7450 ETHERNET SERVICE SWITCH
7750 SERVICE ROUTER
7950 EXTENSIBLE ROUTING SYSTEM
VIRTUALIZED SERVICE ROUTER
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
3HE 11968 AAAC TQZZA 01
Issue: 01
September 2017
Nokia — Proprietary and confidential.
Use pursuant to applicable agreements.
Page 2
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Nokia is a registered trademark of Nokia Corporation. Other products and company
names mentioned herein may be trademarks or tradenames of their respective
owners.
The information presented is subject to change without notice. No responsibility is
assumed for inaccuracies contained herein.
Contains proprietary/trade secret information which is the property of Nokia and must
not be made available to, or copied or used by anyone outside Nokia without its
written authorization. Not to be used or disclosed except in accordance with
applicable agreements.
2
3HE 11968 AAAC TQZZA 01Issue: 01
Page 3
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table of Contents
1 Getting Started ...............................................................................9
1.1About This Guide.........................................................................................9
1.2Interface Configuration Process ................................................................11
3Standards and Protocol Support ..............................................887
Issue: 013HE 11968 AAAC TQZZA 017
Page 8
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
8
3HE 11968 AAAC TQZZA 01Issue: 01
Page 9
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
1 Getting Started
1.1About This Guide
This guide describes system concepts and provides configuration examples to
provision Input/Output modules (IOMs), XMA Control Modules (XCMs), also referred
to as cards, Media Dependent Adapters (MDAs), XRS Media Adapters (XMAs), and
ports.
This guide is organized into functional chapters and provides concepts and
descriptions of the implementation flow, as well as Command Line Interface (CLI)
syntax and command usage.
The topics and commands described in this document apply to the:
• 7450 ESS
Getting Started
• 7750 SR
• 7950 XRS
• VSR
Table 1 lists the available chassis types for each SR OS router.
Table 1Supported SR OS Router Chassis Types
7450 ESS7750 SR7950 XRS
• 7450 ESS-7/12 running in
standard mode (not mixedmode)
• 7450 ESS-7/12 running in
mixed-mode (not standard
mode)
• 7750 SR-a4/a8
• 7750 SR-c4/c12
• 7750 SR-1e/2e/3e
• 7750 SR-7/12
• 7750 SR-12e
•7950XRS-16c
• 7950 XRS-20/40
For a list of unsupported features by platform and chassis, refer to the SR OS
R15.0.Rx Software Release Notes, part number 3HE 12060 000x TQZZA or the VSR
Release Notes, part number 3HE 12092 000x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ
depending on supported functionality and user configuration.
Issue: 013HE 11968 AAAC TQZZA 019
Page 10
Getting Started
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Note: This guide generically covers Release 15.0.Rx content and may contain some
content that will be released in later maintenance loads. Refer to the SR OS R15.0.Rx
Software Release Notes, part number 3HE 12060 000x TQZZA or the VSR Release Notes,
part number 3HE 12092 000x TQZZA, for information on features supported in each load of
the Release 15.0.Rx software.
10
3HE 11968 AAAC TQZZA 01Issue: 01
Page 11
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
1.2Interface Configuration Process
Table 2 lists the tasks necessary to configure IOMs and XCMs (also referred to as
cards), MDAs and XMAs, and ports.
Note: For consistency across platforms, XMAs are modeled in the SR OS (CLI and SNMP)
as MDAs.
Unless specified otherwise:
• the term “card” is used generically to refer to both IOMs and XCMs
• the term “MDA” is used generically to refer to both MDAs and XMAs
Table 2Configuration Process
AreaTaskSection
Getting Started
ProvisioningChassis slots and cardsChassis Slots and Cards
MCMsMCMs
MDAsMDA-a, MDA-aXP, MDA, MDA-XP
and MDA-e Modules
Versatile Service ModuleVersatile Service Module (VSM)
Configure cards and MDAsConfiguring Cards and MDAs
Configure cards, MCMs, and MDAsConfiguring Cards, MCMs, and MCAs
Configure portsConfiguring Ports
Service managementService Management Tasks
Issue: 013HE 11968 AAAC TQZZA 0111
Page 12
Getting Started
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
12
3HE 11968 AAAC TQZZA 01Issue: 01
Page 13
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2Interfaces
2.1Configuration Overview
Note: This document uses the term preprovisioning in the context of preparing or
preconfiguring entities such as chassis slots, cards, Media Dependent Adapters (MDAs),
compact media adapters (CMAs), ports, and interfaces, prior to initialization. These entities
can be installed while remaining administratively disabled (shutdown). When the entity is in
a no shutdown state (administratively enabled), then the entity is considered to be
provisioned.
Note: For consistency across platforms, XRS Media Adapters (XMAs) and Compact XMAs
(C-XMAs) are modeled as MDAs.
Interfaces
Unless specified otherwise:
• the term “card” is used generically to refer to both Input Output Modules (IOMs) and
XCMs
• the term “MDA” is used generically to refer to both MDAs and XMAs
Nokia routers provide the capability to configure chassis slots to accept specific card
and MDA types and set the relevant configurations before the equipment is actually
installed. The preprovisioning capability allows you to plan your configurations as
well as monitor and manage your router hardware inventory. Ports and interfaces
can also be preprovisioned. When the functionality is needed, the cards can be
inserted into the appropriate chassis slots when required.
2.1.1Chassis Slots and Cards
To preprovision a chassis slot, the card type must be specified. Operators can enter
card type information for each slot. When a card is installed in a slot and enabled, the
system verifies that the installed card type matches the provisioned card type. If the
parameters do not match, the card remains offline. A preprovisioned slot can remain
empty without conflicting with populated slots.
Issue: 013HE 11968 AAAC TQZZA 0113
Page 14
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The general syntax for the configuration of card slots is similar for all platforms,
though the number of available slots varies by platform and chassis model. The
supported card-types vary by chassis. Refer to the appropriate platform Installation
Guide for more information.
The 7950 XRS platforms accept XCMs in slots. An XCM has two slots, each of which
accept an XMA or C-XMA module. The C-XMA modules require a mechanical
adapter to fit in an XMA slot.
In the config context, use the following CLI commands and syntax examples to
provision the chassis slot and XCM:
The 7450 ESS-7/12, and 7750 SR-7/12, and 7750 SR-12e platforms support a
variety of IOM types (including the IOM3-XP, IOM3-XP-B, IOM3-XP-C, IOM4-e and
IOM4-e-B) in designated chassis slots. IOMs have two slots for pluggable MDAs.
The IOM3-XP, IOM3-XP-B and IOM3-XP-C support MDA and MDA-XPs. The
IOM4-e and IOM4-e-B support MDA-e modules.
In the config context, use the following CLI commands and syntax examples to
provision a chassis slot and an IOM:
The 7450 ESS-7/12, and 7750 SR-7/12, and 7750 SR-12e platforms also support a
variety of IMMs in designated chassis slots. IMMs have integrated MDAs. The
provisioning requirements depends on the generation of IMM that you use. Refer to
the IMM Installation Guide for more information.
The 7750 SR-a platforms support IOM-a cards in dedicated chassis slots. The
7750 SR-a4 supports one physical IOM-a in slot 3. This IOM-a is represented in the
CLI as card 1. The 7750 SR-a8 supports two physical IOM-a cards, one in slot 3, the
other in slot 6. These IOM-a cards are represented in the CLI as card 1 and card 2
respectively. The IOM-a does not have pluggable MDA slots. Each IOM-a can be
configured to support up to four MDA-a or MDA-aXP modules. IOM-a cards are
configured in the same manner as IOMs.
14
3HE 11968 AAAC TQZZA 01Issue: 01
Page 15
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The 7750 SR-e platforms support the IOM-e modules in dedicated slots in the rear
of each chassis. The 7750 SR-1e supports one physical IOM-e module. This IOM-e
is represented in the CLI as card 1. The 7750 SR-2e supports two physical IOM-e
cards. These IOM-e cards are represented in the CLI as card 1 and card 2
respectively. The 7750 SR-3e supports three physical IOM-e cards. These IOM-e
cards are represented in the CLI as card 1, card 2, and card 3 respectively. The
IOM-e does not have pluggable MDA slots. An IOM-e can be configured to support
up to four MDA-e modules. IOM-e cards are configured in the same manner as IOMs.
The 7750 SR-c4/c12 platforms do not have slots for IOM or IMM cards. The system
is modeled as having a fixed system-provisioned IOM in slot 1. The chassis has
positions that accept MCMs or CMAs. MCMs accept MDAs. CMAs can be directly
inserted into the 7750 SR-c4/c12 without the need for MCMs. CMAs are modeled as
MDAs in SR OS.
2.1.2MCMs
Interfaces
MCMs are only supported on the 7750 SR-c12 and SR-c4 systems.
An MCM must be configured before an MDA can be provisioned. If you provision an
MDA type before an MCM is configured, it is assumed you are provisioning a CMA.
CMAs do not require MCM preconfiguration. Up to six MCMs may be provisioned on
a 7750 SR-c12. Even-numbered CMA positions are invalid for MCM installation
(MCMs physically span two CMA positions; “mcm 1” spans CMA position 1 and 2).
Up to two MCMs can be provisioned on the 7750 SR-c4.
Refer to the CMA Installation Guide and MDA Installation Guide for more information
on the physical characteristics of each card.
2.1.3MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e
Modules
MDAs are pluggable adapter cards that provide physical interface connectivity.
MDAs are available in a variety of interface and density configurations. MDA
modules differ by chassis. Refer to the individual chassis guide and the individual
MDA installation guides for more information about specific MDAs.
Issue: 013HE 11968 AAAC TQZZA 0115
Page 16
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
On the 7750 SR-c4/c12 platforms, the MDAs plug into MCMs. MCMs must be
provisioned before an MDA can be provisioned with a type. Up to six MDAs (each
seated in an MCM) may be provisioned on a 7750 SR-c12. Even-numbered CMA
positions are invalid for MDA installation (MDAs physically span two CMA positions;
“mda 1” spans CMA positions 1 and 2). Up to two MDAs (each seated in an MCM)
can be provisioned on the 7750 SRc4. CMAs are also supported on 7750 SR-c4/c12
platforms, as described in CMAs.
The following displays a show card state command. In this example, an m60-10/100eth-tx MDA is installed in position 1 on a 7750 SR-c12.
A:ALU-3>config>card# show card state
===============================================================================
Card State
===============================================================================
Slot/ ProvisionedEquippedAdmin OperationalNumNum Comments
IdTypeTypeState StatePorts MDA
On the 7450 ESS-7/12, 7750 SR-7/12, and 7750 SR-12e, MDAs plug into IOMs.
(MDA and MDA-XP modules plug into the IOM3-XP/-B/-C. MDA-e modules plug into
the IOM4-e and IOM4-e-B). Up to two MDAs can be provisioned on an IOM.
IMMs are designed with fixed integrated media cards, which may require
provisioning, depending on the generation of the IMM.
