connectivity verification of this ring node.
Default
no src-ip
Parameters
- ip-address
-
Specifies the source IP address.
Platforms
All
src-ip
Syntax
src-ip {eq | neq} ip-address
src-ip {eq | neq} ip-prefix-list ip-prefix-list-name
no src-ip
Context
[Tree] (config>app-assure>group>policy>aqp>entry>match src-ip)
Full Context
configure application-assurance group policy app-qos-policy entry match src-ip
Description
This command specifies a source TCP/UDP address to use as match criteria.
Default
no src-ip
Parameters
- eq
-
Specifies that a successful match occurs when the flow matches the specified address or prefix.
- neq
-
Specifies that a successful match occurs when the flow does not match the specified address or prefix.
- ip-address
-
Specifies a valid unicast address.
- ip-prefix-list-name
-
Specifies an IP prefix list name, up to 32 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-ip
Syntax
src-ip ip-address
src-ip ip-prefix-list ip-prefix-list-name
no src-ip
Context
[Tree] (config>app-assure>group>sess-fltr>entry>match src-ip)
Full Context
configure application-assurance group session-filter entry match src-ip
Description
This command specifies a source TCP/UDP address to use as match criteria.
Default
no src-ip
Parameters
- ip-address
-
Specifies a valid unicast address.
- ip-prefix-list-name
-
Specifies an IP prefix list name, up to 32 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-ip
Syntax
src-ip {eq | neq} ip-address
no src-ip
Context
[Tree] (debug>app-assure>group>traffic-capture>match src-ip)
Full Context
debug application-assurance group traffic-capture match src-ip
Description
This command configures debugging on a source IP address.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-ip
Syntax
src-ip {ip-address/mask | ip-address ipv4-address-mask}
Context
[Tree] (config>li>li-filter>li-ip-filter>entry>match src-ip)
Full Context
configure li li-filter li-ip-filter entry match src-ip
Description
This command configures source IP address LI filter match criterion.
The no form of this command removes any configured source IP. The match criterion is ignored.
Parameters
- ip-address
-
Specifies an address specified as dotted quad.
- mask
-
Specifies eight 16-bit hexadecimal pieces representing bit match criteria.
- ipv4-address-mask
-
Any mask expressed in dotted quad notation.
Platforms
All
src-ip
Syntax
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask}
no src-ip
Context
[Tree] (config>li>li-filter>li-ipv6-filter>entry>match src-ip)
Full Context
configure li li-filter li-ipv6-filter entry match src-ip
Description
This command configures source IPv6 address LI filter match criterion.
The no form of this command removes any configured source IPv6 address. The match criterion is ignored.
Parameters
- ipv6-address
-
Specifies an IPv6 address entered as:.
- prefix-length
-
Specifies a length.
- ipv6-address-mask
-
Specifies an IPv6 address mask expressed as:
Platforms
All
src-ip
Syntax
src-ip {ip-address/mask | ip-address [ipv4-address-mask] | ip-prefix-list prefix-list-name}
no src-ip
Context
[Tree] (config>qos>sap-egress>ip-criteria>entry>match src-ip)
[Tree] (config>qos>sap-ingress>ip-criteria>entry>match src-ip)
Full Context
configure qos sap-egress ip-criteria entry match src-ip
configure qos sap-ingress ip-criteria entry match src-ip
Description
This command configures a source IPv4 address range to be used as an SAP QoS policy match criterion.
To match on the source IPv4 or IPv6 address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 can also be used for IPv4.
The no form of this command removes the source IPv4 or IPv6 address match criterion.
Default
no src-ip
Parameters
- ip-address
-
Specifies the source IPv4 address specified in dotted decimal notation.
- mask
-
Specifies the length in bits of the subnet mask.
- ipv4-address-mask
-
Specifies the subnet mask in dotted decimal notation.
- prefix-list-name
-
Specifies the IPv4 prefix list name, a string of up to 32 printable ASCII characters. If the string contains special characters (#, ?, space), the entire string must be enclosed within double quotes.
Platforms
All
src-ip
Syntax
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list ipv6-prefix-list-name}
no src-ip
Context
[Tree] (config>qos>sap-ingress>ipv6-criteria>entry>match src-ip)
[Tree] (config>qos>sap-egress>ipv6-criteria>entry>match src-ip)
Full Context
configure qos sap-ingress ipv6-criteria entry match src-ip
configure qos sap-egress ipv6-criteria entry match src-ip
Description
This command configures a source IPv6 address range to be used as an SAP QoS policy match criterion.
To match on the source IPv6 address, specify the address and its associated mask, for example, 2001:db8:1000::/64.
The no form of this command removes the source IPv6 address match criterion.
Default
no src-ip
Parameters
- ipv6-address
-
Specifies the IPv6 address for the IP match criterion in hexadecimal digits.
- prefix-length
-
Specifies the IPv6 prefix length for the IPv6 address expressed as a decimal integer.
- ipv6-address-mask
-
Specifies the IPv6 address mask.
- ipv6-prefix-list-name
-
Specifies the IPv6 prefix list name, a string of up to 32 printable ASCII characters. If the string contains special characters (#, ?, space), the entire string must be enclosed within double quotes.
Platforms
All
src-ip
Syntax
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list ip-prefix-list-name}
src-ip {ipv6-address/mask | ipv6-address ipv6-address-mask | ipv6-prefix-list ipv6-prefix-list-name}
no src-ip
Context
[Tree] (config>qos>network>egress>ip-criteria>entry>match src-ip)
[Tree] (config>qos>network>egress>ipv6-criteria>entry>match src-ip)
[Tree] (config>qos>network>ingress>ip-criteria>entry>match src-ip)
[Tree] (config>qos>network>ingress>ipv6-criteria>entry>match src-ip)
Full Context
configure qos network egress ip-criteria entry match src-ip
configure qos network egress ipv6-criteria entry match src-ip
configure qos network ingress ip-criteria entry match src-ip
configure qos network ingress ipv6-criteria entry match src-ip
Description
This command configures a source IPv4 or IPv6 address range to be used as a network QoS policy match criterion.
To match on the source IPv4 or IPv6 address, specify the address and its associated mask, for example, when specifying an IPv4 address, 10.1.0.0/16 or 10.1.0.0 255.255.0.0 can be used.
The no form of this command removes the source IPv4 or IPv6 address match criterion.
Parameters
- ip-address
-
Specifies the source IPv4 address specified in dotted decimal notation.
- mask
-
Specifies the length in bits of the subnet mask.
- ipv4-address-mask
-
Specifies the subnet mask in dotted decimal notation.
- ip-prefix-list-name
-
Specifies an IPv4 prefix list which contains IPv4 address prefixes to be matched.
- ipv6-address
-
Specifies the IPv6 prefix for the IP match criterion in hex digits.
- mask
-
Specifies the length of the ipv6-address expressed as a decimal integer.
- ipv6-address-mask
-
Specifies the eight 16-bit hexadecimal pieces representing bit match criteria.
- ipv6-prefix-list-name
-
Specifies an IPv6 prefix list which contains IPv6 address prefixes to be matched.
Platforms
All
src-ip
Syntax
IPv4:
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
IPv6:
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
no src-ip
Context
[Tree] (config>filter>ipv6-exception>entry>match src-ip)
[Tree] (config>filter>ip-exception>entry>match src-ip)
[Tree] (config>filter>ipv6-filter>entry>match src-ip)
Full Context
configure filter ipv6-exception entry match src-ip
configure filter ip-exception entry match src-ip
configure filter ipv6-filter entry match src-ip
Description
This command configures a source IPv4 or IPv6 address range to be used as an IP filter or IP exception match criterion.
To match on the source IPv4 or IPv6 address, specify the address and its associated mask, for example, 10.1.0.0/16 for IPv4. The conventional notation of 10.1.0.0 255.255.0.0 may also be used for IPv4.
The no form of the command removes the source IP address match criterion.
Default
no src-ip
Parameters
- ip-address
-
Specifies the destination IPv4 address specified in dotted decimal notation.
- mask
-
Specifies the length in bits of the subnet mask.
- ipv4-address-mask
-
Specifies the subnet mask in dotted decimal notation.
- ip-prefix-listoripv6-prefix-list prefix-list-name
-
Specifies to use a list of IP prefixes, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
- ipv6-address
-
Specifies an IPv6 prefix for the IP match criterion in hex digits.
- prefix-length
-
Specifies whether a the IPv6 prefix length for the specified ipv6-address expressed as a decimal integer.
- ipv6-address-mask
-
Specifies eight 16-bit hexadecimal pieces representing bit match criteria.
Platforms
VSR
- configure filter ip-exception entry match src-ip
- configure filter ipv6-exception entry match src-ip
All
- configure filter ipv6-filter entry match src-ip
src-ip
Syntax
src-ip ip-prefix[/mask] [netmask]
src-ip ip-prefix-list ip-prefix-list-name
no src-ip
Context
[Tree] (config>system>security>mgmt-access-filter>ip-filter>entry src-ip)
Full Context
configure system security management-access-filter ip-filter entry src-ip
Description
This command configures a source IP address range or an IP prefix list to be used as a management access filter match criterion.
The no form of this command removes the source IP address match criterion.
Default
no src-ip
Parameters
- ip-prefix
-
Specifies the IP prefix for the IP match criterion in dotted decimal notation.
- mask
-
Specifies the subnet mask length expressed as a decimal integer.
- netmask
-
Specifies the dotted quad equivalent of the mask length.
- ip-prefix-list-name
-
Specifies the IP prefix list used as a match criterion for the source IP address. It is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes .
Platforms
All
src-ip
Syntax
src-ip ipv6-address/prefix-length
src-ip ipv6-prefix-list ipv6-prefix-list-name
no src-ip
Context
[Tree] (config>system>security>mgmt-access-filter>ipv6-filter>entry src-ip)
Full Context
configure system security management-access-filter ipv6-filter entry src-ip
Description
This command configures a source IPv6 address range or an IPv6 prefix list to be used as a management access filter match criterion. This command only applies to the 7750 SR and 7950 XRS.
The no form of this command removes the source IPv6 address match criterion.
Default
no src-ip
Parameters
- ipv6-address/prefix-length
-
Specifies the IPv6 address for the IPv6 match criterion in dotted decimal notation. An IPv6 IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
- ipv6-prefix-list-name
-
Specifies the IPv6 prefix list used a match criterion for the source IP address. It is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes .
Platforms
All
src-ip
Syntax
src-ip [ipv6-address/ prefix-length | ip-prefix-list prefix-list-name]
no src-ip
Context
[Tree] (cfg>sys>sec>cpm>ip-filter>entry>match src-ip)
Full Context
configure system security cpm-filter ip-filter entry match src-ip
Description
This command specifies the IP address to match the source IP address of the packet.
To match on the source IP address, specify the address and its associated mask, such as 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of this command removes the source IP address match criterion.
Default
no src-ip
Parameters
- ipv6-address/prefix-length
-
Specifies the IP address for the match criterion in dotted decimal notation. An IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
- ip-prefix-list
-
Creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.
- ip-prefix-list-name
-
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-ip
Syntax
src-ip [ip-address/mask | ipv6-prefix-list ipv6-prefix-list-name]
no src-ip
Context
[Tree] (cfg>sys>sec>cpm>ipv6-filter>entry>match src-ip)
Full Context
configure system security cpm-filter ipv6-filter entry match src-ip
Description
This command specifies the IPv6 address to match the source IPv6 address of the packet.
To match on the source IP address, specify the address and its associated mask, such as 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of this command removes the source IP address match criterion.
This command only applies to the 7750 SR and 7950 XRS.
Default
no src-ip
Parameters
- ip-address/mask
-
Specifies the IP address for the match criterion in dotted decimal notation. An IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
- ipv6-prefix-list
-
Creates a list of IPv6 prefixes for match criteria in IPv6 ACL and CPM filter policies.
- ipv6-prefix-list-name
-
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-ip-address
src-ip-address
Syntax
src-ip-address ip-address
no src-ip-address
Context
[Tree] (config>saa>test>type-multi-line>lsp-ping src-ip-address)
[Tree] (config>saa>test>type-multi-line>lsp-trace>sr-policy src-ip-address)
[Tree] (config>saa>test>type-multi-line>lsp-ping>sr-policy src-ip-address)
Full Context
configure saa test type-multi-line lsp-ping src-ip-address
configure saa test type-multi-line lsp-trace sr-policy src-ip-address
configure saa test type-multi-line lsp-ping sr-policy src-ip-address
Description
This command configures the source IP address. This option is used when an OAM packet must be generated from a different address than the node’s system interface address. For example, when the OAM packet is sent over an LDP LSP and the LDP LSR-ID of the corresponding LDP session to the next hop is set to an address other than the system interface address.
The no form of this command removes the configuration.
Parameters
- ip-address
-
Specifies the source IP address.
Platforms
All
src-ipv4-address
src-ipv4-address
Syntax
src-ipv4-address a.b.c.d
no src-ipv4-address
Context
[Tree] (debug>oam>build-packet>packet>field-override>header>ipv4 src-ipv4-address)
[Tree] (config>test-oam>build-packet>header>ipv4 src-ipv4-address)
Full Context
debug oam build-packet packet field-override header ipv4 src-ipv4-address
configure test-oam build-packet header ipv4 src-ipv4-address
Description
This command defines the source IPv4 address to be used in the IPv4 header.
The no form of this command removes the source IPv4 address.
Default
src-ipv4-address 0.0.0.0
Parameters
- a.b.c.d
-
Specifies the IPv4 source address to be used in the IPv4 header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-ipv6-address
src-ipv6-address
Syntax
src-ipv6-address ipv6-address
no src-ipv6-address
Context
[Tree] (debug>oam>build-packet>packet>field-override>header>ipv6 src-ipv6-address)
[Tree] (config>test-oam>build-packet>header>ipv6 src-ipv6-address)
Full Context
debug oam build-packet packet field-override header ipv6 src-ipv6-address
configure test-oam build-packet header ipv6 src-ipv6-address
Description
This command defines the source IPv6 address to be used in the IPv6 header.
The no form of the removes the source IPv6 address.
Parameters
- ipv6-address
-
Specifies the IPv6 source address to be used in the IPv6 header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-mac
src-mac
Syntax
src-mac ieee-address
no src-mac
Context
[Tree] (config>redundancy>mc>peer>mcr>l3ring>node>cv src-mac)
Full Context
configure redundancy multi-chassis peer mc-ring l3-ring ring-node connectivity-verify src-mac
Description
This command specifies the source MAC address used for the ring-node connectivity verification of this ring node.
If all zeros are specified, the MAC address of the system management processor (CPM) is used.
The no form of this command reverts to the default.
Parameters
- ieee-address
-
Specifies the 48-bit MAC address for the static ARP in the form aa:bb:cc:dd:ee:ff or aa-bb-cc-dd-ee-ff where aa, bb, cc, dd, ee, and ff are hexadecimal numbers. Allowed values are any non-broadcast, non-multicast MAC and non-IEEE reserved MAC addresses.
Platforms
All
src-mac
Syntax
src-mac ieee-address
no src-mac
Context
[Tree] (config>redundancy>mc>peer>mcr>node>cv src-mac)
Full Context
configure redundancy multi-chassis peer mc-ring ring ring-node connectivity-verify src-mac
Description
This command specifies the source MAC address used for the Ring-Node Connectivity Verification of this ring node.
A value of all zeros (000000000000 H (0:0:0:0:0:0)) specifies that the MAC address of the system management processor (CPM) is used.
Default
no src-mac
Parameters
- ieee-address
-
Specifies the source MAC address.
Platforms
All
src-mac
Syntax
src-mac ieee-address [ieee-address-mask]
no src-mac
Context
[Tree] (config>li>li-filter>li-mac-filter>entry>match src-mac)
Full Context
configure li li-filter li-mac-filter entry match src-mac
Description
This command configures a source MAC address or range to be used as a MAC filter match criterion.
The no form of this command removes the source mac as the match criteria.
Parameters
- ieee-address
-
Specifies the 48-bit IEEE mac address to be used as a match criterion.
- ieee-address-mask
-
Specifies a 48-bit mask. The following table describes the format styles to configure the 48-bit mask.
Table 1. Format Styles to Configure Mask Format Style
Format Syntax
Example
Decimal
DDDDDDDDDDDDDD
281474959933440
Hexadecimal
0xHHHHHHHHHHHH
0x0FFFFF000000
Binary
0bBBBBBBB...B
0b11110000...B
To configure so that all packets with a source MAC OUI value of 00-03-FA are subject to a match condition then the entry should be specified as: 003FA000000 0xFFFFFF000000
Platforms
All
src-mac
Syntax
src-mac ieee-address [ieee-address-mask]
no src-mac
Context
[Tree] (config>qos>sap-ingress>mac-criteria>entry>match src-mac)
Full Context
configure qos sap-ingress mac-criteria entry match src-mac
Description
This command configures a source MAC address or range to be used as a service ingress QoS policy match criterion.
The no form of this command removes the source mac as the match criteria.
Default
no src-mac
Parameters
- ieee-address
-
Enter the 48-bit IEEE MAC address to be used as a match criterion.
- ieee-address-mask
-
This 48-bit mask can be configured using the following formats:
Table 2. Format Styles to Configure Mask Format Style
Format Syntax
Example
Decimal
DDDDDDDDDDDDDD
281474959933440
Hexadecimal
0xHHHHHHHHHHHH
0x0FFFFF000000
Binary
0bBBBBBBB...B
0b11110000...B
To configure all packets with a source MAC OUI value of 00-03-FA to be subject to a match condition, the entry should be specified as: 003FA000000 0xFFFFFF000000
Platforms
All
src-mac
Syntax
src-mac ieee-address [ieee-address-mask]
no src-mac
Context
[Tree] (config>filter>ip-filter>entry>match src-mac)
[Tree] (config>filter>ipv6-filter>entry>match src-mac)
[Tree] (config>filter>mac-filter>entry>match src-mac)
Full Context
configure filter ip-filter entry match src-mac
configure filter ipv6-filter entry match src-mac
configure filter mac-filter entry match src-mac
Description
Configures a source MAC address or range to be used as a MAC filter match criterion.
The no form of the command removes the source mac as the match criteria.
Default
no src-mac
Parameters
- ieee-address
-
Specifies the 48-bit IEEE MAC address to be used as a match criterion.
- ieee-address-mask
-
Specifies the 48-bit mask to match a range of MAC address values.
To configure so that all packets with a source MAC OUI value of 00:03:FA are subject to a match condition then the entry should be specified as: 00:03:FA:00:00:00 FF:FF:FF:00:00:00
Platforms
All
src-mac
Syntax
src-mac ieee-address [ieee-address-mask]
no src-mac
Context
[Tree] (config>system>security>mgmt-access-filter>mac-filter>entry>match src-mac)
Full Context
configure system security management-access-filter mac-filter entry match src-mac
Description
This command configures a source MAC address or range to be used as a MAC filter match criterion.
The no form of this command removes the source mac as the match criteria.
Default
no src-mac
Parameters
- ieee-address
-
Specifies the 48-bit IEEE mac address to be used as a match criterion.
- ieee-address-mask
-
Specifies a 48-bit mask that can be configured using the formats listed in ieee-address-mask Formats:
Table 3. ieee-address-mask Formats Format Style
Format Syntax
Example
Decimal
DDDDDDDDDDDDDD
281474959933440
Hexadecimal
0xHHHHHHHHHHHH
0x0FFFFF000000
Binary
0bBBBBBBB...B
0b11110000...B
To configure so that all packets with a source MAC OUI value of 00-03-FA are subject to a match condition then the entry should be specified as: 003FA000000 0xFFFFFF000000
Platforms
All
src-mac-address
src-mac-address
Syntax
src-mac-address ieee-address
no src-mac-address
Context
[Tree] (debug>oam>build-packet>packet>field-override>header>ethernet src-mac-address)
[Tree] (config>test-oam>build-packet>header>ethernet src-mac-address)
Full Context
debug oam build-packet packet field-override header ethernet src-mac-address
configure test-oam build-packet header ethernet src-mac-address
Description
This command defines the source MAC address for the Ethernet header.
The no form of this command deletes the configured MAC address.
