i Commands – Part II
interface-id-mapping
interface-id-mapping
Syntax
interface-id-mapping
Context
[Tree] (show>router>dhcp6>local-dhcp-server interface-id-mapping)
Full Context
show router dhcp6 local-dhcp-server interface-id-mapping
Description
This command displays information about the DHCPv6 server that uses a unique /64 prefix per interface-ID options combination.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of interface ID mapping information.
Output Exampleshow router 600 dhcp6 local-dhcp-server "d6" interface-id-mapping
===============================================================================
Interface-ID Mappings for DHCPv6 server d6
===============================================================================
Mapped Prefix : 2001:AAAA::/64
Relay Interface ID : 1/1/10
LDRA Interface ID : (Not Specified)
Active Leases : 2001:AAAA::1 (stable)
===============================================================================
1 prefix found
===============================================================================
Output fields: interface ID mapping describes interface ID mapping field descriptions.
Field |
Description |
---|---|
Mapped Prefix |
The mapped prefix |
Relay Interface ID |
The value of the Interface-ID Option assigned by the DHCPv6 Relay Agent |
LDRA Interface ID |
The value of the Interface-ID Option assigned by the Lightweight DHCPv6 Relay Agent |
Active Leases |
The number of active leases |
No. of prefixes found |
The total number of prefixes found. |
interface-statistics
interface-statistics
Syntax
interface-statistics service service-id all
interface-statistics service service-id group-interface grp-if
interface-statistics service service-id subscriber-interface sub-if
Context
[Tree] (clear>subscr-mgmt interface-statistics)
Full Context
clear subscriber-mgmt interface-statistics
Description
This command clears subscriber interface statistics.
Parameters
- service-id
-
Specifies the service ID of the service
- grp-id
-
Specifies the group interface name, up to 32 characters
- sub-id
-
Specifies the subscriber interface, up to 32 characters
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
interface-statistics
Syntax
interface-statistics service service-id all
interface-statistics service service-id group-interface grp-if
interface-statistics service service-id subscriber-interface sub-if
Context
[Tree] (show>subscr-mgmt interface-statistics)
Full Context
show subscriber-mgmt interface-statistics
Description
This command displays subscriber interface statistics.
Parameters
- service-id
-
Specifies the service ID of the service.
- grp-id
-
Specifies the group interface name, up to 32 characters
- sub-id
-
Specifies the subscriber interface, up to 32 characters
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of service interface statistics information.
Output Example*B:Dut-C# show subscriber-mgmt interface-statistics service 10 all
===============================================================================
Subscriber statistics for svc 10, itf si-1
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 15 15
Bytes in IP packets 1990 1990
Last cleared 06/28/2021 21:19:40
===============================================================================
===============================================================================
Subscriber statistics for svc 10, itf gi-1-6
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 5 5
Bytes in IP packets 670 670
Last cleared 06/28/2021 21:19:40
===============================================================================
===============================================================================
Subscriber statistics for svc 10, itf gi-1-11
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 10 10
Bytes in IP packets 1320 1320
Last cleared 06/28/2021 21:19:40
===============================================================================
Number of active subscriber hosts 3
===============================================================================
*B:Dut-C#
*B:Dut-C# show subscriber-mgmt interface-statistics service 10 subscriber-interface "si-1"
===============================================================================
Subscriber statistics for svc 10, itf si-1
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 15 15
Bytes in IP packets 1990 1990
Last cleared 06/28/2021 21:19:40
===============================================================================
Number of active subscriber hosts 3
===============================================================================
*B:Dut-C#
*B:Dut-C# show subscriber-mgmt interface-statistics service 10 group-interface "gi-1-6"
===============================================================================
Subscriber statistics for svc 10, itf gi-1-6
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 5 5
Bytes in IP packets 670 670
Last cleared 06/28/2021 21:19:40
===============================================================================
Number of active subscriber hosts 1
===============================================================================
*B:Dut-C#
*B:Dut-C# show subscriber-mgmt interface-statistics service 10 group-interface "gi-1-
"gi-1-11" "gi-1-6"
*B:Dut-C# show subscriber-mgmt interface-statistics service 10 group-interface "gi-1-11"
===============================================================================
Subscriber statistics for svc 10, itf gi-1-11
===============================================================================
Ingress Egress
-------------------------------------------------------------------------------
IP packets 10 10
Bytes in IP packets 1320 1320
Last cleared 06/28/2021 21:19:40
===============================================================================
Number of active subscriber hosts 2
===============================================================================
*B:Dut-C#
interfaces
interfaces
Syntax
interfaces
Context
[Tree] (show>test-oam>lag-meas interfaces)
Full Context
show test-oam lag-ip-measurement interfaces
Description
This command displays LAG measurement data on all LAG interfaces.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Output
The following output is an example of the LAG measurement data on all LAG interfaces, and Output fields: LAG IP measurement summary for all interfaces describes the output fields.
Output Example: LAG IP measurement summary for all interfacesshow test-oam lag-ip-measurement interfaces
--------------------------------------------------
LAG IP Measurement Interface Operational Summary
--------------------------------------------------
Interface
Oper Protocol Detectable Tx Error Ports
--------------------------------------------------
to-sr7
Up IPv4 none 2
--------------------------------------------------
Label |
Description |
---|---|
Interface |
Displays the interface name |
Oper |
Displays the operational state of the LAG measurement |
Protocol |
Displays the IP protocol enabled for the LAG measurement |
Detectable Tx Error |
Displays the error preventing the LAG measurement from transmitting packets on any of the ports |
Ports |
Displays the number of ports (micro sessions) |
iom
iom
Syntax
iom [slot-number]
Context
[Tree] (tools>dump>filter>resources iom)
Full Context
tools dump filter resources iom
Description
This command shows information about filter resource utilization on all IOMs or a specified IOM. Resource utilization per filter type is available, as well as filters using most resources on a given line card.
Parameters
- slot-number
-
Specifies that only the filter resource utilization associated with the IOM card in this slot will be displayed.
Platforms
All
Output
The following output is an example of filter resource utilization information for all IOMs.
Output Example*A:Dut-C>tools>dump>filter>resources># iom
=======================================================
Number of ACL filter entries used / available on IOMs
=======================================================
Slot Used Available
-------------------------------------------------------
1 11 65524
2 5 65530
3 5 65530
=======================================================
===========================================================================
Number of ACL filters and filter entries used / available on FlexPaths
===========================================================================
Slot FlexPath Dir Filters Filters MAC/IP MAC/IP IPv6 IPv6
used avail entries entries entries entries
used avail used avail
---------------------------------------------------------------------------
1 1 Ingr 2 2045 10 65526 2 28670
Egr 2 2045 5 32763 2 16382
2 1 Ingr 4 2043 7 65529 2 28670
Egr 0 2047 2 32766 2 16382
3 1 Ingr 0 2047 7 65529 2 28670
Egr 0 2047 2 32766 2 16382
===========================================================================
===============================================================================
Filters utilizing most resources (ordered by TCAM entries per FlexPath)
Only filters present on any IOM are displayed
===============================================================================
Type Id Entries Subentries TCAM entries
(per FlexPath)
-------------------------------------------------------------------------------
No Mac filters found
-------------------------------------------------------------------------------
Ip 100 5 5 5
Ip 5:23 2 2 2
Ip 6:24 2 2 2
Ip 3 1 1 1
Ip 4 1 1 1
-------------------------------------------------------------------------------
Ipv6 fSpec-0 0 0 0
Ipv6 fSpec-2345 0 0 0
No more Ipv6 filters
===============================================================================
ip
ip
Syntax
ip [filter-type filter-type]
ip embedded [inactive]
ip ip-filter-id embedded [inactive]
ip ip-filter-id [detail]
ip ip-filter-id associations
ip ip-filter-id type entry-type
ip ip-filter-id counters [type entry-type] [detail]
ip ip-filter-id entry entry-id [counters] [detail]
ip ip-filter-id [entry entry-id] effective-action [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ip ip-filter-id [entry entry-id] effective-action service service-id [{ ingress | egress}]
Context
[Tree] (show>filter ip)
Full Context
show filter ip
Description
This command displays IPv4 filter information.
When effective-action is specified, this command displays what effectively happens to a packet that matches the criteria associated with the IPv4 filter policy.
Parameters
- filter-type
-
Specifies the type of filter to display.
- inactive
-
Displays all, or optionally inactive embeddings. If ip-filter-id is specified, displays embeddings for the IP filter ID.
- ip-filter-id
-
Specifies the IPv4 filter policy for which to display information. Values can be expressed in different formats; the following shows decimal integer format.
- detail
-
Displays detailed information.
- associations
-
Appends, to the detailed filter policy output, information about where the specified filter policy is applied.
- entry-type
-
Specifies the type of filter entry to display.
- counters
-
Displays counter information for the specified filter ID. Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
- entry-id
-
Specifies the filter policy entry (of the specified filter policy) for which to display information.
- effective-action
-
Displays the action that the system will effectively apply to the packet.
- ingress
-
Filters the output and only displays the information for filter policies applied on ingress.
- egress
-
Filters the output and only displays the information for filter policies applied on egress.
- router
-
Filters the output and only displays the information for that specific service ("Base” instance).
- service-id
-
Filters the output and only displays the information for the specified service. The specified value must correspond to an existing service in which the filter has been applied.
Platforms
All
Output
Show Filter (no policy specified) — The following is an output example of IPv4 filter information when no policy is specified. Output fields: IP filter ID describes the command output fields.
Output ExampleA:ALA-49# show filter ip
===============================================================================
Configured IP Filters Total: 2
===============================================================================
Filter-Id Scope Applied Description
-------------------------------------------------------------------------------
5 Template Yes
6 Template Yes
===============================================================================
Host Common IP Filters Total: 2
===============================================================================
Filter-Id Description
-------------------------------------------------------------------------------
5:P4 Auto-created PCC-Rule Ingress Filter
6:P5 Auto-created PCC-Rule Egress Filter
===============================================================================
Num IP filters: 4
===============================================================================
Label |
Description |
---|---|
Filter Id |
The IP filter ID |
Scope |
Template — the filter policy is of type template |
Exclusive—the filter policy is of type exclusive |
|
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Description |
The IP filter policy description |
Show Filter (no filter-id specified, embedded keyword specified) — The following output is an example of IPv4 filter information when no filter ID is specified but the embedded keyword is specified. Output fields: IP (no filter ID specified) describes the command output fields.
Output Example*A:Dut-C>config>filter# show filter ip embedded
==================================================================================
IP Filter embedding
==================================================================================
In From Priority Inserted Status
----------------------------------------------------------------------------------
10 2 50 1/1 OK
1 100 1/2 OK- 1 entry overwritten
20 2 100 0/5 Failed – out of resources
==================================================================================
Label |
Description |
---|---|
In |
Shows embedding filter index |
From |
Shows embedded filters included |
Priority |
Shows priority of embedded filter |
Inserted |
Shows embedded/total number of entries from embedded filter. Status: OK — embedding operation successful, if any entries are overwritten this will also be indicated Failed — embedding failed, the reason is displayed (out of resources) |
Show Filter (with filter-id specified) — The following output is an example of IPv4 filter information with the filter ID specified. Output fields: IP filter policy describes the command output fields.
Output Example*A:Dut-B>config>filter>ip-filter# show filter ip 10
===============================================================================
IP Filter
===============================================================================
Filter Id : 10
Scope : Embedded
Type : Normal
Entries : 4
Description : (Not Specified)
Filter Name : 10
Label |
Description |
---|---|
Filter Id |
The IPv4 filter policy ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Scope |
Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive |
|
Type |
Normal — the filter policy is of type normal |
src-mac — the filter policy is of type src-mac |
|
Packet-length — the filter policy is of type packet-length |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
System filter |
Indicates if the filter has been chained to a system filter |
Radius Ins Pt |
Indicates the RADIUS insertion point, if any |
CrCtl. Ins Pt |
Indicates the Credit Control insertion point, if any |
RadSh. Ins Pt |
Indicates the RADIUS shared insertion point, if any |
PccRl. Ins Pt |
Indicates the PCC rule insertion point, if any |
Entries |
The number of entries configured in this filter ID |
Description |
The IPv4 filter policy entry description string |
Filter Match Criteria |
IP — Indicates the filter is an IPv4 filter policy |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Description |
The IPv4 filter policy entry description string |
Log Id |
The filter log ID |
Src. IP |
The source IPv4 address and prefix length match criterion; "0.0.0.0/0” indicates no criterion specified for the filter entry |
Src. Port |
The source TCP, UDP, or SCTP port number, port range, or port match list |
Dest. IP |
The destination IPv4 address and prefix length match criterion; "0.0.0.0/0” indicates no criterion specified for the filter entry |
Dest. Port |
The destination TCP, UDP, or SCTP port number, port range, or port match list |
Protocol |
The protocol for the match criteria; undefined indicates no protocol specified |
Dscp |
The DiffServ Code Point (DSCP) name |
ICMP Type |
The ICMP type match criterion; undefined indicates no ICMP type specified |
ICMP Code |
The ICMP code field in the ICMP header of an IPv4 packet |
Fragment |
False — Indicates if the filter is configured to match on all non-fragmented packets |
True — Indicates if the filter is configured to match on all fragmented packets |
|
First-Only — Indicates if the filter is configured to match the first fragment of a fragmented packet |
|
Non-First-Only — Indicates if the filter is configured to match a fragment of a fragmented packet, but not the first fragment |
|
Off — fragments are not a matching criteria. All fragments and non-fragments implicitly match |
|
Src Route Opt |
Indicates if the source route option has been set |
Sampling |
Off — specifies that traffic sampling is disabled |
On—specifies that traffic matching the associated IPv4 filter entry is sampled |
|
Int. Sampling |
Off — interface traffic sampling is disabled |
On — interface traffic sampling is enabled |
|
IP-Option |
Specifies matching packets with a specific IPv4 option or a range of IPv4 options in the IPv4 header for IPv4 filter match criteria |
Multiple Option |
Off — the option fields are not checked |
On — packets containing one or more option fields in the IPv4 header will be used as IPv4 filter match criteria |
|
Tcp-flag |
Specifies the list of TCP flags selected:
TCP flags not selected as match criteria are not displayed Example: Matching "tcp-ack true” and "tcp-rst false” is represented in the show command as Tcp-flag : Ack !Rst |
Option-present |
Off — specifies not to search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero be used as IPv4 filter match criteria |
|
Egress PBR |
Indicates if the egress-pbr flag is set for this entry |
Primary Action |
Indicates the configured action, if any; indented sub-labels in the show output provide configured parameters for this action |
Secondary Action |
Indicates the configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action |
PBR Target Status |
The status of the target of the primary or secondary action based on simple checks |
Extended Action |
Indicates the configured extended action, if any |
PBR Down Action |
Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down |
Downloaded Action |
The action downloaded by CPM to IOM |
Dest. Stickiness |
Indicates whether stickiness is configured |
Hold Remain |
The stickiness timer |
Ing. Matches |
The number of ingress filter matches/hits for the filter entry |
Egr. Matches |
The number of egress filter matches/hits for the filter entry |
Show Filter Associations — The following output is an example of IPv4 filter information when the associations keyword is specified. Output fields: IP associations describes the command output fields.