MDA-a and MDA-aXP modules are used in the 7750 SR-a and the MDA-e and ISA2
modules are used in the 7750 SR-e chassis. Up to four MDAs can be provisioned for
each IOM.
In all cases, the card slot and IOM or IMM card-type must be provisioned before an
MDA can be provisioned. A preprovisioned MDA slot can remain empty without
interfering with services on populated equipment. When an MDA is installed and
enabled, the system verifies that the MDA type matches the provisioned type. If the
parameters do not match, the MDA remains offline.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 17
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
On the 7750 SR-c12/SR-c4, 7450 ESS-7/12, 7750 SR-7/12, and 7750 SR-12e
platforms, MDA names in the CLI start with the letter 'm' (for example, m10-1gb-xpsfp).
The following example displays the card, card-type, mda, and mda-type command
usage in the 7750 SR-7:
The 7750 SR-a4 and 7750 SR-a8 support only MDA-a and MDA-aXP modules,
which are identified in the CLI with an “ma” prefix (for example, ma4-10gb-sfp+), or
“max” prefix (for example, maxp10-10gb-sfp+). Likewise, the 7750 SR-1e,
7750 SR-2e, and 7750 SR-3e support only MDA-e modules, which are identified in
the CLI with an “me” prefix, such as me1-100gb-cfp2.
The following example shows the card, card-type, mda, and mda-type command
usage in the 7750 SR-1e:
Note: For consistency across platforms, XMAs are modeled in the system as MDAs, and
unless specified otherwise, the term MDA is used generically in this document to refer to
both MDAs and C-XMA/XMAs. When the term XMA is used, it refers to both XMAs and CXMAs unless specified otherwise.
XMAs are supported on the 7950 XRS platforms. XMAs plug into XCMs. XCMs must
be provisioned before an XMA can be provisioned with a type.
The XMA information must be configured before ports can be configured. After you
configure the XCM, use the following CLI commands to provision XMAs.
A maximum of two XMAs can be configured on an XCM. The following example
displays the card slot, card type, MDA slot, and MDA type command usage:
On the 7950 XRS, the show card state output displays an “x” in the name of the
XMA and “cx” in the name of a C-XMA:
A:Dut-A# show card state
===============================================================================
Card State
===============================================================================
Slot/ Provisioned TypeAdmin OperationalNumNum Comments
IdEquipped Type (if different) State StatePorts MDA
CMAs (Compact Media Adapter) are supported on the 7750 SR-c12 and SR-c4 and
are configured and provisioned in the same manner as MDAs. Up to twelve CMAs
may be provisioned on a 7750 SR-c12, and up to four CMAs may be provisioned on
an SR-c4. CMA names in the CLI start with the letter “c” (for example, c4-ds3). The
following shows show card state command output. In this example, a c8-10/100eth-tx CMA is installed in CMA position 5.
A:7750-3# show card state
====================================================================================
Card State
====================================================================================
Slot/ ProvisionedEquippedAdmin OperationalNumNum Comments
IdTypeTypeState StatePorts MDA
On the 7750 SR-c4 platform there are two fixed 10GbE ports that are modeled in CLI
as an icm2-10gb-xp-xfp (integrated CMA) in position 1/5. A preprovisioned CMA slot
can remain empty without conflicting with populated slots.
Once installed and enabled, the system verifies that the installed CMA type matches
the provisioned type. If the parameters do not match, the CMA remains offline.
2.1.6Versatile Service Module (VSM)
The Versatile Service Module (VSM) is a module that allows operators to internally
connect a VPLS or VLL service into an IES or IPVPN service. Each module is
capable of 10 Gb/s throughput.
A VSM, like an MDA, is installed and provisioned as a pluggable module in an IOM.
The VSM is supported on the 7450 ESS-7/12, 7750 SR-7/12, and 7750 SR-12e
platforms. The VSM is not supported on the 7950 XRS or on the 7750 SR-c12/c4
platforms.
See Versatile Service Module for more details.
2.1.7Oversubscribed Ethernet MDAs
The 7750 SR and 7450 ESS support oversubscribed Ethernet MDAs and CMAs.
These have more bandwidth towards the user than the capacity between the MDA
and IOM.
A traffic management function is implemented on the MDA to control the data
entering the IOM. This function consists of two parts:
20
• rate limiting
3HE 11968 AAAC TQZZA 01Issue: 01
Page 21
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• packet classification and scheduling
2.1.7.1Rate Limiting
The oversubscribed MDA or CMA limits the rate at which traffic can enter the MDA
or CMA on a per-port basis. If a port exceeds its configured limits then the excess
traffic will be discarded, and 802.3x flow control frames (pause frames) are
generated.
2.1.7.2Packet Classification and Scheduling
The classification and scheduling function implemented on the oversubscribed MDA
or CMA ensures that traffic is correctly prioritized when the bus from the MDA or CMA
to the IOM is over-committed. This could occur if the policing parameters configured
are such that the sum of the traffic being admitted into the MDA or CMA is greater
than the capacity between the MDA and the IOM.
Interfaces
The classification function uses the bits set in the DSCP or Dot1p fields of the
customer packets to perform classification. It can also identify locally addressed
traffic arriving on network ports as Network Control packets. This classification on the
oversubscribed MDA or CMA uses the following rules.
• If the service QoS policy for the SAP (port or VLAN) uses the default
classification policy, all traffic is classified as Best Effort (be).
• If the service QoS policy for the SAP contains a Dot1p classification, the Dot1p
field in the customer packets is used for classification on the MDA or CMA.
• If the service QoS policy for the SAP contains a DSCP classification, the DSCP
field in the customer packets is used for classification on the MDA or CMA.
• If a mix of Dot1p and DSCP classification definitions are present in the service
QoS policy, then the field used to perform classification is the type used for the
highest priority definition. For example, if High Priority 1 is the highest priority
definition and it specifies that the DSCP field should be used, then the DSCP
field is used for classification on the MDA or CMA and the Dot1p field is ignored.
• If the service QoS policy for the SAP specifies IP or MAC filters for forwarding
class identification, then traffic is treated as Best Effort. Full MAC or IP
classification is not possible on the MDA/CMA (but is possible on the IOM).
Issue: 013HE 11968 AAAC TQZZA 0121
Page 22
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• The packet is classified into 16 classes. Typically, these are the eight forwarding
classes and each packet is assigned one priority per forwarding class. After
classification, the packet is offered to the queuing model. This queuing model is
limited to three queues each having four thresholds. These thresholds define
whether an incoming packet, after classification, is accepted in the queue or not.
Table 3 shows typical mapping of classes onto queues and thresholds.
Table 3Typical Mapping Of Classes Onto Queues/Threshold
Counter {QueueThreshold Traffic Class}
0 {2 3 “fc-nc / in-profile”}
1{22“fc-nc / out-profile”}
2 {21“fc-h1 / in-profile”}
3{20“fc-h1 / out-profile”}
4{13“fc-ef / in-profile”}
5 {12 “fc-ef / out-profile”}
6{1 1 “fc-h2 / in-profile”}
7{1 0“fc-h2 / out-profile”}
8 {0 3 “fc-l1 / in-profile”}
9 {0 3 “fc-l1 / out-profile”}
10 {02“fc-af / in-profile”}
11{0 2“fc-af / out-profile”}
12{0 1 “fc-l2 / in-profile”}
13 {0 1“fc-l2 / out-profile”}
14 {0 0 “fc-be / in-profile”}
15 {0 0 “fc-be / out-profile”}
A counter is associated with each mapping. The above is an example and is
dependent on the type of classification (such as dscp-exp, dot1p, and so on). When
the threshold of a particular class is reached, packets belonging to that class are not
accepted in the queue. The packets are dropped and the associated counter is
incremented.
22
3HE 11968 AAAC TQZZA 01Issue: 01
Page 23
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The scheduling of the three queues is done in a strict priority, highest priority basis
is associated with queue 2. This means that scheduling is done at queue level, not
on the class that resulted from the classification. As soon as a packet has been
accepted by the queue there is no way to differentiate it from other packets in the
same queue (for example, another classification result not exceeding its threshold).
All packets queued in the same queue have the same priority from a scheduling point
of view.
2.1.8Channelized MDA/CMA Support
2.1.8.1Channelized DS-1/E-1 CMA
Each 8-port channelized DS-1/E-1 CMA supports channelization down to DS-0.
Each 8-port channelized DS-1/E-1 CMA supports 64 channel groups. This MDA is
supported on the 7750 SR-7/12 and 7750 SR-c4/c12 platforms. This CMA is
supported on the 7750 SR-c4/c12 platforms.
Interfaces
2.1.8.2Channelized DS-3/E-3 CMA
On the E-3 CMA, bit stuffing is not supported in G.751 framing mode. All of the 12
justification service bits and the four justification bits contain valid data on the
transmitted signal. Incoming bitstreams should contain valid data in the 12
justification service bits and four justification bits, otherwise the link will not function.
This CMA is supported on the 7750 SR-c4/c12 platforms.
2.1.8.3Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
Each port for the channelized ASAP OC-3/STM-1 MDA supports channelization
down to DS-0 and accepts one OC-3/STM-1 SFP small form factor pluggable (SFP)
module. The same SFP optics used on Nokia’s SONET/SDH MDAs can be used on
the channelized ASAP OC-3/STM-1 MDA.
Each channelized OC-3/STM-1 supports up to 512 channels with DS-0 timeslots with
per-channel encapsulation configuration (for example, Frame Relay, PPP, cHDLC,
ATM). DS-3 TDM channels can be further channelized to DS-1/E-1 channel groups.
An E3 TDM channel cannot be channelized and can only be configured in clear
channel operation. The MDA is based on a programmable data path architecture that
Issue: 013HE 11968 AAAC TQZZA 0123
Page 24
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
enables enhanced Layer 1 and Layer 2 data path functionality, for example ATM TM
features, MDA-based channel or port queuing, or multilink applications like Inverse
ATM Multiplexing (IMA). This MDA is supported on the 7750 SR-7/12 and the
7750 SR-c4/c12 platforms.
2.1.8.4Channelized OC-12/STM-4 ASAP MDAs
The channelized OC-12/STM-4 variant of the ASAP MDAs has features and
channelization options similar to the 4-port channelized OC-3/STM-1 ASAP MDA.
DS-3 TDM channels can be further channelized to DS-1/E-1 channel groups. An E3 TDM channel cannot be channelized and can only be configured in clear channel
operation. This MDA is supported on the 7750 SR-7/12 and the 7750 SR-c4/c12
platforms.
2.1.8.5Channelized DS-3/E-3 ASAP MDA (4-Port)
The 4-port MDA provides four ports configurable as DS-3 or E-3. The MDA has eight
(8) 1.0/2.3 connectors and accepts up to eight (8) DS-3/E-3 coax patch cables.