Default
no override
Parameters
- ieee-address
-
Specifies the source Ethernet MAC address to be used in the Ethernet header. Specifies the 48-bit MAC address.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-port
src-port
Syntax
src-port {lt | gt | eq} src-port-number
src-port range start end
no src-port
Context
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>ingr-ip>entry>match src-port)
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>ingr-ipv6>entry>match src-port)
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>egr-ipv6>entry>match src-port)
[Tree] (config>subscr-mgmt>cat-map>category>exh-lvl>egr-ip>entry>match src-port)
Full Context
configure subscriber-mgmt category-map category exhausted-credit-service-level ingress-ip-filter-entries entry match src-port
configure subscriber-mgmt category-map category exhausted-credit-service-level ingress-ipv6-filter-entries entry match src-port
configure subscriber-mgmt category-map category exhausted-credit-service-level egress-ipv6-filter-entries entry match src-port
configure subscriber-mgmt category-map category exhausted-credit-service-level egress-ip-filter-entries entry match src-port
Description
This command configures the source port match condition.
The no form of this command reverts to the default.
Parameters
- lt | gt | eq
-
Specifies the operators.
- src-port-number
-
Specifies the source port number as a decimal hex or binary.
- dst-port-number
-
Specifies the destination port number as a decimal hex or binary.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
src-port
Syntax
src-port {eq | neq} port-num
src-port {eq | neq} port-list port-list-name
src-port {eq | neq} range start-port-num end-port-num
no src-port
Context
[Tree] (config>app-assure>group>policy>aqp>entry>match src-port)
Full Context
configure application-assurance group policy app-qos-policy entry match src-port
Description
This command specifies a source IP port, source port list, or source range to use as match criteria.
The no form of this command removes the parameters from the configuration.
Default
no src-port
Parameters
- eq
-
Specifies that a successful match occurs when the flow matches the specified port.
- neq
-
Specifies that a successful match occurs when the flow does not match the specified port.
- port-num
-
Specifies the source port number.
- start-port-num end-port-num
-
Specifies the start or end source port number.
- port-list-name
-
Specifies a named port-list, up to 32 characters, containing a set of ports or ranges of ports.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-port
Syntax
src-port {eq | gt | lt} port-num
src-port port-list port-list-name
src-port range start-port-num end-port-num
no src-port
Context
[Tree] (config>app-assure>group>sess-fltr>entry>match src-port)
Full Context
configure application-assurance group session-filter entry match src-port
Description
This command specifies a source IP port, source port list, or source range to use as match criteria.
The no form of this command removes the parameters from the configuration.
Default
no src-port
Parameters
- eq
-
Specifies that a successful match occurs when the flow matches the specified port.
- gt
-
Specifies all port numbers greater than the port-number match.
- lt
-
Specifies all port numbers less than the port-number match.
- port-num
-
Specifies the source port number.
- start-port-num end-port-num
-
Specifies the start or end source port number.
- port-list-name
-
Specifies a named port-list, up to 32 characters, containing a set of ports or ranges of ports.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-port
Syntax
src-port {eq | neq} port-num
no src-port
Context
[Tree] (debug>app-assure>group>traffic-capture>match src-port)
Full Context
debug application-assurance group traffic-capture match src-port
Description
This command configures debugging on a source port.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
src-port
Syntax
src-port {lt | gt | eq} src-port-number
src-port range src-port-number src-port-number
no src-port
Context
[Tree] (config>li>li-filter>li-ip-filter>entry>match src-port)
[Tree] (config>li>li-filter>li-ipv6-filter>entry>match src-port)
Full Context
configure li li-filter li-ip-filter entry match src-port
configure li li-filter li-ipv6-filter entry match src-port
Description
This command configures a source TCP or UDP port number or port range for an IP LI filter match criterion. Note that an entry containing Layer 4 match criteria will not match non-initial (second, third, and so on) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.
The no form of this command removes the source port match criterion.
Parameters
- lt
-
Specifies all port numbers less than src-port-number match.
- gt
-
Specifies all port numbers greater than src-port-number match.
- eq
-
Specifies that src-port-number must be an exact match.
- src-port-number
-
Specifies the source port number to be used as a match criteria expressed as a decimal integer.
Platforms
All
src-port
Syntax
src-port {lt | gt | eq} src-port-number
src-port range start end
no src-port
Context
[Tree] (config>qos>sap-egress>ip-criteria>entry>match src-port)
[Tree] (config>qos>sap-ingress>ipv6-criteria>entry>match src-port)
[Tree] (config>qos>sap-egress>ipv6-criteria>entry>match src-port)
[Tree] (config>qos>sap-ingress>ip-criteria>entry>match src-port)
Full Context
configure qos sap-egress ip-criteria entry match src-port
configure qos sap-ingress ipv6-criteria entry match src-port
configure qos sap-egress ipv6-criteria entry match src-port
configure qos sap-ingress ip-criteria entry match src-port
Description
This command configures a source TCP or UDP port number or port range for a SAP QoS policy match criterion.
The no form of this command removes the source port match criterion.
Default
no src-port
Parameters
- {lt | gt | eq} src-port-number
-
The TCP or UDP port numbers to match, specified as less than (lt), greater than (gt), or equal to (eq) to the source port value, specified as a decimal integer.
- range startend
-
The range of TCP or UDP port values to match, specified as between the start and end source port values inclusive.
Platforms
All
src-port
Syntax
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range start end
no src-port
Context
[Tree] (config>qos>network>ingress>ip-criteria>entry>match src-port)
[Tree] (config>qos>network>egress>ipv6-criteria>entry>match src-port)
[Tree] (config>qos>network>egress>ip-criteria>entry>match src-port)
[Tree] (config>qos>network>ingress>ipv6-criteria>entry>match src-port)
Full Context
configure qos network ingress ip-criteria entry match src-port
configure qos network egress ipv6-criteria entry match src-port
configure qos network egress ip-criteria entry match src-port
configure qos network ingress ipv6-criteria entry match src-port
Description
This command configures a source TCP or UDP port number, port range, or a port list for a network QoS policy match criterion.
The no form of this command removes the source port match criterion.
Default
no src-port
Parameters
- lt
-
Keyword used to specify TCP or UDP port numbers to match that are less than the source port value.
- gt
-
Keyword used to specify TCP or UDP port numbers to match that are greater than the source port value.
- eq
-
Keyword used to specify TCP or UDP port numbers to match that are equal to the source port value.
- src-port-number
-
The source port value, specified as a decimal integer.
- port-list-name
-
Specifies a port list name, up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
- start
-
Specifies the starting range of TCP or UDP source port values to match.
- end
-
Specifies the end range of TCP or UDP source port values to match.
Platforms
All
src-port
Syntax
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
no src-port
Context
[Tree] (config>filter>ip-exception>entry>match src-port)
[Tree] (config>filter>ipv6-filter>entry>match src-port)
[Tree] (config>filter>ip-filter>entry>match src-port)
[Tree] (config>filter>ipv6-exception>entry>match src-port)
Full Context
configure filter ip-exception entry match src-port
configure filter ipv6-filter entry match src-port
configure filter ip-filter entry match src-port
configure filter ipv6-exception entry match src-port
Description
This command configures a source TCP, UDP, or SCTP port number, port range, or port match list for an IP filter or IP exception match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "src-port eq 0" match criterion, may match non-initial fragments when the source port value is not present in a packet fragment and other match criteria are also met.
The no form of the command removes the source port match criterion.
Default
no src-port
Parameters
- lt | gt | eq
-
Specifies the operator to use relative to src-port-number for specifying the port number match criteria.
lt specifies that all port numbers less than src-port-number match.
gt specifies that all port numbers greater than src-port-number match.
eq specifies that src-port-number must be an exact match.
- src-port-number
-
Specifies the source port number to be used as a match criteria expressed as a decimal integer, and in hexadecimal or binary format. Below shows decimal integer only.
- port-list-name
-
Specifies to use a list of ports referred to by port-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
- src-port-number src-port-number
-
Specifies inclusive port range between two src-port-number values.
Platforms
VSR
- configure filter ipv6-exception entry match src-port
- configure filter ip-exception entry match src-port
All
- configure filter ip-filter entry match src-port
- configure filter ipv6-filter entry match src-port
src-port
Syntax
src-port {port-id | cpm | lag lag-id}
no src-port
Context
[Tree] (config>system>security>mgmt-access-filter>ipv6-filter>entry src-port)
[Tree] (config>system>security>mgmt-access-filter>ip-filter>entry src-port)
Full Context
configure system security management-access-filter ipv6-filter entry src-port
configure system security management-access-filter ip-filter entry src-port
Description
This command restricts ingress management traffic to either the CPM/CCM Ethernet port or any other logical port (for example LAG) on the device.
When the source interface is configured, only management traffic arriving on those ports satisfy the match criteria.
The no form of this command reverts to the default value.
Default
no src-port
Parameters
- port-id
-
Specifies the port ID in formats shown below.
- cpm
-
Matches any traffic received on any Ethernet port.
- lag-id
-
Specifies the LAG identifier.
Platforms
All
src-port
Syntax
src-port tcp/udp port-number [mask]
scr-port port-list port-list-name
scr-port range tcp/udp port-number tcp/udp port-number
no scr-port
Context
[Tree] (cfg>sys>sec>cpm>ip-filter>entry>match src-port)
[Tree] (cfg>sys>sec>cpm>ipv6-filter>entry>match src-port)
Full Context
configure system security cpm-filter ip-filter entry match src-port
configure system security cpm-filter ipv6-filter entry match src-port
Description
This command specifies the TCP/UDP port to match the source port of the packet.
An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.
Default
no src-port
Parameters
- tcp/udp port-number
-
Specifies the source port number to be used as a match criteria expressed as a decimal integer.
- port-list-name
-
Specifies the port list name to be used as a match criteria for the destination port.
- mask
-
Specifies the 16 bit mask to be applied when matching the destination port.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-prefix
src-prefix
Syntax
src-prefix ip-address/mask [ip-address/mask]
no src-prefix ip-address/mask
Context
[Tree] (config>service>vprn>mvpn>red-source-list src-prefix)
Full Context
configure service vprn mvpn red-source-list src-prefix
Description
This command configures multicast source IPv4 prefixes for preferred source selection. Single or multi-line inputs are allowed.
The no form of this command deletes specified prefix from the list.
Default
No prefixes are specified.
Parameters
- ip-address/mask
-
IPv4 address prefix with mask. Up to 8 maximum.
Platforms
All
src-prefix
Syntax
src-prefix ipv6-ip-address/prefix-length [ ipv6-address/prefix-length]
no ipv6-ip-address/prefix-length
Context
[Tree] (config>service>vprn>mvpn>red-source-list>ipv6 src-prefix)
Full Context
configure service vprn mvpn red-source-list ipv6 src-prefix
Description
This command configures multicast source IPv6 prefixes for preferred source selection. Single or multi-line inputs are allowed.
The no form of this command deletes specified prefix from the list
Default
No prefixes are specified.
Parameters
- ipv6-ip-address/mask
-
IPv6 address prefix with prefix-length. Up to 8 maximum.
Platforms
All
src-route-option
src-route-option
Syntax
src-route-option {true | false}
no source-route-option
Context
[Tree] (config>filter>ip-filter>entry>match src-route-option)
Full Context
configure filter ip-filter entry match src-route-option
Description
This command enables source route option match conditions. When enabled, this filter should match if a (strict or loose) source route option is present/not present at any location within the IP header, as per the value of this object. The no form of the command removes the criterion from the match entry.
Default
no src-route-option
Parameters
- true
-
Enables source route option match conditions.
- false
-
Disables source route option match conditions.
Platforms
All
src-tcp-port
src-tcp-port
Syntax
src-tcp-port tcp-port
no src-tcp-port
Context
[Tree] (config>test-oam>build-packet>header>tcp src-tcp-port)
Full Context
configure test-oam build-packet header tcp src-tcp-port
Description
This command defines the source TCP port to be used in the test TCP header.
The no form of this command reverts to the default.
Default
src-tcp-port 0
Parameters
- tcp-port
-
Specifies the source TCP port to be used in the test TCP header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-tcp-port
Syntax
src-tcp-port tcp-port
no src-tcp-port
Context
[Tree] (debug>oam>build-packet>packet>field-override>header>tcp src-tcp-port)
Full Context
debug oam build-packet packet field-override header tcp src-tcp-port
Description
This command defines the source TCP port to be used in the TCP header.
The no form of this command reverts to the default.
Default
no override
Parameters
- tcp-port
-
Specifies the source TCP port to be used in the test TCP header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-udp-port
src-udp-port
Syntax
src-udp-port udp-port
no src-udp-port
Context
[Tree] (config>test-oam>build-packet>header>udp src-udp-port)
Full Context
configure test-oam build-packet header udp src-udp-port
Description
This command defines the source UDP port to be used in the test UDP header.
The no form of this command reverts to the default.
Default
src-udp-port 0
Parameters
- udp-port
-
Specifies the source UDP port to be used in the test UDP header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-udp-port
Syntax
src-udp-port udp-port
no src-udp-port
Context
[Tree] (debug>oam>build-packet>packet>field-override>header>udp src-udp-port)
Full Context
debug oam build-packet packet field-override header udp src-udp-port
Description
This command defines the source UDP port to be used in the UDP header.
The no form of this command reverts to the default.
Default
no override
Parameters
- udp-port
-
Specifies the source UDP port to be used in the UDP header.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-udp-port
Syntax
src-udp-port port-number
no src-udp-port
Context
[Tree] (config>test-oam>link-meas>template>twl src-udp-port)
Full Context
configure test-oam link-measurement measurement-template twamp-light src-udp-port
Description
This command configures a source UDP port to be used by the link measurement tests linked to this template.
Unless required, Nokia suggests that the link measurement dynamically select an available source UDP port from the dynamic range. Before a UDP port in the configurable range can be configured as a source it must be owned by the application. Use the config>test-oam>twamp>twamp-light> source-udp-port-pools>port>pool-type command to map the port range to the application.
To use a source port in this range for link-measurement, the selected port number must have a pool-type link-measurement configured. The source UDP port must be owned by the application prior to the configuration under the application. A configured source-udp-port cannot be used when multiple tests are configured between the same source IP, destination IP and destination UDP port. A conflict may occur when non-unique addressing is used between two peers. A conflicting situation may occur when tests between peers are using IPv6 discovery and the link-local addresses on both nodes are the same. Other conflicts exist, such as, multiple tests between peers using the same source and destination IP system address instead of an interface address. When this condition exists, the operational state of the link-measurement test is operationally down with a failure condition UdpPortUnavailable.
The no form of the command removes the port number from the link measurement template.
Default
no src-udp-port
Parameters
- port-number
-
Specifies the source UDP port number.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
src-udp-port
Syntax
src-udp-port port-number
no src-udp-port
Context
[Tree] (config>test-oam>lag-meas>template>twl src-udp-port)
Full Context
configure test-oam lag-ip-measurement lag-ip-measurement-template twamp-light src-udp-port
Description
This command configures the source UDP port for the test packets. When a port is not specified using this command, the system dynamically allocates the UDP port from the dynamic range. This command should only be specified when required for interoperability. Otherwise, the default allocation from the dynamic range should be used.
The no form of this command allocates the source UDP port from the dynamic range.
Default
no src-udp-port
Parameters
- port-number
-
Specifies the source UDP port number.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
srefresh
srefresh
Syntax
srefresh [detail]
no srefresh
Context
[Tree] (debug>router>rsvp>packet srefresh)
Full Context
debug router rsvp packet srefresh
Description
This command debugs srefresh packets.
The no form of the command disables the debugging.
Parameters
- detail
-
Displays detailed information about srefresh packets.
Platforms
All
srh-mode
srh-mode
Syntax
srh-mode srh-mode
no srh-mode
Context
[Tree] (conf>router>segment-routing>srv6>ms-locator>un srh-mode)
[Tree] (config>router>segment-routing>srv6>inst>loc>func>end srh-mode)
[Tree] (config>router>segment-routing>srv6>inst>loc>func>end-x srh-mode)
[Tree] (config>router>segment-routing>srv6>inst>ms-loc>func>ua srh-mode)
Full Context
configure router segment-routing segment-routing-v6 micro-segment-locator un srh-mode
configure router segment-routing segment-routing-v6 base-routing-instance locator function end srh-mode
configure router segment-routing segment-routing-v6 base-routing-instance locator function end-x srh-mode
configure router segment-routing segment-routing-v6 base-routing-instance micro-segment-locator function ua srh-mode
Description
This command configures the SRH penultimate or ultimate pop mode, as well as the ultimate decapsulation mode, for the SID.
The no form of this command reverts to the default value.
Default
srh-mode psp
Parameters
- srh-mode
-
Specifies the SRH mode for the SID.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srlb
srlb
Syntax
srlb reserved-label-block-name
no srlb
Context
[Tree] (config>router>isis>segm-rtng srlb)
[Tree] (config>router>ospf>segm-rtng srlb)
Full Context
configure router isis segment-routing srlb
configure router ospf segment-routing srlb
Description
This command specifies the reserved label block to use for the Segment Routing Local Block (SRLB) for the specified IS-IS or OSPF instance. The named reserved label block must already have been configured under config>router>mpls>mpls-labels.
The no form of this command removes an SRLB.
Parameters
- reserved-label-block-name
-
Specifies the name of the reserved label block, up to 64 characters.
Platforms
All
srlg
srlg
Syntax
[no] srlg
Context
[Tree] (config>router>mpls>lsp>secondary srlg)
Full Context
configure router mpls lsp secondary srlg
Description
This command enables the use of the SRLG constraint in the computation of a secondary path for an LSP at the head-end LER. The command is configurable for both RSVP-TE and SR-TE LSPs.
When SRLG is enabled, CSPF includes the SRLG constraint in the computation of the secondary LSP path if path-computation-method local-cspf is configured on the LSP. CSPF returns the list of SRLG groups along with the ERO during primary path CSPF computation. At a subsequent establishment of a secondary path with the SRLG constraint, the MPLS task again queries CSPF by providing the list of SRLG group numbers to be avoided. CSPF prunes all links with interfaces that belong to the same SRLGs as the interfaces included in the ERO of the primary path. If CSPF finds a path, the secondary path is set up. If a path is not found, MPLS keeps retrying the requests to CSPF.
An SRLG enabled secondary or standby path of the LSP configured with a value of the path-computation-method command other than local-cspf remains operationally down with a failure code of srlgPrimaryCspfDisabled(25).
When an LSP is administratively enabled, the SRLG-enabled secondary path is not tried if the first attempt to bring up the primary path is in progress. The SRLG enabled secondary path is kept down temporarily with failure code srlgPrimaryPathDown(26). After this first attempt, MPLS begins setting up the SRLG-enabled standby paths. If primary path computation fails or primary path was not configured, MPLS requests CSPF to compute the secondary path using an empty primary SRLG list. The SRLG disjoint state field shows True in this scenario.
If the primary path is re-optimized, has undergone MBB, or has come back up after being down, the MPLS task check determines if any SRLG secondary paths should be re-signaled. If MPLS finds that a secondary path is no longer SRLG disjointed, and therefore becomes ineligible, MPLS puts it on a delayed MBB immediately after the expiry of the retry timer. If MBB fails at the first try, the secondary path is torn down and the path is put on retry if not active. If the secondary path is active, then it is only torn down and resignaled when the primary path is activated. The secondary path can remain active even when ineligible while the revert timer to activate the primary path is still running.
If the primary goes down while active, the LSP uses the path of an eligible SRLG secondary path if it is up. If all secondary eligible SRLG paths are down, MPLS uses a non-SRLG secondary path, if configured and up. While the LSP is using a non-SRLG secondary path, if an eligible SRLG secondary path comes back up, MPLS switches the path of the LSP to the eligible SRLG secondary path. As soon as a path for the primary is successfully computed by CSPF, MPLS schedules the delay retry MBB for the secondary path using the new SRLG list.
If the primary path goes down while inactive, for example it is waiting for the revert timer to expire, MPLS resets the SRLG list of the primary to empty and changes the state of all secondary paths, including the currently active one, to the Disjointed state. A delay retry MBB is still performed but results in no change to the active secondary path.
A secondary path that becomes ineligible as a result of an update to the SRLG membership list of the primary path has the ineligibility status removed on any of the following events:
-
a successful delay retry MBB of the secondary SRLG path that makes it eligible again
-
the secondary path goes down. MPLS puts the standby on retry at the expiry of the retry timer. If successful, it becomes eligible. If not successful after the retry-timer expires or the number of retries reached the number configured under the retry-limit parameter, it is left down.
Once the primary path of the LSP is set up and is operationally up, any subsequent changes to the SRLG group membership of an interface that the primary path is using is not considered until the next opportunity the primary path is re-signaled. The primary path may be re-signaled due to a failure or to a make-before-break operation. Make-before-break occurs as a result of a global revertive operation, a timer based or manual re-optimization of the LSP path, or an operator change to any of the path constraints.