Output ExampleA:ALA-49# show filter ip 1 associations
===============================================================================
IP Filter
===============================================================================
Filter Id : 4 Applied : Yes
Scope : Template Def. Action : Drop
System filter : Unchained
Radius Ins Pt : n/a
CrCtl. Ins Pt : n/a
RadSh. Ins Pt : n/a
PccRl. Ins Pt : n/a
Entries : 1
Description : (Not Specified)
-------------------------------------------------------------------------------
Filter Association : IP
-------------------------------------------------------------------------------
Service Id : 2 Type : VPLS
- SAP 1/2/2 (Ingress)
-------------------------------------------------------------------------------
Filter associated with IOM: 1
===============================================================================
Label |
Description |
---|---|
Filter Id |
The IPv4 filter policy ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Scope |
Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive |
|
Type |
Normal — the filter policy is of type normal |
src-mac — the filter policy is of type src-mac |
|
Packet-length — the filter policy is of type packet-length |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop—the default action for the filter ID for packets that do not match the filter entries is to drop |
|
System filter |
Indicates if the filter has been chained to a system filter |
Radius Ins Pt |
Indicates the RADIUS insertion point, if any |
CrCtl. Ins Pt |
Indicates the Credit Control insertion point, if any |
RadSh. Ins Pt |
Indicates the RADIUS shared insertion point, if any |
PccRl. Ins Pt |
Indicates the PCC rule insertion point, if any |
Entries |
The number of entries configured in this filter ID |
Description |
The IPv4 filter policy description |
Filter Association |
Indicates the filter is an IPv4 filter policy |
Service Id |
The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied |
Type |
The type of service of the service ID |
(Ingress) |
The filter policy ID is applied as an ingress filter policy on the interface |
(Egress) |
The filter policy ID is applied as an egress filter policy on the interface |
Show Filter Counters — The following output is an example of IPv4 filter information when the counters keyword is specified. Output fields: IP counters describes the command output fields.
Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
Output Example*A:ALA-48# show filter ip 100 counters
===============================================================================
IP Filter
===============================================================================
Filter Id : 4 Applied : Yes
Scope : Template Def. Action : Drop
System filter : Unchained
Radius Ins Pt : n/a
CrCtl. Ins Pt : n/a
RadSh. Ins Pt : n/a
PccRl. Ins Pt : n/a
Entries : 1
Description : (Not Specified)
-------------------------------------------------------------------------------
Filter Match Criteria : IP
-------------------------------------------------------------------------------
Entry : 4001
Ing. Matches : 9788619 pkts (978861900 bytes)
Egr. Matches : 9788619 pkts (978861900 bytes)
===============================================================================
Label |
Description |
---|---|
Filter Id |
The IPv4 filter policy ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Scope |
Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
System filter |
Indicates if the filter has been chained to a system filter |
Radius Ins Pt |
Indicates the RADIUS insertion point, if any |
CrCtl. Ins Pt |
Indicates the Credit Control insertion point, if any |
RadSh. Ins Pt |
Indicates the RADIUS shared insertion point, if any |
PccRl. Ins Pt |
Indicates the PCC rule insertion point, if any |
Entries |
The number of entries configured in this filter ID |
Description |
The IPv4 filter policy description |
Filter Match Criteria |
IP — Indicates the filter is an IPv4 filter policy |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Ing. Matches |
The number of ingress filter matches/hits for the filter entry |
Egr. Matches |
The number of egress filter matches/hits for the filter entry |
Show Filter IP Output (with effective-action specified) — The following output is an example of IPv4 filter information when the effective-action keyword is specified. Output fields: filter IP effective action describes the command output fields.
If the main action (either primary or secondary) cannot be performed, a reason will be given. This will be displayed on the same line as the Effective Action. The reason codes as currently defined are:
-
action not supported in L2 service
-
action not supported in L3 service
-
action not supported on egress
-
destination not reachable
-
egress-pbr is off
-
egress-pbr is on
-
entry-default
-
filter-default-action
-
not POS unnumbered interface
-
pbr-down-action-override
-
target does not exist
show filter ip 1 effective-action
===============================================================================
IP Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template Def. Action : Drop
Entries : 1
Description : (Not Specified)
-------------------------------------------------------------------------------
Entry : 1
-------------------------------------------------------------------------------
Stickiness : No
PBR Dwn Act Override: None
PBR Down Action : Drop (entry-default)
Configuration
Primary Action : Forward (SAP)
Next Hop : 1/1/2
Service Id : 10
Secondary Action : None
Status
Target status based on extended checks
Primary Action : Down
Secondary Action : None
Downloaded Action : Primary
Stickiness Timer : Not Running
Effective Action based on application context
Service Id : 10 Type : VPLS
Ingress
Effective Action: Drop (entry-default)
===============================================================================
Label |
Description |
---|---|
Filter Id |
The IPv4 filter policy ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Scope |
Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
Entries |
The number of entries configured in this filter ID |
Description |
The IPv4 filter policy description |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Stickiness |
No — stickiness is not configured |
Yes — stickiness is configured |
|
PBR Dwn Act Override |
Indicates whether or not the action to take when the PBR target is down has been overridden |
PBR Down Action |
Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down |
Configuration |
Section of the output providing information on the configured parameters |
Primary Action |
The configured action, if any; indented sub-labels in the show output provide configured parameters for this action |
Secondary Action |
The configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action |
Status/Target status based on extended checks |
Section of the output providing information on the operational status of certain parameters |
Primary Action |
The status of the target of the primary action, if any configured, based on extended checks |
Secondary Action |
The status of the target of the secondary action, if any configured, based on extended checks |
Downloaded Action |
The action downloaded by the CPM to the IOM |
Stickiness Timer |
The status of the stickiness timer, if any |
Effective Action based on application context |
Section of the output providing the effective action, in the context of services, that a packet matching the criteria will be subject to |
Service Id |
The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied |
Type |
The service type in which the service has been applied |
Ingress/Egress |
The direction in which the service has been applied |
Effective Action |
The effective action that the packet will be subject to |
Extended Action |
Indicates the configured extended action, if any |
ip
Syntax
ip ip-filter-id [entry entry-id] [{ingress | egress}]
Context
[Tree] (clear>filter ip)
Full Context
clear filter ip
Description
Clears the counters associated with the entries of the specified IPv4 filter policy.
By default, the counters associated with each entry of the specified filter policy are all cleared. The scope of which counters are cleared can be narrowed using the command line parameters.
Default
Clears all counters associated with each entry of the specified IPv4 filter policy.
Parameters
- ip-filter-id
-
The IPv4 filter policy ID for which to clear the entry counters. Values can be expressed in different formats. The following shows decimal integer format.
- entry-id
-
Specifies that only the counters associated with the specified filter policy entry are cleared.
- ingress
-
Specifies to only clear the ingress counters.
- egress
-
Specifies to only clear the egress counters.
Platforms
All
ip
Syntax
ip ip-filter-id
Context
[Tree] (tools>dump>filter>resources ip)
Full Context
tools dump filter resources ip
Description
This command displays information about the specified IP filter including resource utilization on CPM and IOM, the IOMs on which the filter is used, and the entries using the most resources.
Parameters
- ip-filter-id
-
Specifies that only the filter resource utilization associated with this IP filter will be displayed.
Platforms
All
Output
The following output is an example of IP filter resource utilization information.
Output Example*A:Dut-C>tools>dump>filter>resources># ip 100
===============================================================================
Resource utilization details for Ip filter 100
===============================================================================
CPM entries used : 5
CPM subentries used : 5
TCAM entries used (per FlexPath) : 5
Associated with IOMs : 1,2,3,4,5,6,7,8,9,10
---------------------------------------------------------------------------
Largest 5 entries
---------------------------------------------------------------------------
Entry ID Active TCAM entries
(per FlexPath)
---------------------------------------------------------------------------
3 Yes 1
4 Yes 1
5 Yes 1
6 Yes 1
100 Yes 1
---------------------------------------------------------------------------
===============================================================================
ip
Syntax
ip entry entry-id [interval seconds] [ repeat repeat] [absolute | rate]
Context
[Tree] (monitor>cpm-filter ip)
Full Context
monitor cpm-filter ip
Description
This command displays monitor command statistics for IP filter entries.
Parameters
- entry-id
-
Displays information on the specified filter entry ID for the specified filter ID only.
- seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ip
Syntax
ip ip-filter-id entry entry-id [interval seconds] [repeat repeat] [absolute | rate]
Context
[Tree] (monitor>filter ip)
Full Context
monitor filter ip
Description
This command enables IP filter monitoring. The statistical information for the specified IP filter entry displays at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the specified IP filter. The subsequent statistical information listed for each interval is displayed as a delta to the previous display.
When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
Parameters
- ip-filter-id
-
Displays detailed information for the specified filter ID and its filter entries.
- entry-id
-
Displays information on the specified filter entry ID for the specified filter ID only.
- seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
All
Output
The following output is an example of filter IP information.
Output ExampleA:ALA-1>monitor# filter ip 10 entry 1 interval 3 repeat 3 absolute
===============================================================================
Monitor statistics for IP filter 10 entry 1
===============================================================================
At time t = 0 sec (Base Statistics)
-------------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
-------------------------------------------------------------------------------
At time t = 3 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
-------------------------------------------------------------------------------
At time t = 6 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
-------------------------------------------------------------------------------
At time t = 9 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
===============================================================================
A:ALA-1>monitor#
A:ALA-1>monitor# filter ip 10 entry 1 interval 3 repeat 3 rate
===========================================================================
Monitor statistics for IP filter 10 entry 1
===========================================================================
At time t = 0 sec (Base Statistics)
---------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
---------------------------------------------------------------------------
At time t = 3 sec (Mode: Rate)
---------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
---------------------------------------------------------------------------
At time t = 6 sec (Mode: Rate)
---------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
---------------------------------------------------------------------------
At time t = 9 sec (Mode: Rate)
---------------------------------------------------------------------------
Ing. Matches: 0 Egr. Matches : 0
===========================================================================
A:ALA-1>monitor#
ip
Syntax
ip entry entry-id [interval seconds] [ repeat repeat] [absolute | rate]
Context
[Tree] (monitor>management-access-filter ip)
Full Context
monitor management-access-filter ip
Description
This command monitors statistics for the MAF IP filter entry.
Parameters
- entry-id
-
Specifies an existing IP MAF entry ID.
- seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
All
ip
Syntax
ip
Context
[Tree] (show>system ip)
Full Context
show system ip
Description
This command displays the system IP configuration.
Platforms
All
ip
Syntax
ip
Context
[Tree] (clear ip)
Full Context
clear ip
Description
Commands in this context clear IP tunnel information.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ip
Syntax
ip
Context
[Tree] (show ip)
Full Context
show ip
Description
Commands in this context display IP related information.
Platforms
All
ip-exception
ip-exception
Syntax
ip-exception
ip-exception ip-filter-id
ip-exception ip-filter-id [{associations | counters}]
ip-exception ip-filter-id entry entry-id [counters]
Context
[Tree] (show>filter ip-exception)
Full Context
show filter ip-exception
Description
This command shows IPv4 exception information.
Parameters
- filter-id
-
Specifies the IPv4 exception filter.
- associations
-
Displays associations applicable to the specified IPv4 exception.
- counters
-
Displays counters for the specified IPv4 exception.
- entry entry-id
-
Specifies an integer that identifies the entry.
Platforms
VSR
Output
The following output is an example of IPv4 exception filter information, and Output fields: IPv4 exception describes the fields.
Output Example*A:Dut-C>config>filter>ip-except>entry$ show filter ip-exception 1
===============================================================================
IP-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 2
Description : Default description for ip-exception 1
Filter Name : ip-exception-1
-------------------------------------------------------------------------------
Filter Match Criteria : IP
-------------------------------------------------------------------------------
Entry : 1
Description : Default description for Ip Exception Policy id # 1 entry
1
Src. IP : 0.0.0.0/0
Src. Port : n/a
Dest. IP : 0.0.0.0/0
Dest. Port : n/a
Protocol : 1
ICMP Type : Undefined ICMP Code : Undefined
Ing. Matches : 0 pkts
Egr. Matches : 10 pkts (1060 bytes)
Entry : 2
Description : (Not Specified)
Src. IP : 192.168.1.0/24
Src. Port : n/a
Dest. IP : 10.10.1.0/24
Dest. Port : n/a
Protocol : Undefined
ICMP Type : Undefined ICMP Code : Undefined
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
===============================================================================
*A:Dut-C>config>filter>ip-except>entry$
Label |
Description |
---|---|
Filter-Id |
The filter ID. |
Scope |
Template — The filter policy is of type Template. Exclusive — The filter policy is of type Exclusive. |
Applied |
No — The IPv6 exception filter has not been applied. Yes — The IPv6 exception filter is applied. |
Entries |
The number of entries. |
Description |
The description of the specified filter, if specified. |
Filter Name |
The filter name. |
Filter Match Criteria |
IP — Indicates the filter is an IPv4 filter policy. |
Entry |
The number of active or inactive entries. |
Description |
The IPv4 filter policy entry description string. |
Src. IP |
The source IP address of the logged packet. |
Src. Port |
The source port of the logged packet. |
Dst. IP |
The destination IP address of the logged packet. |
Dst. Port |
The destination port of the logged packet. |
Protocol |
The protocol for the match criteria; undefined indicates no protocol specified. |
ICMP Type |
The ICMP type match criterion. Undefined indicates no ICMP type specified. |
Ing. Matches |
The number of packets matched on ingress. |
Egr. Matches |
The number of packets matched on egress. |
ip-exception
Syntax
ip-exception filter-id [entry entry-id] [{ingress | egress}]
Context
[Tree] (clear>filter ip-exception)
Full Context
clear filter ip-exception
Description
This command clears the counters associated with the entries of the specified IP exception filter policy.
Parameters
- filter-id
-
Specifies the filter policy ID for which to clear the entry counters.
- entry-id
-
Specifies that only the counters associated with the specified filter policy entry are cleared.