Each physical DS-3 connection can support a full clear-channel DS-3, or it can be
channelized into independent DS-1/E-1 data channels. Each DS-1/E-1 channel can
then be further channelized down to DS-0s. All DS-0 channels within a DS-3 port
must be configured for the same channel speed.: 56 kb/s or 64 kb/s. The 56 kb/s
speed value is only supported on DS-1 channels (ESF and SF framing) and not on
E-1 (G.704) channels. Also, 56 kb/s channels cannot be part of a bundle. E-3 ports
do not support channelization, only clear channel operation. This MDA is supported
on the 7750 SR-7/12 and the 7750 SR-c4/c12 platforms. This MDA is supported on
the 7750 SR-7/12 and the 7750 SR-c4/c12 platforms.
2.1.8.6Channelized DS-3/E-3 ASAP MDA (12-Port)
The 12-port MDA provides 12 ports configurable as DS-3 or E-3. The MDA has 24
1.0/2.3 connectors and accepts up to 24 DS-3/E-3 coax patch cables.
Each physical DS-3 connection can support a full clear-channel DS-3, or it can be
channelized into independent DS-1/E-1 data channels. Each DS-1/E-1 channel can
then be further channelized down to DS-0s. All DS-0 channels within a DS-3 port
must be configured for the same channel speed.: 56 kb/s or 64 kb/s. The 56 kb/s
speed value is only supported on DS-1 channels (ESF and SF framing) and not on
24
3HE 11968 AAAC TQZZA 01Issue: 01
Page 25
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
E-1 (G.704) channels. Also, 56 kb/s channels cannot be part of a bundle. E-3 ports
do not support channelization, only clear channel operation. This MDA is supported
on the 7750 SR-7/12 and the 7750 SR-c4/c12 platforms.
2.1.8.7Channelized OC-3/STM-1 Circuit Emulation Services (CES)
CMA and MDA
The channelized OC-3/STM-1/OC-12/STM-4 CES MDAs (c1-choc3-ces-sfp / m1choc3-ces-sfp, m4-choc3-ces-sfp, m1-choc12-ces-sfp) provide an industry leading
consolidation for DS-1, E-1 and n*64 kb/s for CES.
The channelized OC-3/STM-1/OC-12/STM-4 CES CMA/MDAs support CES. Circuit
emulation services are interoperable with the existing 7705 SAR and 7250 SAS
circuit emulation services. They are also interoperable with the 1850 TSS-5 circuit
emulation services.
Two modes of circuit emulation are supported: unstructured and structured.
Unstructured mode is supported for DS-1 and E-1 channels as per RFC4553
(SAToP). Structured mode is supported for n*64 kb/s circuits as per RFC 5086,
Structure-Aware Time Division Multiplexed (TDM) Circuit Emulation Service over
Packet Switched Network (CESoPSN). In addition, DS-1, E-1 and n*64 kb/s circuits are also supported as per MEF8, Circuit Emulation Services over Ethernet
(CESoETH) (Oct 2004). TDM circuits are optionally encapsulated in MPLS or
Ethernet as per the applicable standards.
Interfaces
All channels on the CES CMA/MDA are supported as circuits to be emulated across
the packet network. This includes DS-1, E-1 and n*64 kb/s channels. Structure
agnostic mode is supported for DS-1 and E-1 channels. Structure aware mode is
supported for n*64 kb/s channel groups in DS-1 and E-1 carriers. N*64 kb/s circuit
emulation supports basic and Channel Associated Signaling (CAS) options. CAS
configuration must be identical for all channel groups on a given DS-1 or E-1.
Circuits encapsulated in MPLS use circuit pipes (Cpipes) to connect to the far end
circuit. Cpipes support either SAP-spoke SDP or SAP-SAP connections.
Circuits encapsulated in Ethernet can be selected as a SAP in Epipes. Circuits
encapsulated in Ethernet can be either SAP-spoke SDP or SAP-SAP connections for
all valid Epipe SAPs. An EC-ID and far-end destination MAC address must be
configured for each circuit.
Issue: 013HE 11968 AAAC TQZZA 0125
Page 26
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Each OC-3/STM-1 port can be independently configured to be loop-timed or nodetimed. Each OC-3/STM-1 port can be configured to be a timing source for the node.
Each DS-1 or E-1 channel can be independently configured to be loop-timed, nodetimed, adaptive-timed, or differential-timed. One adaptive timed circuit is supported
per CMA or MDA. The CES circuit configured for adaptive timing can be configured
to be a timing source for the node. This is required to distribute network timing to
network elements which only have packet connectivity to network.
On the 7750 SR-c12 CES CMA, a BITS port is also provided. The BITS port can be
configured as one reference sources (ref1, ref2) in the system timing subsystem.
These MDAs are supported on the 7750 SR-7/12 and the 7750 SR-c4/c12 platforms.
2.1.8.8Network Interconnections
Nokia routers can fill the needs of smaller service providers as well as the more
remote point of presence (PoPs) locations for larger service providers. To support
the use of lower speed links as network links in the likelihood that lower speed circuits
are used as network or backbone links, the routers support a DS-1/E-1/DS-3/E-3 port
(ASAP MDAs) or channel and an MLPPP bundle (ASAP MDAs) as network ports to
transport and forwarding of all service types. This feature allows service providers to
use lower speed circuits to interconnect small PoPs and CoS that do not require
large amounts of network or backbone bandwidth.
26
3HE 11968 AAAC TQZZA 01Issue: 01
Page 27
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.2Digital Diagnostics Monitoring
Some Nokia SFPs, XFPs, QSFPs, CFPs and the MSA DWDM transponder have the
Digital Diagnostics Monitoring (DDM) capability where the transceiver module
maintains information about its working status in device registers including:
• temperature
• supply voltage
• transmit (TX) bias current
• TX output power
• received (RX) optical power
For QSFPs and CFPs, DDM Temperature and Supply voltage is available only at the
Module level as shown in Table 5.
Refer to the Statistics Collection section for details about the QSFP and CFP sample
DDM and DDM Lane information.
Interfaces
For the QSFPs and CFPs, the number of lanes is indicated by DDM attribute
“Number of Lanes: 4”.
Subsequently, each lane threshold and measured values are shown per lane.
If a given lane entry is not supported by the given QSFP or CFP specific model, then
it is shown as “-“ in the entry.
A sample QSFP and CFP lane information is provided below:
Transceiver Data
Transceiver Type: QSFP+
Model Number: 3HE06485AAAA01 ALU IPUIBMY3AA
TX Laser Wavelength: 1310 nmDiag Capable: yes
Number of Lanes: 4
Connector Code: LCVendor OUI: e4:25:e9
Manufacture date: 2012/02/02Media: Ethernet
Serial Number: 12050188
Part Number: DF40GELR411102A
Optical Compliance : 40GBASE-LR4
Link Length support: 10km for SMF
===============================================================================
Transceiver Digital Diagnostic Monitoring (DDM)
===============================================================================
------------------------------------------------------------------------------Temperature (C)+35.6+75.0+70.0+0.0-5.0
Supply Voltage (V)3.233.603.503.103.00
===============================================================================
===============================================================================
Transceiver Lane Digital Diagnostic Monitoring (DDM)
Transceiver Type: CFP
Model Number: 3HE04821ABAA01 ALU IPUIBHJDAA
TX Laser Wavelength: 1294 nmDiag Capable: yes
Number of Lanes: 4
Connector Code: LCVendor OUI: 00:90:65
Manufacture date: 2011/02/11Media: Ethernet
Serial Number: C22CQYR
Part Number: FTLC1181RDNL-A5
Optical Compliance : 100GBASE-LR4
Link Length support: 10km for SMF
===============================================================================
Transceiver Digital Diagnostic Monitoring (DDM)
===============================================================================
Value High Alarm High WarnLow Warn Low Alarm
------------------------------------------------------------------------------Temperature (C)+48.2+70.0+68.0+2.0+0.0
Supply Voltage (V)3.243.463.433.173.13
===============================================================================
===============================================================================
Transceiver Lane Digital Diagnostic Monitoring (DDM)
===============================================================================
High AlarmHigh WarnLow WarnLow Alarm
------------------------------------------------------------------------------Lane Temperature (C)+55.0+53.0+27.0+25.0
Lane Tx Bias Current (mA)120.0115.035.030.0
Lane Tx Output Power (dBm)4.504.00-3.80-4.30
Lane Rx Optical Pwr (avg dBm)4.504.00-13.00-16.00
------------------------------------------------------------------------------Lane ID Temp(C)/AlmTx Bias(mA)/AlmTx Pwr(dBm)/AlmRx Pwr(dBm)/Alm
The transceiver is programmed with warning and alarm thresholds for low and high
conditions that can generate system events. These thresholds are programmed by
the transceiver manufacturer.
There are no CLI commands required for DDM operations, however, the show>port port-id detail command displays DDM information in the Transceiver Digital
Diagnostics Monitoring output section.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 29
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
DDM information is populated into the router’s MIBs, so the DDM data can be
retrieved by Network Management using SNMP. Also, RMON threshold monitoring
can be configured for the DDM MIB variables to set custom event thresholds if the
factory-programmed thresholds are not at the desired levels.
The following are potential uses of the DDM data:
• Optics degradation monitoring — With the information returned by the DDMcapable optics module, degradation in optical performance can be monitored
and trigger events based on custom or the factory-programmed warning and
alarm thresholds.
• Link/router fault isolation — With the information returned by the DDM-capable
optics module, any optical problem affecting a port can be quickly identified or
eliminated as the potential problem source.
Supported real-time DDM features are summarized in Table 4.
Table 4Real-Time DDM Information
Interfaces
ParameterUser UnitsSFP/XFP
Units
TemperatureCelsiusCSupportedSupportedSupported
Supply
Voltage
TX Bias
Current
TX Output
Power
RX Received
Optical
Power4
AUX1parameter dependent
AUX2parameter dependent
VoltsµVSupportedSupportedNot supported
mAµASupportedSupportedSupported
dBm (converted from mW)mWSupportedSupportedSupported
dBm (converted from
dBm) (Avg Rx Power or
OMA)
(embedded in transceiver)
(embedded in transceiver)
mWSupportedSupportedSupported
-Not supportedSupportedNot supported
-Not supportedSupportedNot supported
SFPXFPMSA DWDM
The factory-programmed DDM alarms and warnings that are supported are
summarized in Table 5.