Once an SRLG secondary path is set up and is operationally up, any subsequent changes to the SRLG group membership of an interface the secondary path is using is not considered until the next opportunity when the secondary path is re-signaled. The secondary path is re-signaled due to a failure, to a re-signaling of the primary path, or to a make before break operation. Make-before-break occurs as a result of a timer based or manual re-optimization of the secondary path, or an operator change to any of the path constraints of the secondary path, except for enabling or disabling the srlg command itself. Enabling or disabling the srlg command on an active secondary or on an active or inactive secondary standby path causes the path to be torn down and re-signaled.
In addition, the user-configured include or exclude admin group statements for a secondary path are also checked together with the SRLG constraints by CSPF.
The following behavior of the feature is specific to the SR-TE LSP.
-
An SRLG-enabled SR-TE LSP secondary path with SID label hops remains operational with failure code srlgPathWithSidHops(59).
-
An SR-TE LSP uses IGP advertised link SRLG information in the TE database. It does not support the use of SRLG information in the static user SRLG database (configure router mpls srlg-database).
-
Delay Retry MBB for making a non-disjointed path a disjointed one is not supported with an SR-TE LSP. Instead, the system performs a break-before-make (that is, teardown and retry) operation. If a non-disjointed path is the active path of the LSP, that path is torn down and retried after the router switches to another path (for example, after revert-timer expires). If the non-disjointed path is not an active path, it is torn down and retried immediately.
The no form of this command reverts to the default value.
Default
no srlg
Platforms
All
srlg-database
srlg-database
Syntax
[no] srlg-database
Context
[Tree] (config>router>mpls srlg-database)
Full Context
configure router mpls srlg-database
Description
Commands in this context configure the link members of SRLG groups for the entire network at any node that needs to signal LSP paths (for example, a head-end node).
The no form of this command deletes the entire SRLG database. CSPF assumes all interfaces have no SRLG membership association if the database was not disabled with the command config>router>mpls>user-srlg-db disable.
Platforms
All
srlg-enable
srlg-enable
Syntax
[no] srlg-enable
Context
[Tree] (config>router>route-next-hop-policy>template srlg-enable)
Full Context
configure router route-next-hop-policy template srlg-enable
Description
This command configures the SRLG constraint into the route next-hop policy template.
When this command is applied to a prefix, the LFA SPF will attempt to select an LFA next-hop, among the computed ones, which uses an outgoing interface that does not participate in any of the SLRGs of the outgoing interface used by the primary next-hop.
The SRLG criterion is applied before running the LFA next-hop selection algorithm.
The no form deletes the SRLG constraint from the route next-hop policy template.
Default
no srlg-enable
Platforms
All
srlg-frr
srlg-frr
Syntax
srlg-frr [strict]
no srlg-frr
Context
[Tree] (config>router>mpls srlg-frr)
Full Context
configure router mpls srlg-frr
Description
This command enables the use of the SRLG constraint in the computation of FRR bypass or detour to be associated with any primary LSP path on this system.
When this option is enabled, CSPF includes the SRLG constraint in the computation of a FRR detour or bypass for protecting the primary LSP path.
CSPF prunes all links with interfaces that belong to the same SRLG as the interface that is being protected, that is, the outgoing interface at the PLR the primary path is using. If one or more paths are found, the MPLS task will select one based on best cost and will signal the bypass/detour. If not found and the user has included the strict option, the bypass/detour is not setup and the MPLS task will keep retrying the request to CSPF. Otherwise, if a path exists that meets the other TE constraints, other than the SRLG one, the bypass/detour is setup.
A bypass or a detour LSP path is not intended to be SRLG disjoint from the entire primary path. Only the SRLGs of the outgoing interface at the PLR that the primary path is using are avoided.
When the MPLS task is searching for an SRLG bypass tunnel to associate with the primary path of the protected LSP, it will first check if any configured manual bypass LSP with CSPF enabled satisfies the SRLG constraints. The search skips any non-CSPF manual bypass LSP because there is no ERO returned to check the SRLG constraint. If no path is found, the task will check if an existing dynamic bypass LSP satisfies the SRLG and other primary path constraints. If not found, it will make a request to CSPF.
Once the primary path of the LSP is configured and is operationally up, subsequent changes to the SRLG group membership of an interface the primary path is using are not considered by the MPLS task at the PLR for bypass/detour association until the next opportunity the bypass LSP path or the primary path is resignaled. The path may be resignaled due to a failure or a Make-Before-Break (MBB) operation. MBB occurs as a result of a global revertive operation, a timer based or manual re-optimization of the bypass LSP or LSP primary path, or a user update of the primary path constraints.
Once the bypass or detour path is set up and is operationally up, subsequent changes to the SRLG group membership of an interface the bypass/detour path is using are not considered by the MPLS task at the PLR until the next opportunity when the association with the primary LSP path is rechecked. The association is rechecked if the bypass path is re-optimized using the timer or manual resignal MBB. Detour paths cannot be re-optimized separately from the primary path.
Enabling or disabling srlg-frr command only takes effect when the LSP primary path or the bypass path is resignaled. The user can either wait for the resignal timer to expire or cause the paths to be resignaled immediately by executing, at the ingress LER, the manual resignal command for the LSP primary path or for the bypass LSP path.
A MPLS interface can belong to a maximum of 64 SRLG groups. The SRLG groups are configured using the config>router>if-attribute>srlg-group command. The SRLG groups that an RSVP interface belong to are configured using the srlg-group command in the config>router>mpls>interface context.
The no form of this command reverts to the default value.
Default
no srlg-frr
Parameters
- strict
-
Specifies the name of the SRLG group within a virtual router instance.
Platforms
All
srlg-group
srlg-group
Syntax
[no] srlg-group group-name [group-name]
no srlg-group
Context
[Tree] (config>service>ies>if>if-attribute srlg-group)
[Tree] (config>router>if>if-attribute srlg-group)
[Tree] (config>router>mpls>if srlg-group)
[Tree] (config>service>vprn>if>if-attribute srlg-group)
Full Context
configure service ies interface if-attribute srlg-group
configure router interface if-attribute srlg-group
configure router mpls interface srlg-group
configure service vprn interface if-attribute srlg-group
Description
This command configures the SRLG membership of an interface. The user can apply SRLGs to an IES, VPRN, network IP, or MPLS interface.
An interface can belong to up to 64 SRLG groups. However, each single operation of the srlg-group command allows a maximum of five (5) groups to be specified at a time. Once an SRLG group is bound to one or more interface, its value cannot be changed until all bindings are removed.
The configured SRLG membership is applied in all levels/areas the interface is participating in. The same interface cannot have different memberships in different levels/areas.
Only the SRLGs bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.
The no form of this command deletes one or more of the SRLG memberships of an interface. The user can also delete all memberships of an interface by not specifying a group name.
Parameters
- group-name
-
Specifies the name of the group, up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain. Each single operation of the srlg-group command allows a maximum of 5 groups to be specified at a time.
Platforms
All
srlg-group
Syntax
srlg-group group-name value group-value [penalty-weight penalty-weight]
no srlg-group group-name
Context
[Tree] (config>router>if-attribute srlg-group)
Full Context
configure router if-attribute srlg-group
Description
This command defines a Shared Risk Link Group (SRLG) which can be associated with an IP or MPLS interface.
SRLG is used to tag IP or MPLS interfaces which share a specific fate with the same identifier. For example, an SRLG group identifier could represent all links which use separate fibers but are carried in the same fiber conduit. If the conduit is accidentally cut, all the fiber links are cut which means all interfaces using these fiber links will fail.
The user first configures locally on each router the name and identifier of each SRLG group. A maximum of 1024 SRLGs can be configured per system.
The user then configures the SRLG membership of an interface. The user can apply SRLGs to an IES, VPRN, network IP, or MPLS interface. A maximum of 64 SRLGs can be applied to a given interface.
When SRLGs are applied to MPLS interfaces, CSPF at an LER will exclude the SRLGs of interfaces used by the LSP primary path when computing the path of the secondary path. CSPF at an LER or LSR will also exclude the SRLGs of the outgoing interface of the primary LSP path in the computation of the path of the FRR backup LSP. This provides path disjointness between the primary path and the secondary path or FRR backup path of an LSP.
When SRLGs applied to IES, VPRN, or network IP interfaces, they are evaluated in the route next-hop selection by adding the srlg-enable option in a route next-hop policy template applied to an interface or a set of prefixes. For instance, the user can enable the SRLG constraint to select a LFA next-hop for a prefix which avoids all interfaces that share fate with the primary next-hop.
The following provisioning rules are applied to SRLG configuration. The system will reject the creation of a SRLG if it re-uses the same name but with a different group value than an existing group. The system will also reject the creation of an SRLG if it re-uses the same group value but with a different name than an existing group.
Only the SRLGs bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.
A user may specify a penalty weight (penalty-weight) associated with an SRLG. This controls the likelihood of paths with links sharing SRLG values with a primary path being used by a bypass or detour LSP. The higher the penalty weight, the less desirable it is to use the link with a given SRLG.
Parameters
- group-name
-
Specifies the name of the group, up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain.
- group-value
-
Specifies the integer value associated with the group. The association of group name and value should be unique within an IP/MPLS domain.
- penalty-weight
-
Specifies the integer value of the penalty weight that is assigned to the SRLG group
Platforms
All
srrp
srrp
Syntax
srrp srrp-id [create]
no srrp srrp-id
Context
[Tree] (config>service>ies>sub-if>grp-if srrp)
[Tree] (config>service>vprn>sub-if>grp-if srrp)
Full Context
configure service ies subscriber-interface group-interface srrp
configure service vprn subscriber-interface group-interface srrp
Description
This command creates a Subscriber Router Redundancy Protocol (SRRP) instance on a group IP interface. An SRRP instance manages all subscriber subnets within the group interfaces subscriber IP interface or other subscriber IP interfaces that are associated through a wholesale/retail relationship. Only one unique SRRP instance can be configured per group interface.
The no form of this command removes an SRRP instance from a group IP interface. Once removed, the group interface ignores ARP requests for the SRRP gateway IP addresses that may exist on subscriber subnets associated with the group IP interface. Then the group interface stops routing using the redundant IP interface associated with the group IP interface and will stop routing with the SRRP gateway MAC address. Ingress packets destined to the SRRP gateway MAC will also be silently discarded. This is the same behavior as a group IP interface that is disabled (shutdown).
The no form of this command removes the SRRP ID from the configuration.
Default
no srrp
Parameters
- srrp-id
-
Specifies a 32 bit instance ID that must be unique to the system. The instance ID must also match the instance ID used by the remote router that is participating in the same SRRP context. SRRP is intended to perform a function similar to VRRP where adjacent IP hosts within local subnets use a default gateway to access IP hosts on other subnets.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
srrp
Syntax
[no] srrp
Context
[Tree] (debug>router srrp)
Full Context
debug router srrp
Description
This command enables debugging for SRRP packets.
The no form of this command disables debugging.
Platforms
All
srrp
Syntax
[no] srrp
Context
[Tree] (config>redundancy>multi-chassis>peer>sync srrp)
Full Context
configure redundancy multi-chassis peer sync srrp
Description
This command specifies whether subscriber routed redundancy protocol (SRRP) information should be synchronized with the multi-chassis peer.
Default
no srrp
Platforms
All
srrp
Syntax
srrp
Context
[Tree] (config>redundancy srrp)
Full Context
configure redundancy srrp
Description
Commands in this context configure SSRP system parameters for BNG CUPS inter-BNG-UP resiliency.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
srrp-enabled-routing
srrp-enabled-routing
Syntax
srrp-enabled-routing [hold-time hold-time]
no srrp-enabled-routing
Context
[Tree] (config>service>ies>sub-if>grp-if srrp-enabled-routing)
[Tree] (config>service>vprn>sub-if>grp-if srrp-enabled-routing)
Full Context
configure service ies subscriber-interface group-interface srrp-enabled-routing
configure service vprn subscriber-interface group-interface srrp-enabled-routing
Description
This command configures SRRP-enabled routing.
The no form of this command reverts to the default.
Parameters
- hold-time hold-time
-
Specifies the hold time, in deci-seconds.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
srrp-instance
srrp-instance
Syntax
[no] srrp-instance srrp-id
Context
[Tree] (config>redundancy>mc>peer>mcr>l3ring srrp-instance)
Full Context
configure redundancy multi-chassis peer mc-ring l3-ring srrp-instance
Description
This command configures an SRRP instance for a Layer 3 ring.
The no form of this command reverts to the default.
Parameters
- srrp-id
-
Specifies the SRRP ID of this SRRP instance.
Platforms
All
srv6
srv6
Syntax
srv6 {origination| termination}
no srv6
Context
[Tree] (config>fwd-path-ext>fpe srv6)
Full Context
configure fwd-path-ext fpe srv6
Description
This command configures if the SRv6 FPE application type is used for the origination or termination of SRv6 tunnels.
The origination or termination of SRv6 on services requires the configuration of a dedicated SRv6 FPE and cannot share the same FPE. A single FPE can be configured for SRv6 origination. One or more FPEs can be configured for SRv6 termination, where a termination SRv6 FPE is assigned one or more configured locators. Transit SRv6 routers do not need SRv6 FPEs.
The no form of this command disables SRv6 on an FPE.
Parameters
- origination
-
Keyword used to specify the origination FPE application type.
- termination
-
Keyword used to specify the termination FPE application type.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-instance
srv6-instance
Syntax
srv6-instance id default-locator name
no srv6-instance
Context
[Tree] (config>service>vprn>bgp-ipvpn>srv6 srv6-instance)
[Tree] (config>service>vprn>bgp-evpn>srv6 srv6-instance)
Full Context
configure service vprn bgp-ipvpn segment-routing-v6 srv6-instance
configure service vprn bgp-evpn segment-routing-v6 srv6-instance
Description
This command configures an SRv6 instance.
The no form of this command removes the SRv6 instance from the BGP IP-VPN or BGP EVPN control plane for the service.
Parameters
- id
-
Specifies the SRv6 instance ID that exists in the service and is associated to a IP-VPN or EVPN control plane.
- name
-
Specifies a default regular or micro-segment locator name, up to 64 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-locator
srv6-locator
Syntax
srv6-locator name
no srv6-locator
Context
[Tree] (config>router>policy-options>policy-statement>default-action srv6-locator)
[Tree] (config>router>policy-options>policy-statement>entry>action srv6-locator)
Full Context
configure router policy-options policy-statement default-action srv6-locator
configure router policy-options policy-statement entry action srv6-locator
Description
This command configures either a string encoding a midstring parameter delimited by at signs (@), or a reference to a named locator for the SRv6 TLV to use.
For a VRF export policy, the referenced locator must already be configured using the commands in the configure service vprn segment-routing-v6 locator context.
For a BGP export policy, the referenced locator must already be configured using the commands in the configure router segment-routing segment-routing-v6 base-routing-instance locator context.
The no form of this command specifies not to use a locator for the SRv6 TLV.
Default
no srv6-locator
Parameters
- name
-
Specifies either a string encoding a midstring parameter delimited by at signs (@) or a reference to a named locator for the SRv6 TLV to use, up to 64 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-micro-segment-locator
srv6-micro-segment-locator
Syntax
srv6-micro-segment-locator name
no srv6-micro-segment-locator
Context
[Tree] (config>router>policy-options>policy-statement>entry>action srv6-micro-segment-locator)
[Tree] (config>router>policy-options>policy-statement>default-action srv6-micro-segment-locator)
Full Context
configure router policy-options policy-statement entry action srv6-micro-segment-locator
configure router policy-options policy-statement default-action srv6-micro-segment-locator
Description
This command configures either a string encoding a midstring parameter delimited by at signs (@), or a reference to a named micro-segment (uSID) locator for the SRv6 TLV to use.
For a VRF export policy, the referenced uSID locator must already be configured using the commands in the configure service vprn segment-routing-v6 micro-segment-locator context.
For a BGP export policy, the referenced uSID locator must already be configured using the commands in the configure router segment-routing segment-routing-v6 base-routing-instance micro-segment-locator context.
The no form of this command specifies not to use a uSID locator for the SRv6 TLV.
Default
no srv6-micro-segment-locator
Parameters
- name
-
Specifies either a string encoding a midstring parameter delimited by at signs (@) or a reference to a named uSID locator for the SRv6 TLV to use, up to 64 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-return-path-bfd-sid
srv6-return-path-bfd-sid
Syntax
srv6-return-path-bfd-sid ipv6-address | param-name
no srv6-return-path-bfd-sid
Context
[Tree] (config>router>policy-options>policy-statement>entry>action srv6-return-path-bfd-sid)
[Tree] (config>router>policy-options>policy-statement>default-action srv6-return-path-bfd-sid)
Full Context
configure router policy-options policy-statement entry action srv6-return-path-bfd-sid
configure router policy-options policy-statement default-action srv6-return-path-bfd-sid
Description
This command applies to the initiator of Seamless Bidirectional Forwarding Detection sessions. This command configures the S-BFD session to echo mode and pushes an additional SRv6 SID in the SRH for S-BFD packets only when it is sent on the imported SRv6 policy.
The return-path SID refers to a binding SID on a SRv6 policy configured on the far-end router. Instead of being routed through the IGP path, the S-BFD packet returns to the initiator through this SRv6 return path. The no form of this command disables the controlled return-path SID and echo mode for S-BFD.
Parameters
- ipv6-address
-
Specifies the IPv6 address.
- param-name
-
Specifies the parameter variable name, up to 32 characters. Policy parameters must start and end with an at-sign (@).
Platforms
All
srv6-sid
srv6-sid
Syntax
srv6-sid ipv6-address
no srv6-sid
Context
[Tree] (conf>router>segment-routing>sr-policies>policy>seg-list>segment srv6-sid)
Full Context
configure router segment-routing sr-policies static-policy segment-list segment srv6-sid
Description
This command defines the 128-bit SRv6 SID for the segment. The policy can only be administratively enabled if its type (defined with the configure router segment-routing sr-policies static-policy type command) and all its segments (defined with the configure router segment-routing sr-policies static-policy segment-list segment command) are SRv6.
Parameters
- ipv6-address
-
Specifies the SID, up to 72 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-sid-prefix
srv6-sid-prefix
Syntax
srv6-sid-prefix {ipv6-prefix/prefix-length | param-name}
no srv6-sid-prefix
Context
[Tree] (config>router>policy-options>policy-statement>entry>from srv6-sid-prefix)
Full Context
configure router policy-options policy-statement entry from srv6-sid-prefix
Description
This command configures either the name of a prefix policy variable or an IPv6 prefix and prefix length, as match criterion for a BGP route.
A BGP route matches this criterion if it has an SRv6 TLV, and the SID or micro-segment (uSID) value in that TLV is matched by the bits of the IPv6 prefix (up to the specified prefix length).
This match criterion is supported in BGP import policies, BGP export policies, and VRF or VSI import policies.
Default
no srv6-sid-prefix
Parameters
- ipv6-prefix/prefix-length
-
Specifies the IPv6 address and prefix length.
- param-name
-
Specifies the name of a prefix policy variable, which can be up to 32 characters and must start and end with an at sign (@)
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
srv6-tlv
srv6-tlv
Syntax
srv6-tlv {present | not-present}
no srv6-tlv
Context
[Tree] (config>router>policy-options>policy-statement>entry>from srv6-tlv)
Full Context
configure router policy-options policy-statement entry from srv6-tlv
Description
This command configures whether the entry matches a BGP route with a prefix SID attribute containing an SRv6 TLV. This match criterion is supported in BGP import policies, BGP export policies, and VRF or VSI import policies.
The no form of this command disables the router from taking whether a BGP route has a prefix SID attribute containing an SRv6 TLV into consideration when matching a BGP route with the entry.
Default
no srv6-tlv
Parameters
- present
-
Specifies that a BGP route only matches this entry if it has a prefix SID attribute containing an SRv6 TLV.
- not-present
-
Specifies that a BGP route only matches this entry if it does not have a prefix SID attribute containing an SRv6 TLV.
Platforms
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
ssap
ssap
Syntax
ssap ssap-value [ssap-mask]
no ssap
Context
[Tree] (config>qos>sap-ingress>mac-criteria>entry>match ssap)
Full Context
configure qos sap-ingress mac-criteria entry match ssap
Description
This command configures an Ethernet 802.2 LLC SSAP value or range for an ingress SAP QoS policy match criterion.
This is a 1-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.
The snap-pid field, etype field, ssap, and dsap fields are mutually exclusive and cannot be part of the same match criteria.
The no form of this command removes the ssap match criterion.