- ingress
-
Specifies to only clear the ingress counters.
- egress
-
Specifies to only clear the egress counters.
Platforms
VSR
ip-filter
ip-filter
Syntax
ip-filter [entry entry-id]
Context
[Tree] (show>system>security>cpm-filter ip-filter)
Full Context
show system security cpm-filter ip-filter
Description
This command displays CPM IP filters.
Parameters
- entry-id
-
Identifies a CPM filter entry as configured on this system.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Output
The following output is an example of IP filter entry information.
Output fields: CPM IP filter describes CPM IP filter output fields.
Output ExampleA:ALA-35# show system security cpm-filter ip-filter
===============================================================================
CPM IP Filters
===============================================================================
Entry-Id Dropped Forwarded Description
-------------------------------------------------------------------------------
101 25880 0 CPM-Filter 10.4.101.2 #101
102 25880 0 CPM-Filter 10.4.102.2 #102
103 25880 0 CPM-Filter 10.4.103.2 #103
104 25882 0 CPM-Filter 10.4.104.2 #104
105 25926 0 CPM-Filter 10.4.105.2 #105
106 25926 0 CPM-Filter 10.4.106.2 #106
107 25944 0 CPM-Filter 10.4.107.2 #107
108 25950 0 CPM-Filter 10.4.108.2 #108
109 25968 0 CPM-Filter 10.4.109.2 #109
110 25984 0 CPM-Filter 10.4.110.2 #110
111 26000 0 CPM-Filter 10.4.111.2 #111
112 26018 0 CPM-Filter 10.4.112.2 #112
113 26034 0 CPM-Filter 10.4.113.2 #113
114 26050 0 CPM-Filter 10.4.114.2 #114
115 26066 0 CPM-Filter 10.4.115.2 #115
116 26084 0 CPM-Filter 10.4.116.2 #116
===============================================================================
A:ALA-35#
A:ALA-35# show system security cpm-filter ip-filter entry 101
===============================================================================
CPM IP Filter Entry
===============================================================================
Entry Id : 101
Description : CPM-Filter 10.4.101.2 #101
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id : n/a
Src. IP : 10.4.101.2/32 Src. Port : 0
Dest. IP : 10.4.101.1/32 Dest. Port : 0
Protocol : 6 Dscp : ef
ICMP Type : Undefined ICMP Code : Undefined
Fragment : True Option-present : Off
IP-Option : 130/255 Multiple Option : True
TCP-syn : Off TCP-ack : True
Match action : Drop
===============================================================================
A:ALA-35#
Label |
Description |
---|---|
Entry-Id |
Displays information about the specified management access filter entry |
Dropped |
Displays the number of dropped events. |
Forwarded |
Displays the number of forwarded events. |
Description |
Displays the CPM filter description. |
Log ID |
Displays the log ID where matched packets will be logged. |
Src IP |
Displays the source IP address(/netmask or prefix-list) |
Dest. IP |
Displays the destination IP address(/netmask). |
Src Port |
Displays the source port number (range). |
Dest. Port |
Displays the destination port number (range). |
Protocol |
Displays the Protocol field in the IP header. |
Dscp |
Displays the DSCP field in the IP header. |
Fragment |
Displays the 3-bit fragment flags or 13-bit fragment offset field. |
ICMP Type |
Displays the ICMP type field in the ICMP header. |
ICMP Code |
Displays the ICMP code field in the ICMP header. |
TCP-syn |
Displays the SYN flag in the TCP header. |
TCP-ack |
Displays the ACK flag in the TCP header |
Match action |
When the criteria matches, displays drop or forward packet. |
Next Hop |
In case match action is forward, indicates destination of the matched packet. |
Dropped pkts |
Indicates number of matched dropped packets |
Forwarded pkts |
Indicates number of matched forwarded packets. |
ip-filter
Syntax
ip-filter [entry entry-id]
Context
[Tree] (show>system>security>mgmt-access-filter ip-filter)
Full Context
show system security management-access-filter ip-filter
Description
This command displays management-access IP filters.
Parameters
- entry-id
-
Displays information for the specified entry.
Platforms
All
Output
The following output is an example of MAF IP filter information and Output fields: management access filter describes the management access filter output fields.
Output Example*A:Dut-F# show system security management-access-filter ip-filter
=============================================================================
IPv4 Management Access Filter
=============================================================================
filter type: : ip
Def. Action : permit
Admin Status : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry : 1
Description : (Not Specified)
Src IP : ip-prefix-list "MAF-MATCH-ALLOW"
Src interface : undefined
Dest port : undefined
Protocol : undefined
Router : undefined
Action : none
Log : disabled
Matches : 0
=============================================================================
*A:Dut-F#
Label |
Description |
---|---|
Def. action |
Permit — Specifies that packets not matching the configured selection criteria in any of the filter entries are permitted. Deny — Specifies that packets not matching the configured selection criteria in any of the filter entries are denied and that a ICMP host unreachable message will be issued. Deny-host-unreachable — Specifies that packets not matching the configured selection criteria in the filter entries are denied. |
Entry |
The entry ID in a policy or filter table. |
Description |
A text string describing the filter. |
Src IP |
The source IP address or prefix list used for management access filter match criteria. |
Src interface |
The interface name for the next hop to which the packet should be forwarded if it hits this filter entry. |
Dest port |
The destination port. |
Matches |
The number of times a management packet has matched this filter entry. |
Protocol |
The IP protocol to match. |
Action |
The action to take for packets that match this filter entry. |
ip-filter
Syntax
ip-filter [entry entry-id]
Context
[Tree] (clear>cpm-filter ip-filter)
Full Context
clear cpm-filter ip-filter
Description
This command clears IP filter statistics.
Parameters
- entry-id
-
Specifies a particular CPM IP filter entry.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ip-filter
Syntax
ip-filter ip-filter-id
Context
[Tree] (tools>perform>filter ip-filter)
Full Context
tools perform filter ip-filter
Description
Commands in this context perform IP filter operations.
Parameters
- ip-filter-id
-
Specifies a particular IP filter ID or filter name.
- filter-id
-
Specifies the IP filter ID.
- filter-name
-
Specifies name of the IP filter, up to 64 characters.
Platforms
All
ip-identification-assist
ip-identification-assist
Syntax
ip-identification-assist [isa mda-id/esa-vm-id]
Context
[Tree] (show>app-assure>group ip-identification-assist)
Full Context
show application-assurance group ip-identification-assist
Description
This command displays the status and statistics for the IP identification assist feature.
Parameters
- isa mda-id
-
Specifies the slot and MDA of the ISA in the format slot/mda.
- isa esa-vm-id
-
Specifies the ESA and ESA VM in the format esa-esa-id/vm-id.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
Use the following command to display IP identification assist information for a group.
show application-assurance group 1 ip-identification-assist isa 1/1
Output
Example===============================================================================
Application Assurance Group 1 IP Identification Assist
===============================================================================
ip-identification-assist : Up
passive-dns-monitor : Enabled
-------------------------------------------------------------------------------
IP Entry Statistics
-------------------------------------------------------------------------------
Maximum IP entries : 100000
Free IP entries : 99866
Active IP entries : 134
application : 126
parent application : 6
conflict (apps/parent) : 0
conflict (other) : 2
-------------------------------------------------------------------------------
Active IP entry match status
-------------------------------------------------------------------------------
IP entry matched : 85
IP entry not matched : 49
-------------------------------------------------------------------------------
Cumulative IP lookup results
-------------------------------------------------------------------------------
total misses : 1383
total matches : 594
match - application : 528
match - parent application : 56
match - app/parent conflict : 0
match - other conflict : 10
===============================================================================
Use the following command to display IP identification assist information for a partition.
show application-assurance group 1:0 ip-identification-assist isa 1/1
Output
Example===============================================================================
Application Assurance Group 1:0 IP Identification Assist
===============================================================================
ip-identification-assist : Up
passive-dns : Enabled
positive-app-id : Enabled
-------------------------------------------------------------------------------
Passive DNS Monitoring Statistics
-------------------------------------------------------------------------------
DNS responses : 150
ignored - no reverse flow : 0
ignored - untrusted : 0
ignored - wrong direction : 0
DNS responses matched : 150
matched - IPv4 : 150
matched - IPv6 : 0
DNS responses unknown : 0
unknown - IPv4 : 0
unknown - IPv6 : 0
-------------------------------------------------------------------------------
Positive Application Identification Statistics
-------------------------------------------------------------------------------
Flows with global applications : 0
ignored - ip-ident-assist : 0
ignored - no expression : 0
Flows used to populate cache : 0
IPv4 added/updated : 0
IPv6 added/updated : 0
===============================================================================
ip-identification-assist
Syntax
ip-identification-assist
Context
[Tree] (tools>dump>app-assure>group ip-identification-assist)
Full Context
tools dump application-assurance group ip-identification-assist
Description
Commands in this context dump statistics for the IP identification assist feature.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ip-prefix
ip-prefix
Syntax
ip-prefix [hunt | detail] [rd rd] [prefix ip-prefix/ip-prefix-length] [ community comm-id] [tag tag] [ next-hop next-hop] [aspath-regex reg-exp]
Context
[Tree] (show>router>bgp>routes>evpn ip-prefix)
Full Context
show router bgp routes evpn ip-prefix
Description
This command displays BGP-EVPN IPv4 prefix routes.
Parameters
- hunt
-
Displays entries for the specified route.
- detail
-
Displays detailed information.
- rd
-
Displays information for the route distinguisher.
- ip-prefix/ip-prefix-length
-
Specifies the IPv4 address and mask length.
- comm-id
-
Specifies the community ID, up to 72 characters.
- tag
-
Specifies the IPv4 prefix route tag.
- next-hop
-
Specifies the IPv4 or IPv6 BGP next-hop address.
- reg-exp
-
Displays routes matching the specified regular expression, up to 80 characters.
Platforms
All
ip-prefix-list
ip-prefix-list
Syntax
ip-prefix-list
ip-prefix-list prefix-list-name [association]
Context
[Tree] (show>qos>match-list ip-prefix-list)
Full Context
show qos match-list ip-prefix-list
Description
Displays the list of configured IPv4 QoS prefix lists or the details of a specific IPv4 QoS prefix list together with the SAP and network QoS policies in which it is used and the entry number within that policy.
Parameters
- prefix-list-name
-
Specifies an IPv4 prefix list which contains IPv4 address prefixes to be matched.
- association
-
Displays the QoS policy and entry number in which the specified prefix list is used.
Platforms
All
Output
The following output is an example of ip-prefix-list information
Output Example*A:PE# show qos match-list ip-prefix-list
===============================================================================
QoS Match IP Prefix List
===============================================================================
Prefix List Name Description Num Prefixes
-------------------------------------------------------------------------------
ipv4list1 1
ipv4list2 1
-------------------------------------------------------------------------------
No. of Prefix-List: 2
===============================================================================
*A:PE#
*A:PE# show qos match-list ip-prefix-list "ipv4list1”
===============================================================================
QoS Match IP Prefix List
===============================================================================
Prefix Name : ipv4list1
Description : (Not Specified)
-------------------------------------------------------------------------------
IP Prefixes
-------------------------------------------------------------------------------
10.0.0.0/8
-------------------------------------------------------------------------------
No. of Prefixes : 1
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Association
-------------------------------------------------------------------------------
QoS Policy ID Criteria Entry
-------------------------------------------------------------------------------
10 (sap-ingress) 10 (source-ip)
10 (sap-egress) 10 (source-ip)
-------------------------------------------------------------------------------
===============================================================================
*A:PE#
ip-prefix-list
Syntax
ip-prefix-list [prefix-list-name]
ip-prefix-list prefix-list-name references
Context
[Tree] (show>filter>match-list ip-prefix-list)
Full Context
show filter match-list ip-prefix-list
Description
This command displays IPv4 prefix information for match criteria in IPv4 ACL and CPM filter policies.
Parameters
- prefix-list-name
-
String of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
- references
-
The filter policies, policy entries and source/destination IPv4 match type per entry referring to this match list.
Platforms
All
Output
The following output is an example of IPv4 prefix information for match criteria in IPv4 ACL and CPM filter policies, and Output fields: filter match IP prefix lists describes the output fields.
Output exampleshow filter match-list ip-prefix-list "p11"
===============================================================================
Filter Match IP Prefix Lists
===============================================================================
ip-prefix-list "pl1"
===============================================================================
excluded prefixes:
-------------------------------------------------------------------------------
10.1.1.1/32
-------------------------------------------------------------------------------
configured prefixes:
-------------------------------------------------------------------------------
#10.0.0.0/8
-------------------------------------------------------------------------------
generated prefixes:
-------------------------------------------------------------------------------
10.0.0.0/16 10.1.0.0/24 10.1.1.0/32 10.1.1.2/31
10.1.1.4/30 10.1.1.8/29 10.1.1.16/28 10.1.1.32/27
10.1.1.64/26 10.1.1.128/25 10.1.2.0/23 10.1.4.0/22
10.1.8.0/21 10.1.16.0/20 10.1.32.0/19 10.1.64.0/18
10.1.128.0/17 10.2.0.0/15 10.4.0.0/14 10.8.0.0/13
10.16.0.0/12 10.32.0.0/11 10.64.0.0/10 10.128.0.0/9
-------------------------------------------------------------------------------
NUM used prefixes: 24
Note: "#" in front of the IP address indicates that the prefix is not used
References:
-------------------------------------------------------------------------------
No references
===============================================================================
Label |
Description |
---|---|
Excluded prefixes |
Displays excluded prefix information |
Configured prefixes |
Displays configured prefix information |
Generated prefixes |
Displays generated prefix information |
NUM used prefixes |
Displays the number of used prefixes |
References |
Displays reference information |
ip-tunnel-stats
ip-tunnel-stats
Syntax
ip-tunnel-stats
Context
[Tree] (show>isa>stats ip-tunnel-stats)
Full Context
show isa statistics ip-tunnel-stats
Description
Commands in this context display IP tunnel statistical information. This includes statistics for non-IPsec tunnels supported on tunnel ISAs.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipoe
ipoe
Syntax
ipoe
ipoe session
Context
[Tree] (clear>service>id ipoe)
Full Context
clear service id ipoe
Description
This command clears the IPoE related data for the service.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe
Syntax
ipoe
Context
[Tree] (clear>call-trace ipoe)
Full Context
clear call-trace ipoe
Description
Commands in this context clear the IPoE job.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe
Syntax
ipoe
Context
[Tree] (tools>perform>subscr-mgmt>loc-user-db ipoe)
Full Context
tools perform subscriber-mgmt local-user-db ipoe
Description
This command contains the tools used to control IPoE entries in the local user database.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe
Syntax
ipoe
Context
[Tree] (show>service>id ipoe)
Full Context
show service id ipoe
Description
Commands in this context display IPoE information.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe
Syntax
ipoe
Context
[Tree] (show>call-trace ipoe)
Full Context
show call-trace ipoe
Description
Commands in this context display IP over Ethernet (IPoE) call trace information.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe-session
ipoe-session
Syntax
ipoe-session
Context
[Tree] (tools>dump>router ipoe-session)
Full Context
tools dump router ipoe-session
Description
Commands in this context dump information about IPoE session-related tools in the specified routing instance.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
ipoe-session-policy
ipoe-session-policy
Syntax
ipoe-session-policy ipoe-session-policy-name [association]
ipoe-session-policy
Context
[Tree] (show>subscr-mgmt ipoe-session-policy)
Full Context
show subscriber-mgmt ipoe-session-policy
Description
This command displays IPoE session policy information.