Issue: 013HE 11968 AAAC TQZZA 0129
Page 30
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 5DDM Alarms and Warnings
ParameterSFP/XFP UnitsSFPXFPRequired?MSA DWDM
Temperature
- High Alarm
- Low Alarm
- High Warning
- Low Warning
Supply Voltage
- High Alarm
- Low Alarm
- High Warning
- Low Warning
TX Bias Current
- High Alarm
- Low Alarm
- High Warning
- Low Warning
TX Output Power
- High Alarm
- Low Alarm
- High Warning
- Low Warning
CYesYesYesYes
µVYesYesYesNo
µAYesYesYesYes
mWYesYesYesYes
RX Optical Power
- High Alarm
- Low Alarm
- High Warning
- Low Warning
AUX1
- High Alarm
- Low Alarm
- High Warning
- Low Warning
AUX2
- High Alarm
- Low Alarm
- High Warning
- Low Warning
30
mWYesYesYesYes
parameter
dependent
(embedded in
transceiver)
parameter
dependent
(embedded in
transceiver)
3HE 11968 AAAC TQZZA 01Issue: 01
NoYesYesNo
NoYesYesNo
Page 31
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.2.1SFPs and XFPs
The availability of the DDM real-time information and the warning and alarm status
is based on the transceiver. It may or may not indicate that DDM is supported.
Although some Nokia SFPs support DDM, Nokia has not required DDM support in
releases prior to Release 6.0. Non-DDM and DDM-supported SFPs are
distinguished by a specific ICS value.
For SFPs that do not indicate DDM support in the ICS value, DDM data is available
although the accuracy of the information has not been validated or verified.
For non-Nokia transceivers, DDM information may be displayed, but Nokia is not
responsible for formatting, accuracy, and so on.
2.2.2Statistics Collection
Interfaces
The DDM information and warnings and alarms are collected at one minute intervals,
so the minimum resolution for any DDM events when correlating with other system
events is one minute.
In the Transceiver Digital Diagnostic Monitoring section of the show portport-iddetail command output:
• if the present measured value is higher than either or both of the High Alarm and
High Warn thresholds, an exclamation mark “!” displays along with the threshold
value
• if the present measured value is lower than either or both of the Low Alarm and
Low Warn thresholds, an exclamation mark “!” displays along with the threshold
value
B:SR7-101# show port 2/1/6 detail
......
===============================================================================
Transceiver Digital Diagnostic Monitoring (DDM), Internally Calibrated
===============================================================================
Value High Alarm High WarnLow Warn Low Alarm
------------------------------------------------------------------------------Temperature (C)+33.0+98.0+88.0-43.0-45.0
Supply Voltage (V)3.31 4.123.603.00 2.80
Tx Bias Current (mA)5.7 60.050.00.1 0.0
Tx Output Power (dBm)-5.45 0.00-2.00-10.50-12.50
Rx Optical Power (avg dBm)-0.65-3.00!-4.00!-19.51-20.51
===============================================================================
Issue: 013HE 11968 AAAC TQZZA 0131
Page 32
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3Ports
2.3.1Port Types
Before a port can be configured, the slot must be provisioned with a card type and
MDA type.
Nokia routers support the following port types:
• Ethernet — Supported Ethernet port types include:
− Fast Ethernet (10/100BASE-T)
− Gb Ethernet (1GbE, 1000BASE-T)
− 10 Gb Ethernet (10GbE, 10GBASE-X)
− 40 Gb Ethernet (40GbE)
− 100 Gb Ethernet (100GbE)
Router ports must be configured as either access, hybrid, or network. The
default is network.
− Access ports — Configured for customer facing traffic on which services are
configured. If a Service Access Port (SAP) is to be configured on the port or
channel, it must be configured as an access port or channel. When a port is
configured for access mode, the appropriate encapsulation type must be
configured to distinguish the services on the port or channel. Once a port
has been configured for access mode, one or more services can be
configured on the port or channel depending on the encapsulation value.
− Network ports — Configured for network-facing traffic. These ports
participate in the service provider transport or infrastructure network. Dot1q
is supported on network ports.
− Hybrid ports — Configured for access and network-facing traffic. While the
default mode of an Ethernet port remains network, the mode of a port
cannot be changed between the access, network, and hybrid values unless
the port is shut down and the configured SAPs or interfaces are deleted.
Hybrid ports allow a single port to operate in both access and network
modes. The MTU of a port in hybrid mode is the same as in network mode,
except for the 10/100 MDA. The default encapsulation for hybrid port mode
is dot1q; it also supports QinQ encapsulation on the port level. Null hybrid
port mode is not supported.
32
3HE 11968 AAAC TQZZA 01Issue: 01
Page 33
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Once the port is changed to hybrid, the default MTU of the port is changed
to match the value of 9212 bytes currently used in network mode (higher
than an access port), ensuring that both SAP and network VLANs can be
accommodated. The only exception is when the port is a 10/100 Fast
Ethernet. In those cases, the MTU in hybrid mode is set to 1522 bytes,
which corresponds to the default access MTU with QinQ, which is larger
than the network dot1q MTU or access dot1q MTU for this type of Ethernet
port. The configuration of all parameters in access and network contexts
continues to be done within the port using the same CLI hierarchy as in
existing implementation. The difference is that a port configured in mode
hybrid allows both ingress and egress contexts to be configured
concurrently.
An Ethernet port configured in hybrid mode can have two values of
encapsulation type: dot1q and QinQ. The NULL value is not supported
since a single SAP is allowed, and can be achieved by configuring the port
in the access mode, or a single network IP interface is allowed, which can
be achieved by configuring the port in network mode. Hybrid mode can be
enabled on a LAG port when the port is part of a single chassis LAG
configuration. When the port is part of a multi-chassis LAG configuration, it
can only be configured to access mode since MC-LAG is not supported on
a network port and consequently is not supported on a hybrid port. The
same restriction applies to a port that is part of an MC-Ring configuration.
Interfaces
For a hybrid port, the amount of the allocated port buffers in each of ingress
and egress is split equally between network and access contexts using the
following config>port>hybrid-buffer-allocation>ing-weight access
access-weight [0 to 100] network network-weight [0 to 100] and
config>port>hybrid-buffer-allocation>egr-weight access access-
weight [0 to 100] network network-weight [0 to 100] commands.
Adapting the terminology in buffer-pools, the port’s access active bandwidth
and network active bandwidth in each ingress and egress are derived as
follows (egress formulas shown only):
• port-access-active-egress-bandwidth = port-active-egress-bandwidth x
• hybrid-port-access-egress-factor
• port-network-active-egress-bandwidth = port-active-egress-bandwidth
x
• hybrid-port-network-egress-factor
Issue: 013HE 11968 AAAC TQZZA 0133
Page 34
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
When a named pool policy is applied to the hybrid port’s MDA or to the
hybrid port, the port’s fair share of total buffers available to the MDA is split
into three parts: default pools, named pools local to the port, and named
pools on the ports MDA. This allocation can be altered by entering the
corresponding values in the port-allocation-weights parameter.
• WAN PHY — 10 G Ethernet ports can be configured in WAN PHY mode (using
the ethernet xgig config). When configuring the port to be in WAN mode, you
can change certain SONET/SDH parameters to reflect the SONET/SDH
requirements for this port.
• SONET-SDH and TDM — Supported SONET-SDH and TDM port types include:
− n*DS-0 inside DS-1/E-1
− DS-1/E-1DS-3/E-3
− OC3/STM-1
− OC12/STM-4
− OC48/STM-16
− OC192/STM-64 SONET/SDH
− OC768/STM-256
A SONET/SDH port/path or a TDM port/channel can be configured with the
following encapsulations depending on the MDA type:
− Frame Relay
− PPP
− cHDLC
• ATM — Some MDAs support ATM encapsulation on SONET/SDH and TDM
ports. The ATM cell format and can be configured for either UNI or NNI cell
format. The format is configurable on a SONET/SDH or TDM port/channel path
basis. All VCs on a path, channel or port must use the same cell format. The
ATM cell mapping can also be configured on per-interface basis for either Direct
or PLCP on some MDAs (for example ASAP MDA).
• Several Media Dependent Adapters (MDAs) support channelization down to the
DS-0 level. ATM, Frame Relay, PPP, and cHDLC are supported encapsulations
on channelized ports.
• Link Aggregation (LAG) — LAG can be used to group multiple ports into one
logical link. The aggregation of multiple physical links allows for load sharing and
offers seamless redundancy. If one of the links fails, traffic is redistributed over
the remaining links.
• Multilink Bundles — A multilink bundle is a collection of channels on channelized
ports that physically reside on the same MDA. Multilink bundles are used by
providers who offer either bandwidth-on-demand services or fractional
bandwidth services (fraction of a DS-3/E-3 for example). Multilink bundles are
supported over PPP channels (MLPPP) and ATM channels (IMA).
34
3HE 11968 AAAC TQZZA 01Issue: 01
Page 35
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• APS — Automatic Protection Switching (APS) is a means to provide redundancy
on SONET equipment to guard against linear unidirectional or bidirectional
failures. The network elements (NEs) in a SONET/SDH network constantly
monitor the health of the network. When a failure is detected, the network
proceeds through a coordinated pre-defined sequence of steps to transfer (or
switchover) live traffic to the backup facility (called protection facility.) This is
done very quickly to minimize lost traffic. Traffic remains on the protection facility
until the primary facility (called working facility) fault is cleared, at which time the
traffic may optionally be reverted to the working facility.
• Bundle Protection Group (BPGRP) — A BPGRP is a collection of two bundles
created on the APS Group port. Working bundle resides on the working circuit
of the APS group, while protection bundle resides on the protection circuit of the
APS group. APS protocol running on the circuits of the APS Group port monitors
the health of the SONET/SDH line and based on it or administrative action
moves user traffic from one bundle to another in the group as part of an APS
switch.
• Cross connect adapter (CCA) — A CCA on a VSM module interconnects the
egress forwarding path on the IOM directly to the ingress forwarding path. This
eliminates the need for the physical port MAC, PHY, cable and other MDAspecific components producing a less costly and more reliable adapter.
Interfaces
• Optical Transport Network (OTN) — Including OTU2, OTU2e, and OTU3. OTU2
encapsulates 10-Gigabit Ethernet WAN and adds FEC (Forward Error
Correction). OTU2e encapsulates 10-Gigabit Ethernet LAN and adds FEC
(Forward Error Correction). OTU3 encapsulated OC768 and adds FEC.
2.3.2Port Features
2.3.2.1Port State and Operational State
There are two port attributes that are related and similar but have slightly different
meanings: Port State and Operational State (or Operational Status).
The following descriptions are based on normal individual ports. Many of the same
concepts apply to other objects that are modeled as ports in the router such as PPP/
IMA/MLFR multilink bundles or APS groups but the show output descriptions for
these objects should be consulted for the details.
• Port State
− Displayed in port summaries such as show port or show port 1/1
− tmnxPortState in the TIMETRA-PORT-MIB
Issue: 013HE 11968 AAAC TQZZA 0135
Page 36
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
− Values: None, Ghost, Down (linkDown), Link Up, Up
• Operational State
− Displayed in the show output of a specific port such as show port 2/1/3
− tmnxPortOperStatus in the TIMETRA-PORT-MIB
− Values: Up (inService), Down (outOfService)
The behavior of Port State and Operational State are different for a port with link
protocols configured (Eth OAM, Eth CFM or LACP for Ethernet ports, LCP for PPP/
POS ports). A port with link protocols configured only transitions to the Up Port State
when the physical link is up and all the configured protocols are up. A port with no
link protocols configured transitions from Down to Link Up and then to Up
immediately once the physical link layer is up.