Default
no ssap
Parameters
- ssap-value
-
The 8-bit ssap match criteria value in hex.
- ssap-mask
-
This is optional and can be used when specifying a range of ssap values to use as the match criteria.
This 8-bit mask can be configured using the following formats.
Table 4. Format Styles to Configure Mask Format Style
Format Syntax
Example
Decimal
DDD
240
Hexadecimal
0xHH
0xF0
Binary
0bBBBBBBBB
0b11110000
Platforms
All
ssap
Syntax
ssap ssap-value [ssap-mask]
no ssap
Context
[Tree] (config>filter>mac-filter>entry>match ssap)
Full Context
configure filter mac-filter entry match ssap
Description
This command configures an Ethernet 802.2 LLC SSAP value or range for a MAC filter match criterion.
This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.
The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.
The no form of the command removes the ssap match criterion.
Default
no ssap
Parameters
- ssap-value
-
Specifies the 8-bit ssap match criteria value in decimal, hexadecimal or binary.
- ssap-mask
-
Specifies an optional parameter that may be used when specifying a range of ssap values to use as the match criteria.
This 8 bit mask and the ssap value can be configured as described in 8-bit Mask Syntax.
Table 5. 8-bit Mask Syntax Format Style
Format Syntax
Example
Decimal
DDD
240
Hexadecimal
0xHH
0xF0
Binary
0bBBBBBBBB
0b11110000
Platforms
All
ssap
Syntax
ssap ssap-value [ssap-mask]
no ssap
Context
[Tree] (config>system>security>mgmt-access-filter>mac-filter>entry>match ssap)
Full Context
configure system security management-access-filter mac-filter entry match ssap
Description
This command configures an Ethernet 802.2 LLC SSAP value or range for a MAC filter match criterion.
This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.
The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information about MAC Match Criteria Exclusivity Rules fields that are exclusive based on the frame format.
The no form of this command removes the SSAP match criterion.
Default
no ssap
Parameters
- ssap-value
-
Specifies the 8-bit SSAP match criteria value in hex.
- ssap-mask
-
Specifies a range of SSAP values to use as the match criteria.
Platforms
All
ssh
ssh
Syntax
ssh host [-l username] [-v ssh-version] [{router router-instance | service-name service-name}] [re-exchange-min minutes] [re-exchange-mbyte megabytes] [-i private-key-filename] [-p port]
Context
[Tree] (ssh)
Full Context
ssh
Description
This command initiates a client SSH session with the remote host and is independent from the administrative or operational state of the SSH server. However, to be the target of an SSH session, the SSH server must be operational. This command also allows the user to initiate an SSH session, with a key reexchange, based on maximum megabytes or minutes, whichever occurs first. If the reexchange options are not set, the default behavior does not perform a key reexchange.
Quitting SSH while in the process of authentication is accomplished by either executing a ctrl-c or "~." (tilde and dot), assuming the "~” is the default escape character for the SSH session.
Parameters
- host
-
Specifies the remote host for the SSH session.
- username
-
Specifies the user name to use when opening the SSH session, up to 32 characters.
- router-instance
-
Specifies the router name or service ID.
- service-name
-
Specifies the service name, up to 64 characters.
- minutes
-
Specifies the time interval after which the SSH client will initiate the key reexchange.
- megabytes
-
Specifies the number of megabytes, on a SSH session, after which the SSH client will initiate the key reexchange.
- private-key-filename
-
Specifies the name of the file containing the private key for public-key authentication on the SR OS SSH client, up to 255 characters. (The public key must be provided to the SSH server.) When using the private-key-filename option, if the file containing the private key is encrypted, the system asks for the password to decrypt the file.
- port
-
Specifies the listening port for the SR OS SSH client to establish the SSH session with the SSH server.
Platforms
All
ssh
ssh-authentication-method
ssh-authentication-method
Syntax
ssh-authentication-method
Context
[Tree] (config>system>security>user ssh-authentication-method)
Full Context
configure system security user ssh-authentication-method
Description
Commands in this context configure, at the user level, the authentication method accepted by the SSH server. The user-level configuration overrides the system-level configuration.
Platforms
All
ssh-max-sessions
ssh-max-sessions
Syntax
ssh-max-sessions number-of-sessions
no ssh-max-sessions
Context
[Tree] (config>system>security>profile ssh-max-sessions)
[Tree] (config>system>security>cli-session-group ssh-max-sessions)
Full Context
configure system security profile ssh-max-sessions
configure system security cli-session-group ssh-max-sessions
Description
This command is used to limit the number of SSH-based sessions available to all users that are part of a particular profile, or to all users of all profiles that are part of the same cli-session-group.
The no form of this command disables the command and the profile or group limit is not applied on the number of sessions.
Default
no ssh-max-sessions
Parameters
- number-of-sessions
-
Specifies the maximum number of allowed SSH-based sessions.
Platforms
All
ssh-reply
ssh-reply
Syntax
[no] ssh-reply
Context
[Tree] (config>service>ies>if>vrrp ssh-reply)
Full Context
configure service ies interface vrrp ssh-reply
Description
This command enables the non-owner master to reply to SSH Requests directed at the virtual router instances IP addresses. The SSH request can be received on any routed interface. SSH must not have been disabled at the management security level (either on the parental IP interface or based on the SSH source host address). Proper login and CLI command authentication is still enforced.
When ssh-reply is not enabled, SSH packets to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to SSH regardless of the ssh-reply configuration.
The ssh-reply command is only available in non-owner vrrp virtual-router-id nodal context. If the ssh-reply command is not executed, SSH packets to the virtual router instance IP addresses is silently discarded.
The no form of this command restores the default operation of discarding all SSH packets destined to the non-owner virtual router instance IP addresses.
Default
no ssh-reply
Platforms
All
ssh-reply
Syntax
[no] ssh-reply
Context
[Tree] (config>service>vprn>if>vrrp ssh-reply)
Full Context
configure service vprn interface vrrp ssh-reply
Description
This command enables the non-owner master to reply to SSH Requests directed at the virtual router instance’s IP addresses. The SSH request can be received on any routed interface. SSH must not have been disabled at the management security level (either on the parental IP interface or based on the SSH source host address). Proper login and CLI command authentication is still enforced.
When ssh-reply is not enabled, SSH packets to non-owner master virtual IP addresses are silently discarded. Non-owner backup virtual routers never respond to SSH regardless of the ssh-reply configuration.
The ssh-reply command is only available in non-owner vrrp virtual-router-id nodal context. If the ssh-reply command is not executed, SSH packets to the virtual router instance IP addresses is silently discarded.
The no form of this command restores the default operation of discarding all SSH packets destined to the non-owner virtual router instance IP addresses.
Default
no ssh-reply
Platforms
All
ssh-reply
Syntax
[no] ssh-reply
Context
[Tree] (config>router>if>vrrp ssh-reply)
Full Context
configure router interface vrrp ssh-reply
Description
This command enables the non-owner master to reply to SSH requests directed at the virtual router instance IP addresses. This command is only applicable to IPv4.
Non-owner virtual router instances are limited by the VRRP specifications to responding to ARP requests destined to the virtual router IP addresses and routing IP packets not addressed to the virtual router IP addresses.
This limitation can be disregarded for certain applications. Ping, Telnet and SSH can be individually enabled or disabled on a per-virtual-router-instance basis.
The ssh-reply command enables the non-owner master to reply to SSH requests directed at the virtual router instances IP addresses. The SSH request can be received on any routed interface. SSH must not have been disabled at the management security level (either on the parental IP interface or based on the SSH source host address). Correct login and CLI command authentication is still enforced.
When ssh-reply is not enabled, SSH requests to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to SSH requests regardless of the ssh-reply setting.
The ssh-reply command is only available in non-owner vrrp nodal context.
By default, SSH requests to the virtual router instance IP addresses are silently discarded.
The no form of the command discards all SSH request messages destined to the non-owner virtual router instance IP addresses.
Default
no ssh-reply — SSH requests to the virtual router instance IP addresses are discarded.
Platforms
All
ssm
ssm
Syntax
ssm
Context
[Tree] (config>port>ethernet ssm)
Full Context
configure port ethernet ssm
Description
This command enables the Ethernet Synchronization Messaging Channel (ESMC) for the Ethernet port. ESMC carries the Synchronization Status Message (SSM) code representing the quality level of the source of frequency of the central clock of the node.
Platforms
All
ssm-assert-compatible-mode
ssm-assert-compatible-mode
Syntax
ssm-assert-compatible-mode [enable | disable]
Context
[Tree] (config>service>vprn>pim ssm-assert-compatible-mode)
Full Context
configure service vprn pim ssm-assert-compatible-mode
Description
This command specifies whether SSM assert is enabled in compatibility mode for this PIM protocol instance. When enabled, for SSM groups, PIM will consider the SPT bit to be implicitly set to compute the value of CouldAssert (S,G,I) as defined in RFC 4601, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised). When disabled, for SSM groups, PIM will not assume the SPT bit to be set. The SPT bit is set by Update_SPTbit(S,G,iif) macro defined in RFC 4601.
Default
ssm-assert-compatible-mode disable
Parameters
- enable
-
enables SSM assert in compatibility mode for this PIM protocol instance
- disable
-
disabled SSM assert in compatibility mode for this PIM protocol instance
Platforms
All
ssm-bit
ssm-bit
Syntax
ssm-bit sa-bit
Context
[Tree] (config>system>sync-if-timing>bits ssm-bit)
Full Context
configure system sync-if-timing bits ssm-bit
Description
This command configures which sa-bit to use for conveying SSM information when the interface-type is E1.
Default
ssm-bit 8
Parameters
- sa-bit
-
Specifies the sa-bit value.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ssm-default-range-disable
ssm-default-range-disable
Syntax
ssm-default-range-disable ipv4
Context
[Tree] (config>service>vprn>pim ssm-default-range-disable)
Full Context
configure service vprn pim ssm-default-range-disable
Description
This command specifies whether to disable the use of default range (232/8) for SSM so that it can be used by ASM to process (*,G). When enabled, the use of default range is disabled for SSM and it can be used by ASM. When disabled, the SSM default range is enabled.
Default
ssm-default-range-disable
Platforms
All
ssm-groups
ssm-groups
Syntax
[no] ssm-groups
Context
[Tree] (config>service>vprn ssm-groups)
Full Context
configure service vprn ssm-groups
Description
This command enables access to the context to enable a source-specific multicast (SSM) configuration instance.
Platforms
All
ssm-groups
Syntax
[no] ssm-groups
Context
[Tree] (config>router>pim ssm-groups)
Full Context
configure router pim ssm-groups
Description
Commands in this context enable an ssm-group configuration instance.
Platforms
All
ssm-translate
ssm-translate
Syntax
ssm-translate
Context
[Tree] (config>service>vprn>igmp>if ssm-translate)
[Tree] (config>service>vprn>igmp ssm-translate)
Full Context
configure service vprn igmp interface ssm-translate
configure service vprn igmp ssm-translate
Description
Commands in this context configure group ranges which are translated to SSM (S,G) entries. If the static entry needs to be created, it has to be translated from a IGMPv1 IGMPv2 request to a Source Specific Multicast (SSM) join. An SSM translate source can only be added if the starg command is not enabled. An error message is generated if you try to configure the source command with starg command enabled.
Platforms
All
ssm-translate
Syntax
ssm-translate
Context
[Tree] (config>service>vprn>mld ssm-translate)
Full Context
configure service vprn mld ssm-translate
Description
Commands in this context configure group ranges which are translated to SSM (S,G) entries. If the static entry needs to be created, it has to be translated from a IGMPv1 IGMPv2 request to a Source Specific Multicast (SSM) join. An SSM translate source can only be added if the starg command is not enabled. An error message is generated if you try to configure the source command with starg command enabled.
Platforms
All
ssm-translate
Syntax
ssm-translate
Context
[Tree] (config>router>igmp ssm-translate)
[Tree] (config>router>igmp>if ssm-translate)
Full Context
configure router igmp ssm-translate
configure router igmp interface ssm-translate
Description
Commands in this context configure group ranges which are translated to SSM (S,G) entries. If the static entry needs to be created, it has to be translated from a IGMPv1 IGMPv2 request to a Source Specific Multicast (SSM) join. An SSM translate source can only be added if the starg command is not enabled. An error message is generated if you try to configure the source command with starg command enabled.
Platforms
All
ssm-translate
Syntax
ssm-translate
Context
[Tree] (config>router>mld>if ssm-translate)
[Tree] (config>router>mld ssm-translate)
Full Context
configure router mld interface ssm-translate
configure router mld ssm-translate
Description
Commands in this context configure group ranges which are translated to SSM (S,G) entries. If the static entry needs to be created, it has to be translated from a IGMPv1 IGMPv2 request to a Source Specific Multicast (SSM) join. An SSM translate source can only be added if the starg command is not enabled. An error message is generated if you try to configure the source command with starg command enabled.
Platforms
All
stable-pool-sizing
stable-pool-sizing
Syntax
[no] stable-pool-sizing
Context
[Tree] (config>card>fp stable-pool-sizing)
Full Context
configure card fp stable-pool-sizing
Description
This command provides a stable buffer pool allocation environment for all default port buffer pools on a forwarding plane. This stable environment is provided at the expense of optimal buffer allocation between the various port buffer pools. Normally, port pools are sized according to a ports relative bandwidth with other ports and the ability of a port to use pool buffers. As an example, on a forwarding plane with two potential MDAs and only one equipped, the normal behavior is to provide all available default pool buffers to the ports on the currently equipped MDA. If a second MDA is equipped in the future, buffers are freed from the existing MDA and provided to the ports on the new MDA. Stable pool sizing alters this behavior by reserving buffers for both MDAs whether they are equipped or not thus preventing a resizing event when an MDA is equipped. In addition, existing ports on a module always receive their maximum bandwidth share of buffers independent on any sub-rate condition that may currently exist. This provides a stable amount of buffers to other ports on the module independent of link or configuration events that may occur on the port.
Stable pool sizing preserves the ability to modify the effective bandwidth used to determine a port’s relative share of the available buffers through the use of the ing-percentage-of-rate and egr-percentage-of-rate commands under the port configuration. Changing the values associated with these commands will cause a reevaluation of buffer distribution and thus a possible resizing of pools on each port within the module. These commands have no effect on ports associated with other modules on the forwarding plane.
Stable pool sizing may be enabled or disabled at any time on a forwarding plane. The system will dynamically change the pool sizes according to the stable pool sizing state.
When a port connector breakout is configured, its ports is included in the stable pool sizing calculation. Consequently, adding or removing a port connector breakout to or from the configuration will cause the buffer pool allocation to be recalculated even when stable pool sizing is enabled.
The no form of this command disables stable pool sizing on a forwarding plane. Existing buffer pools are resized according to normal pool sizing behavior.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
stack
stack
Syntax
stack [ipv4] [ipv6-slaac]
no stack
Context
[Tree] (config>subscr-mgmt>pppoe-client-policy stack)
Full Context
configure subscriber-mgmt pppoe-client-policy stack
Description
This command defines which NCP session is started in the PPPoE client and how addresses are retrieved within that NCP session.
Default
stack ipv4
Parameters
- ipv4
-
Indicates that IPCP should be started and used to retrieve an IPv4 address.
- ipv6-slaac
-
Indicates that IPv6CP should be started and that SLAAC is used to retrieve an IPv6 prefix.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
stack-capability-signaling
stack-capability-signaling
Syntax
[no] stack-capability-signaling
Context
[Tree] (config>service>ipipe stack-capability-signaling)
Full Context
configure service ipipe stack-capability-signaling
Description
This command enables stack-capability signaling in the initial label mapping message of the Ipipe PW to indicate that IPv6 is supported.
When enabled, the 7750 SR includes the stack-capability TLV with the IPv6 stack bit set according to the ce-address-discovery ipv6 keyword, and also checks the value of the stack-capability TLV received from the far end.
This command must be blocked if no ce-address-discovery is specified, or the ipv6 keyword is not included with the ce-address-discovery command.
This command if only applicable to the Ipipe service and must be blocked for all other services.
This command has no effect if both SAPs on the Ipipe service are local to the node.
Default
no stack-capability-signaling
Platforms
All
stale-routes-time
stale-routes-time
Syntax
[no] stale-routes-time time
Context
[Tree] (config>service>vprn>bgp>group>graceful-restart stale-routes-time)
[Tree] (config>service>vprn>bgp>group>neighbor>graceful-restart stale-routes-time)
[Tree] (config>service>vprn>bgp>graceful-restart stale-routes-time)
Full Context
configure service vprn bgp group graceful-restart stale-routes-time
configure service vprn bgp group neighbor graceful-restart stale-routes-time
configure service vprn bgp graceful-restart stale-routes-time
Description
This command configures the time period to keep stale routes before the END-OF-RIB message is received from the restarting router.
Default
360 seconds
Parameters
- time
-
1 to 3600 seconds
Platforms
All
stale-routes-time
Syntax
stale-routes-time time
no stale-routes-time
Context
[Tree] (config>router>bgp>group>neighbor>graceful-restart stale-routes-time)
[Tree] (config>router>bgp>graceful-restart stale-routes-time)
[Tree] (config>router>bgp>group>graceful-restart stale-routes-time)
Full Context
configure router bgp group neighbor graceful-restart stale-routes-time
configure router bgp graceful-restart stale-routes-time
configure router bgp group graceful-restart stale-routes-time
Description
This command configures the maximum amount of time in seconds that stale routes should be maintained after a graceful restart is initiated.
The no form of this command resets the stale routes time back to the default of 360 seconds.
Default
no stale-routes-time
Parameters
- time
-
Specifies the amount of time that stale routes should be maintained after a graceful restart is initiated.
Platforms
All
stale-time
stale-time
Syntax
stale-time seconds
no stale-time
Context
[Tree] (config>service>ies>if>ipv6 stale-time)
[Tree] (config>service>ies>ipv6 stale-time)
[Tree] (config>service>vprn>if>ipv6 stale-time)
[Tree] (config>service>vprn>ipv6 stale-time)
Full Context
configure service ies interface ipv6 stale-time
configure service ies ipv6 stale-time
configure service vprn interface ipv6 stale-time
configure service vprn ipv6 stale-time
Description
This command configures the time a neighbor discovery cache entry can remain stale before being removed.
The no form of this command removes the stale-time value.
Default
no stale-time
Parameters
- seconds
-
The allowed stale time (in seconds) before a neighbor discovery cache entry is removed.
Platforms
All
stale-time
Syntax
stale-time seconds
no stale-time
Context
[Tree] (config>router>ipv6 stale-time)
Full Context
configure router ipv6 stale-time
Description
This command configures the time a neighbor discovery cache entry can remain stale before being removed.
The no form of this command removes the stale-time value.
Default
stale-time 14400
Parameters
- seconds
-
Specifies the allowed stale time (in seconds) before a neighbor discovery cache entry is removed.
Platforms
All
stale-time
Syntax
stale-time seconds
no stale-time
Context
[Tree] (config>router>origin-validation>rpki-session stale-time)
Full Context
configure router origin-validation rpki-session stale-time
Description
This command configures the maximum length of time that prefix origin validation records learned from the cache server remain usable after the RPKI-Router session goes down. The default stale-time is 3600 seconds (1 hour). When the timer expires all remaining stale entries associated with the session are deleted.
Default
no stale-time
Parameters
- seconds
-
Specifies a time, in seconds.
Platforms
All
stale-time
Syntax
stale-time seconds
no stale-time
Context
[Tree] (config>router>if>ipv6 stale-time)
Full Context
configure router interface ipv6 stale-time
Description
This command configures the time a neighbor discovery cache entry can remain stale before being removed.
The no form of this command removes the stale-time value.
Default
no stale-time
Parameters
- seconds
-
The allowed stale time (in seconds) before a neighbor discovery cache entry is removed.
Platforms
All
standard-multi-instance
standard-multi-instance
Syntax
[no] standard-multi-instance
Context
[Tree] (config>service>vprn>isis standard-multi-instance)
Full Context
configure service vprn isis standard-multi-instance
Description
This command enables IS-IS multi-instance (MI) as described in draft-ginsberg-isis-mi-bis-01. Multiple instances allow instance-specific adjacencies to be formed that support multiple network topologies on the same physical interfaces. Each instance has an LSDB, and each PDU contains a TLV identifying the instance and the topology to which the PDU belongs. A single topology is supported in each instance, so the instance-specific topology identifier (ITID) is set to 0 and cannot be changed.
The standard-multi-instance (based on draft-ginsberg-isis-mi-bis-01) and iid-tlv-enable (based on draft-ietf-isis-mi-02) commands cannot be configured in the same instance, because the MAC addresses and PDUs from the two standards are incompatible.