Parameters
- ipoe-session-policy-name
-
Specifies the IPoE session policy name up to 32 characters.
- association
-
Displays the interface and captures SAPs that reference the IPoE session policy.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of IPoE session policy information.
Output Exampleshow subscriber-mgmt ipoe-session-policy "ipoe-policy-1"
===============================================================================
IPoE Session Policy "ipoe-policy-1"
===============================================================================
Description : IPoE policy
Last Mgmt Change : 02/28/2015 11:51:25
Session Key : sap-mac
Session Timeout : unlimited
===============================================================================
show subscriber-mgmt ipoe-session-policy "ipoe-policy-1" association
===============================================================================
IPoE Session Policy "ipoe-policy-1"
===============================================================================
-------------------------------------------------------------------------------
IPoE Interface Associations
-------------------------------------------------------------------------------
Service-Id : 1000 (IES)
- group-int-1-1
Service-Id : 2000 (VPRN)
- group-int-1-1
-------------------------------------------------------------------------------
Capture SAP Associations
-------------------------------------------------------------------------------
Service-Id : 10 (VPLS)
- 1/1/4:*.*
===============================================================================
Output fields: IPoE session policy describes subscriber management IPoE session policy output fields.
Field |
Description |
---|---|
Description |
The user-provided description of this IPoE policy |
Last Mgmt Change |
The sysUpTime at the time of the last modification |
Session Key |
The session key to be used for this IPoE session to group subscriber hosts |
Session Timeout |
The session timeout period to be used for this IPoE session |
IPoE Interface Associations |
The service ID and interface name of the associated interfaces |
Capture SAP Associations |
The service ID and SAP ID of the associated capture SAPS |
ipsec
ipsec
Syntax
ipsec
Context
[Tree] (clear ipsec)
Full Context
clear ipsec
Description
Commands in this context clear IPsec commands.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipsec
Syntax
ipsec
Context
[Tree] (show ipsec)
Full Context
show ipsec
Description
Commands in this context display IPsec related information.
Platforms
All
ipsec
Syntax
ipsec
Context
[Tree] (tools>dump ipsec)
Full Context
tools dump ipsec
Description
Commands in this context dump IPsec information.
Platforms
All
ipsec
Syntax
ipsec
Context
[Tree] (tools>perform ipsec)
Full Context
tools perform ipsec
Description
Commands in this context perform IPsec operations.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipsec
Syntax
ipsec
Context
[Tree] (show>router>interface ipsec)
Full Context
show router interface ipsec
Description
This command displays IPsec specific information.
Platforms
VSR
ipsec-domain
ipsec-domain
Syntax
ipsec-domain [ipsec-domain-id]
Context
[Tree] (show>redundancy>multi-chassis ipsec-domain)
Full Context
show redundancy multi-chassis ipsec-domain
Description
This command displays information about an IPsec domain.
Parameters
- ipsec-domain-id
-
Displays information IPsec domain ID.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of IPsec domain information. Output fields: IPsec domain describes the output fields
Output Exampleshow>redundancy>multi-chassis# ipsec-domain 1
===============================================================================
Multi-Chassis IPsec Domain: 1
===============================================================================
Designated Role : active Priority : 250
Tunnel Group : 1 Revertive : false
Admin State : Up Protection Status : nominal
Router Id : 81.81.81.81 Current Active : 81.81.81.81
Activity State : active
===============================================================================
===============================================================================
Domain 1 Adjacencies
===============================================================================
Peer Oper Remote Remote
Router-Id State Activity Designated
State Role
-------------------------------------------------------------------------------
84.84.84.84 Up standby active
84.84.84.84
85.85.85.85 Up standby standby
85.85.85.85
-------------------------------------------------------------------------------
Domain Adjacency Entries found: 2
===============================================================================
===============================================================================
Multi-Chassis Tunnel Statistics
===============================================================================
Static Dynamic
-------------------------------------------------------------------------------
Installed 0 0
Installing 0 0
Awaiting Config 0 0
Failed 0 0
===============================================================================
Label |
Description |
---|---|
Designated Role |
The designated role, active or standby. |
Priority |
The priority. |
Tunnel Group |
The tunnel group ID. |
Revertive |
The revertive value. true means that revertive is configured. false means that revertive is not configured. |
Admin State |
The administrative state. |
Protection Status |
Displays nominal or notReady. notReady means the system is not ready for a switchover. There could be a major traffic impact if switchover happens in the case of notReady. nominal means the tunnel-group is in a better situation to switchover than notReady. However, there still might be a traffic impact. |
Router Id |
The router ID. |
Current Active |
The router ID of the active router. |
Activity State |
The activity state. |
Adjacencies |
|
Peer |
The IP address of the peer. |
Router-Id |
The router ID. |
Oper State |
The operational state of the peer. |
Remote Activity State |
The activity state of the peer. |
Remote Designated Role |
The designated role of the peer. |
Domain Adjacency Entries found |
The total number of domain peer entries found. |
Multi-Chassis Tunnel Statistics |
|
Static |
The number of static multi-chassis tunnels. |
Dynamic |
The number of dynamic multi-chassis tunnels. |
Installed |
The number of tunnels that have been successfully installed. |
Installing |
The number of tunnels that are being installed. |
Awaiting Config |
The number of synchronized tunnels that do not have a corresponding configuration ready. |
Failed |
The number of tunnels that failed to be installed. |
ipsec-interface
ipsec-interface
Syntax
ipsec-interface
ipsec-interface ip-int-name [group grp-ipv6-address]
ipsec-interface gateway-name gw-name [remote-address ip-address | ipv6-address] [ port port-id] [sa-id sa-id]
ipsec-interface static-tunnel-name tunnel-name [ sa-id sa-id]
Context
[Tree] (show>router>mld ipsec-interface)
Full Context
show router mld ipsec-interface
Description
This command displays information about the MLD states over IPsec tunnels.
Parameters
- ip-int-name
-
Specifies the dynamic name for the MLD-enabled child_SA.
- grp-ipv6-address
-
Displays IPv6 multicast group address for which this entry contains information.
- gw-name
-
Specifies the IPsec gateway name, up to 32 characters.
- ip-address
-
Displays the information associated with the specified IP address.
- ipv6-address
-
Displays the information associated with the specified IPv6 address.
- port-id
-
Specifies the peer’s UDP port.
- sa-id
-
Specifies the child_SA ID.
- tunnel-name
-
Specifies the IPsec static tunnel name up to 32 characters.
Platforms
All
Output
The following output is an example of MLD IPsec interface information. The interface name in the output is the dynamic name for an MLD-enabled child_sa. There is a corresponding MLD interface name in the show>ipsec>gateway name tunnel tunnel output
Output Example*A:DUT-A# show router 40 mld ipsec-interface "ipsec-if-1583392"
===============================================================================
mld ipsec dynamic tunnel interfaces detail
===============================================================================
name : ipsec_gw_1040_1
remote-address: 3ffe::900:1
port : 500 sa-id : 1
index : 1583392 state : in-service
version : 2 group count : 0
querier up : 11384 querier expiry: 0
next query : 56 interface name: ipsec-if-1583392
querier : fe80::6e:9c56:9651:5829
===============================================================================
ipsec-stats
ipsec-stats
Syntax
ipsec-stats
Context
[Tree] (show>isa>stats ipsec-stats)
Full Context
show isa statistics ipsec-stats
Description
Commands in this context display IPsec tunnel statistics.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipsec-transport-mode-profile
ipsec-transport-mode-profile
Syntax
ipsec-transport-mode-profile [name]
ipsec-transport-mode-profile name association
Context
[Tree] (show>ipsec ipsec-transport-mode-profile)
Full Context
show ipsec ipsec-transport-mode-profile
Description
This command displays IPsec transport mode profile information. If a name is specified, the command displays details about the named ipsec-transport-mode-profile , otherwise, a list of configured IPsec transport mode profiles is displayed.
Parameters
- name
-
Displays information about the specified IPsec transport mode profile, up to 32 characters.
- association
-
Displays a list of IP tunnels that reference the specified ipsec-transport-mode-profile name.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of IPsec transport mode profile information. Output fields: IPsec transport mode profile describes the fields.
Output ExampleA:v70# show ipsec ipsec-transport-mode-profile "test"
===============================================================================
IPsec Transport Mode Profile Configuration Detail
===============================================================================
Description : (Not Specified)
Keying Type : Dynamic Replay Window : None
IKE Policy Id : 1 Auto Establish : disabled
Transform Id1 : 1 Transform Id2 : None
Transform Id3 : None Transform Id4 : None
Pre Shared Key : KrbVPnF6Dg13PM/biw6ErPl5XU7+
Local Id Type : none
Cert Profile : (Not Specified)
TrustAnchor Prof : (Not Specified)
Cert Status Verification
Default Resu*: revoked
Primary : crl
Secondary : none
Max Num of Keys
Phase 1 : 0
Phase 2 : 0
===============================================================================
* indicates that the corresponding row element may have been truncated.
A:v70# show ipsec ipsec-transport-mode-profile "test" association
===============================================================================
IP tunnels using Transport Mode Profile
===============================================================================
SvcId Type SAP Tunnel
-------------------------------------------------------------------------------
400 vprn tunnel-1.private:100 t1
-------------------------------------------------------------------------------
Number of Entries: 1
===============================================================================
Label |
Description |
---|---|
Description |
The text string to describe the transport mode profile |
Keying Type |
The keying type |
Replay Window |
The replay window size |
IKE Policy ID |
The ID of the IKE policy used for IKE negotiation |
Auto Establish |
The status of auto-establish |
Transform Id1, Id2, Id3, Id4 |
The transform ID |
Pre Shared Key |
The pre-shared key used for authentication (hashed) |
Local Id Type |
The local ID used for IDi or IDr for IKEv2 tunnels |
Cert Profile |
The name of certificate profile to be used for certificate authentication |
TrustAnchor Prof |
The name of trust anchor profile to be used for certificate authentication. |
Default Result |
The default result when both the primary and secondary method failed to provide an answer |
Primary |
The primary method that is used to verify the revocation status of the peer’s certificate; either CRL or OCSP. |
Secondary |
The secondary method that is used to verify the revocation status of the peer’s certificate; either CRL, OCSP, or none. |
Max Num of Keys |
Phase 1 — The maximum number of IKE_SA keys, which can be saved by the system. Phase 2 — The maximum number of CHILD_SA keys, which can be saved by the system. |
Transport Mode Profile |
The transport mode profile name |
SvcID |
The service ID |
Type |
The service type |
SAP |
The SAP ID |
Tunnel |
The tunnel ID |
ipv4
ipv4
Syntax
ipv4 all
ipv4 entry entry-id
Context
[Tree] (clear>subscr-mgmt>isa-filter ipv4)
Full Context
clear subscriber-mgmt isa-filter ipv4
Description
This command resets the entry hit counts associated with the specified isa-filter to zero. If an entry-id is specified, only counters for that entry are reset, otherwise all entry counters are reset.
Parameters
- all
-
Clears all IPv4 ISA filter entries.
- entry-id
-
Specifies the ID of the entry within the ISA filter for which to reset the counters.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipv4
Syntax
ipv4 [summary | detail] [egress-if port-id]
ipv4 [summary | detail] [egress-lsp tunnel-id]
ipv4 [summary | detail] [egress-nh ip-address]
Context
[Tree] (show>router>ldp>bindings>active ipv4)
Full Context
show router ldp bindings active ipv4
Description
This command display LDP active IPv4 bindings.
Parameters
- egress-if port-id
-
Displays LDP active bindings by matching egress-if.
- egress-lsp tunnel-id
-
Specifies the tunnel identifier for this egress LSP.
- egress-nh ip-address
-
Displays LDP active bindings by matching egress-nh.
- detail
-
Displays detailed information.
- summary
-
Displays information in a summarized format.
Platforms
All
ipv4
Syntax
ipv4 [timeout seconds] [ dhcp-client-identifier {string ascii-string | hex hex-string}] [reboot-on-success] [save-provision-file-destination file-url] [ include-user-class]
Context
[Tree] (tools>perform>system>auto-node-provisioning ipv4)
Full Context
tools perform system auto-node-provisioning ipv4
Description
This command initiates the IPv4 auto-provisioning of the node on all the ports that have an operationally up port but no IP address.
Parameters
- seconds
-
DHCP request timeout period, before the system tries the next interface. Within this timeout, the DHCP client tries to retransmit the DHCP request with randomized exponential backoff (RFC 2131). This randomized exponential backoff begins at 2 s and goes to 64 s (2,4,8,32,64,64,64,64). After 64 seconds, the system will retry every 64 s.
- ascii-string
-
DHCP client identifier in ASCII format, up to 127 characters long.
- hex-string
-
DHCP client identifier in hexadecimal format, up to 254 hexadecimal nibbles long.
- file-url
-
The file URL as a local-url. The local file or folder name should not exceed 99 characters).
local-url
[cflash-id/][file-path]
cflash-id
cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B:
- include-user-class
-
Keyword to include user class data in network discovery requests.
Platforms
All
ipv4
Syntax
ipv4 [aspath-regex reg-exp] [community comm-id] [origin-val originState] [leaked] [l eakable] [brief] [all]
ipv4 [aspath-regex reg-exp] hunt [ community comm-id] [origin-val originState] [ leaked] [leakable] [brief] [all]
ipv4 [detail | longer] [aspath-regex reg-exp] [community comm-id] [origin-val originState] [leaked] [leakable] [ all]
Context
[Tree] (show>router>bgp>routes ipv4)
Full Context
show router bgp routes ipv4
Description
This command displays BGP IPv4 routes.
Parameters
- reg-exp
-
Displays routes matching the specified regular expression, up to 80 characters.