The linkDown and linkUp log events (events 2004 and 2005 in the SNMP application
group) are associated with transitions of the port Operational State. Note that these
events map to the RFC 2863, The Interfaces Group MIB, (which obsoletes RFC
2233, The Interfaces Group MIB using SMIv2) linkDown and linkUp traps as
mentioned in the SNMPv2-MIB.
An Operational State of Up indicates that the port is ready to transmit service traffic
(the port is physically up and any configured link protocols are up). The relationship
between port Operational State and Port State is shown in Table 6:
Table 6Relationship of Port State and Oper State
Operational State (Oper State or Oper Status)
(as displayed in “show port x/y/z”)
Port State (as displayed in the
show port summary)
UpUpUp
Link Up (indicates the physical
link is ready)
DownDownDown
For ports that have no link layer
protocols configured
UpDown
For ports that have link layer
protocols configured
(PPP, LACP, 802.3ah EFM, 802.1ag
Eth-CFM)
2.3.2.2802.1x Network Access Control
36
Nokia routers support network access control of client devices (PCs, STBs, and so
on) on an Ethernet network using the IEEE. 802.1x standard. 802.1x is known as
Extensible Authentication Protocol (EAP) over a LAN network or EAPOL.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 37
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.2.1802.1x Modes
Nokia routers support port-based network access control for Ethernet ports only.
Every Ethernet port can be configured to operate in one of three different operation
modes, controlled by the port-control parameter:
• force-auth — Disables 802.1x authentication and causes the port to transition
to the authorized state without requiring any authentication exchange. The port
transmits and receives normal traffic without requiring 802.1x-based host
authentication. This is the default setting.
• force-unauth — Causes the port to remain in the unauthorized state, ignoring
all attempts by the hosts to authenticate. The switch cannot provide
authentication services to the host through the interface.
• auto — Enables 802.1x authentication. The port starts in the unauthorized state,
allowing only EAPOL frames to be sent and received through the port. Both the
router and the host can initiate an authentication procedure as described below.
The port remains in unauthorized state (no traffic except EAPOL frames is
allowed) until the first client is authenticated successfully. After this, traffic is
allowed on the port for all connected hosts.
Interfaces
2.3.2.2.2802.1x Basics
The IEEE 802.1x standard defines three participants in an authentication
conversation (see Figure 1 which shows an example with the 7450 ESS).
• The supplicant — This is the end-user device that requests access to the
network.
• The authenticator — Controls access to the network. Both the supplicant and the
authenticator are referred to as Port Authentication Entities (PAEs).
• The authentication server — Performs the actual processing of the user
information.
Figure 1802.1x Architecture
Client7450 ESSRADIUS
Supplicant
EAPOLRADIUS
Authenticator
Authentication
Authenticator
Server
Server
OSSG038
Issue: 013HE 11968 AAAC TQZZA 0137
Page 38
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The authentication exchange is carried out between the supplicant and the
authentication server, the authenticator acts only as a bridge. The communication
between the supplicant and the authenticator is done through the Extended
Authentication Protocol (EAP) over LANs (EAPOL). On the back end, the
communication between the authenticator and the authentication server is done with
the RADIUS protocol. The authenticator is thus a RADIUS client, and the
authentication server a RADIUS server.
The messages involved in the authentication procedure are shown in Figure 2. The
router initiates the procedure when the Ethernet port becomes operationally up, by
sending a special PDU called EAP-Request/ID to the client. The client can also
initiate the exchange by sending an EAPOL-start PDU, if it doesn't receive the EAPRequest/ID frame during bootup. The client responds on the EAP-Request/ID with a
EAP-Response/ID frame, containing its identity (typically username + password).
Figure 2802.1x Authentication Scenario
Client
EAPOL-Start
EAP-Request/ID
EAP-Response/ID
EAP-Request/OTP
EAP-Response/OTP
EAP-Success
EAP-Logoff
EAP-Request/ID
7450 ESSRADIUS
Authentication
Server
Port Unauthorized
Access Request
Access Challenge
Access Request
Access Accept
Port Authorized
Port Unauthorized
quiet-period
OSSG039
38
After receiving the EAP-Response/ID frame, the router will encapsulate the identity
information into a RADIUS AccessRequest packet, and send it off to the configured
RADIUS server.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 39
INTERFACE CONFIGURATION GUIDE
OSSG040-7750
Client
quiet-period
supplicanttimeout
transmitperiod
EAP-Request/ID
EAP-Request/ID
EAP-Request/ID
EAP-Request/ID
7750 SR
RADIUS
Authentication
Server
Client
Access Request
Access Request
Access Request
quiet-period
server-
timeout
max-auth-request
EAP-Request/ID
EAP-Response/ID
EAP-Failure
EAP-Request/ID
7750 SR
RADIUS
Authentication
Server
802.1x EAPOL Timers
802.1x RADIUS Timers
Port Unauthorized
RELEASE 15.0.R5
The RADIUS server checks the supplied credentials, and if approved will return an
Access Accept message to the router. The router notifies the client with an EAPSuccess PDU and puts the port in authorized state.
2.3.2.2.3802.1x Timers
The 802.1x authentication procedure is controlled by a number of configurable timers
and scalars. There are two separate sets, one for the EAPOL message exchange
and one for the RADIUS message exchange. See Figure 3 for an example of the
timers on the 7750 SR.
Figure 3802.1x EAPOL Timers (left) and RADIUS Timers (right)
Interfaces
• transit-period — Indicates how many seconds the Authenticator will listen for
an EAP-Response/ID frame. If the timer expires, a new EAP-Request/ID frame
will be sent and the timer restarted. The default value is 60. The range is 1 to
3600 seconds.
EAPOL timers:
• supplicant-timeout — This timer is started at the beginning of a new
authentication procedure (transmission of first EAP-Request/ID frame). If the
timer expires before an EAP-Response/ID frame is received, the 802.1x
authentication session is considered as having failed. The default value is 30.
Issue: 013HE 11968 AAAC TQZZA 0139
The range is 1 to 300.
Page 40
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• quiet-period — Indicates number of seconds between authentication sessions
It is started after logoff, after sending an EAP-Failure message or after expiry of
the supplicant-timeout timer. The default value is 60. The range is 1 to 3600.
RADIUS timer and scaler:
• max-auth-req — Indicates the maximum number of times that the router will
send an authentication request to the RADIUS server before the procedure is
considered as having failed. The default value is value 2. The range is 1 to 10.
• server-timeout — Indicates how many seconds the authenticator will wait for a
RADIUS response message. If the timer expires, the access request message
is sent again, up to max-auth-req times. The default value is 60. The range is 1
to 3600 seconds.
The router can also be configured to periodically trigger the authentication procedure
automatically. This is controlled by the enable re-authentication and reauth-period
parameters. Reauth-period indicates the period in seconds (since the last time that
the authorization state was confirmed) before a new authentication procedure is
started. The range of reauth-period is 1 to 9000 seconds (the default is 3600
seconds, one hour). Note that the port stays in an authorized state during the reauthentication procedure.
2.3.2.2.4802.1x Tunneling
Tunneling of untagged 802.1x frames received on a port is supported for both Epipe
and VPLS service using either null or default SAPs (for example 1/1/1:*) when the
port dot1x port-control is set to force-auth.
When tunneling is enabled on a port (using the command configure port port-id ethernet dot1x tunneling), untagged 802.1x frames are treated like user frames
and are switched into Epipe or VPLS services which have a corresponding null SAP
or default SAP on that port. In the case of a default SAP, it is possible that other nondefault SAPs are also present on the port. Untagged 802.1x frames received on
other service types, or on network ports, are dropped.
When tunneling is required, it is expected that it is enabled on all ports into which
802.1x frames are to be received. The configuration of dot1x must be configured
consistently across all ports in LAG as this is not enforced by the system.
Note that 802.1x frames are treated like user frames, that is, tunneled, by default
when received on a spoke or mesh SDP.
40
3HE 11968 AAAC TQZZA 01Issue: 01
Page 41
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.2.5802.1x Configuration and Limitations
Configuration of 802.1x network access control on the router consists of two parts:
• Generic parameters, which are configured under config>security>dot1x
• Port-specific parameters, which are configured under
config>port>ethernet>dot1x
801.x authentication:
• Provides access to the port for any device, even if only a single client has been
authenticated.
• Can only be used to gain access to a pre-defined Service Access Point (SAP).
It is not possible to dynamically select a service (such as a VPLS service)
depending on the 802.1x authentication information.
• If 802.1x access control is enabled and a high rate of 802.1x frames are received
on a port, that port will be blocked for a period of 5 minutes as a DoS protection
mechanism.
Interfaces
2.3.2.3MACsec
Media Access Control Security (MACsec) is an industry-standard security
technology that provides secure communication for almost all types of traffic on
Ethernet links. MACsec provides point-to-point and point-to-multipoint security on
Ethernet links between directly-connected nodes or nodes connected via a Layer 2
cloud. It is capable of identifying and preventing most security threats, including:
• denial of service
• intrusion
• man-in-the-middle
• masquerading
• passive wiretapping
• playback attacks
MACsec is standardized in IEEE 802.1AE, and is a Layer 2 encryption. MACsec
encrypts anything from the 802.1AE header to the end of the payload including
802.1Q. MACsec leaves the DMAC and SMAC in clear text.
Figure 4 shows the 802.1AE LAN-Mode structure.
Issue: 013HE 11968 AAAC TQZZA 0141
Page 42
Interfaces
sw0118
21148
octetsoctetoctet
SLANTCIMACsec EthertypePN
SecTAG
SCI (encoding
is optional)
octetsoctets
Figure 4802.1 AE LAN-MODE
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Autheticated
802.1AE LAN-MODE
0x88e5
MISEec Ether
Type
802.1QDMACSMAC
TCI/AN SL
Excrypted
Payload
PAC KET
NUMBER
The forwarding on a MACSec packet is performed using the destination MAC
address, which is in clear text.
2.3.2.3.1MAC Sec 802.1AE Header (SecTAG)
The 802.1AE header includes a security TAG which includes:
• the association number within the channel
• the packet number to provide a unique initialization vector for encryption and
authentication algorithms as well as protection against replay attack
• an optional LAN-Wide secure channel identifier
The security TAG (SecTAG) is identified by the MACsec EtherType and conveys the
following:
802.1AE dictates that the 802.1Q VLAN needs to be encrypted. Some vendors give
the option of configuring the MACSec on a port with VLAN in clear text.
SR OS supports both modes. On the 7750 SR, 7450 ESS, and 7950 XRS, 1/10 Gig
cards support both mode of operation.
Figure 6 shows the VLAN encrypted and VLAN in clear.