The no form of this command removes the standard-multi-instance configuration.
Default
no standard-multi-instance
Platforms
All
standard-multi-instance
Syntax
[no] standard-multi-instance
Context
[Tree] (config>router>isis standard-multi-instance)
Full Context
configure router isis standard-multi-instance
Description
This command enables IS-IS multi-instance (MI) as described in draft-ginsberg-isis-mi-bis-01. Multiple instances allow instance-specific adjacencies to be formed that support multiple network topologies on the same physical interfaces. Each instance has an LSDB, and each PDU contains a TLV identifying the instance and the topology to which the PDU belongs. A single topology is supported in each instance, so the instance-specific topology identifier (ITID) is set to 0 and cannot be changed.
The standard-multi-instance (based on draft-ginsberg-isis-mi-bis-01) and iid-tlv-enable (based on draft-ietf-isis-mi-02) commands cannot be configured in the same instance, because the MAC addresses and PDUs from the two standards are incompatible.
The no form of this command removes the standard-multi-instance configuration.
Default
no standard-multi-instance
Platforms
All
standby
standby
Syntax
[no] standby
Context
[Tree] (config>router>mpls>lsp>secondary standby)
Full Context
configure router mpls lsp secondary standby
Description
The secondary path LSP is normally signaled once the primary path LSP fails. The standby keyword ensures that the secondary path LSP is signaled and maintained indefinitely in a hot standby state. Standby paths are selected in preference to non-standby secondary paths. When multiple standby secondary paths exist, then the path-preference is used to determine the order in which the paths are selected. If multiple standby secondary paths have the same, lowest, path-preference value then the system will select the path with the lowest up-time. When the primary path is re-established then the traffic is switched back to the primary path LSP.
The no form of this command specifies that the secondary LSP is signaled when the primary path LSP fails.
Platforms
All
standby-forwarding
standby-forwarding
Syntax
[no] standby-forwarding
Context
[Tree] (config>service>ies>if>ipv6>vrrp standby-forwarding)
Full Context
configure service ies interface ipv6 vrrp standby-forwarding
Description
This command allows the forwarding of packets by a standby router.
The no form of this command specifies that a standby router should not forward traffic sent to virtual router's MAC address. However, the standby router should forward traffic sent to the standby router’s real MAC address.
Default
no standby-forwarding
Platforms
All
standby-forwarding
Syntax
[no] standby-forwarding
Context
[Tree] (config>service>ies>if>vrrp standby-forwarding)
Full Context
configure service ies interface vrrp standby-forwarding
Description
This command allows the forwarding of packets by a standby router.
The no form of this command specifies that a standby router should not forward traffic sent to virtual router's MAC address. However, the standby router should forward traffic sent to the standby router’s real MAC address.
Default
no standby-forwarding
Platforms
All
standby-forwarding
Syntax
[no] standby-forwarding
Context
[Tree] (config>service>vprn>if>ipv6>vrrp standby-forwarding)
[Tree] (config>service>vprn>if>vrrp standby-forwarding)
Full Context
configure service vprn interface ipv6 vrrp standby-forwarding
configure service vprn interface vrrp standby-forwarding
Description
This command allows the forwarding of packets by a standby router.
The no form of this command specifies that a standby router should not forward traffic sent to virtual router's MAC address. However, the standby router should forward traffic sent to the standby router’s real MAC address.
Default
no standby-forwarding
Platforms
All
standby-forwarding
Syntax
[no] standby-forwarding
Context
[Tree] (config>router>if>ipv6>vrrp standby-forwarding)
[Tree] (config>router>if>vrrp standby-forwarding)
Full Context
configure router interface ipv6 vrrp standby-forwarding
configure router interface vrrp standby-forwarding
Description
This command specifies whether this VRRP instance allows forwarding packets to a standby router. When disabled, a standby router should not forward traffic sent to virtual router's MAC address. However, the standby router should forward traffic sent to the standby router’s real MAC address. When enabled, a standby router should forward all traffic.
Default
no standby-forwarding
Platforms
All
standby-ip-lifetime
standby-ip-lifetime
Syntax
standby-ip-lifetime [days days] [hrs hrs] [min min] [sec sec]
standby-ip-lifetime [seconds]
standby-ip-lifetime
Context
[Tree] (config>subscr-mgmt>vrgw>brg>brg-profile>dhcp-pool standby-ip-lifetime)
Full Context
configure subscriber-mgmt vrgw brg brg-profile dhcp-pool standby-ip-lifetime
Description
This command defines how long these addresses are kept aside when standby addresses are signaled to the pool. During this time these addresses can only be used by devices explicitly requesting the IP (for example, datatrigger or DHCP renew/rebind). When the timer expires the addresses will again become available for dynamic allocation.
Default
standby-ip-lifetime hrs 6
Parameters
- days
-
Specifies the standby IP lifetime in days.
- hrs
-
Specifies the standby IP lifetime in hours.
- min
-
Specifies the standby IP lifetime in minutes.
- sec
-
Specifies the standby IP lifetime in seconds.
- seconds
-
Specifies the lifetime of the standby IP addresses
- seconds
-
Specifies the lifetime in seconds.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
standby-mep-shutdown
standby-mep-shutdown
Syntax
[no] standby-mep-shutdown
Context
[Tree] (config>eth-cfm>redundancy>mc-lag standby-mep-shutdown)
Full Context
configure eth-cfm redundancy mc-lag standby-mep-shutdown
Description
This system wide command enables MEPs to track the state of MC-LAG. This allows MEPs on the standby MC-LAG to act administratively down.
The no form of command disables the MEP tracking.
Default
no standby-mep-shutdown
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
standby-signaling
standby-signaling
Syntax
standby-signaling {lacp | power-off}
no standby-signaling
Context
[Tree] (config>lag standby-signaling)
Full Context
configure lag standby-signaling
Description
This command specifies how the state of a member port is signaled to the remote side when the status corresponding to this member port has the standby value.
Default
standby-signaling lacp
Platforms
All
standby-signaling-master
standby-signaling-master
Syntax
[no] standby-signaling-master
Context
[Tree] (config>service>epipe>endpoint standby-signaling-master)
[Tree] (config>service>ipipe>endpoint standby-signaling-master)
Full Context
configure service epipe endpoint standby-signaling-master
configure service ipipe endpoint standby-signaling-master
Description
When this command is enabled, the pseudowire standby bit (value 0x00000020) is sent to T-LDP peer for each spoke SDP of the endpoint that is selected as a standby.
This command is mutually exclusive with a VLL mate SAP created on a mc-lag/mc-aps or ICB. It is also mutually exclusive with vc-switching.
Default
standby-signaling-master
Platforms
All
standby-signaling-slave
standby-signaling-slave
Syntax
[no] standby-signaling-slave
Context
[Tree] (config>service>epipe>spoke-sdp-fec standby-signaling-slave)
Full Context
configure service epipe spoke-sdp-fec standby-signaling-slave
Description
This command enables standby-signaling-slave for an Epipe.
Platforms
All
standby-signaling-slave
Syntax
[no] standby-signaling-slave
Context
[Tree] (config>service>epipe>endpoint standby-signaling-slave)
[Tree] (config>service>epipe>spoke-sdp standby-signaling-slave)
Full Context
configure service epipe endpoint standby-signaling-slave
configure service epipe spoke-sdp standby-signaling-slave
Description
When this command is enabled, the node will block the transmit forwarding direction of a spoke SDP based on the pseudowire standby bit received from a T-LDP peer.
This command is present at the endpoint level as well as the spoke SDP level. If the spoke SDP is part of an explicit-endpoint, it will not be possible to change this setting at the spoke SDP level. An existing spoke SDP can be made part of the explicit endpoint only if the settings do not conflict. A newly created spoke SDP, which is part of a specific explicit-endpoint, will inherit this setting from the endpoint configuration.
This command is mutually exclusive with an endpoint that is part of an mc-lag, mc-aps or an ICB.
If the command is disabled, the node assumes the existing independent mode of behavior for the forwarding on the spoke SDP.
Default
no standby-signaling-slave
Platforms
All
starg
starg
Syntax
[no] starg
Context
[Tree] (config>subscr-mgmt>mld-policy>static>group starg)
[Tree] (config>subscr-mgmt>igmp-policy starg)
[Tree] (config>subscr-mgmt>igmp-policy>static>group starg)
Full Context
configure subscriber-mgmt mld-policy static group starg
configure subscriber-mgmt igmp-policy starg
configure subscriber-mgmt igmp-policy static group starg
Description
This command adds a static (*,G) entry. This command can only be enabled if no existing source addresses for this group are specified.
The no form of this command removes the starg entry from the configuration.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
starg
Syntax
[no] starg
Context
[Tree] (config>service>vpls>spoke-sdp>mld-snooping>static>group starg)
[Tree] (config>service>vpls>spoke-sdp>igmp-snooping>static>group starg)
[Tree] (config>service>vpls>sap>igmp-snooping>static>group starg)
[Tree] (config>service>vpls>mesh-sdp>mld-snooping>static>group starg)
[Tree] (config>service>vpls>sap>mld-snooping>static>group starg)
[Tree] (config>service>vpls>mesh-sdp>igmp-snooping>static>group starg)
Full Context
configure service vpls spoke-sdp mld-snooping static group starg
configure service vpls spoke-sdp igmp-snooping static group starg
configure service vpls sap igmp-snooping static group starg
configure service vpls mesh-sdp mld-snooping static group starg
configure service vpls sap mld-snooping static group starg
configure service vpls mesh-sdp igmp-snooping static group starg
Description
This command adds a static (*,g) entry to allow multicast traffic for the corresponding multicast group from any source. This command can only be enabled if no existing source addresses for this group are specified.
The no form of this command removes the starg entry from the configuration.
Default
no starg
Platforms
All
starg
Syntax
starg
Context
[Tree] (config>service>vprn>igmp>if>static>group starg)
Full Context
configure service vprn igmp interface static group starg
Description
This command adds a static (*,G) entry. This command can only be enabled if no existing source addresses for this group are specified.
Use the no form of this command to remove the starg entry from the configuration.
Platforms
All
starg
Syntax
[no] starg
Context
[Tree] (config>service>vprn>mld>if>static>group starg)
Full Context
configure service vprn mld interface static group starg
Description
This command adds a static (*,G) entry. This command can only be enabled if no existing source addresses for this group are specified.
Use the no form of this command to remove the starg entry from the configuration.
Platforms
All
starg
Syntax
[no] starg
Context
[Tree] (config>router>igmp>if>static>group starg)
Full Context
configure router igmp interface static group starg
Description
This command adds a static (*,G) entry. This command can only be enabled if no existing source addresses for this group are specified.
Use the no form of the command to remove the (*,G) entry from the configuration.
Platforms
All
starg
Syntax
[no] starg
Context
[Tree] (config>router>igmp>tunnel-interface>static>group starg)
Full Context
configure router igmp tunnel-interface static group starg
Description
This command adds a static (*,G) group entry in a static group join on a tunnel interface associated with a P2MP RSVP LSP.
This command can only be enabled if no existing source addresses for this group are specified.
The no form of the command removes the (*,G) entry from the configuration.
Platforms
All
starg
Syntax
[no] starg
Context
[Tree] (config>router>mld>if>static>group starg)
Full Context
configure router mld interface static group starg
Description
This command adds a static (*,G) entry. This command can only be enabled if no existing source addresses for this group are specified.
The no form of this command removes the starg entry from the configuration.
Platforms
All
start
start
Syntax
start {immediate | on-new-session}
Context
[Tree] (debug>app-assure>group>traffic-capture>record start)
Full Context
debug application-assurance group traffic-capture record start
Description
This command records limit conditions.
Parameters
- immediate
-
Start recording immediately for new or existing flows or sessions.
- on-new-session
-
Only start recording record for new flows or sessions.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
start
Syntax
start start-week start-day start-month hours-minutes
Context
[Tree] (config>system>time>dst-zone start)
Full Context
configure system time dst-zone start
Description
This command configures start of summer time settings.
Default
start first sunday january 00:00
Parameters
- start-week
-
Specifies the starting week of the month when the summer time takes effect.
- start-day
-
Specifies the starting day of the week when the summer time takes effect.
- start-month
-
Specifies the starting month of the year when the summer time takes effect.
- hours-minutes
-
Specifies the time at which the summer time takes effect, in hh:mm format.
Platforms
All
start-avg
start-avg
Syntax
start-avg percent
no start-avg
Context
[Tree] (config>qos>slope-policy>exceed-slope start-avg)
[Tree] (config>qos>slope-policy>high-slope start-avg)
[Tree] (config>qos>slope-policy>highplus-slope start-avg)
[Tree] (config>qos>slope-policy>low-slope start-avg)
Full Context
configure qos slope-policy exceed-slope start-avg
configure qos slope-policy high-slope start-avg
configure qos slope-policy highplus-slope start-avg
configure qos slope-policy low-slope start-avg
Description
This command sets the exceed, low, high, or highplus Random Early Detection (RED) slope position for the shared buffer average utilization value where the packet discard probability starts to increase above zero. The percent parameter is expressed as a percentage of the shared buffer size.
The no form of this command restores the start-avg value to the default setting. If the max-avg setting is smaller than the default, an error will occur and the start-avg setting will not be changed to the default.
Default
start-avg 85 - Highplus slope default is 85% buffer utilization before discard probability starts to increase above zero.
start-avg 70 — High slope default is 70% buffer utilization before discard probability starts to increase above zero.
start-avg 50 — Low slope default is 50% buffer utilization before discard probability starts to increase above zero.
start-avg 30 — Exceed slope default is 30% buffer utilization before discard probability starts to increase above zero.
Parameters
- percent
-
The percentage of the shared buffer space for the buffer pool at which point the drop probability starts to increase above zero. The value entered must be less than or equal to the current setting of max-avg. If the entered value is greater than the current value of max-avg, an error will occur and no change will take place.
Platforms
All
start-entry
start-entry
Syntax
start-entry entry-id count count
no start-entry
Context
[Tree] (config>li>li-filter-block-reservation>li-reserved-block start-entry)
Full Context
configure li li-filter-block-reservation li-reserved-block start-entry
Description
This command defines a block of reserved filter entries that are used to insert LI filter entries into a normal filter.
The no form of this command removes the entry ID and count from the configuration.
Parameters
- entry-id
-
Specifies an entry identification to start a block of reserved filter entries.
- count
-
Specifies the number of entries in the block.
Platforms
All
start-label
start-label
Syntax
start-label start-value end-label end-value
no start-label
Context
[Tree] (config>router>mpls-labels>reserved-label-block start-label)
Full Context
configure router mpls-labels reserved-label-block start-label
Description
This command configures start and end labels for a reserved label block. This command must be configured for a reserved label block to be created.
Default
start-label 0, end-label 0
Parameters
- start-value
-
Specifies a starting value.
- end-value
-
Specifies an ending value.
Platforms
All
startup-wait-time
startup-wait-time
Syntax
startup-wait-time [min minutes] [sec seconds] [hrs hours]
no startup-wait-time [min minutes] [sec seconds]
Context
[Tree] (config>router>dhcp>server>failover startup-wait-time)
[Tree] (config>router>dhcp6>server>failover startup-wait-time)
[Tree] (config>router>dhcp>server>pool>failover startup-wait-time)
[Tree] (config>router>dhcp6>server>pool>failover startup-wait-time)
Full Context
configure router dhcp local-dhcp-server failover startup-wait-time
configure router dhcp6 local-dhcp-server failover startup-wait-time
configure router dhcp server pool failover startup-wait-time
configure router dhcp6 server pool failover startup-wait-time
Description
This command enables the startup wait time during which each peer waits after the initialization process before assuming the active role for the prefix designated as local or access-driven. This is to avoid transient issues during the initialization process.
The startup-wait-time should be configured to an interval in which, after boot, both nodes can set up an MCS TCP link and start MCS. The timer is restarted each time the server downloads a lease from the MCS database and stops when the last state record from the peer is synchronized. The next state is (PRE-)NORMAL, unless the timer times out or is forced to stop via the tools command (tools>perform>router>dhcp or dhcp6>local-dhcp-server server-name>pool/failover>abort-startup-wait), in which case the local DHCP server transitions immediately to the COMMUNICATIONS-INTERRUPTED state.
Default
startup-wait-time min 2
Parameters
- minutes
-
Specifies the startup wait time, in minutes.
- seconds
-
Specifies the startup wait time, in seconds.
- hours
-
Specifies the startup wait time, in hours.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
stat-mode
stat-mode
Syntax
stat-mode stat-mode
no stat mode
Context
[Tree] (config>subscr-mgmt>sla-prof>ingress>qos>policer stat-mode)
[Tree] (config>subscr-mgmt>sla-prof>ingress>qos>queue stat-mode)
[Tree] (config>subscr-mgmt>sla-prof>egress>qos>policer stat-mode)
[Tree] (config>subscr-mgmt>sla-prof>egress>qos>queue stat-mode)
Full Context
configure subscriber-mgmt sla-profile ingress qos policer stat-mode
configure subscriber-mgmt sla-profile ingress qos queue stat-mode
configure subscriber-mgmt sla-profile egress qos policer stat-mode
configure subscriber-mgmt sla-profile egress qos queue stat-mode
Description
This command is used to configure the forwarding plane octet and packet counters of a policer or queue to count packets of a specific type or state. For example separate counters for IPv4/IPv6 or separate counters for offered high and low priority policed traffic.
For policers, this command overrides the policer stat-mode configuration as defined in the sap-ingress or sap-egress qos policy. For details on sap-ingress and sap-egress policer stat-mode, refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide. For use in Enhanced Subscriber Management (ESM) context only, an additional stat-mode enables separate counters for IPv4 and IPv6 packets.
When a policer’s stat-mode is changed while the sla profile is in use, any previous counter values are lost and any new counters are set to zero.
For queues, this command sets the stat-mode. Queue stat-mode is only available for use in Enhanced Subscriber Management (ESM) context to enable separate IPv4/IPv6 counters.
A queue’s stat-mode cannot be changed while the SLA profile is in use.
The no form of this command reverts to the default.
Default
For policers, the default is no stat-mode override. The sap-ingress or sap-egress stat-mode is used instead.
For queues, the default is to count in-/out-of-profile octets and packets.
Parameters
- stat-mode
-
Specifies the stat mode for the policer.
For ingress and egress qos queue stat-mode overrides.
For ingress and egress qos policer stat-mode overrides, refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for details on the sap-ingress and sap-egress policer stat-mode parameters.
For use in Enhanced Subscriber Management (ESM) context only:
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
- configure subscriber-mgmt sla-profile ingress qos policer stat-mode
- configure subscriber-mgmt sla-profile egress qos policer stat-mode
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
- configure subscriber-mgmt sla-profile egress qos queue stat-mode
- configure subscriber-mgmt sla-profile ingress qos queue stat-mode
stat-mode
Syntax
stat-mode stat-mode
no stat mode
Context
[Tree] (config>card>fp>ingress>access>qgrp>policer-over>plcr stat-mode)
[Tree] (config>card>fp>ingress>network>qgrp>policer-over>plcr stat-mode)
Full Context
configure card fp ingress access queue-group policer-override policer stat-mode
configure card fp ingress network queue-group policer-override policer stat-mode
Description
This command configures the forwarding plane counters that allow offered, output and discard accounting to occur for the policer. An ingress policer has multiple types of offered packets (explicit in-profile, explicit out-of-profile, high priority or low priority) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow and red). Due to the large number of policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers will not be configured with a CIR profiling rate and not all policers will receive explicitly profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported which prevents any packet accounting, the use of the policer’s parent command requires at the policer's stat-mode to be set at least to the minimal setting so that offered stats are available for the policer's Fair Information Rate (FIR) to be calculated. Once a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. You can view the total/allocated/free stats by using the tools dump resource-usage command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
-
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for details on the policer stat-mode parameters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode stat-mode
no stat-mode
Context
[Tree] (config>service>cpipe>sap>ingress>policer-over>plcr stat-mode)
[Tree] (config>service>epipe>sap>egress>policer-over>plcr stat-mode)
[Tree] (config>service>epipe>sap>ingress>policer-over>plcr stat-mode)
[Tree] (config>service>ipipe>sap>ingress>policer-over>plcr stat-mode)
[Tree] (config>service>ipipe>sap>egress>policer-over>plcr stat-mode)
[Tree] (config>service>cpipe>sap>egress>policer-over>plcr stat-mode)
Full Context
configure service cpipe sap ingress policer-override policer stat-mode
configure service epipe sap egress policer-override policer stat-mode
configure service epipe sap ingress policer-override policer stat-mode
configure service ipipe sap ingress policer-override policer stat-mode
configure service ipipe sap egress policer-override policer stat-mode
configure service cpipe sap egress policer-override policer stat-mode
Description
The SAP QoS policy’s policer stat-mode command is used to configure the forwarding plane counters that allow offered, output, and discard accounting to occur for the policer. A policer has multiple types of offered packets (for example, soft in-profile and out-of-profile from ingress and hard in-profile and out-of-profile due to egress profile overrides) and each of these offered types is interacting with the policers metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the potentially large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers will not be configured with a CIR profiling rate and not all policers will receive explicitly re-profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and indicates how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer’s parent command requires that the policer’s stat-mode to be set at least to the minimal setting so that offered statistics are available for the policer’s Fair Information Rate (FIR) to be calculated.