- hunt
-
Displays entries for the specified route.
- comm-id
-
Specifies the community ID, up to 72 characters.
- originState
-
Filters the BGP routes displayed by the command to those routes with a particular RPKI route origin validation state.
- leaked
-
Filters BGP routes displayed by the command to those routes leaked into this router’s BGP instance from another BGP instance.
- leakable
-
Filters BGP routes displayed by the command to those routes eligible for leaking from this router’s BGP instance to another BGP instance.
- brief
-
Displays the IPv4 BGP route information in a brief format.
- all
-
Displays all output for imported routes.
Platforms
All
ipv4-prefix
ipv4-prefix
Syntax
ipv4-prefix [ip-prefix/ip-prefix-length]
Context
[Tree] (show>router>bgp>routes>bgp-ls ipv4-prefix)
Full Context
show router bgp routes bgp-ls ipv4-prefix
Description
This command displays BGP-LS NLRIs with an IPv4 prefix.
Parameters
- ip-prefix/ip-prefix-length
-
Specifies information for the specified IPv4 prefix and mask length, up to 64 characters.
Platforms
All
ipv6
ipv6
Syntax
ipv6 all
ipv6 entry entry-id
Context
[Tree] (clear>subscr-mgmt>isa-filter ipv6)
Full Context
clear subscriber-mgmt isa-filter ipv6
Description
This command resets the entry hit counts associated with the specified isa-filter to zero. If an entry-id is specified, only counters for that entry are reset, otherwise all entry counters are reset.
Parameters
- all
-
Clears all IPv6 ISA filter entries.
- entry-id
-
Specifies the ID of the entry within the ISA filter for which to reset the counters.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
ipv6
Syntax
ipv6 [summary | detail] [egress-if port-id]
ipv6 [summary | detail] [egress-lsp tunnel-id]
ipv6 [summary | detail] [egress-nh ip-address]
Context
[Tree] (show>router>ldp>bindings>active ipv6)
Full Context
show router ldp bindings active ipv6
Description
This command display LDP active IPv6 bindings.
Parameters
- egress-if port-id
-
Displays LDP active bindings by matching egress-if.
- egress-lsp tunnel-id
-
Specifies the tunnel identifier for this egress LSP.
- egress-nh ip-address
-
Displays LDP active bindings by matching egress-nh.
- detail
-
Displays detailed information.
- summary
-
Displays information in a summarized format.
Platforms
All
ipv6
Syntax
ipv6 [filter-type filter-type]
ipv6 embedded [inactive]
ipv6 ipv6-filter-id embedded [inactive]
ipv6 ipv6-filter-id [detail]
ipv6 ipv6-filter-id associations
ipv6 ipv6-filter-id type entry-type
ipv6 ipv6-filter-id counters [type entry-type] [detail]
ipv6 ipv6-filter-id entry entry-id [counters] [detail]
ipv6 ipv6-filter-id [entry entry-id] effective-action [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action router [{ingress | egress}]
ipv6 ipv6-filter-id [entry entry-id] effective-action service service-id [{ ingress | egress}]
Context
[Tree] (show>filter ipv6)
Full Context
show filter ipv6
Description
This command shows IPv6 filter information.
When effective-action is specified, this command displays what effectively happens to a packet that matches the criteria associated with the IPv6 filter policy.
Parameters
- filter-type
-
Specifies the type of filter to display.
- inactive
-
Shows all embeddings, optionally shows inactive embedding only, if ipv6-filter-id is not specified shows all embedded filters.
- ipv6-filter-id
-
Specifies the IPv6 filter policy for which to display information. Values can be expressed in different formats. The following only shows decimal integer format.
- detail
-
Displays detailed information.
- associations
-
Appends, to the detailed filter policy output, information as to where the specified filter policy ID is applied.
- entry-type
-
Specifies type of filter entry to display.
- counters
-
Displays counter information. Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
- entry-id
-
Specifies the filter policy entry (of the specified filter policy) to display information.
- effective-action
-
Displays the action that the system will effectively apply to the packet.
- ingress
-
Filters the output and only displays the information for filter policies applied on ingress.
- egress
-
Filters the output and only displays the information for filter policies applied on egress.
- router
-
Filters the output and only displays the information for that specific service ("Base” instance).
- service-id
-
Filters the output and only displays the information for the specified service. The specified value should correspond to an existing service in which the filter has been applied.
Platforms
All
Output
Show Filter (no filter-id specified) — The following output is an example of IPv6 filter information when no filter ID is specified, and Output fields: filter IPv6 (no filter ID specified) describes the fields.
Output ExampleA:ALA-48# show filter ipv6
===============================================================================
IP Filters
===============================================================================
Filter-Id Scope Applied Description
-------------------------------------------------------------------------------
100 Template Yes test
200 Exclusive Yes
-------------------------------------------------------------------------------
Num IPv6 filters: 2
===============================================================================
A:ALA-48# show filter ipv6 embedded
===============================================================================
IP Filter embedding
===============================================================================
In From Priority Inserted Status
----------------------------------------------------------------------------------
10 2 50 1/1 OK
1 100 1/2 OK- 1 entry overwritten
20 2 100 0/5 Failed – out of resources
===============================================================================
A:ALA-48#
===============================================================================
Configured IP Filters Total: 4
===============================================================================
Filter-Id Scope Applied Description
-------------------------------------------------------------------------------
1 Template No
5 Exclusive No
10 Template Yes
100 Embedded N/A
===============================================================================
System IP Filters Total: 1
===============================================================================
Filter-Id Description
-------------------------------------------------------------------------------
_tmnx_ofs_test of-switch 'test' embedded filter
-------------------------------------------------------------------------------
Num IP filters: 5
==============================================================================
Label |
Description |
---|---|
Filter Id |
The IPv6 filter ID |
Scope |
Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive |
|
Applied |
No — the filter policy ID has not been applied |
Yes—the filter policy ID is applied |
|
Description |
The IPv6 filter policy description |
In |
Shows embedding filter index |
From |
Shows embedded filters included |
Priority |
Shows priority of embedded filter |
Inserted |
Shows embedded/total number of entries from embedded filter Status: OK — embedding operation successful, if any entries are overwritten this will also be indicated Failed — embedding failed, the reason is displayed (out of resources) |
Show Filter (with filter-id specified) — The following output is an example of IPv6 filter information when filter-id is specified, and Output fields: IPv6 filter policy describes the fields.
Output ExampleA:ALA-48# show filter ipv6 100
===============================================================================
IPv6 Filter
===============================================================================
Filter Id : 100 Applied : Yes
Scope : Template Def. Action : Forward
Entries : 1
Description : test
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 10
Log Id : 101
Src. IP : ::/0 Src. Port : None
Dest. IP : ::/0 Dest. Port : None
Next Header : Undefined Dscp : Undefined
ICMP Type : Undefined ICMP Code : Undefined
Tcp-flag : (Not Specified)
Match action : Drop
Ing. Matches : 0 Egr. Matches : 0
===============================================================================
A:ALA-48#
Label |
Description |
---|---|
Filter Id |
The IPv6 filter policy ID |
Scope |
Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive |
|
Entries |
The number of entries configured in this filter ID |
Description |
The IPv6 filter policy description |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
Filter Match Criteria |
IP — Indicates the filter is an IPv6 filter policy |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Log Id |
The filter log ID |
Src. IP |
The source IPv6 address and mask match criterion
|
Dest. IP |
The destination IPv6 address and mask match criterion
|
Protocol |
The protocol ID for the match criteria; undefined indicates no protocol specified |
ICMP Type |
The ICMP type match criterion; undefined indicates no ICMP type specified |
Fragment |
False — configures a match on all non-fragmented IPv6 packets |
True — configures a match on all fragmented IPv6 packets |
|
Off — fragments are not a matching criteria; all fragments and nonfragments implicitly match |
|
Sampling |
Off — specifies that traffic sampling is disabled |
On — specifies that traffic matching the associated IPv6 filter entry is sampled |
|
IP-Option |
Specifies matching packets with a specific IPv6 option or a range of IPv6 options in the IPv6 header for IPv6 filter match criteria |
Match action |
Default — the filter does not have an explicit forward or drop match action specified; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Drop — drop packets matching the filter entry |
|
Forward—the explicit action to perform is forwarding of the packet; if the action is Forward, then if configured, the next hop information should be displayed, including nexthop: IPv6 address, Indirect: IPv6 address or Interface: IPv6 interface name |
|
Ing. Matches |
The number of ingress filter matches/hits for the filter entry |
Src. Port |
The source TCP, UDP, or SCTP port number, port range, or port match list |
Dest. Port |
The destination TCP, UDP, or SCTP port number, port range, or port match list |
Dscp |
The DiffServ Code Point (DSCP) name |
ICMP Code |
The ICMP code field in the ICMP header of an IPv6 packet |
Tcp-flag |
Specifies the list of TCP flags selected:
TCP flags not selected as match criteria are not displayed Example: Matching "tcp-ack true” and "tcp-rst false” is represented in the show command as Tcp-flag : Ack !Rst |
Option-present |
Off — specifies not to search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero be used as IPv6 filter match criteria |
|
Int. Sampling |
Off — interface traffic sampling is disabled |
On — interface traffic sampling is enabled |
|
Multiple Option |
Off — the option fields are not checked |
On — packets containing one or more option fields in the IPv6 header will be used as IPv6 filter match criteria |
|
Egr. Matches |
The number of egress filter matches/hits for the filter entry |
Ing. Rate-limiter |
The number of offered, forwarded, and dropped packet matches for the filter entry |
Show Filter Associations — The following output is an example of IPv6 filter information when the associations keyword is specified, and Output fields: IPv6 filter associations describes the fields.
Output ExampleA:ALA-48# show filter ipv6 1 associations
===============================================================================
IPv6 Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template Def. Action : Drop
Entries : 1
-------------------------------------------------------------------------------
Filter Association : IPv6
-------------------------------------------------------------------------------
Service Id : 2000 Type : IES
- SAP 1/1/1:2000 (Ingress)
===============================================================================
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 10
Log Id : 101
Src. IP : ::/0 Src. Port : None
Dest. IP : ::/0 Dest. Port : None
Next Header : Undefined Dscp : Undefined
ICMP Type : Undefined ICMP Code : Undefined
TCP-flag : (Not Specified)
Match action : Drop
Ing. Matches : 0 Egr. Matches : 0
===============================================================================
A:ALA-48#
Label |
Description |
---|---|
Filter Id |
The IPv6 filter policy ID |
Scope |
Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive |
|
Entries |
The number of entries configured in this filter ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
Service Id |
The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied |
SAP |
The Service Access Point on which the filter policy ID is applied |
(Ingress) |
The filter policy ID is applied as an ingress filter policy on the interface |
(Egress) |
The filter policy ID is applied as an egress filter policy on the interface |
Type |
The type of service of the service ID |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified |
Log Id |
The filter log ID |
Src. IP |
The source IPv6 address and mask match criterion
|
Dest. IP |
The destination IPv6 address and mask match criterion
|
Protocol |
The protocol ID for the match criteria; undefined indicates no protocol specified |
ICMP Type |
The ICMP type match criterion; undefined indicates no ICMP type specified |
Fragment |
False — configures a match on all non-fragmented IPv6 packets |
True — configures a match on all fragmented IPv6 packets |
|
Off — fragments are not a matching criteria; all fragments and nonfragments implicitly match |
|
Sampling |
Off — specifies that traffic sampling is disabled |
On — specifies that traffic matching the associated IPv6 filter entry is sampled |
|
IP-Option |
Specifies matching packets with a specific IPv6 option or a range of IPv6 options in the IPv6 header for IPv6 filter match criteria |
TCP-syn |
False — configures a match on packets with the SYN flag set to false |
True — configures a match on packets with the SYN flag set to true |
|
Off — the state of the TCP SYN flag is not considered as part of the match criteria |
|
Match action |
Default — the filter does not have an explicit forward or drop match action specified; if the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified |
Drop — drop packets matching the filter entry |
|
Forward — the explicit action to perform is forwarding of the packet; if the action is Forward, then if configured the nexthop information should be displayed, including Nexthop: <IPv6 address>, Indirect: <IPv6 address> or Interface: <IPv6 interface name> |
|
Ing. Matches |
The number of ingress filter matches/hits for the filter entry |
Src. Port |
The source TCP, UDP, or SCTP port number, port range, or port match list |
Dest. Port |
The destination TCP, UDP, or SCTP port number, port range, or port match list |
Dscp |
The DiffServ Code Point (DSCP) name |
ICMP Code |
The ICMP code field in the ICMP header of an IPv6 packet |
Option-present |
Off — specifies not to search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero be used as IPv6 filter match criteria |
|
Int. Sampling |
Off — interface traffic sampling is disabled |
On — interface traffic sampling is enabled |
|
Multiple Option |
Off — the option fields are not checked |
On — packets containing one or more option fields in the IPv6 header will be used as IPv6 filter match criteria |
|
TCP-ack |
False — configures a match on packets with the ACK flag set to false |
True — configured a match on packets with the ACK flag set to true |
|
Off — the state of the TCP ACK flag is not considered as part of the match criteria |
|
Egr. Matches |
The number of egress filter matches/hits for the filter entry |
Show Filter Counters — The following output is an example of IPv6 filter information when the counters keyword is specified, and Output fields: IPv6 filter counters describes the output fields.
Egress count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
Output ExampleA:ALA-48# show filter ipv6 8 counters
===============================================================================
IPv6 Filter
===============================================================================
Filter Id : 8 Applied : Yes
Scope : Template Def. Action : Forward
Entries : 4
Description : Description for Ipv6 Filter Policy id # 8
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 5
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
Entry : 6
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
Entry : 8
Ing. Matches : 160 pkts (14400 bytes)
Egr. Matches : 80 pkts (6880 bytes)
Entry : 10
Ing. Matches : 80 pkts (7200 bytes)
Egr. Matches : 80 pkts (6880 bytes)
====================================================================================
A:ALA-48#
Label |
Description |
---|---|
IP Filter Filter Id |
The IPv6 filter policy ID |
Scope |
Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive |
|
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
Filter Match Criteria |
IP — Indicates the filter is an IPv6 filter policy |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Ing. Matches |
The number of ingress filter matches/hits for the filter entry |
Egr. Matches |
The number of egress filter matches/hits for the filter entry |
Egress count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation.
Show Filter IPv6 Output (with effective-action specified) — The following output is an example of IPv6 filter information when the effective-action keyword is specified. Output fields: IPv6 filter effective action describes the command output fields.