Figure 6802.1 AE LAN/WAN Modes and VLAN Encrypted/Clear
Interfaces
2.3.2.3.3MACSec Key management modes
Table 7MACsec Key Management Modes
KeyingExplanationSR OS SupportWhere Used
Static SAKManually configure
Issue: 013HE 11968 AAAC TQZZA 0143
There are four-main, key management modes in MACSec. Table 7 describes these
management modes.
each node with a static
SAK, SAM, or CLI
NASwitch to switch
Page 44
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 7MACsec Key Management Modes (Continued)
KeyingExplanationSR OS SupportWhere Used
Static CAK PRE SHARED KEYUses a dynamic
MACSec Key
Management (MKA)
and uses a configured
pre shared key to drive
the CAK. The CAK
encrypts the SAK
between two peers and
authenticates the
peers
Dynamic CAK EAP
Authentication
Dynamic CAK MSK distribution
via RADIUS and EAP-TLS
Uses a dynamic MKA
and uses a EAP MSK
(Master System Key) to
drive the CAK. The
CAK encrypts the SAK
between two peers and
authenticates the
peers
MSKs are stored in the
Radius server and
distributed to the hosts
via EAP-TLS. This is
usually used in the
access networks
where there are a large
number of hosts using
MACSec and
connecting to an
access switch. MKA
uses MSK to drive the
CAK. The CAK
encrypts the SAK
between 2 peers and
authenticates the
peers
SupportedSwitch to switch
Not SupportedSwitch to switch
Not SupportedHost to switch
44
2.3.2.3.4MACsec Terminology
Figure 7 illustrates some of the main concepts used in MACSec for the static-CAK
scenario.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 45
INTERFACE CONFIGURATION GUIDE
sw0120
MKA
Node 2 CA1
Port 1/1/1 security zone 1
SecY 1
TxSC1
TxSA1 (Inactive)
TxSA2 (Active)
RxSC1
RxSA1
RxSA2
Node 1 CA1
Port 1/1/1 security zone 1
SecY 1
TxSC1
TxSA1 (Active)
TxSA2 (Inactive)
RxSC1
RxSA1
RxSA2
SC1-node1
SCI-node2
CA1
RELEASE 15.0.R5
Figure 7MACsec Concepts for Static-CAK
Table 8 describes the MACsec terminology.
Table 8MACsec Terms
Interfaces
MACsec TermDescription
CA: Connectivity
Association
A security relationship, established and maintained by key agreement protocols
(MKA), that comprises a fully-connected subset of the service access points in
stations attached to a single LAN that are to be supported by MACsec.
MKA: MACSec Key
Agreement Protocol
Control protocol between MACSec peers, which is used for peer aliveness and
encryption key distribution. MACsec Key Agreement is responsible for discovering,
authenticating, and authorizing the potential participants in a CA.
SecY: MAC Security
Entity
Operates the MAC Security protocol within a system. Manages and identifies the SC
and the corresponding active SA.
SC: Security ChannelSC provides a unidirectional point-to-point or point-to-multipoint communication.
Each SC contains a succession of SAs and each SC has a different SAK.
Issue: 013HE 11968 AAAC TQZZA 0145
Page 46
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 8MACsec Terms (Continued)
MACsec TermDescription
SA: Security Association In the cases of SR OS 2 SA per SC, each with a different SAK, each SC comprises
a succession of SAs. Each SA is identified by the SC identifier, concatenated with a
two-bit association number. The Secure Association Identifier (SAI), thus created,
allows the receiving SecY to identify the SA, and thus the SAK used to decrypt and
authenticate the received frame. The AN, and hence the SAI, is only unique for the
SAs that can be used or recorded by participating SecYs at any instant.
MACsec Key Agreement is responsible for creating and distributing SAKs to each of
the SecYs in a CA. This key creation and distribution is independent of the
cryptographic operation of each of the SecYs. The decision to replace one SA with
its successor is made by the SecY that transmits using the SC, after MACsec Key
Agreement has informed it that all the other SecYs are prepared to receive using that
SA. No notification, other than receipt of a secured frame with a different SAI is sent
to the receiver. A SecY must always be capable of storing SAKs for two SAs for each
inbound SC, and of swapping from one SA to another without notice. Certain LAN
technologies can reorder frames of different priority, so reception of frames on a
single SC can use interleaved SA.
SAK: Security
Association Key
2.3.2.3.5MACsec Static CAK
SAK is the encryption key used to encrypt the datapath of MACSec.
MACsec uses SAs for encryption of packets. SA is a security relationship that
provides security guarantees for frames transmitted from one member of a CA to the
others. Each SA contains a single secret key (SAK) where the cryptographic
operations used to encrypt the datapath PDUs.
SAK is the secret key used by an SA to encrypt the channel.
When enabled, MACsec uses a static CAK security mode. Two security keys, a
connectivity association key (CAK) that secures control plane traffic and a randomlygenerated secure association key (SAK) that secures data plane traffic are used to
secure the point-to-point or point-to-multipoint Ethernet link. Both keys are regularly
exchanged between both devices on each end of the Ethernet link to ensure link
security.
Figure 8 illustrates MACsec generating the CAK.
46
3HE 11968 AAAC TQZZA 01Issue: 01
Page 47
INTERFACE CONFIGURATION GUIDE
sw0121
MKA Protocol
RADIUS
EAP Authentication
Server
MKPDU: MACsec Key Agreement Protocol Data Unit
EAP
Supplicant
PSK:
CAK Value: 128 or 256
CKN Value: 16 Char
PSK:
CAK Value:
CKN Value:
Key Server
RNG
SAK:
MKPDUMKPDUMKPDUControl Plane: Using Kek, ICK
Data Plane: Using SAKsEncrypted DATA Encrypted DATA
EAPoL for Authentication
CAK: derived from EAP or PSK
KEK: Key encryption
key to wrap SAK
Encrypt wrap SAKIntegrity MKPDU
ICK: Integrity check
value (ICV) key
+
oror
EAP
Authenticator
RELEASE 15.0.R5
Figure 8MACsec Generating the CAK
Interfaces
The node initially needs to secure the control plain communication to distribute the
SAKs between two or more members of a CA domain.
The securing of control plain is done via CAK. To generate the CAK, there are two
main methods:
• EAPoL (SR OS does not support EAPoL)
• pre shared key (CAK and CKN values are configured manually via CLI). The
following CAK and CKN rules apply.
− CAK is a 32 hexadecimal characters for 128-bit key and 64 hexadecimal
characters for 256-bit key depending on which algorithm is used for control
plain encryption (for example, aes-128-cmac or aes-256-cmac).
− CKN is a 32 octets char (64 hex) and it is the connectivity association key
name which identifies the CAK. This allows each of the MKA participants to
select which CAK to use to process a received MKPDU. MKA places no
restriction on the format of the CKN, except that it must comprise an
integral number of octets, between 1 and 32 (inclusive), and that all
potential members of the CA use the same CKN.
− CKN and CAK must match on peers to create a MACsec Secure CA.
Issue: 013HE 11968 AAAC TQZZA 0147
Figure 9 illustrates the MACsec control plane authentication and encryption.
Page 48
Interfaces
sw0122
MKA Protocol
RADIUS
EAP Authentication
Server
MKPDU: MACsec Key Agreement Protocol Data Unit
EAP
Supplicant
EAP
Authenticator
PSK:
CAK Value: 128 or 256
CKN Value: 16 Char
PSK:
CAK Value:
CKN Value:
Key Server
RNG
SAK:
Datapath
security Association Key
MKPDUMKPDUMKPDU
EAPoL for Authentication
CAK:
derived from EAP or PSK
KEK: Key encryption
key to wrap SAK
Encrypt wrap SAKIntegrity MKPDU
ICK: Integrity check
value (ICV) key
+
oror
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Figure 9MACsec Control Plane
Once the CAK is generated, it can obtain two other keys. These keys are:
48
• KEK (Key Encryption Key) — used to wrap and encrypt the SAKs
• ICK (Integrity Connection Value (ICV) Key) — used to for integrity check of each
MKPDU send between two CA
The key server then creates a SAK, that is shared with the CAs of the security
domain, and that SAK secures all data traffic traversing the link. The key server will
continue to periodically create and share a randomly-created SAK over the point-topoint link for as long as MACsec is enabled.
The SAK will be encrypted via the AES-CMAC, the KEK as encryption key, and ICK
as integration key.
2.3.2.3.6SAK Rollover
SR OS re-generates the SAK after the following events:
• when a new host has joined the CA domain and MKA hellos are received from
this host
• when the sliding window is reaching the end of its 32-bit or 64-bit length
• when a new PSK is configured and a rollover of PSK has been executed
3HE 11968 AAAC TQZZA 01Issue: 01
Page 49
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.3.7MKA
Each peer operates the MACsec Key Agreement Protocol (MKA). Each node can
operate multiple MKAs base on the number of CA that it belongs to. Each instance
of MKA is protected by a distinct secure connectivity Association key (CAK), that
allows each PAE to ensure that information for a given MKA instance is only
accepted from other peer that also possess that CAK, and therefore identifying
themselves as members or potential members of the same CA. See MACsec Static
CAK for a description of how the CAK identification is done via CKN.
2.3.2.3.8Pre-shared Key
A peer may support the use of one or more pre-shared key (PSKs). An instance of
MKA operates for each PSK that is administratively configured as active.
A pre-shared key may be created by NSP, or entered in CLI manually.
Interfaces
Each PSK is configured with two fields. The two fields are:
• CKN (connectivity association name)
• CAK value
The CAK name (CKN) is required to be different from that for existing keys and can
be used to identify the key in subsequent management operations.
Each static CAK configuration can have two pre-shared key entries for rollover. The
active PSK index dictates which CAK is being used for encrypting the MKA PDUs
and the SAK.
NSP has additional functionality to roll over and configure the PSK. The rollover via
NSP can be based on a configured timer.
2.3.2.3.9MKA Hello Timer
MKA uses a member identifier (MI) to identify each node in the CA domain.
A participant proves liveness to each of its peers by including their MI, together with
an acceptably-recent message number (MN), in an MKPDU.
Issue: 013HE 11968 AAAC TQZZA 0149
Page 50
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
To avoid a new participant having to respond to each MKPDU from each partner as
it is received, or trying to delay its reply until it is likely that MI MN tuples have been
received from all potential partners, each participant maintains and advertises both
a live peers list and a potential peers list. The live peers list includes all the peers that
have included the participant's MI and a recent MN in a recent MKPDU. The potential
peers list includes all the other peers that have transmitted an MKPDU that has been
directly received by the participant or that were included in the Live Peers List of a
MKPDU transmitted by a peer that has proved liveness. Peers are removed from
each list when an interval of between MKA life time and MKA life time plus MKA Hello
Time has elapsed since the participant's recent MN was transmitted. This time is
sufficient to ensure that two or more MKPDUs will have been lost or delayed prior to
the incorrect removal of a live peer.