Each time the policer’s stat mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. The total/allocated/free statistics can be viewed by using the tools dump resource-usage card slot-num fp fp-number command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The stat-mode setting defined for the policer in the QoS policy may be overridden on a SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The current active stat mode setting will continue to be used by the policer.
The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
The no form of this command attempts to return the policer’s stat-mode setting to minimal.
Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for detailed information about the supported parameters for the policer stat-mode command.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS
- configure service cpipe sap ingress policer-override policer stat-mode
- configure service cpipe sap egress policer-override policer stat-mode
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
- configure service ipipe sap ingress policer-override policer stat-mode
- configure service epipe sap egress policer-override policer stat-mode
- configure service ipipe sap egress policer-override policer stat-mode
- configure service epipe sap ingress policer-override policer stat-mode
stat-mode
Syntax
stat-mode stat-mode
no stat-mode
Context
[Tree] (config>service>vpls>sap>egress>policer-override>plcr stat-mode)
[Tree] (config>service>vpls>sap>ingress>policer-override>plcr stat-mode)
Full Context
configure service vpls sap egress policer-override policer stat-mode
configure service vpls sap ingress policer-override policer stat-mode
Description
The SAP-egress QoS policy’s policer stat-mode command is used to configure the forwarding plane counters that allow offered, output and discard accounting to occur for the policer. A policer has multiple types of offered packets (for example, soft in-profile and out-of-profile from ingress and hard in-profile and out-of-profile due to egress profile overrides) and each of these offered types is interacting with the policers metering and profiling functions resulting in colored output packets (green, yellow and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers will not be configured with a CIR profiling rate and not all policers will receive explicitly re-profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported which prevents any packet accounting, the use of the policer’s parent command requires that the policer’s stat-mode to be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. You can view the total/allocated/free stats by using the tools dump resource-usage card slot-num fp fp-number command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on a SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of the command returns the policer’s stat-mode setting to minimal.
Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for detailed information about the policer stat-mode command parameters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode stat-mode
no stat-mode
Context
[Tree] (config>service>ies>if>sap>egress>policer-override>plcr stat-mode)
[Tree] (config>service>ies>if>sap>ingress>policer-override>plcr stat-mode)
Full Context
configure service ies interface sap egress policer-override policer stat-mode
configure service ies interface sap ingress policer-override policer stat-mode
Description
The SAP-egress QoS policy’s policer stat-mode command is used to configure the forwarding plane counters that allow offered, output and discard accounting to occur for the policer. A policer has multiple types of offered packets (for example, soft in-profile and out-of-profile from ingress and hard in-profile and out-of-profile due to egress profile overrides) and each of these offered types is interacting with the policers metering and profiling functions resulting in colored output packets (green, yellow and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers will not be configured with a CIR profiling rate and not all policers will receive explicitly re-profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported which prevents any packet accounting, the use of the policer’s parent command requires that the policer’s stat-mode to be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. You can view the total/allocated/free stats by using the tools dump resource-usage card slot-num fp fp-number command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on a SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command returns the policer’s stat-mode setting to minimal.
Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for detailed information about the policer stat-mode command parameters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode stat-mode
no stat-mode
Context
[Tree] (config>service>vprn>if>sap>ingress>policer-override>plcr stat-mode)
[Tree] (config>service>vprn>if>sap>egress>policer-override>plcr stat-mode)
Full Context
configure service vprn interface sap ingress policer-override policer stat-mode
configure service vprn interface sap egress policer-override policer stat-mode
Description
The SAP-egress QoS policy’s policer stat-mode command is used to configure the forwarding plane counters that allow offered, output and discard accounting to occur for the policer. A policer has multiple types of offered packets (for example, soft in-profile and out-of-profile from ingress and hard in-profile and out-of-profile due to egress profile overrides) and each of these offered types is interacting with the policers metering and profiling functions resulting in colored output packets (green, yellow and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers will not be configured with a CIR profiling rate and not all policers will receive explicitly re-profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported which prevents any packet accounting, the use of the policer’s parent command requires that the policer’s stat-mode to be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. You can view the total/allocated/free stats by using the tools dump resource-usage card slot-num fp fp-number command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on a SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command returns the policer’s stat-mode setting to minimal.
Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for detailed information about the policer stat-mode command parameters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode {no-stats | minimal | offered-profile-no-cir | offered-priority-no-cir | offered-profile-cir | offered-priority-cir | offered-total-cir | offered-limited-profile-cir | offered-profile-capped-cir | offered-limited-capped-cir}
no stat mode
Context
[Tree] (config>qos>sap-ingress>dyn-policer stat-mode)
[Tree] (config>qos>sap-ingress>policer stat-mode)
Full Context
configure qos sap-ingress dynamic-policer stat-mode
configure qos sap-ingress policer stat-mode
Description
This command is used to configure the forwarding plane counters that allow offered, forwarded, and dropped accounting to occur for the policer. An ingress policer has multiple types of offered packets (explicit in-profile, explicit out-of-profile, uncolored, high-priority, or low priority) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the large number of policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers, for example, will not be configured with a CIR profiling rate and not all policers will receive explicitly profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer’s parent command requires that the policer's stat-mode be set at least to the minimal setting so that offered stats are available for the policer's Fair Information Rate (FIR) to be calculated. When a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. The total/allocated/free stats can be viewed by using the tools dump resource-usage card fp command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The ingress policer stat-modes are described in Ingress Policer Stat Mode Summary .
Stat Mode |
Stat Resources |
Traffic Counters (Packet/Octets) |
Comments |
|
---|---|---|---|---|
Offered |
Dropped/Forwarded |
|||
no-stats |
0 |
— |
— |
— |
Minimal |
1 |
Single counter entering policer |
Single counter for dropped/forwarded exiting policer |
— |
offered-profile-no-cir |
2 |
In/out entering policer |
In/out entering policer |
Intended for when the policer does not change the profile of packets. Includes only in-profile and out-of-profile. |
offered-priority-no-cir |
2 |
High/low entering policer |
High/low entering policer |
Intended for when only packet priority stats are required. |
offered-profile-cir |
4 |
In/out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packets to in-profile and out-of-profile. |
offered-priority-cir |
4 |
High/low entering policer |
In/out exiting policer |
Intended for when packet priority entering the policer and profile exiting the policer is required. |
offered-total-cir |
2 |
Single counter entering policer |
In/out exiting policer |
— |
offered-limited-profile-cir |
3 |
Out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packet to in-profile and out-of-profile. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
offered-profile-capped-cir |
5 |
In/out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. |
offered-limited-capped-cir |
4 |
In/uncolored entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
- no-stats
-
Counter resource allocation: 0
The policer does not have any forwarding plane counters allocated and cannot provide offered, dropped, and forwarded statistics. A policer using no-stats cannot be a child to a parent policer and the policer’s parent command will fail.
When collect-stats is enabled, no statistics are generated.
- minimal
-
Counter resource allocation: 1
This stat-mode provides the minimal accounting resource usage and counter information, and includes the total offered, dropped and forwarded packet and octet counters for traffic entering (offered) and exiting (dropped/forwarded) the policer.
The default stat-mode for a policer is minimal. The minimal mode allocates 1 forwarding plane offered counter and one traffic manager discard counter. The forwarding counter is derived by subtracting the discard counter from the offered counter. The counters do not differentiate possible offered types (profile or priority) and do not count in-profile or out-of-profile output. This does not prevent the policer from supporting different offered packet types and does not prevent the policer from supporting a CIR rate.
This counter mode is useful when only the most basic accounting information is required.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in minimal stat-mode .
Table 7. Ingress Accounting Statistics Collected in minimal stat-mode Show Output
Accounting Statistics Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. All
apd
AllPacketsDropped
aod
AllOctetsDropped
For. All
apf
AllPacketsForwarded
aof
AllOctetsForwarded
- offered-profile-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering the policer.
The offered-profile-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-profile-no-cir mode is most useful when the policer is receiving only in-profile and out-of-profile premarked (and trusted) packets. It is expected that, in this instance, a CIR rate will not be defined since all packets are already premarked. This mode does not prevent the policer from receiving untrusted (color undefined) traffic nor does it prevent the policer from being configured with a CIR rate.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-no-cir stat-mode .
Table 8. Ingress Accounting Statistics Collected in offered-profile-no-cir stat-mode Show Output
Accounting Statistics Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-priority-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the packet priority of traffic entering the policer.
The offered-priority-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-priority-no-cir mode is most useful when the policer is receiving only untrusted packets and the ingress priority high and priority low classification options are being used without a CIR profiling rate defined. This mode does not prevent the policer from receiving trusted packets that are premarked in-profile or out-of-profile nor does it prevent the policer from being configured with a CIR rate.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-priority-no-cir stat-mode .
Table 9. Ingress Accounting Statistics Collected in offered-priority-no-cir stat-mode Show Output
Accounting Statistics Collected
Field
Field Description
Off. HiPrio
hpo
HighPriorityPacketsOffered
hoo
HighPriorityOctetsOffered
Off. LowPrio
lpo
LowPriorityPacketsOffered
loo
LowPriorityOctetsOffered
Dro. HiPrio
hpd
HighPriorityPacketsDropped
hod
HighPriorityOctetsDropped
Dro. LowPrio
lpd
LowPriorityPacketsDropped
lod
LowPriorityOctetsDropped
For. HiPrio
hpf
HighPriorityPacketsForwarded
hof
HighPriorityOctetsForwarded
For. LowPrio
lpf
LowPriorityPacketsForwarded
lof
LowPriorityOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises hard in/out and uncolored traffic. The offered counters cover traffic explicitly profiled to in-profile, traffic explicitly profiled to out-of-profile, and traffic that has not been explicitly profiled at ingress (uncolored).
The offered-profile-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-profile-cir mode is most useful when the policer is receiving trusted out-of-profile and in-profile traffic and is also receiving untrusted packets that are being applied to a defined CIR profiling rate. This mode differs from offered-limited-profile-cir mode in that it expects both trusted in-profile and out-of-profile packets while still performing CIR profiling on packets with untrusted markings. If trusted in-profile packets are not being received, the offered-limited-profile-cir stat-mode could be used instead, which has the benefit of using a reduced number of stat resources.
This mode is intended to be used without profile-capped configured within the policer as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-cir stat-mode .
Table 10. Ingress Accounting Statistics Collected in offered-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-priority-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the priority of traffic entering the policer and the profile exiting the policer.
The offered-priority-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-priority-cir mode is most useful when the policer is receiving only untrusted packets that are being classified as high priority or low priority and are being applied to a defined CIR profiling rate. This mode differs from offered-profile-cir mode in that it does not expect trusted in-profile and out-of-profile packets but does not exclude the ability of the policer to receive them.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-priority-cir stat-mode .
Table 11. Ingress Accounting Statistics Collected in offered-priority-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. HiPrio
hpo
HighPriorityPacketsOffered
hoo
HighPriorityOctetsOffered
Off. LowPrio
lpo
LowPriorityPacketsOffered
loo
LowPriorityOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter.
The offered-total-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-total-cir mode is most useful when the policer is not receiving trusted in-profile or out-of-profile traffic and both high- and low-priority classifications are not being used on the untrusted packets and the offered packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile or out-of-profile packets and does not prevent the use of priority high or low classifications on the untrusted packets.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-total-cir stat-mode .
Table 12. Ingress Accounting Statistics Collected in offered-total-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-profile-cir
-
Counter resource allocation: 3
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises of hard out and uncolored. The offered counters cover traffic explicitly profiled to out-of-profile and traffic that has not been explicitly profiled at ingress (Uncolor). The traffic explicitly profiled to in-profile is counted with the uncolored traffic.
The offered-limited-profile-cir mode allocates three forwarding plane offered counters and three traffic manager discard counters.
The offered-limited-profile-cir mode is most useful when the policer is receiving trusted out-of-profile (profile out but no profile in) traffic and untrusted packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile packets. If trusted in-profile packets are not being received, the offered-limited-profile-cir is preferred over offered-profile-cir because it uses a reduced number of stat resources.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-limited-profile-cir stat-mode .
Table 13. Ingress Accounting Statistics Collected in offered-limited-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
- offered-profile-capped-cir
-
Counter resource allocation: 5
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises of hard in/out and uncolored. The offered counters cover traffic explicitly profiled to in-profile, traffic explicitly profiled to out-of-profile, and traffic that has not been explicitly profiled at ingress (Uncolor).
When offered-profile-capped-cir is defined, the system creates five offered-output counters in the forwarding plane and five discard counters in the traffic manager.
The offered-profile-capped-cir mode is similar to the offered-profile-cir mode except that it includes support for profile in and soft-in-profile that may be output as out-of-profile due to enabling profile-capped mode on the ingress policer.
The impact of using offered-profile-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-capped-cir stat-mode .
Table 14. Ingress Accounting Statistics Collected in offered-profile-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-capped-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed resulting in the traffic entering the policer comprising of hard in/out and uncolored. The offered counters cover in-profile traffic and traffic that has not been explicitly profiled at ingress (Uncolor). The traffic explicitly profiled to out-of-profile is counted with the uncolored traffic.
When offered-limited-capped-cir is defined, the system creates four forwarding plane offered-output counters in the network processor and four discard counters in the traffic manager.
The offered-limited-capped-cir mode is similar to the offered-profile-capped-cir mode except that it combines soft in-profile with profile in (InProf) and profile out (OutProf) with soft-out-of-profile (Uncolor) and eliminates the "offered undefined” statistic. If trusted out-of-profile packets are not being received, the offered-limited-capped-cir is preferred over offered-profile-capped-cir because it uses a reduced number of stat resources.
This mode is intended to be used with profile-capped configured within the policer.
The impact of using offered-limited-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-limited-capped-cir stat-mode .
Table 15. Ingress Accounting Statistics Collected in offered-limited-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
- configure qos sap-ingress dynamic-policer stat-mode
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
- configure qos sap-ingress policer stat-mode
stat-mode
Syntax
stat-mode {no-stats | minimal | offered-profile-no-cir | offered-profile-cir | offered-total-cir | offered-limited-capped-cir | offered-profile-capped-cir}
no stat mode
Context
[Tree] (config>qos>sap-egress>dyn-policer stat-mode)
Full Context
configure qos sap-egress dynamic-policer stat-mode
Description
The sap-egress QoS policy's policer stat-mode command is used to configure the forwarding plane counters that allow offered, forwarded, and dropped accounting to occur for the policer. An egress policer has multiple types of offered packets (soft in-profile and out-of-profile from ingress and hard in-profile, out-of-profile, and exceed-profile due to egress profile overrides) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers, for example, will not be configured with a CIR profiling rate and not all policers will receive explicitly reprofiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer's parent command requires that the policer’s stat-mode be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated. When a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer's stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane's policer counter resources. The total, allocated, and free statistics can be viewed by using the tools dump resource-usage card fp command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The egress policer stat-modes are described in Egress Policer Stat-mode Summary.
Stat Mode |
Stat Resources |
Traffic Counters (Packet/Octets) |
Comments |
|
---|---|---|---|---|
Offered |
Dropped/Forwarded |
|||
no-stats |
0 |
— |
— |
— |
minimal |
1 |
Single counter entering policer |
Single counter for dropped/forwarded exiting policer |
— |
offered-profile-no-cir |
2 |
In or out entering policer |
In/out entering policer |
Intended for when the policer does not change the profile of packets. Includes only in-profile and out-of-profile. |
offered-profile-cir |
4 |
In, out, or uncolored (which corresponds to hard in-profile, hard out-of-profile, or soft in- or out-of-profile) entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packets to in-profile and out-of-profile. |
offered-total-cir |
2 |
Single counter entering policer |
In/out exiting policer |
— |
offered-limited-capped-cir |
4 |
In or out entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
offered-profile-capped-cir |
5 |
In, out, or uncolored (which corresponds to hard in-profile, hard out-of-profile, or soft in- or out-of-profile) entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured |
When a policer is created within the policy, the default setting for stat-mode is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
- no-stats
-
Counter resource allocation: 0
The policer does not have any forwarding plane counters allocated and cannot provide offered, discard, and forward statistics. A policer using no-stats cannot be a child to a parent policer and the policer’s parent command will fail.
When collect-stats is enabled, no statistics are generated.
- minimal
-
Counter resource allocation: 1
This stat-mode provides the minimal accounting resource usage and counter information, and includes only the total offered, dropped and forwarded packet and octet counters for traffic entering (offered) and exiting (dropped/forwarded) the policer.
The default stat-mode for a policer is minimal. The minimal mode allocates 1 forwarding plane offered counter and one traffic manager discard counter. The forwarding counter is derived by subtracting the discard counter from the offered counter. The counters do not differentiate possible offered types and do not count different profile output. This does not prevent the policer from supporting different offered packet types and does not prevent the policer from supporting a CIR rate or using exceed PIR.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in minimal stat-mode .
Table 17. Egress Accounting Statistics Collected in minimal stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. All
apd
AllPacketsDropped
aod
AllOctetsDropped
For. All
apf
AllPacketsForwarded
aof
AllOctetsForwarded
- offered-profile-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering the policer. inplus-profile traffic is counted with the in-profile counters and exceed-profile traffic is counted with the out-of-profile counters.
The offered-profile-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-profile-no-cir mode is most useful when profile-based offered, dropped, and forwarded stats are required from the egress policer, but a CIR or enable-exceed-pir is not being used to recolor the soft in-profile and out-of-profile packets. This mode does not prevent the policer from being configured with a CIR rate or using enable-exceed-pir.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode .
Table 18. Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover traffic reclassified to in-profile (which includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (which includes traffic reclassified to exceed-profile) and traffic which has not been reclassified at egress (Uncolor). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-profile-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-profile-cir mode is most useful when profile-based offered, dropped and forwarded stats are required from the egress policer and a CIR rate is being used to recolor the soft in-profile and out-of-profile packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-cir stat-mode .
Table 19. Egress Accounting Statistics Collected in offered-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-total-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-total-cir mode is most useful when the policer is not receiving trusted in-profile or out-of-profile traffic, and both high- and low- priority classifications are not being used on the untrusted packets, and the offered packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile or out-of-profile packets and does not prevent the use of priority high or low classifications on the untrusted packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-total-cir stat-mode .
Table 20. Egress Accounting Statistics Collected in offered-total-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-capped-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover in-profile traffic (which includes traffic reclassified to inplus-profile) and out-of-profile traffic (which includes traffic reclassified to exceed-profile). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
offered-limited-capped-cir is defined, the system creates four forwarding plane offered-output counters in the network processor and three discard counters in the traffic manager.
The offered-limited-capped-cir mode is similar to the offered-profile-capped-cir mode except that it combines soft in-profile with profile in and soft-out-of-profile with profile out and eliminates the offered-undefined statistic.
The impact of using offered-limited-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in instead of offered-undefined.
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode .
Table 21. Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-capped-cir
-
Counter resource allocation: 5
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover traffic reclassified to in-profile (which includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (which includes traffic reclassified to exceed-profile) and traffic that has not been reclassified at egress (uncolored). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
When offered-profile-capped-cir is defined, the system creates five offered-output counters in the forwarding plane and five discard counters in the traffic manager.
The offered-profile-capped-cir mode is similar to the offered-profile-cir mode except that it includes support for profile inplus, profile in and soft-in-profile that may be output as out-of-profile due to enabling profile-capped mode on the ingress policer.
The impact of using offered-profile-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in (hard in-profile) instead of offered-undefined (uncolored).
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode .
Table 22. Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
stat-mode
Syntax
stat-mode {no-stats | minimal | offered-profile-no-cir | offered-profile-cir | offered-total-cir | offered-limited-capped-cir | offered-profile-capped-cir | offered-total-cir-exceed | offered-four-profile-no-cir | offered-total-cir-four-profile}
no stat mode
Context
[Tree] (config>qos>sap-egress>policer stat-mode)
Full Context
configure qos sap-egress policer stat-mode
Description
The sap-egress QoS policy's policer stat-mode command is used to configure the forwarding plane counters that allow offered, forwarded, and dropped accounting to occur for the policer. An egress policer has multiple types of offered packets (soft in-profile and out-of-profile from ingress and hard in-profile, out-of-profile, and exceed-profile due to egress profile overrides) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers, for example, will not be configured with a CIR profiling rate and not all policers will receive explicitly reprofiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer's parent command requires that the policer’s stat-mode be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated. When a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer's stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane's policer counter resources. The total, allocated, and free statistics can be viewed by using the tools dump resource-usage card fp command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The egress policer stat-modes are described in Egress Policer Stat-mode Summary.
Stat Mode |
Stat Resources |
Traffic Counters (Packet/Octets) |
Comments |
|
---|---|---|---|---|
Offered |
Dropped/Forwarded |
|||
no-stats |
0 |
— |
— |
— |
minimal |
1 |
Single counter entering policer |
Single counter for dropped/forwarded exiting policer |
— |
offered-profile-no-cir |
2 |
In or out entering policer |
In/out entering policer |
Intended for when the policer does not change the profile of packets. Includes only in-profile and out-of-profile. |
offered-profile-cir |
4 |
In, out, or uncolored (which corresponds to hard in-profile, hard out-of-profile, or soft in- or out-of-profile) entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packets to in-profile and out-of-profile. |
offered-total-cir |
2 |
Single counter entering policer |
In/out exiting policer |
— |
offered-limited-capped-cir |
4 |
In or out entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
offered-profile-capped-cir |
5 |
In, out, or uncolored (which corresponds to hard in-profile, hard out-of-profile, or soft in- or out-of-profile) entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured |
offered-total-cir-exceed |
3 |
Single counter entering policer |
In/out/exceed exiting policer |
Intended for when the policer is configured with enable-exceed-pir to forward packets that exceed its configured PIR or when traffic is reclassified at egress to exceed-profile |
offered-four-profile-no-cir |
4 |
Inplus, in, out, or exceed entering policer |
Inplus/in/out/exceed entering policer |
Intended to be used when the policer does not change the profile of the packets and traffic is reclassified at egress to inplus and/or exceed-profile |
offered-total-cir-four-profile |
4 |
Single counter entering policer |
Inplus, in, out, or exceed exiting policer |
Intended to be used when the policer can change the profile of the packet and traffic is reclassified at egress to profile inplus |
When a policer is created within the policy, the default setting for stat-mode is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
- no-stats
-
Counter resource allocation: 0
The policer does not have any forwarding plane counters allocated and cannot provide offered, discard, and forward statistics. A policer using no-stats cannot be a child to a parent policer and the policer’s parent command will fail.
When collect-stats is enabled, no statistics are generated.
- minimal
-
Counter resource allocation: 1
This stat-mode provides the minimal accounting resource usage and counter information, and includes only the total offered, dropped and forwarded packet and octet counters for traffic entering (offered) and exiting (dropped/forwarded) the policer.
The default stat-mode for a policer is minimal. The minimal mode allocates 1 forwarding plane offered counter and one traffic manager discard counter. The forwarding counter is derived by subtracting the discard counter from the offered counter. The counters do not differentiate possible offered types and do not count different profile output. This does not prevent the policer from supporting different offered packet types and does not prevent the policer from supporting a CIR rate or using exceed PIR.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in minimal stat-mode .
Table 24. Egress Accounting Statistics Collected in minimal stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. All
apd
AllPacketsDropped
aod
AllOctetsDropped
For. All
apf
AllPacketsForwarded
aof
AllOctetsForwarded
- offered-profile-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering the policer. inplus-profile traffic is counted with the in-profile counters and exceed-profile traffic is counted with the out-of-profile counters.
The offered-profile-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-profile-no-cir mode is most useful when profile-based offered, dropped, and forwarded stats are required from the egress policer, but a CIR or enable-exceed-pir is not being used to recolor the soft in-profile and out-of-profile packets. This mode does not prevent the policer from being configured with a CIR rate or using enable-exceed-pir.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode .
Table 25. Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover traffic reclassified to in-profile (which includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (which includes traffic reclassified to exceed-profile) and traffic which has not been reclassified at egress (Uncolor). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-profile-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-profile-cir mode is most useful when profile-based offered, dropped and forwarded stats are required from the egress policer and a CIR rate is being used to recolor the soft in-profile and out-of-profile packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-cir stat-mode .
Table 26. Egress Accounting Statistics Collected in offered-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-total-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-total-cir mode is most useful when the policer is not receiving trusted in-profile or out-of-profile traffic, and both high- and low- priority classifications are not being used on the untrusted packets, and the offered packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile or out-of-profile packets and does not prevent the use of priority high or low classifications on the untrusted packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-total-cir stat-mode .
Table 27. Egress Accounting Statistics Collected in offered-total-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-capped-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover in-profile traffic (which includes traffic reclassified to inplus-profile) and out-of-profile traffic (which includes traffic reclassified to exceed-profile). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
offered-limited-capped-cir is defined, the system creates four forwarding plane offered-output counters in the network processor and three discard counters in the traffic manager.
The offered-limited-capped-cir mode is similar to the offered-profile-capped-cir mode except that it combines soft in-profile with profile in and soft-out-of-profile with profile out and eliminates the offered-undefined statistic.
The impact of using offered-limited-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in instead of offered-undefined.
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode .
Table 28. Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-capped-cir
-
Counter resource allocation: 5
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is made up of traffic that is inplus-profile, in-profile, out-of-profile, exceed-profile, soft in-profile, and soft out-of-profile. The offered counters cover traffic reclassified to in-profile (which includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (which includes traffic reclassified to exceed-profile) and traffic that has not been reclassified at egress (uncolored). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
When offered-profile-capped-cir is defined, the system creates five offered-output counters in the forwarding plane and five discard counters in the traffic manager.
The offered-profile-capped-cir mode is similar to the offered-profile-cir mode except that it includes support for profile inplus, profile in and soft-in-profile that may be output as out-of-profile due to enabling profile-capped mode on the ingress policer.
The impact of using offered-profile-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in (hard in-profile) instead of offered-undefined (uncolored).
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode .
Table 29. Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir-exceed
-
Counter resource allocation: 3
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter. The offered-total-cir-exceed mode allocates three forwarding plane offered counters and three traffic manager discard counters.
The offered-total-cir-exceed mode is similar to the offered-total-cir mode except that it includes support for forwarded and dropped counters for profile exceed.
This mode is intended to be used when the policer is configured with enable-exceed-pir to forward packets that exceed its configured PIR or when traffic is egress reclassified to profile exceed. The mode gives the forwarded and dropped counters per profile (in, out, exceed). It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-total-cir-exceed stat-mode .
Table 30. Egress Accounting Statistics Collected in offered-total-cir-exceed stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
- offered-four-profile-no-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering the policer. Offered, dropped, and forwarded counters are provided for inplus, in, out and exceed-profile traffic.
The offered-four-profile-no-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-four-profile-no-cir mode is similar to the offered-profile-no-cir mode except that it includes support for offered, dropped, and forwarded counters for both inplus-profile and exceed-profile.
This mode is intended to be used when traffic is egress reclassified to inplus and/or exceed-profile. It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-four-profile-no-cir stat-mode .
Table 31. Egress Accounting Statistics Collected in offered-four-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. ExcProf
xpo
ExceedProfilePacketsOffered
xoo
ExceedProfileOctetsOffered
Off. InplusProf
ppo
InplusProfilePacketsOffered
poo
InplusProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
Dro. InprofProf
ppd
InplusProfilePktsDropped
pod
InplusProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
For. InplusProf
ppf
InplusProfilePktsForwarded
pof
InplusProfileOctetsForwarded
- offered-total-cir-four-profile
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. There is a separate dropped and forwarded counter for inplus, in, out and exceed-profile traffic.
The offered-total-cir-four-profile mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-total-cir-four-profile mode is similar to the offered-total-cir except that it includes support for forwarded and dropped counters for both profile inplus and profile exceed.
This mode is intended to be used when traffic is reclassified at egress to inplus-profile. It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Egress Accounting Statistics Collected in offered-total-cir-four-profile stat-mode .
Table 32. Egress Accounting Statistics Collected in offered-total-cir-four-profile stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
Dro. InprofProf
ppd
InplusProfilePktsDropped
pod
InplusProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
For. InplusProf
ppf
InplusProfilePktsForwarded
pof
InplusProfileOctetsForwarded
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode {no-stats | minimal | offered-profile-no-cir | offered-priority-no-cir | offered-profile-cir | offered-priority-cir | offered-total-cir | offered-limited-profile-cir | offered-profile-capped-cir | offered-limited-capped-cir}
no stat mode
Context
[Tree] (config>qos>qgrps>ing>qgrp>policer stat-mode)
Full Context
configure qos queue-group-templates ingress queue-group policer stat-mode
Description
This command is used to configure the forwarding plane counters that allow offered, forwarded, and dropped accounting to occur for the policer. An ingress policer has multiple types of offered packets (explicit in-profile, explicit out-of-profile, uncolored, high-priority or low-priority) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the large number of policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers, for example, will not be configured with a CIR profiling rate and not all policers will receive explicitly profiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer’s parent command requires that the policer's stat-mode be set at least to the minimal setting so that offered stats are available for the policer's Fair Information Rate (FIR) to be calculated. When a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer’s stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane’s policer counter resources. The total/allocated/free stats can be viewed by using the tools dump resource-usage card fp command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The stat-modes are described in Stat Mode Descriptions.
Stat Mode |
Stat Resources |
Traffic Counters (Packet/Octets) |
Comments |
|
---|---|---|---|---|
Offered |
Dropped/Forwarded |
|||
no-stats |
0 |
None |
None |
— |
Minimal |
1 |
Single counter entering policer |
Single counter for dropped/forwarded exiting policer |
— |
offered-profile-no-cir |
2 |
In/out entering policer |
In/out entering policer |
Intended for when the policer does not change the profile of packets. Includes only in- and out-of-profile. |
offered-priority-no-cir |
2 |
High/low entering policer |
High/low entering policer |
Intended for when only packet priority stats are required. |
offered-profile-cir |
4 |
In/out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packets to in- and out-of-profile. |
offered-priority-cir |
4 |
High/low entering policer |
In/out exiting policer |
Intended for when packet priority entering the policer and profile exiting the policer is required. |
offered-total-cir |
2 |
Single counter entering policer |
In/out exiting policer |
— |
offered-limited-profile-cir |
3 |
Out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packet to in- and out-of-profile. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
offered-profile-capped-cir |
5 |
In/out/uncolored entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. |
offered-limited-capped-cir |
4 |
In/uncolored entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
- no-stats
-
Counter resource allocation: 0
The policer does not have any forwarding plane counters allocated and cannot provide offered, dropped and forwarded statistics. A policer using no-stats cannot be a child to a parent policer and the policer’s parent command will fail.
When collect-stats is enabled, no statistics are generated.
- minimal
-
Counter resource allocation: 1
This stat-mode provides the minimal accounting resource usage and counter information, and includes the total offered, dropped and forwarded packet and octet counters for traffic entering (offered) and exiting (dropped/forwarded) the policer.
The default stat-mode for a policer is minimal. The minimal mode allocates 1 forwarding plane offered counter and one traffic manager discard counter. The forwarding counter is derived by subtracting the discard counter from the offered counter. The counters do not differentiate possible offered types (profile or priority) and do not count in-profile or out-of-profile output. This does not prevent the policer from supporting different offered packet types and does not prevent the policer from supporting a CIR rate.
This counter mode is useful when only the most basic accounting information is required.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in minimal stat-mode .
Table 34. Ingress Accounting Statistics Collected in minimal stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. All
apd
AllPacketsDropped
aod
AllOctetsDropped
For. All
apf
AllPacketsForwarded
aof
AllOctetsForwarded
- offered-profile-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering the policer.
The offered-profile-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-profile-no-cir mode is most useful when the policer is receiving only in-profile and out-of-profile premarked (and trusted) packets. It is expected that, in this instance, a CIR rate will not be defined since all packets are already premarked. This mode does not prevent the policer from receiving untrusted (color undefined) nor does it prevent the policer from being configured with a CIR rate.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-no-cir stat-mode .
Table 35. Ingress Accounting Statistics Collected in offered-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-priority-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the packet priority of traffic entering the policer.
The offered-priority-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-priority-no-cir mode is most useful when the policer is receiving only untrusted packets and the ingress priority high and priority low classification options are being used without a CIR profiling rate defined. This mode does not prevent the policer from receiving trusted packets that are premarked in-profile or out-of-profile nor does it prevent the policer from being configured with a CIR rate.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-priority-no-cir stat-mode .
Table 36. Ingress Accounting Statistics Collected in offered-priority-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. HiPrio
hpo
HighPriorityPacketsOffered
hoo
HighPriorityOctetsOffered
Off. LowPrio
lpo
LowPriorityPacketsOffered
loo
LowPriorityOctetsOffered
Dro. HiPrio
hpd
HighPriorityPacketsDropped
hod
HighPriorityOctetsDropped
Dro. LowPrio
lpd
LowPriorityPacketsDropped
lod
LowPriorityOctetsDropped
For. HiPrio
hpf
HighPriorityPacketsForwarded
hof
HighPriorityOctetsForwarded
For. LowPrio
lpf
LowPriorityPacketsForwarded
lof
LowPriorityOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises of hard in/out and uncolored. The offered counters cover traffic explicitly profiled to in-profile, traffic explicitly profiled to out-of-profile, and traffic that has not been explicitly profiled at ingress (uncolored).
The offered-profile-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-profile-cir mode is most useful when the policer is receiving trusted out-of-profile and in-profile traffic and is also receiving untrusted packets that are being applied to a defined CIR profiling rate. This mode differs from offered-limited-profile-cir mode in that it expects both trusted in-profile and out-of-profile packets while still performing CIR profiling on packets with untrusted markings. If trusted in-profile packets are not being received, the offered-limited-profile-cir stat-mode could be used instead, which has the benefit of using a reduced number of stat resources.
This mode is intended to be used without profile-capped configured within the policer as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-cir stat-mode .
Table 37. Ingress Accounting Statistics Collected in offered-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-priority-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the priority of traffic entering the policer and the profile exiting the policer.
The offered-priority-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-priority-cir mode is most useful when the policer is receiving only untrusted packets that are being classified as high priority or low priority and are being applied to a defined CIR profiling rate. This mode differs from offered-profile-cir mode in that it does not expect trusted in-profile and out-of-profile packets but does not exclude the ability of the policer to receive them.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-priority-cir stat-mode .
Table 38. Ingress Accounting Statistics Collected in offered-priority-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. HiPrio
hpo
HighPriorityPacketsOffered
hoo
HighPriorityOctetsOffered
Off. LowPrio
lpo
LowPriorityPacketsOffered
loo
LowPriorityOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter.
The offered-total-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-total-cir mode is most useful when the policer is not receiving trusted in-profile or out-of-profile traffic and both high- and low-priority classifications are not being used on the untrusted packets and the offered packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile or out-of-profile packets and does not prevent the use of priority high or low classifications on the untrusted packets.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics collected in offered-total-cir stat-mode .
Table 39. Ingress Accounting Statistics collected in offered-total-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-profile-cir
-
Counter resource allocation: 3
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises of hard out and uncolored. The offered counters cover traffic explicitly profiled to out-of-profile and traffic that has not been explicitly profiled at ingress (uncolored). The traffic explicitly profiled to in-profile is counted with the uncolored traffic.
The offered-limited-profile-cir mode allocates three forwarding plane offered counters and three traffic manager discard counters.
The offered-limited-profile-cir mode is most useful when the policer is receiving trusted out-of-profile (profile out but no profile in) traffic and untrusted packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile packets. If trusted in-profile packets are not being received, the offered-limited-profile-cir is preferred over offered-profile-cir because it uses a reduced number of stat resources.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
- offered-profile-capped-cir
-
Counter resource allocation: 5
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed so that the traffic entering the policer comprises of hard in/out and uncolored. The offered counters cover traffic explicitly profiled to in-profile, traffic explicitly profiled to out-of-profile, and traffic that has not been explicitly profiled at ingress (uncolored).
When offered-profile-capped-cir is defined, the system creates five offered-output counters in the forwarding plane and five discard counters in the traffic manager.
The offered-profile-capped-cir mode is similar to the offered-profile-cir mode except that it includes support for profile in and soft-in-profile that may be output as 'out-of-profile’ due to enabling profile-capped mode on the ingress policer.
The impact of using offered-profile-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-profile-capped-cir stat-mode .
Table 41. Ingress Accounting Statistics Collected in offered-profile-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-capped-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when ingress reclassification is performed resulting in the traffic entering the policer comprising of hard in/out and uncolored. The offered counters cover in-profile traffic and traffic that has not been explicitly profiled at ingress (uncolored). The traffic explicitly profiled to out-of-profile is counted with the uncolored traffic.
offered-limited-capped-cir is defined, the system creates four forwarding plane offered-output counters in the network processor and four discard counters in the traffic manager.
The offered-limited-capped-cir mode is similar to the offered-profile-capped-cir mode except that it combines soft in-profile with profile in (InProf) and profile out (OutProf) with soft-out-of-profile (Uncolor) and eliminates the 'offered undefined' statistic. If trusted out-of-profile packets are not being received, the offered-limited-capped-cir is preferred over offered-profile-capped-cir because it uses a reduced number of stat resources.
This mode is intended to be used with profile-capped configured within the policer.
The impact of using offered-limited-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used.
The counters displayed in the show output and those collected when collect-stats is enabled (the actual fields collected depends on the record configured in the applied accounting policy) are described in Ingress Accounting Statistics Collected in offered-limited-capped-cir stat-mode .
Table 42. Ingress Accounting Statistics Collected in offered-limited-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode {no-stats | minimal | offered-profile-no-cir | offered-profile-cir | offered-total-cir | offered-limited-capped-cir | offered-profile-capped-cir | offered-total-cir-exceed | offered-four-profile-no-cir | offered-total-cir-four-profile}
no stat mode
Context
[Tree] (cfg>qos>qgrps>egr>qgrp>policer stat-mode)
Full Context
configure qos queue-group-templates egress queue-group policer stat-mode
Description
The sap-egress QoS policy's policer stat-mode command is used to configure the forwarding plane counters that allow offered, forwarded, and dropped accounting to occur for the policer. An egress policer has multiple types of offered packets (soft in-profile and out-of-profile from ingress and hard in-profile, out-of-profile, and exceed-profile due to egress profile overrides) and each of these offered types is interacting with the policer’s metering and profiling functions resulting in colored output packets (green, yellow, and red). Due to the potential large number of egress policers, it is not economical to allocate counters in the forwarding plane for all possible offered packet types and output conditions. Many policers, for example, will not be configured with a CIR profiling rate and not all policers will receive explicitly reprofiled offered packets. The stat-mode command allows provisioning of the number of counters each policer requires and how the offered packet types and output conditions should be mapped to the counters.
While a no-stats mode is supported that prevents any packet accounting, the use of the policer's parent command requires that the policer’s stat-mode to be set at least to the minimal setting so that offered stats are available for the policer’s Fair Information Rate (FIR) to be calculated. When a policer has been made a child to a parent policer, the stat-mode cannot be changed to no-stats unless the policer parenting is first removed.
Each time the policer's stat-mode is changed, any previous counter values are lost and any new counters are set to zero.
Each mode uses a certain number of counters per policer instance that are allocated from the forwarding plane's policer counter resources. The total/allocated/free stats can be viewed by using the tools dump resource-usage card fp command. If insufficient counters exist to implement a mode on any policer instance, the stat-mode change will fail and the previous mode will continue unaffected for all instances of the policer.
The ingress policer stat-modes are described in Egress Policer Stat Mode Summary.