If the main action (either primary or secondary) cannot be performed, a reason will be given. This will be displayed on the same line as the Effective Action. The reason codes as currently defined are:
-
action not supported in L2 service
-
action not supported in L3 service
-
action not supported on egress
-
destination not reachable
-
egress-pbr is off
-
egress-pbr is on
-
entry-default
-
filter-default-action
-
pbr-down-action-override
-
target does not exist
show filter ipv6 10 entry 10 effective-action
===============================================================================
IPv6 Filter
===============================================================================
Filter Id : 10 Applied : Yes
Scope : Template Def. Action : Drop
Entries : 8
Description : (Not Specified)
-------------------------------------------------------------------------------
Entry : 10
-------------------------------------------------------------------------------
Origin : Fixed - overwrites embedded filter 30 entry 5
Egress PBR : Disabled
Stickiness : No
PBR Dwn Act Override: None
PBR Down Action : Drop (entry-default)
Configuration
Primary Action : Forward (Next Hop VRF)
Next Hop : 3ffe:0:a0a:a01:: (Indirect)
Router : Base
Extended Action : Remark DSCP "cp51"
Secondary Action : Forward (Next Hop VRF)
Next Hop : 3ffe:0:1414:1401:: (Indirect)
Router : Base
Extended Action : Remark DSCP "cp31"
Status
Target status based on extended checks
Primary Action : Up
Secondary Action : Up
Downloaded Action : Primary
Stickiness Timer : Not Running
Effective Action based on application context
Service Id : 100 Type : IES
Ingress
Effective Action: Primary
Extended Action : Performed
Service Id : N/A Type : Base Router
Egress
Effective Action: Primary
Extended Action : Performed
===============================================================================
Label |
Description |
---|---|
Filter Id |
The IPv6 filter policy ID |
Applied |
No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied |
|
Scope |
Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive |
|
Def. Action |
Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
|
Entries |
The number of entries configured in this filter ID |
Description |
The IPv6 filter policy description |
Entry |
The filter entry ID; if the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Origin |
The type of filter entry |
Egress PBR |
Indicates if the egress-pbr flag is set for this entry |
Stickiness |
No — stickiness is not configured |
Yes — stickiness is configured |
|
PBR Dwn Act Override |
Indicates whether or not the action to take when the PBR target is down has been overridden |
PBR Down Action |
Indicates the action to take when the target is down; packets that match the entry criteria will be subject to the PBR Down Action in case the target of the main action is down |
Configuration |
Section of the output providing information on the configured parameters |
Primary Action |
The configured action, if any; indented sub-labels in the show output provide configured parameters for this action |
Secondary Action |
The configured secondary action, if any; indented sub-labels in the show output provide configured parameters for this action |
Status/Target status based on extended checks |
Section of the output providing information on the operational status of certain parameters |
Primary Action |
The status of the target of the primary action, if configured, based on extended checks |
Secondary Action |
The status of the target of the secondary action, if configured, based on extended checks |
Downloaded Action |
The action downloaded by the CPM to the IOM |
Stickiness Timer |
The status of the stickiness timer, if any |
Effective Action based on application context |
Section of the output providing the effective action, in the context of services, that a packet matching the criteria will be subject to |
Service Id |
The service ID on which the filter policy ID is applied; the output also provides a list of service points where the filter has been applied |
Type |
The service type in which the service has been applied |
Ingress/Egress |
The direction in which the service has been applied |
Effective Action |
Indicates the effective action the packet will be subject to |
Extended Action |
Indicates the configured extended action, if any |
ipv6
Syntax
ipv6 ipv6-filter-id [entry entry-id] [{ingress | egress}]
Context
[Tree] (clear>filter ipv6)
Full Context
clear filter ipv6
Description
Clears the counters associated with the entries of the specified IPv6 filter policy.
By default, the counters associated with each entry of the specified filter policy are all cleared. The scope of which counters are cleared can be narrowed using the command line parameters.
Default
Clears all counters associated with each entry of the specified IPv6 filter policy.
Parameters
- ipv6-filter-id
-
The IPv6 filter policy ID for which to clear the entry counters. Values can be expressed in different formats. The following only shows decimal integer format.
- entry-id
-
Specifies that only the counters associated with the specified filter policy entry are cleared.
- ingress
-
Specifies to only clear the ingress counters.
- egress
-
Specifies to only clear the egress counters.
Platforms
All
ipv6
Syntax
ipv6 ipv6-filter-id
Context
[Tree] (tools>dump>filter>resources ipv6)
Full Context
tools dump filter resources ipv6
Description
This command displays information about the specified IPv6 filter including resource utilization on CPM and IOM, the IOMs on which the filter is used, and the entries using the most resources.
Parameters
- ipv6-filter-id
-
Specifies that only the filter resource utilization associated with this IPv6 filter will be displayed.
Platforms
All
Output
The following output is an example of IPv6 filter resource utilization information.
Output Example*A:Dut-C>tools>dump>filter>resources># ipv6 "fSpec-0"
===============================================================================
Resource utilization details for Ipv6 filter fSpec-0
===============================================================================
CPM entries used : 0
CPM subentries used : 0
TCAM entries used (per FlexPath) : 0
Associated with IOMs : 2
---------------------------------------------------------------------------
Largest 5 entries
---------------------------------------------------------------------------
Entry ID Active TCAM entries
(per FlexPath)
---------------------------------------------------------------------------
No Matching Entries
---------------------------------------------------------------------------
===============================================================================
ipv6
Syntax
ipv6 [timeout seconds] [ dhcp-client-identifier {duid-link-local | duid-enterprise} { string ascii-string | hex hex-string}] [reboot-on-success] [ save-provision-file-destination file-url] [include-user-class]
Context
[Tree] (tools>perform>system>auto-node-provisioning ipv6)
Full Context
tools perform system auto-node-provisioning ipv6
Description
This command initiates the IPv6 auto-provisioning of the node on all the ports that have an operationally up port but no IP address.
Parameters
- seconds
-
DHCP request timeout period, before the system tries the next interface. Within this timeout, the DHCP client tries to retransmit the DHCP request with randomized exponential backoff (RFC 2131). This randomized exponential backoff begins at 2 s and goes to 64 s (2,4,8,32,64,64,64,64). After 64 seconds, the system will retry every 64 s.
- duid-link-local
-
Keyword to configure the type code of the server DUID.
- duid-enterprise
-
Keyword to configure the type code of the server DUID.
- ascii-string
-
DHCP client identifier in ASCII format, up to 127 characters long.
- hex-string
-
DHCP client identifier in hexadecimal format, up to 254 hexadecimal nibbles long.
- file-url
-
The file URL as a local-url. The local file or folder name should not exceed 99 characters).
local-url
[cflash-id/][file-path]
cflash-id
cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B:
- reboot-on-success
-
Keyword to reboot the router when the auto-provisioning process completes successfully.
- include-user-class
-
Keyword to include user class data in network discovery requests.
Platforms
All
ipv6
Syntax
ipv6 entry entry-id [interval seconds] [ repeat repeat] [absolute | rate]
Context
[Tree] (monitor>cpm-filter ipv6)
Full Context
monitor cpm-filter ipv6
Description
This command displays monitor command statistics for IPv6 filter entries.
Parameters
- entry-id
-
Displays information on the specified filter entry ID for the specified filter ID only.
- seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ipv6
Syntax
ipv6 entry-id [interval seconds] [ repeat repeat] [absolute | rate]
Context
[Tree] (monitor>management-access-filter ipv6)
Full Context
monitor management-access-filter ipv6
Description
This command monitors statistics for the MAF IPv6 filter entry.
Parameters
- entry-id
-
Specifies an existing IP MAF entry ID.
- interval seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
All
ipv6
Syntax
ipv6 ipv6-filter-id entry entry-id [ interval seconds] [repeat repeat] [ absolute | rate]
Context
[Tree] (monitor>filter ipv6)
Full Context
monitor filter ipv6
Description
This command enables IPv6 filter monitoring. The statistical information for the specified IPv6 filter entry displays at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the specified IPv6 filter. The subsequent statistical information listed for each interval is displayed as a delta to the previous display.
When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
Parameters
- ipv6-filter-id
-
Displays detailed information for the specified IPv6 filter ID and its filter entries.
- entry-id
-
Displays information on the specified filter entry ID for the specified filter ID only.
- seconds
-
Configures the interval for each display in seconds.
- repeat
-
Configures how many times the command is repeated.
- absolute
-
Displays raw statistics, without processing. No calculations are performed on the delta or rate statistics.
- rate
-
Displays rate-per-second for each statistic instead of the delta.
Platforms
All
Output
The following output is an example of filter IPv6 information.
Output ExampleA:ALA-48# monitor filter ipv6 100 entry 10 interval 3 repeat 3 absolute
===============================================================================
Monitor statistics for IPv6 filter 100 entry 10
-------------------------------------------------------------------------------
At time t = 0 sec (Base Statistics)
-------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
-------------------------------------------------------------------------------
At time t = 3 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
-------------------------------------------------------------------------------
At time t = 6 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
-------------------------------------------------------------------------------
At time t = 9 sec (Mode: Absolute)
-------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 01
===============================================================================
A:ALA-48#
A:ALA-48# monitor filter ipv6 100 entry 10 interval 3 repeat 3 rate
==============================================================================
Monitor statistics for IPv6 filter 100 entry 10
------------------------------------------------------------------------------
At time t = 0 sec (Base Statistics)
------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
------------------------------------------------------------------------------
At time t = 3 sec (Mode: Rate)
------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
------------------------------------------------------------------------------
At time t = 6 sec (Mode: Rate)
------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
------------------------------------------------------------------------------
At time t = 9 sec (Mode: Rate)
------------------------------------------------------------------------------
Ing. Matches : 0 Egr. Matches : 1
==============================================================================
A:ALA-48#
ipv6
Syntax
ipv6 [aspath-regex reg-exp] [community comm-id] [origin-val originState] [leaked] [l eakable] [brief] [all]
ipv6 [aspath-regex reg-exp] hunt [ community comm-id] [origin-val originState] [ leaked] [leakable] [brief] [all]
ipv6 [detail | longer] [aspath-regex reg-exp] [community comm-id] [origin-val originState] [leaked] [leakable] [ all]
Context
[Tree] (show>router>bgp>routes ipv6)
Full Context
show router bgp routes ipv6
Description
This command displays BGP IPv6 routes.
Parameters
- reg-exp
-
Displays routes matching the specified regular expression, up to 80 characters.
- hunt
-
Displays entries for the specified route.
- comm-id
-
Specifies the community ID, up to 72 characters.
- originState
-
Filters the BGP routes displayed by the command to those routes with a particular RPKI route origin validation state.
- leaked
-
Filters BGP routes displayed by the command to those routes leaked into this router’s BGP instance from another BGP instance.
- leakable
-
Filters BGP routes displayed by the command to those routes eligible for leaking from this router’s BGP instance to another BGP instance.
- brief
-
Displays the IPv4 BGP route information in a brief format.
- all
-
Displays all output for imported routes.
Platforms
All
ipv6-exception
ipv6-exception
Syntax
ipv6-exception exception
ipv6-exception exception [associations]
ipv6-exception exception [counters]
ipv6-exception exception entry entry-id [counters]
Context
[Tree] (show>filter ipv6-exception)
Full Context
show filter ipv6-exception
Description
This command shows IPv6 exception information.
Parameters
- exception
-
Specifies the IPv6 exception filter.
- associations
-
Displays associations applicable to the specified IPv6 exception.
- counters
-
Displays counters for the specified IPv6 exception.
- entry entry-id
-
Specifies an integer that identifies the entry.
Platforms
VSR
Output
The following output is an example of IPv6 exception filter information, and Output fields: IPv6 exception describes the fields.
Output Example*A:Dut-C# show filter ipv6-exception
===============================================================================
Configured IPv6-Exception Filters Total: 1
===============================================================================
Filter-Id Scope Applied Description
-------------------------------------------------------------------------------
1 Template Yes?
===============================================================================
Num IPv6-Exception filters: 1
===============================================================================
*A:kanlnx94: Dut-B# show filter ipv6-exception 1
===============================================================================
IPv6-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 1
Description : (Not Specified)
Filter Name : An IPv6 exception filter
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 10 (Inactive)
Description : (Not Specified)
Src. IP : ::/0
Src. Port : n/a
Dest. IP : ::/0
Dest. Port : eq 1234
Next Header : 6
ICMP Type : Undefined ICMP Code : Undefined
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
===============================================================================
*A:Dut-C# show filter ipv6-exception 1 associations
===============================================================================
IPv6-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 1
Description : (Not Specified)
Filter Name : An IPv6 exception filter
-------------------------------------------------------------------------------
Filter Association : IPv6
-------------------------------------------------------------------------------
Service Id : N/A Type : Router Base
- Router Interface secure-interface
-------------------------------------------------------------------------------
Filter associated with IOM: 1
===============================================================================
*A:Dut-C# show filter ipv6-exception 1 counters
===============================================================================
IPv6-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 1
Description : (Not Specified)
Filter Name : An IPv6 exception filter
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 10 (Inactive)
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
===============================================================================
*A:Dut-C# show filter ipv6-exception 1 entry 10
===============================================================================
IPv6-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 1
Description : (Not Specified)
Filter Name : An IPv6 exception filter
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry : 10 (Inactive)
Description : (Not Specified)
Src. IP : ::/0
Src. Port : n/a
Dest. IP : ::/0
Dest. Port : eq 1234
Next Header : 6
ICMP Type : Undefined ICMP Code : Undefined
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
===============================================================================
*A:Dut-C# show filter ipv6-exception 1 entry 10 counters
===============================================================================
IPv6-Exception Filter
===============================================================================
Filter Id : 1 Applied : Yes
Scope : Template
Entries : 1
Description : (Not Specified)
Filter Name : An IPv6 exception filter
-------------------------------------------------------------------------------
Filter Match Criteria : IPv6
-------------------------------------------------------------------------------
Entry? : 10 (Inactive)
Ing. Matches : 0 pkts
Egr. Matches : 0 pkts
===============================================================================
*A:Dut-C#
Label |
Description |
---|---|
Configured IPv6-Exception Filters |
The number of configured IPv6 exception filters. |
Filter-Id |
The filter ID. |
Scope |
Template — The filter policy is of type Template. Exclusive — The filter policy is of type Exclusive. |
Applied |
No — The IPv6 exception filter has not been applied. Yes — The IPv6 exception filter is applied. |
Entries |
The number of entries. |
Description |
The description of the specified filter, if specified. |
Filter Name |
The filter name. |
Num IPv6-Exception filters |
The number of IPv6 exception filters. |
Entry |
The number of active or inactive entries. |
Src. IP |
The source IP address of the logged packet. |
Src. Port |
The source port of the logged packet. |
Dst. IP |
The destination IP address of the logged packet. |
Dst. Port |
The destination port of the logged packet. |
Next Header |
8-bit selector. Identifies the type of header immediately following the IPv6 header. |
ICMP Type |
The ICMP type match criterion. Undefined indicates no ICMP type specified. |
ICMP Code |
The ICMP code field in the ICMP header of an IPv6 packet. |
Ing. Matches |
The number of packets matched on ingress. |
Egr. Matches |
The number of packets matched on egress. |
Filter Association |
Indicates the filter is an IPv6 filter policy. |
Service Id |
The service ID on which the IPv6 exception ID is applied. |
Filter association with IOM |
The number of filters associated with an IOM. |
ipv6-exception
Syntax
ipv6-exception exception [entry entry-id] [ingress]
Context
[Tree] (clear>filter ipv6-exception)
Full Context
clear filter ipv6-exception
Description
This command clears the information about the IPv6 exception filter.