Note: The specified use of the live and potential peer lists permits rapid removal of
participants that are no longer active or attached to the LAN while reducing the number of
MKPDUs transmitted during group formation. For example, a new participant will be
admitted to an established group after receiving, then transmitting, one MKPDU.
Table 9 shows the MKA participant timer values used on SR OS.
Table 9MKA Participant Timer Values
Timer UseTimeout
(parameter)
Per participant periodic transmission,
initialized on each transmission on expiry
Per peer lifetime, initialized when adding to or
refreshing the Potential Peers List or Live
Peers List, expiry causes removal from the
list
participant created or following receipt of an
MKPDU, expiry causes participant to be
deleted
Delay after last distributing a SAK, before the
Key Server will distribute a fresh SAK
following a change in the Live Peer List while
the Potential Peer List is still not empty
MKA Hello Time
or
MKA Bounded Hello
Time
MKA Life Time6.0Participant lifetime, initialized when
Timeout
(parameter)
2.0
0.5
50
3HE 11968 AAAC TQZZA 01Issue: 01
Page 51
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.3.10MACsec Capability, Desire, and Encryption Offset
802.1x-2010 had identified two fields in the MKA PDU. Those fields are:
• MACsec Capability
•Desire
MACsec Capability signals weather MACsec is capable of integrity and
confidentiality. Table 10 describes the four basic settings for MACsec Capability.
Table 10MACsec Basic Settings
SettingDescription
0MACsec is not implemented
1Integrity without confidentiality
2The following are supported:
Interfaces
• Integrity without confidentiality
• Integrity and confidentiality with a
confidentiality offset of 0
1
3
Note:
1. SR OS supports (3) Integrity without confidentiality and Integrity and
confidentiality with a confidentiality offset of 0, 30, or 50.
Encryption offset of 0, 30, or 50 starts from the byte after the SecTAG (802.1ae
header). Ideally, the encryption offset should be configured for IPv4 (offset 30) and
IPv6 (offset 50) to leave the IP header in the clear text. This will allow routers and
switches to use the IP header for LAG or ECMP hashing.
2.3.2.3.11Key Server
The participants, in a given MKA instance agree on a Key Server, are responsible for
the following:
The following are supported:
• Integrity without confidentiality
• Integrity and confidentiality with a
confidentiality offset of 0, 30, or 5
• deciding on the use of MACsec
Issue: 013HE 11968 AAAC TQZZA 0151
Page 52
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• cipher suite selection
• SAK generation and distribution
• SA assignment
• identifying the CA when two or more CAs merge
Each participant in an MKA instance uses the Key Server priority (an 8-bit integer)
encoded in each MKPDU to agree on the Key Server. Each participant selects the
live participant advertising the highest priority as its Key Server whenever the Live
Peers List changes, provided that highest priority participant has not selected
another as its Key Server or is unwilling to act as the Key Server. If a Key Server
cannot be selected, SAKs are not distributed. In the event of a tie for highest priority
Key Server, the member with the highest priority SCI is chosen. For consistency with
other uses of the SCI's MAC address component as a priority, numerically lower
values of the Key Server Priority and SCI are accorded the highest priority.
Note: With SCI, each SC is identified by an SCI that comprises a globally unique MAC
address and a Port Identifier, unique within the system that has been allocated that address.
2.3.2.3.12SA Limits and Network Design
Each MACsec device supports 64 TX-SAs and 64 RX-SAs. An SA (Security
Association) is the key to encrypt or decrypt the data.
As per 802.1AE document, each SecY contains a SC. An SC is a unidirectional
concept; for example, Rx-SC or Tx-SC. Each SC contains at least one SA for
encryption on Tx-SC and decryption on Rx-SC. Also, for extra security, each SC
should be able to roll over the SA and, as such, it is recommended for each SC to
have two SAs for rollover purposes.
MACsec phy will be known as a MACsec security zone. Each MACsec security zone
supports 64Tx-SAs and 64 RX-SAs. Assuming two SAs per SC for SA rollover, then
each zone will support 32 RX-SC and 32 TX-SC.
Table 11 describes the port mapping to security zones.
In a point-to-point topology, each router needs a single security zone and single TxSC for encryption and a single Rx-SC for decryption. Each SC has two SAs. In total
for point-to-point topology, four SAs are needed, two RxSA for RxSC1 and two TXSA
for TxSC1. See Figure 10.
Node 1 CA1
Port 1/1/1 security zone 1
SecY 1
TxSC1-----TxSA1, TxSA2
RxSC1-----RxSA1, RxSA2
CA1
Node 2 CA1
Port 1/1/1 security zone 1
SecY 1
TxSC1-----TxSA1-----TxSA2
RxSC1-----RxSA1-----RxSA2
2.3.2.3.14P2MP (Switch to Switch) Topology
In a multipoint topology with N nodes, each node will need a single TxSC and N
RxSC, one for each one of the peers. As such, 64 max RX-SA per security zone will
translate to 32 Rx-SCs, which will break down to only 32 peers (for example, only 33
nodes in the multipoint topology per security zone, from each node perspective there
is one TxSC and 32 RxSC).
sw0123
Issue: 013HE 11968 AAAC TQZZA 0153
Page 54
Interfaces
Figure 11Switch Multi-point to Switch Multi-point Topology
In Figure 11, when the 34rd node joins the multi-point topology, all other 33 nodes
already part of this domain will not have any SAs to create an RxSC for this 34th
node. However, the 34th node will have a TxSC and will accept 32 peers. The 34th
node will start to transmit and encrypt the PDUs based on its TxSC. However,
because all other nodes do not have a SC for this SAI, they will drop all Rx PDUs.
It is recommended to ensure that a multicast domain, for a single security zone, does
not exceed 32 peers or the summation of all the nodes, in a security zone's CA
domain, do not exceed 33. This is the same is if a security zone has four CAs, the
summation of all nodes in the four CAs should be 33 or less.
2.3.2.3.15SA Exhaustion Behavior
In SA Limits and Network Design, it was explained that the a security zone has 64
RxSAs and 64 TxSAs. Two RxSAs will be used for each RxSC for rollover purposes
and two TxSAs will be used for TxSC for rollover purposes. This translates to 32
peers per security zone.
Under each port, a max-peer parameter can be configured. This parameter assigns
how many peers are allowed on that port.
54
3HE 11968 AAAC TQZZA 01Issue: 01
Page 55
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Note: The operator must ensure that the number of peers do not exceed the limit of
maximum peers per security zone or maximum peers per port (for example, exceeds the
port max-peer parameter).
If the maximum peer is exceeded, the peer connectivity will be random in case of a
node failure or packet loss. Peers will join the CA randomly, on a first-come firstserved basis.
Caution: It is highly recommended that the operator ensures the maxpeer does not exceed
per-security zone or port.
2.3.2.3.16Clear Tag Mode
In most Layer 2 networks, MAC forwarding is done via destination MAC address. The
802.1AE standard dictates that any field after source and destination MAC address
and after the SecTAG is required to be encrypted. This includes the 802.1Q tags. In
some VLAN switching networks, it might be desired to leave the 802.1Q tag in clear
text.
Interfaces
SR OS allows the configuration of 802.1Q tag, in clear text, by placing the 802.1Q
tag before the SecTAG or encrypted, by placing it after the SecTAG.
Table 12 lists the MACsec encryption of 802.1Q tags when the clear-tag is
configured on SR OS.
Table 12MACsec Encryption of 802.1Q Tags with Clear-tag Configured
Unencrypted formatClear-tag-mode
configuration
Single tag (dot1q)Single-tagDA, SA, TPID, VID, EtypeDA, SA, TPID, VID, SecTAG
Single tag (dot1q)Double-tagDA, SA, TPID, VID, EtypeDA, SA, TPID, VID, SecTAG
Double tag (q-in-q)Single-tagDA, SA, TPID1, VID1,
Double tag (q-in-q)Double-tagDA, SA, TPID1, VID1,
Pre-encryption (Tx)Pre-decryption (Rx)
DA, SA, TPID1, VID1,
IPID2, VID2, Etype
IPID2, VID2, Etype
SecTAG
DA, SA, TPID1, VID1,
IPID2, VID2, SecTAG
Issue: 013HE 11968 AAAC TQZZA 0155
Page 56
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.3.17802.1X Tunneling and Multihop MACsec
MACsec is an Ethernet packet and, as with any other Ethernet packet, can be
forwarded through multiple switches via Layer 2 forwarding. The encryption and
decryption of the packets will be performed via the 802.1x (MKA) capable ports.
To ensure that MKA is not terminated on any intermediate switch or router, the user
can enable 802.1x tunneling on the corresponding port.
A sample check to see if tunneling is enabled, is provided below.
By enabling tunneling, the 802.1X MKA packets will be transit that port, without being
terminated, as such MKA negotiation will not happen on a port that has 802.1X
tunneling enabled.
2.3.2.3.18EAPoL Destination Address
The MKA packets are transported over EAPoL with a multicast destination MAC
address. At some point, it might be desired to have the MKA have a point-to-point
connection to a peer node over a Layer 2 multihop cloud. In this case, the EAPoL
destination MAC address can be set to the peer MAC address. This will force the
MKA to traverse multiple nodes and establish an MKA session with the specific peer.
2.3.2.3.19Mirroring Consideration
Mirroring is performed prior to the MACsec encryption engine. Therefore, if a port is
MACsec-enabled and also, that same port is being mirrored, all the mirrored packets
will be in clear text.
2.3.2.4SONET/SDH Port Attributes
One OC-3/STM-1 port is supported on the CMA. One OC-3/STM-1 port is supported
on the MDA. OC-3/STM-1 ports are also supported on TDM satellites. The ports can
be configured for either SONET or SDH operation. SONET ports are configured for
channelized OC-3 operation. SDH ports can be configured for channelized STM-1
operation.
56
3HE 11968 AAAC TQZZA 01Issue: 01
Page 57
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The port’s transmit clock rate can be node or loop timed. The port’s receive clock rate
can be used as a synchronization source for the system. The Section Trace (C1) byte
can be configured by the user to ensure proper physical cabling. The port can
activate and deactivate local line and internal loopbacks.
All SONET/SDH line alarms are configurable to be either enabled (default) or
disabled. Link hold timers can be configured in 100ms increments to control link up
and link down indications. The line signal degradation bit error rate (ber-sd) threshold
and the line signal failure bit error rate (ber-sf) threshold can be configured.
The CMAs, MDAs, and TDM satellite support all standard SR OC-3/STM-1 SFP
optics including multi-mode, intermediate reach, and long reach. Single fiber mode
is not supported.
The CMA contains 3 LEDs for power, status and link state of port #1. The MDA
contains LEDs for power, status and one for each link state. The power LED is blue
if power is connected and off if no power is present. The status LED is green when
operationally up, amber when operationally down, off when administratively
shutdown and blinking green during initialization. The link state LED is green when
the link is established; amber when the link is down; and unlit when the port is
shutdown.