Stat Mode |
Stat Resources |
Traffic Counters (Packet/Octets) |
Comments |
|
---|---|---|---|---|
Offered |
Dropped/Forwarded |
|||
no-stats |
0 |
None |
None |
— |
Minimal |
1 |
Single counter entering policer |
Single counter for dropped/forwarded exiting policer |
— |
offered-profile-no-cir |
2 |
In/out entering policer |
In/out entering policer |
Intended for when the policer does not change the profile of packets. Includes only in- and out-of-profile. |
offered-profile-cir |
4 |
In/out/uncolored (that corresponds to in- or out-of-profile from the ingress processing) entering policer |
In/out exiting policer |
Intended for when the policer can change the profile of packets to in- and out-of-profile. |
offered-total-cir |
2 |
Single counter entering policer |
In/out exiting policer |
— |
offered-limited-capped-cir |
4 |
In/out entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. The information is limited compared to offered-profile-capped-cir with the benefit of using one less stat resource. |
offered-profile-capped-cir |
5 |
In/out/uncolored (that corresponds to in- or out-of-profile from the ingress processing) entering policer |
In/out exiting policer |
Intended for when the policer has profile-capped configured. |
offered-total-cir-exceed |
3 |
Single counter entering policer |
In/out/exceed exiting policer |
Intended for when the policer is configured with enable-exceed-pir to forward packets that exceed its configured PIR or when traffic is egress reclassified to profile exceed. |
offered-four-profile-no-cir |
4 |
Inplus/in/out/exceed entering policer |
Inplus/in/out/exceed entering policer |
Intended to be used when the policer does not change the profile of the packets and traffic is egress reclassified to profile inplus and/or exceed. |
offered-total-cir-four-profile |
4 |
Single counter entering policer |
Inplus/in/out/exceed exiting policer |
Intended to be used when the policer can change the profile of the packet and traffic is egress reclassified to profile inplus. |
The default stat-mode when a policer is created within the policy is minimal.
The stat-mode setting defined for the policer in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied. If insufficient policer counter resources exist to implement the override, the stat-mode override command will fail. The previous stat-mode setting active for the policer will continue to be used by the policer.
The no form of this command attempts to return the policer’s stat-mode setting to minimal. The command will fail if insufficient policer counter resources exist to implement minimal where the QoS policer is currently applied and has a forwarding class mapping.
Parameters
- no-stats
-
Counter resource allocation: 0
The policer does not have any forwarding plane counters allocated and cannot provide offered, discard, and forward statistics. A policer using no-stats cannot be a child to a parent policer and the policer’s parent command will fail.
When collect-stats is enabled, no statistics are generated.
- minimal
-
Counter resource allocation: 1
This stat-mode provides the minimal accounting resource usage and counter information, and includes only the total offered, dropped and forwarded packet and octet counters for traffic entering (offered) and exiting (dropped/forwarded) the policer.
The default stat-mode for a policer is minimal. The minimal mode allocates one forwarding plane offered counter and one traffic manager discard counter. The forwarding counter is derived by subtracting the discard counter from the offered counter. The counters do not differentiate possible offered types and do not count different profile output. This does not prevent the policer from supporting different offered packet types and does not prevent the policer from supporting a CIR rate or using exceed PIR.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in minimal stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 44. Egress Accounting Statistics Collected in minimal stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. All
apd
AllPacketsDropped
aod
AllOctetsDropped
For. All
apf
AllPacketsForwarded
aof
AllOctetsForwarded
- offered-profile-no-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering the policer. inplus-profile traffic is counted with the in-profile counters and exceed-profile traffic is counted with the out-of-of profile counters.
The offered-profile-no-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-profile-no-cir mode is most useful when profile-based offered, dropped and forwarded statistics are required from the egress policer, but a CIR or enable-exceed-pir is not being used to recolor the soft in-profile and out-of-profile packets. This mode does not prevent the policer from being configured with a CIR rate or using enable-exceed-pir.
This mode is intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 45. Egress Accounting Statistics Collected in offered-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer comprises of hard inplus/in/out/exceed and soft in/out. The offered counters cover traffic reclassified to in-profile (that includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (that includes traffic reclassified to exceed-profile), and traffic that has not been reclassified at egress (Uncolor). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-profile-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-profile-cir mode is most useful when profile-based offered, dropped and forwarded stats are required from the egress policer and a CIR rate is being used to recolor the soft in-profile and out-of-profile packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-profile-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 46. Egress Accounting Statistics Collected in offered-profile-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir
-
Counter resource allocation: 2
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
The offered-total-cir mode allocates two forwarding plane offered counters and two traffic manager discard counters.
The offered-total-cir mode is most useful when the policer is not receiving trusted in-profile or out-of-profile traffic and both high- and low-priority classifications are not being used on the untrusted packets and the offered packets are being applied to a defined CIR profiling rate. This mode does not prevent the policer from receiving trusted in-profile or out-of-profile packets and does not prevent the use of priority high or low classifications on the untrusted packets.
This mode is intended to be used without profile-capped or enable-exceed-pir configured within the policer as these could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-total-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 47. Egress Accounting Statistics Collected in offered-total-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-limited-capped-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer comprises of hard inplus/in/out/exceed and soft in/out. The offered counters cover in-profile traffic (that includes traffic reclassified to inplus-profile) and out-of-profile traffic (that includes traffic reclassified to exceed-profile). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
When offered-limited-capped-cir is defined, the system creates four forwarding plane offered-output counters in the network processor and three discard counters in the traffic manager.
The offered-limited-capped-cir mode is similar to the offered-profile-capped-cir mode except that it combines soft-in-profile with profile in and soft-out-of-profile with profile out and eliminates the offered-undefined statistic.
The impact of using offered-limited-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in instead of offered-undefined.
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 48. Egress Accounting Statistics Collected in offered-limited-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-profile-capped-cir
-
Counter resource allocation: 5
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer when egress reclassification is performed so that the traffic entering the policer is comprised of hard inplus, hard in, hard out, and hard exceed, as well as soft in and soft out. The offered counters cover traffic reclassified to in-profile (that includes traffic reclassified to inplus-profile), traffic reclassified to out-of-profile (that includes traffic reclassified to exceed-profile), and traffic that has not been reclassified at egress (uncolor). In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter and exceed-profile traffic is counted with the out-of-profile counter.
When offered-profile-capped-cir is defined, the system creates five offered-output counters in the forwarding plane and five discard counters in the traffic manager.
The offered-profile-capped-cir mode is similar to the offered-profile-cir mode except that it includes support for profile inplus, profile in, and soft-in-profile that may be output as out-of-profile due to enabling profile-capped mode on the ingress policer.
The impact of using offered-profile-capped-cir stat-mode while profile-capped mode is disabled is that one of the counting resources in the forwarding plane and traffic manager will not be used and soft-in-profile will be treated as offered-in (hard in-profile) instead of offered-undefined (uncolored).
This mode is intended to be used with profile-capped configured within the policer but without enable-exceed-pir configured as this could cause the traffic profile to be modified by the policer in a way that is not accounted for in the statistics.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 49. Egress Accounting Statistics Collected in offered-profile-capped-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. Uncolor
ucp
UncoloredPacketsOffered
uco
UncoloredOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
- offered-total-cir-exceed
-
Counter resource allocation: 3
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. In the dropped and forwarded counters, inplus-profile traffic is counted with the in-profile counter. The offered-total-cir-exceed mode allocates three forwarding plane offered counters and three traffic manager discard counters.
The offered-total-cir-exceed mode is similar to the offered-total-cir mode except that it includes support for forwarded and dropped counters for profile exceed.
This mode is intended to be used when the policer is configured with enable-exceed-pir to forward packets that exceed its configured PIR or when traffic is egress reclassified to profile exceed. The mode gives the forwarded and dropped counters per profile (in, out, exceed). It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-total-cir-exceed stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 50. Egress Accounting Statistics Collected in offered-total-cir-exceed stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
- offered-four-profile-no-cir
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering the policer. Offered, dropped, and forwarded counters are provided for inplus-profile, in-profile, out-of-profile, and exceed-profile traffic.
The offered-four-profile-no-cir mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-four-profile-no-cir mode is similar to the offered-profile-no-cir mode except that it includes support for offered, dropped and forwarded counters for both profile inplus and profile exceed.
This mode is intended to be used when traffic is egress reclassified to profile inplus and/or exceed. It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-four-profile-no-cir stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 51. Egress Accounting Statistics Collected in offered-four-profile-no-cir stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. InProf
ipo
InProfilePacketsOffered
ioo
InProfileOctetsOffered
Off. OutProf
opo
OutOfProfilePacketsOffered
ooo
OutOfProfileOctetsOffered
Off. ExcProf
xpo
ExceedProfilePacketsOffered
xoo
ExceedProfileOctetsOffered
Off. InplusProf
ppo
InplusProfilePacketsOffered
poo
InplusProfileOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
Dro. InplusProf
ppd
InplusProfilePktsDropped
pod
InplusProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
For. InplusProf
ppf
InplusProfilePktsForwarded
pof
InplusProfileOctetsForwarded
- offered-total-cir-four-profile
-
Counter resource allocation: 4
This stat-mode provides offered, dropped, and forwarded packet and octet counters corresponding to the profile of traffic entering (offered) and exiting (dropped/forwarded) the policer. All offered traffic is provided in a single counter. There is a separate dropped and forwarded counter for inplus, in, out, and exceed-profile traffic.
The offered-total-cir-four-profile mode allocates four forwarding plane offered counters and four traffic manager discard counters.
The offered-total-cir-four-profile mode is similar to the offered-total-cir except that it includes support for forwarded and dropped counters for both inplus-profile and exceed-profile.
This mode is intended to be used when traffic is egress reclassified to inplus-profile. It is also intended to be used without profile-capped configured within the policer as it could cause the traffic profile to be modified by the policer. This stat-mode is not supported for dynamic policers.
The counters displayed in the show output and those collected when collect-stats is enabled are described in Egress Accounting Statistics Collected in offered-total-cir-four-profile stat-mode (the actual fields collected depends on the record configured in the applied accounting policy).
Table 52. Egress Accounting Statistics Collected in offered-total-cir-four-profile stat-mode Show Output
Accounting Stats Collected
Field
Field Description
Off. All
apo
AllPacketsOffered
aoo
AllOctetsOffered
Dro. InProf
ipd
InProfilePacketsDropped
iod
InProfileOctetsDropped
Dro. OutProf
opd
OutOfProfilePacketsDropped
ood
OutOfProfileOctetsDropped
Dro. ExcProf
xpd
ExceedProfilePktsDropped
xod
ExceedProfileOctetsDropped
Dro. InprofProf
ppd
InplusProfilePktsDropped
pod
InplusProfileOctetsDropped
For. InProf
ipf
InProfilePacketsForwarded
iof
InProfileOctetsForwarded
For. OutProf
opf
OutOfProfilePacketsForwarded
oof
OutOfProfileOctetsForwarded
For. ExcProf
xpf
ExceedProfilePktsForwarded
xof
ExceedProfileOctetsForwarded
For. InplusProf
ppf
InplusProfilePktsForwarded
pof
InplusProfileOctetsForwarded
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
stat-mode
Syntax
stat-mode {per-fc | aggregate}
no stat-mode
Context
[Tree] (config>router>mpls>lsp>egr-stats stat-mode)
[Tree] (config>router>mpls>lsp>ingr-stats stat-mode)
[Tree] (config>router>mpls>lsp-template>egr-stats stat-mode)
Full Context
configure router mpls lsp egress-statistics stat-mode
configure router mpls lsp ingress-statistics stat-mode
configure router mpls lsp-template egress-statistics stat-mode
Description
This command sets the mode used for collecting LSP statistics.
The no form of this command reverts to the default.
Default
stat-mode per-fc
Parameters
- per-fc
-
Specifies that RSVP-TE statistics will be collected per FC.
- aggregate
-
Specifies that SR-TE statistics will be collected as an aggregate across all FCs.
Platforms
All
- configure router mpls lsp egress-statistics stat-mode
- configure router mpls lsp-template egress-statistics stat-mode
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
- configure router mpls lsp ingress-statistics stat-mode
state
state
Syntax
[no] state
Context
[Tree] (config>subscr-mgmt>wlan-gw>ue-query state)
Full Context
configure subscriber-mgmt wlan-gw ue-query state
Description
This command enables matching on a specific UE state. Multiple states can be provisioned.
The no form of this command disables matching on the specified UE state (all UEs match).
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
state
Syntax
state state
no state
Context
[Tree] (config>router>policy-options>policy-statement>entry>from state)
Full Context
configure router policy-options policy-statement entry from state
Description
This command identifies in resilient gateways which routes are associated with an active context and which routes are associated with a standby context.
Default
no state
Parameters
- state
-
Specifies the state.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
state-change
state-change
Syntax
[no] state-change
Context
[Tree] (debug>dynsvc>scripts>inst>event state-change)
[Tree] (debug>dynsvc>scripts>script>event state-change)
[Tree] (debug>dynsvc>scripts>event state-change)
Full Context
debug dynamic-services scripts instance event state-change
debug dynamic-services scripts script event state-change
debug dynamic-services scripts event state-change
Description
This command enables/disables the generation of a specific dynamic data service script debugging event output: state-change.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
state-timer
state-timer
Syntax
state-timer seconds [ action action]
no state-timer
Context
[Tree] (config>router>pcep>pcc state-timer)
Full Context
configure router pcep pcc state-timer
Description
This command configures the state timer for PCE-initiated LSPs. The state timer must be set to a value greater than the redelegation timer.
The no form of the command sets this value to the default.
Default
state-timer 180 action remove
Parameters
- seconds
-
Specifies the number of seconds before the state timer expires.
- action
-
Specifies the actions that are taken on undelegated LSPs upon the state timer expiration.
Platforms
All
stateful
stateful
Syntax
[no] stateful
Context
[Tree] (config>subscr-mgmt>rtr-adv-plcy>pfx-opt stateful)
Full Context
configure subscriber-mgmt router-advertisement-policy prefix-options stateful
Description
This command enables the configuration of RA options for stateful DHCP prefixes used by the subscriber host.
The no form of this command reverts to the default.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
stateless
stateless
Syntax
[no] stateless
Context
[Tree] (config>subscr-mgmt>rtr-adv-plcy>pfx-opt stateless)
Full Context
configure subscriber-mgmt router-advertisement-policy prefix-options stateless
Description
This command enables the configuration of RA options for stateless SLAAC prefixes used by the subscriber host.
The no form of this command reverts to the default.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
static
static
Syntax
static
Context
[Tree] (config>service>vpls>sap>igmp-snooping static)
[Tree] (config>service>vpls>spoke-sdp>igmp-snooping static)
[Tree] (config>service>vpls>spoke-sdp>mld-snooping static)
[Tree] (config>service>vpls>mesh-sdp>mld-snooping static)
[Tree] (config>service>vpls>mesh-sdp>igmp-snooping static)
[Tree] (config>service>vpls>sap>mld-snooping static)
Full Context
configure service vpls sap igmp-snooping static
configure service vpls spoke-sdp igmp-snooping static
configure service vpls spoke-sdp mld-snooping static
configure service vpls mesh-sdp mld-snooping static
configure service vpls mesh-sdp igmp-snooping static
configure service vpls sap mld-snooping static
Description
Commands in this context configure static group addresses. Static group addresses can be configured on a SAP or SDP. When present, either as a (*, g) or a (s,g) entry, multicast packets matching the configuration are forwarded even if no join message was registered for the specific group.
Platforms
All
static
Syntax
static
Context
[Tree] (config>subscr-mgmt>igmp-policy static)
[Tree] (config>subscr-mgmt>mld-policy static)
Full Context
configure subscriber-mgmt igmp-policy static
configure subscriber-mgmt mld-policy static
Description
Commands in this context configure MLD static group membership parameters.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
static
Syntax
static ip-address ieee-address
no static ip-address
Context
[Tree] (config>service>vpls>proxy-arp static)
Full Context
configure service vpls proxy-arp static
Description
This command configures static entries to be added to the table. A static MAC-IP entry requires the addition of the MAC address to the FDB as either learned or CStatic (conditional static MAC) in order to become active.
Parameters
- ip-address
-
Specifies the IPv4 address for the static entry.
- ieee-address
-
Specifies a 48-bit MAC address in the form xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx, where xx represents a hexadecimal number.
Platforms
All
static
Syntax
static ipv6-address ieee-address {host | router}
no static ipv6-address
Context
[Tree] (config>service>vpls>proxy-nd static)
Full Context
configure service vpls proxy-nd static
Description
This command configures static entries to be added to the table. A static MAC-IP entry requires the addition of the MAC address to the FDB as either dynamic or CStatic (Conditional Static MAC) in order to become active. Along with the IPv6 and MAC, the entry must also be configured as either host or router. This will determine if the received NS for the entry will be replied with the R flag set to 1 (router) or 0 (host).
Parameters
- ipv6-address
-
Specifies the IPv6 address for the static entry.
- ieee-address
-
Specifies a 48-bit MAC address in the form xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx, where xx represents a hexadecimal number.
- host
-
Specifies that the entry is type "host”.
- router
-
Specifies that the entry is type "router”.
Platforms
All
static
Syntax
static
Context
[Tree] (config>service>vprn>igmp>if static)
Full Context
configure service vprn igmp interface static
Description
This command tests forwarding on an interface without a receiver host. When enabled, data is forwarded to an interface without receiving membership reports from host members.
Platforms
All
static
Syntax
static
Context
[Tree] (config>service>vprn>mld>if static)
Full Context
configure service vprn mld interface static
Description
This command tests multicast forwarding on an interface without a receiver host. When enabled, data is forwarded to an interface without receiving membership reports from host members.
Platforms
All
static
Syntax
static
Context
[Tree] (config>service>vprn>pim>rp static)
Full Context
configure service vprn pim rp static
Description
This command enables access to the context to configure a static rendezvous point (RP) of a PIM-SM protocol instance.
Platforms
All
static
Syntax
static
Context
[Tree] (config>router>igmp>if static)
Full Context
configure router igmp interface static
Description
This command tests multicast forwarding on an interface without a receiver host. When enabled, data is forwarded to an interface without receiving membership reports from host members.
Platforms
All
static
Syntax
static
Context
[Tree] (config>router>igmp>tunnel-interface static)
Full Context
configure router igmp tunnel-interface static
Description
Commands in this context configure static multicast receiver hosts on a tunnel interface associated with an RSVP P2MP LSP.
When enabled, data is forwarded to an interface without receiving membership reports from host members.
Platforms
All
static
Syntax
static
Context
[Tree] (config>router>mld>if static)
Full Context
configure router mld interface static
Description
This command tests multicast forwarding on an interface without a receiver host. When enabled, data is forwarded to an interface without receiving membership reports from host members.
Platforms
All
static
Syntax
static
Context
[Tree] (config>router>pim>rp static)
[Tree] (config>router>pim>rp>ipv6 static)
Full Context
configure router pim rp static
configure router pim rp ipv6 static
Description
Commands in this context configure static Rendezvous Point (RP) addresses for a multicast group range.
Entries can be created or destroyed. If no IP addresses are configured in the config>router>pim>rp>static>address context, then the multicast group to RP mapping is derived from the RP-set messages received from the Bootstrap Router.
Platforms
All
static
Syntax
static microseconds
no static
Context
[Tree] (config>router>if>if-attribute>delay static)
Full Context
configure router interface if-attribute delay static
Description
This command configures the unidirectional link delay. By default there is no configured delay, the link delay metric TLV is pruned in the IGP.
The no form of this command removes the configured unidirectional link delay.
Default
no static
Parameters
- microseconds
-
Specifies the unidirectional link delay in microseconds.
Platforms
All
static
Syntax
[no] static
Context
[Tree] (config>router>bgp>next-hop-res>use-leaked-routes static)
Full Context
configure router bgp next-hop-resolution use-leaked-routes static
Description
This command configures the router to resolve any non-leaked, unlabeled unicast IPv4 or IPv6 route in the base router BGP RIB by using a static route with direct next hops leaked from any VPRN instance. A BGP route resolved this way cannot resolve other routes (including BGP routes) and cannot be redistributed into non-BGP protocols, such as IGP.
The no form of this command prevents the use of leaked static routes to resolve BGP routes of the base router.
Default
no static
Platforms
All
static
Syntax
[no] static
Context
[Tree] (config>service>vprn>bgp>next-hop-res>use-leaked-routes static)
Full Context
configure service vprn bgp next-hop-resolution use-leaked-routes static
Description
This command configures the router to resolve any non-leaked, unlabeled unicast IPv4 or IPv6 route in the VPRN BGP RIB by using a static route with direct next hops leaked from the GRT. A BGP route resolved this way cannot resolve other routes (including BGP routes) and cannot be redistributed into non-BGP protocols, such as IGP.
The no form of this command prevents the use of leaked static routes to resolve BGP routes of the VPRN.
Default
no static
Platforms
All