Parameters
- exception
-
Specifies the IPv6 exception filter by ID or name.
- exception-id
-
Specifies the IPv6 exception filter ID for which to clear the entry counters.
- exception-name
-
Specifies name of the IPv6 exception filter, up to 64 characters.
- entry-id
-
Specifies that only the counters associated with the specified filter policy entry are cleared.
- ingress
-
Specifies to only clear the ingress counters.
Platforms
VSR
ipv6-filter
ipv6-filter
Syntax
ipv6-filter [entry entry-id]
Context
[Tree] (show>system>security>cpm-filter ipv6-filter)
Full Context
show system security cpm-filter ipv6-filter
Description
This command displays CPM IPv6 filters and only applies to the 7750 SR and 7950 XRS.
Parameters
- entry-id
-
Identifies a CPM IPv6 filter entry as configured on this system.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Output
The following output is an example of IPv6 filter entry information.
Output fields: CPM IPv6 describes CPM IPv6 filter output fields.
The following is an output example on the 7750 SR:A:ALA-35# show system security cpm-filter ipv6-filter
===============================================================================
CPM IPv6 Filters
===============================================================================
Entry-Id Dropped Forwarded Description
-------------------------------------------------------------------------------
101 25880 0 CPM-Filter 2001:db8::101:2 #101
102 25880 0 CPM-Filter 2001:db8::102:2 #102
103 25880 0 CPM-Filter 2001:db8::103:2 #103
104 25880 0 CPM-Filter 2001:db8::104:2 #104
105 25880 0 CPM-Filter 2001:db8::105:2 #105
106 25880 0 CPM-Filter 2001:db8::106:2 #106
107 25880 0 CPM-Filter 2001:db8::107:2 #107
108 25880 0 CPM-Filter 2001:db8::108:2 #108
109 25880 0 CPM-Filter 2001:db8::109:2 #109
===============================================================================
A:ALA-35#
A:ALA-35# show system security cpm-filter ipv6-filter entry 101
===============================================================================
CPM IPv6 Filter Entry
===============================================================================
Entry Id : 1
Description : CPM-Filter 2001:db8::101:2 #101
-------------------------------------------------------------------------------
Filter Entry Match Criteria :
-------------------------------------------------------------------------------
Log Id : n/a
Src. IP : 2001:db8::101:2 Src. Port : 0
Dest. IP : 2001:db8::101:1 Dest. Port : 0
next-header : none Dscp : Undefined
ICMP Type : Undefined ICMP Code : Undefined
TCP-syn : Off TCP-ack : Off
Match action : Drop
Dropped pkts : 25880 Forwarded pkts : 0
===============================================================================
A:ALA-35#
Label |
Description |
---|---|
Entry-Id |
Displays information about the specified management access filter entry |
Dropped |
Displays the number of dropped events. |
Forwarded |
Displays the number of forwarded events. |
Description |
Displays the CPM filter description. |
Log ID |
Log Id where matched packets will be logged. |
Src IP |
Displays Source IP address(/netmask) |
Dest. IP |
Displays Destination IP address(/netmask). |
Src Port |
Displays Source Port Number (range). |
Dest. Port |
Displays Destination Port Number (range). |
next-header |
Displays next-header field in the IPv6 header. |
Dscp |
Displays Traffic Class field in the IPv6 header. |
ICMP Type |
Displays ICMP type field in the icmp header. |
ICMP Code |
Displays ICMP code field in the icmp header. |
TCP-syn |
Displays the SYN flag in the TCP header. |
TCP-ack |
Displays the ACK flag in the TCP header |
Match action |
When criteria matches, displays drop or forward packet. |
Next Hop |
In case match action is forward, indicates destination of the matched packet. |
Dropped pkts |
Indicating number of matched dropped packets |
Forwarded pkts |
Indicating number of matched forwarded packets. |
ipv6-filter
Syntax
ipv6-filter [entry entry-id]
Context
[Tree] (show>system>security>mgmt-access-filter ipv6-filter)
Full Context
show system security management-access-filter ipv6-filter
Description
This command displays management-access IPv6 filters and only applies to the 7750 SR and 7950 XRS.
Parameters
- entry-id
-
Specifies the IPv6 filter entry ID to display.
Platforms
All
Output
The following output is an example of MAF IPv6 filter information, and the table outlined in show>system>security>mgmt-access-filter ip-filter describes the output fields.
Output Example*A:Dut-C# show system security management-access-filter ipv6-filter entry 1
=============================================================================
IPv6 Management Access Filter
=============================================================================
filter type : ipv6
Def. Action : permit
Admin Status : enabled (no shutdown)
-----------------------------------------------------------------------------
Entry : 1
Description : (Not Specified)
Src IP : ipv6-prefix-list "MAF-MATCH-V6-ALLOW"
Flow label : undefined
Src interface : undefined
Dest port : undefined
Next-header : undefined
Router : undefined
Action : permit
Log : enabled
Matches : 0
=============================================================================
*A:Dut-C# s
ipv6-filter
Syntax
ipv6-filter [entry entry-id]
Context
[Tree] (clear>cpm-filter ipv6-filter)
Full Context
clear cpm-filter ipv6-filter
Description
This command clears IPv6 filter statistics.
Parameters
- entry-id
-
Specifies a particular CPM IP filter entry.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ipv6-filter
Syntax
ipv6-filter ipv6-filter-id
Context
[Tree] (tools>perform>filter ipv6-filter)
Full Context
tools perform filter ipv6-filter
Description
Commands in this context perform IPv6 filter operations.
Parameters
- ip-v6filter-id
-
Specifies a particular IPv6 filter ID or filter name.
- filter-id
-
Specifies the IPv6 filter ID.
- filter-name
-
Specifies name of the IPv6 filter, up to 64 characters.
Platforms
All
ipv6-prefix
ipv6-prefix
Syntax
ipv6-prefix [hunt | detail] [rd rd] [prefix ipv6-prefix/ipv6-prefix-length] [ community comm-id] [tag tag] [ next-hop next-hop] [aspath-regex reg-exp]
Context
[Tree] (show>router>bgp>routes>evpn ipv6-prefix)
Full Context
show router bgp routes evpn ipv6-prefix
Description
This command displays BGP-EVPN IPv6 prefix routes.
Parameters
- hunt
-
Displays entries for the specified route.
- detail
-
Displays detailed information.
- rd
-
Displays information for the route distinguisher.
- ipv6-prefix/ipv6-prefix-length
-
Specifies the IPv6 prefix and length.
- comm-id
-
Specifies the community ID, up to 256 characters.
- tag
-
Specifies the IPv6 prefix route tag.
- next-hop
-
Specifies the IPv4 or IPv6 BGP next-hop address.
- reg-exp
-
Displays routes matching the specified regular expression, up to 80 characters.
Platforms
All
ipv6-prefix-list
ipv6-prefix-list
Syntax
ipv6-prefix-list
ipv6-prefix-list prefix-list-name [association]
Context
[Tree] (show>qos>match-list ipv6-prefix-list)
Full Context
show qos match-list ipv6-prefix-list
Description
Displays the list of configured IPv6 QoS prefix lists or the details of a specific IPv6 QoS prefix list together with the network QoS policies in which it is used and the entry number within that policy.
Parameters
- prefix-list-name
-
Specifies an IPv6 prefix list which contains IPv6 address prefixes to be matched.
- association
-
Displays the QoS policy and entry number in which the specified prefix list is used.
Platforms
All
Output
The following output is an example of ipv6-prefix-list information
Output Example*A:PE# show qos match-list ipv6-prefix-list
===============================================================================
QoS Match IPv6 Prefix List
===============================================================================
Prefix List Name Description Num Prefixes
-------------------------------------------------------------------------------
ipv6list1 1
ipv6list2 1
-------------------------------------------------------------------------------
No. of Prefix-List: 2
===============================================================================
*A:PE#
*A:PE# show qos match-list ip-prefix-list "ipv6list1”
===============================================================================
QoS Match IPv6 Prefix List
===============================================================================
Prefix Name : ipv6list1
Description : (Not Specified)
-------------------------------------------------------------------------------
IP Prefixes
-------------------------------------------------------------------------------
2001:db8::/32
-------------------------------------------------------------------------------
No. of Prefixes : 1
-------------------------------------------------------------------------------
===============================================================================
*A:PE#
*A:PE# show qos match-list ipv6-prefix-list "ipv6list1” association
===============================================================================
QoS Match IPv6 Prefix List
===============================================================================
Prefix Name : ipv6list1
Description : (Not Specified)
-------------------------------------------------------------------------------
IPv6 Prefixes
-------------------------------------------------------------------------------
2001:db8::/32
-------------------------------------------------------------------------------
No. of Prefixes : 1
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Association
-------------------------------------------------------------------------------
QoS Policy ID Criteria Entry
-------------------------------------------------------------------------------
10 (sap-ingress) 10 (source-ip)
-------------------------------------------------------------------------------
===============================================================================
*A:PE#
ipv6-prefix-list
Syntax
ipv6-prefix-list [prefix-list-name]
ipv6-prefix-list prefix-list-name references
Context
[Tree] (show>filter>match-list ipv6-prefix-list)
Full Context
show filter match-list ipv6-prefix-list
Description
This command displays IPv6 prefixes information for match criteria in IPv6 ACL and CPM filter policies.
Parameters
- prefix-list-name
-
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
- references
-
Displays the filter policies, policy entries and source/destination IPv6 match type per entry referring to this match list.
Platforms
All
isa
isa
Syntax
isa
Context
[Tree] (tools>dump>nat isa)
Full Context
tools dump nat isa
Description
This command enables the dump tools for NAT ISA.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa
Syntax
isa
Context
[Tree] (clear isa)
Full Context
clear isa
Description
Commands in this context clear ISA commands.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa
Syntax
isa
Context
[Tree] (clear>nat isa)
Full Context
clear nat isa
Description
Commands in this context clear ISA NAT commands.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa
Syntax
isa
Context
[Tree] (clear>wlan-gw isa)
Full Context
clear wlan-gw isa
Description
Commands in this context clear WLAN gateway ISA commands.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa
Syntax
isa video-group-id [esa-vm vapp-id ] [lifetime-peaks] [hour-peaks]
isa video-group-id [md mda-id ] [lifetime-peaks] [hour-peaks]
Context
[Tree] (clear>video>statistics isa)
Full Context
clear video statistics isa
Description
This command clears statistics for a particular ISA video group.
Parameters
- video-group-id
-
statistics for a particular ISA video group a video group ID.
- vapp-id
-
Specifies the video ISA Group Virtual Application ID
- mda-id
-
Specifies the card/slot identifying a provisioned ISA
- lifetime-peaks
-
Clears the lifetime peaks
- hour-peaks
-
Clears the last and current hour peaks
Platforms
7450 ESS, 7750 SR, 7750 SR-s
isa
Syntax
isa
Context
[Tree] (show isa)
Full Context
show isa
Description
Commands in this context display ISA information.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa
Syntax
isa
Context
[Tree] (tools>dump>wlan-gw isa)
Full Context
tools dump wlan-gw isa
Description
Commands in this context dump tools for Wireless LAN Gateway ISA.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-collector
isa-collector
Syntax
isa-collector
Context
[Tree] (show>app-assure>group>cflowd>dir-exp isa-collector)
Full Context
show application-assurance group cflowd direct-export isa-collector
Description
This command displays cflowd collector assignments to ISAs.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-filter
isa-filter
Syntax
isa-filter name [all]
Context
[Tree] (clear>subscr-mgmt isa-filter)
Full Context
clear subscriber-mgmt isa-filter
Description
This command resets the entry hit counts associated with the specified isa-filter to zero.
Parameters
- name
-
Specifies the name of the ISA filter, up to 32 characters.
- all
-
Clears all ISA filter entries.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-filter
Syntax
isa-filter
isa-filter name
isa-filter name associations
isa-filter name ipv4
isa-filter name ipv6
Context
[Tree] (show>subscr-mgmt isa-filter)
Full Context
show subscriber-mgmt isa-filter
Description
This command displays ISA filter information.
Parameters
- name
-
Specifies the ISA filter name, up to 32 characters.
- associations
-
Displays associated information about the specified ISA filter name.
- ipv4
-
Display IPv4 ISA filter information for the specified ISA filter name.
- ipv6
-
Display IPv6 ISA filter information for the specified ISA filter name.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
isa-policer
isa-policer
Syntax
isa-policer policer-name
isa-policer policer-name associations
isa-policer
Context
[Tree] (show>subscr-mgmt isa-policer)
Full Context
show subscriber-mgmt isa-policer
Description
This command displays ISA policer information.
Parameters
- policer-name
-
Specifies the ISA policer name, up to 32 characters.
- associations
-
Displays associated information about the specified ISA policer name.
Platforms
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
isa-radius-policy
isa-radius-policy
Syntax
isa-radius-policy policy-name
isa-radius-policy policy-name associations
Context
[Tree] (show>aaa isa-radius-policy)
Full Context
show aaa isa-radius-policy
Description
This command displays ISA RADIUS policy information.
Parameters
- policy-name
-
Displays information about the specified ISA RADIUS policy.
- associations
-
Displays the information associated with the ISA RADIUS server policy.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of AAA ISA RADIUS policy information.
Output Example*B:asd-tr0610-dr421# show aaa isa-radius-policy "ZiggoAAA_DRP_ISAPlcy"
===============================================================================
Status for ISA RADIUS server policy "ZiggoAAA_DRP_ISAPlcy"
===============================================================================
Server 1, group 1, member 1
-------------------------------------------------------------------------------
Purposes Up : accounting authentication
Source IP address : 172.18.128.33
Acct Tx Requests : 2469931
Acct Tx Retries : 320
Acct Tx Timeouts : 160
Acct Rx Replies : 2469471
Auth Tx Requests : 16417061
Auth Tx Retries : 7169
Auth Tx Timeouts : 2922
Auth Rx Replies : 16406973
CoA Rx Requests : 0
Output fields: subscriber ISA RADIUS policy describes subscriber ISA RADIUS policy output fields.
Label |
Description |
---|---|
Purposes Up |
The RADIUS services that are up and running, and fully operational for this server |
Source IP address |
The IP address of the RADIUS server |
Acct Tx Requests |
The number of RADIUS transaction requests transmitted |
Acct TX Retries |
The number of RADIUS transaction request retries |
Acct TX Timeouts |
The number of RADIUS transaction requests that have timed out |
Acct RX Replies |
The number of RADIUS transaction responses received |
Auth Tx Requests |
The number of authentication requests transmitted |
Auth Tx Retries |
The number of authentication request retries |
Auth Tx Timeouts |
The number of RADIUS authentication requests that have timed out for the policy |
CoA RX Requests |
The number of Change-of-Authorization message responses received |
isa-radius-policy
Syntax
isa-radius-policy policy-name statistics
Context
[Tree] (clear>aaa isa-radius-policy)
Full Context
clear aaa isa-radius-policy
Description
This command clears ISA RADIUS policy data.
Parameters
- policy-name
-
Specifies the ISA RADIUS policy name, up to 32 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-service-chaining
isa-service-chaining
Syntax
isa-service-chaining vas-filter name
Context
[Tree] (clear>subscr-mgmt isa-service-chaining)
Full Context
clear subscriber-mgmt isa-service-chaining
Description
This command clears all L2-aware NAT flows of all hosts associated with the VAS filter and can be used if all flows need re-evaluation against a modified set of matching criteria.
Parameters
- name
-
Specifies the filter name, up to 32 characters.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-service-chaining
Syntax
isa-service-chaining
Context
[Tree] (show>subscr-mgmt isa-service-chaining)
Full Context
show subscriber-mgmt isa-service-chaining
Description
Commands in this context display ISA service chaining information.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
isa-service-chaining
Syntax
isa-service-chaining
Context
[Tree] (show>router isa-service-chaining)
Full Context
show router isa-service-chaining
Description
This command displays information related to service chaining (for ESM hosts with L2-aware NAT) at the router level.
Platforms
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of ISA service chaining information.
Output Exampleshow router isa-service-chaining
===============================================================
ISA Service Chaining - Router "Base"
===============================================================
VXLAN Tep range : 1.2.3.4 - 1.2.3.8
NAT Groups : 2
===============================================================
Label |
Description |
---|---|
VXLAN Tep range |
The VXLAN Tep Information (VTEP) range |
NAT Groups |
The NAT ISA group used in a virtual router for Service Chaining. |
isa-subnets
isa-subnets
Syntax
isa-subnets [detail]
isa-subnets [detail] interface interface-name
isa-subnets prefix ipv6-address/prefix-length
Context
[Tree] (show>router>wlan-gw isa-subnets)
Full Context
show router wlan-gw isa-subnets
Description
This command outputs all the prefixes in use by the WLAN GW pool manager.
Parameters
- detail
-
Displays detailed information for each prefix.
- interface-name
-
Displays only the prefixes associated with this subscriber interface.
- ipv6-address/prefix-length
-
Displays details of a specific IPv6 address and prefix.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Output
The following output is an example of WLAN-GW ISA subnet information.
Output Examplesystem# show router wlan-gw isa-subnets
===============================================================================
ISA Subnets
===============================================================================
Prefix MDA Family Usage
-------------------------------------------------------------------------------
2001:db8:0:1/48 3/1 dhcpv6 0%
2001:db8:1::/48 3/2 dhcpv6 0%
2001:db8:2::/48 4/1 dhcpv6 0%
2001:db8:3::/48 4/2 dhcpv6 0%
2001:db8:4::/48 5/1 dhcpv6 0%
2001:db8:5::/48 5/2 dhcpv6 0%
2001:db8:6::/48 3/1 slaac 0%
2001:db8:7::/48 3/2 slaac 0%
2001:db8:8::/48 4/1 slaac 0%
2001:db8:9::/48 4/2 slaac 0%
2001:db8:a::/48 5/1 slaac 0%
2001:db8:b::/48 5/2 slaac 0%
-------------------------------------------------------------------------------
No. of ISA subnets: 12
===============================================================================
*A:Dut-C# show router wlan-gw isa-subnets prefix 2001:db8::/48
===============================================================================
ISA Subnet Prefix : 2001:db8::/48
-------------------------------------------------------------------------------
Group Id : 1
Member Id : 1
MDA : 3/1
Family : dhcpv6
Subscriber Interface : wlangw-sub-itf
Pool Is Old : No
Usage Level : 0%
Remaining Lease Time : 0d 23:50:54
DHCPv6 Options : (length=512)
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
===============================================================================
isa-subnets
Syntax
isa-subnets all
isa-subnets interface ip-int-name
isa-subnets prefix ipv6-address/prefix-length
Context
[Tree] (clear>router>wlan-gw isa-subnets)
Full Context
clear router wlan-gw isa-subnets
Description
This command clears specific subnets from the pool-manager. Associated UE’s is removed from the system.
When clearing the last subnet on an ISA the pool-manager will automatically allocate a new subnet with allocation-level 0%.
Parameters
- all
-
Clears all the isa-subnets.
- ip-int-name
-
Clears all the isa-subnets of a specific subscriber-interface.
- ipv6-address/prefix-length
-
Clears a specific IPv6 address and prefix length.
Platforms
7750 SR, 7750 SR-e, 7750 SR-s, VSR
isid-route-target
isid-route-target
Syntax
isid-route-target
Context
[Tree] (show>service>id>bgp-evpn isid-route-target)
Full Context
show service id bgp-evpn isid-route-target
Description
This command displays a list of the auto-derived or configured ISID-based route-targets per B-VPLS service. The entries show the ISID ranges and association to either an auto-rt or an actual configured route-target.
The auto-rt display format is: <2-byte-as-number>:<4-byte-value>, where: 4-byte-value = 0x30+ISID.
Platforms
All
Output
Output Example*A:PE-2# show service id 10 bgp-evpn isid-route-target
===============================================================================
EVPN ISID RT Information
===============================================================================
Start End RT type Route Target Last Chgd
Range Range
-------------------------------------------------------------------------------
11 11 auto N/A 10/03/2016 16:19:46
-------------------------------------------------------------------------------
Number of Entries: 1
===============================================================================
isid-using
isid-using
Syntax
isid-using [ISID]
Context
[Tree] (show>service isid-using)
Full Context
show service isid-using
Description
This command displays services using an ISID.
Parameters
- ISID
-
Specifies a 24 bit (0 to 16777215) service instance identifier for this service. As part of the Provider Backbone Bridging frames, it is used at the destination PE as a demultiplexor field.
Platforms
All
Output
The following output is an example of services using ISID information.
Output Example*A:SetupCLI# show service isid-using
=================================================================
Services
=================================================================
SvcId ISID Type b-Vpls Adm Opr SvcMtu CustId
-----------------------------------------------------------------
2001 122 i-VPLS 2002 Up Down 1514 1
2005 2005 i-mVP* 2004 Down Down 1500 1
-----------------------------------------------------------------
Matching Services : 2
-=================================================================
*A:SetupCLI#
A:term17# show service isid-using
=================================================================
Services
=================================================================
SvcId ISID Type b-Vpls Adm Opr SvcMtu CustId
-----------------------------------------------------------------
2000 0 b-VPLS 0 Up Up 1530 1
2110 123 i-VPLS 2000 Up Up 1514 1
2299 0 b-VPLS 0 Down Down 1514 1
-----------------------------------------------------------------
Matching Services : 3
-----------------------------------------------------------------
A:term17#
isis
isis
Syntax
isis [isis-instance]
Context
[Tree] (clear>router isis)
Full Context
clear router isis
Description
Commands in this context clear and reset IS-IS protocol entities.
Parameters
- isis-instance
-
Specifies the IS-IS instance.
- level
-
Specifies the IS-IS level.
Platforms
All
Output
The following outputs are examples of IS-IS traffic engineering database information.
Output ExampleA:Dut-B# tools dump router te-database isis
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L1
Rtr: 0100.1001.0003 Addr: 10.10.10.3 ABR ISIS/0/L1
AdvRtr: 0100.1001.0002 Nghb: 0100.1001.0003.01 ISIS/0/L1
LocIp/Id 100.100.100.1 /0 Status: OK
AdvRtr: 0100.1001.0003 Nghb: 0100.1001.0003.01 ISIS/0/L1
LocIp/Id 100.100.100.2 /0 Status: OK
Net: 0100.1001.0003.01 ISIS/0/L1
AttRtr: 0100.1001.0002 ISIS/0/L1
AttRtr: 0100.1001.0003 ISIS/0/L1
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L2
===================================================================================
A:Dut-B#
A:Dut-B# tools dump router te-database detail isis
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L1
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.2/32 Metric: 0
Pfx: 100.100.100.0/30 Metric: 10
Rtr: 0100.1001.0003 Addr: 10.10.10.3 ABR ISIS/0/L1
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.3/32 Metric: 0
Pfx: 100.100.100.0/30 Metric: 10
-----------------------------------------------------------------------------------
AdvRtr: 0100.1001.0002 Nghb: 0100.1001.0003.01 ISIS/0/L1
Local Addr: 100.100.100.1 Local Id: 0 If Index: 2
Remote Addr: 0.0.0.0 Remote Id: 0 Link Type: TRANS
status: OK
IGP Metric: 10
-----------------------------------------------------------------------------------
AdvRtr: 0100.1001.0003 Nghb: 0100.1001.0003.01 ISIS/0/L1
Local Addr: 100.100.100.2 Local Id: 0 If Index: 0
Remote Addr: 0.0.0.0 Remote Id: 0 Link Type: TRANS
status: OK
IGP Metric: 10
-----------------------------------------------------------------------------------
Net: 0100.1001.0003.01 ISIS/0/L1
AttRtr: 0100.1001.0002 ISIS/0/L1
AttRtr: 0100.1001.0003 ISIS/0/L1
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L2
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.2/32 Metric: 0
Pfx: 10.10.10.3/32 Metric: 10
Pfx: 100.100.100.0/30 Metric: 10
===================================================================================
A:Dut-B#
isis
Syntax
isis [instance isis-instance] [ level level]
Context
[Tree] (tools>dump>router>te-database isis)
Full Context
tools dump router te-database isis
Description
Commands in this context dump the IS-IS traffic engineering database.
Parameters
- isis-instance
-
Specifies the IS-IS instance.
- level
-
Specifies the IS-IS level.
Platforms
All
Output
The following outputs are examples of IS-IS traffic engineering database information.
Output ExampleA:Dut-B# tools dump router te-database isis
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L1
Rtr: 0100.1001.0003 Addr: 10.10.10.3 ABR ISIS/0/L1
AdvRtr: 0100.1001.0002 Nghb: 0100.1001.0003.01 ISIS/0/L1
LocIp/Id 100.100.100.1 /0 Status: OK
AdvRtr: 0100.1001.0003 Nghb: 0100.1001.0003.01 ISIS/0/L1
LocIp/Id 100.100.100.2 /0 Status: OK
Net: 0100.1001.0003.01 ISIS/0/L1
AttRtr: 0100.1001.0002 ISIS/0/L1
AttRtr: 0100.1001.0003 ISIS/0/L1
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L2
===================================================================================
A:Dut-B#
A:Dut-B# tools dump router te-database detail isis
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L1
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.2/32 Metric: 0
Pfx: 100.100.100.0/30 Metric: 10
Rtr: 0100.1001.0003 Addr: 10.10.10.3 ABR ISIS/0/L1
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.3/32 Metric: 0
Pfx: 100.100.100.0/30 Metric: 10
-----------------------------------------------------------------------------------
AdvRtr: 0100.1001.0002 Nghb: 0100.1001.0003.01 ISIS/0/L1
Local Addr: 100.100.100.1 Local Id: 0 If Index: 2
Remote Addr: 0.0.0.0 Remote Id: 0 Link Type: TRANS
status: OK
IGP Metric: 10
-----------------------------------------------------------------------------------
AdvRtr: 0100.1001.0003 Nghb: 0100.1001.0003.01 ISIS/0/L1
Local Addr: 100.100.100.2 Local Id: 0 If Index: 0
Remote Addr: 0.0.0.0 Remote Id: 0 Link Type: TRANS
status: OK
IGP Metric: 10
-----------------------------------------------------------------------------------
Net: 0100.1001.0003.01 ISIS/0/L1
AttRtr: 0100.1001.0002 ISIS/0/L1
AttRtr: 0100.1001.0003 ISIS/0/L1
===================================================================================
Rtr: 0100.1001.0002 Addr: 10.10.10.2 ABR ISIS/0/L2
Num SR LblRanges: 1 [SR-cap]
SR LblRange Start: 18432 Range: 505856
Pfx: 10.10.10.2/32 Metric: 0
Pfx: 10.10.10.3/32 Metric: 10
Pfx: 100.100.100.0/30 Metric: 10
===================================================================================
A:Dut-B#
isis
Syntax
isis [isis-instance]
Context
[Tree] (show>router isis)
Full Context
show router isis
Description
This command displays information for a specified IS-IS instance.
Parameters
- isis-instance
-
Specifies the instance ID for an IS-IS instance.
Platforms
All
isis
Syntax
isis
Context
[Tree] (tools>dump>router isis)
Full Context
tools dump router isis
Description
Commands in this context dump tools for IS-IS.
Parameters
- isis-instance
-
Specifies the IS-IS protocol instance within the router instance.
Platforms
All
isis
Syntax
isis
Context
[Tree] (tools>perform>router isis)
Full Context
tools perform router isis
Description
This command enables the tools to perform certain IS-IS tasks.
Parameters
- isis-instance
-
Specifies the IS-IS protocol instance within the router instance.
Platforms
All
isis
Syntax
isis [isis-instance]
Context
[Tree] (monitor>router isis)
Full Context
monitor router isis
Description
This command monitors commands for the IS-IS instance.
Parameters
- isis-instance
-
Specifies the IS-IS protocol instance within the router instance.
Platforms
All
issu-post-process
issu-post-process
Syntax
issu-post-process
Context
[Tree] (tools>perform>redundancy issu-post-process)
Full Context
tools perform redundancy issu-post-process
Description
This command allows requests for new LSPs.
Platforms
All