Interfaces
When an Ethernet port is configured in WAN mode (xgig wan), you can change
certain SONET/SDH parameters to reflect the SONET/SDH requirements for this
port. See SONET/SDH Port Commands for more information.
2.3.2.5SONET/SDH Path Attributes
Any CES path can only be configured to operate in access mode. Each path has a
configurable text description. The SONET/SDH signal label byte (C2) is configurable.
The SONET/SDH path trace string (J1) is configurable. Payload scrambling can not
be enabled on CES paths. The valid SONET and SDH path configurations are shown
in Table 13.
Table 13Valid SONET and SDH Path Configurations
FramingPath Configuration Options
Per Physical Port
SDHSTM1>AUG1>VC4>TUG3>TUG2>VC12>
E1 STM1>AUG1>VC3>TUG2>VC12>E1
SONETOC3>STS1 SPE>DS3>E1—
Max Number of Paths
Per Physical Port
63 E1 or 512 n*64 kb/s63 E1
Max Number of Paths
Per TDM Satellite Port
Issue: 013HE 11968 AAAC TQZZA 0157
Page 58
Interfaces
INTERFACE CONFIGURATION GUIDE
Table 13Valid SONET and SDH Path Configurations (Continued)
RELEASE 15.0.R5
FramingPath Configuration Options
Per Physical Port
SONETOC3>STS1 SPE>VT GROUP>VT1.5
SPE>DS1
SONETOC3>STS1 SPE>DS33 DS3—
SONETOC3>STS1 SPE>DS3>DS184 DS1, 63 E1 or 512
SDHSTM1>AUG1>VC4>TUG3>TUG2>TU11>
VC11>DS1
STM1>AUG1>VC3>TUG2>VC11>DS1
SDHSTM1>AUG1>VC3>DS3>DS184 DS1, 63 E1 or 512
SDHSTM1>AUG1>VC4>TUG3>VC3>E3
STM1>AUG1>VC3>E3
SDHSTM1>AUG1>VC3>DS33 DS3—
SDHSTM1>AUG1>VC3>DS3>E13 DS3—
Max Number of Paths
Per Physical Port
84 DS1 or 512 n*64 kb/s84 DS1
n*64 kb/s
84 DS1 or 512 n*64 kb/s84 DS1
n*64 kb/s
3 E3—
Max Number of Paths
Per TDM Satellite Port
—
—
All SONET/SDH path alarms are configurable to be either enabled (the default) or
disabled. The MTU size is configurable per path in the range of 512 to 2092. The path
uses a default MTU size set to equal the largest possible CES packet size.
58
Load balancing options are not applicable to channelized CES paths.
When an Ethernet port is configured in WAN mode (xgig wan), you can change
certain SONET/SDH parameters to reflect the SONET/SDH requirements for this
port. See SONET/SDH Path Commands for details.
2.3.2.6Multilink Frame Relay
MLFR is a bundling capability allowing users to spray FR frame fragments over
multiple T1/E1 links. This allows a dynamic provisioning of additional bandwidth by
adding incremental bandwidth between T1/E1 and DS3/E3. A MLFR bundle
increases fault tolerance and improves QoS characteristics since one single large
frame of low priority cannot block a higher priority frame.
A MLFR supports up to eight (8) member links and a maximum of 128 bundles with
up to 336 T1/252 E1 members links can be configured per MDA. NxDS0 circuits or
higher speed circuits are not supported.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 59
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The MLFR implementation supports FRF.16.1 bundle link integrity protocol to verify
serviceability of a member link.
2.3.2.6.1MLFR Bundle Data Plane
FRF.16.1 reuses the UNI/NNI fragmentation procedures defined in FRF.12. Frames
on all FR SAP on the MLFR bundle have the UNI/NNI fragmentation header added
regardless if they are fragmented or not. A separate sequence number state machine
is used for each FR SAP configured on the bundle. The fragmentation threshold is
configurable in the range 128 to 512 bytes.
In order to provide priority based scheduling of the FR SAP fragments over the
bundle links, the user configures a FR scheduling class for each FR SAP configured
on the bundle. As in MC-MLPPP, four scheduling classes are supported.
A separate fragmentation context is used by each FR SAP. FR SAPs of the same
scheduling class share the same egress FR scheduling class queue with fragments
of each SAP packets stored contiguously. The fragments from each scheduling class
queue are then sprayed over the member links. Furthermore, the user may select the
option to not fragment but spray the FR frames with the fragmentation header
included over the member links.
Interfaces
Received fragments over the member links are re-assembled on a per SAP basis to
re-create the original FR frame.
A user is not allowed to add an FR SAP with FRF.12 e2e fragmentation enabled to
an MLFR bundle. Conversely, the user cannot enable FRF.12 e2e fragmentation on
an FR SAP configured on an MLFR bundle. If an FR frame with the e2e
fragmentation header is received on a bundle, it is forwarded if the FR SAP is part of
an Fpipe service. It will be discarded if the FR SAP is part of any other service.
Note that the operator must disable LMI before adding a link to an MLFR bundle.
Also, the operator must shut down the bundle in order to change the value of the
fragmentation threshold.
An FR SAP configured on an MLFR bundle can be part of a VLL, VPLS, IES, or
VPRN service.
Issue: 013HE 11968 AAAC TQZZA 0159
Page 60
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.6.2MLFR Bundle Link Integrity Protocol
FRF.16.1 defines a MLFR Bundle Link Integrity Protocol which verifies the
serviceability of a member link. If a problem is found on the member link the link
integrity protocol will identify the problem, flag the link as unusable, and adjust the
Bundle’s available bandwidth. For MLFR Bundles the link integrity protocol is always
enabled.
For each member link of a bundle the link integrity protocol will do the following:
• Confirm frame processing capabilities of each member link.
• Verify membership of a link to a specific remote bundle.
• Report to the remote end of the member link the bundle to which the link belongs
• Detect loopbacks on the member link. This is always enabled on the 7750 SR.
The near-end monitors the magic number Information Element (IE) sent by the
far-end and if its value matches the one it transmitted in ten consecutive control
messages, it sends a remove_link message to the far-end and brings the link
down. The near-end will attempt to add the link until it succeeds.
• Estimate propagation delay on the member link. The differential delay is
calculated as follows in the 7750 SR implementation. Every time the near-end
sends an add_link or Hello message to the far-end, it includes the Timestamp
Information Element (IE) with the local time the packet was sent. FRF16.1
standard requires that the remote equipment includes the timestamp IE and
copies the received timestamp value unchanged if the sender included this IE.
When the far-end node sends back the ACK for these messages, the near-end
calculates the round trip time. The 7750 SR implementation maintains a history
of the last “N” round-trip-times that were received. It takes the fastest of these
samples for each member link to find out the member link with the fastest RTT.
Then for each link it calculates the difference between the fastest links RTT, and
the RTT for the current link. The user has the option to coordinate link removal
between the local and remote equipment. Note, however, that in the SR 7750
implementation, the addition of a link will be hitless but the removing a link is not.
Specifically, the MLFR Bundle Link Integrity Protocol defines the following control
messages:
• ADD_LINK
• ADD_LINK_ACK
• ADD_LINK_REJ
• HELLO
• HELLO_ACK
60
• REMOVE_LINK
• REMOVE_LINK_ACK
3HE 11968 AAAC TQZZA 01Issue: 01
Page 61
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The control messages are encapsulated in a single-fragment frame where the C-bit,
the B-bit, and the E-bit are all set. The details of the message format are given in
FRF.16.1. Table 14 lists the user configured control parameters with values as
specified in FRF.16.1.
Table 14FRF.16.1 Values
ParameterDefault ValueMinimum ValueMaximum Value
Timer T_HELLO10 seconds1 second180 seconds
Timer T_ACK4 seconds1 second10
Count N_MAX_RETRY215
T_HELLO Timer - this timer controls the rate at which hello messages are sent.
Following a period of T_HELLO duration, a HELLO message is transmitted onto the
Bundle Link.
Interfaces
Note that T_HELLO Timer is also used, during the Bundle Link adding process, as
an additional delay before re-sending an ADD_LINK message to the peer Bundle
Link when this peer Bundle Link does not answer as expected.
T_ACK Timer - this timer defines the maximum period to wait for a response to any
message sent onto the Bundle Link before attempting to retransmit a message onto
the Bundle Link.
N_RETRY - this counter specifies the number of times a retransmission onto a
Bundle Link will be attempted before an error is declared and the appropriate action
taken.
2.3.2.7FRF.12 End-to-End Fragmentation
The user enables FRF.12 e2e fragmentation on a per FR SAP basis. A fragmentation
header is added between the standard Q.922 header and the payload. This header
consists of a 2-byte Network Layer Protocol ID (NLPID) of value 0xB1 to indicate e2e
fragmentation payload and a 2-byte containing the Beginning bit (B-bit), the End-bit
(E-bit), the Control bit (C-bit), and the Sequence Number field.
Issue: 013HE 11968 AAAC TQZZA 0161
Page 62
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The following is the mode of operation for the fragmentation in the transmit direction
of the FR SAP. Frames of all the FR SAP forwarding class queues are subject to
fragmentation. The fragmentation header is, however, not included when the frame
size is smaller than the user configured fragmentation size. The SAP transmits all
fragments of a frame before sending the next full or fragmented frame. The
fragmentation threshold is configurable in the range 128 to 512 bytes. In the receive
direction, the SAP accepts a full frame interleaved with fragments of another frame
to interoperate with other vendor implementations.
An FR SAP with FRF.12 e2e fragmentation enabled can be part of a VPLS service,
an IES service, a VPRN service, an Ethernet VLL service, or an IP VLL service. This
SAP cannot be part of a FR VLL service or an FRF.5 VLL service. However,
fragmented frames received on such VLLs will be passed transparently as in current
implementation.
2.3.2.7.1SAP Fragment Interleaving Option
This option provides a different mode of operation for the fragmentation in the
transmit direction of the FR SAP than in the default behavior of a FRF.12 end-to-end
fragmentation. It allows for the interleaving of high-priority frames and fragments of
low-priority frames.
When the interleave option is enabled, only frames of the FR SAP non expedited
forwarding class queues are subject to fragmentation. The frames of the FR SAP
expedited queues are interleaved, with no fragmentation header, among the
fragmented frames. In effect, this provides a behavior like in MLPPP Link Fragment
Interleaving (LFI). The receive direction of the FR SAP supports both modes of
operation concurrently, for example, with and without fragment interleaving.
2.3.2.8FRF.12 UNI/NNI Link Fragmentation
The user enables FRF.12 UNI/NNI link fragmentation on a per FR circuit basis. All
FR SAPs configured on this circuit are subject to fragmentation. A fragmentation
header is added on top of the standard Q.922 header. This header consists of 2
bytes containing the beginning bit (B-bit), the End-bit (E-bit), the Control bit (C-bit),
and the sequence number field. The fragmentation header is included on frames of
all SAPs regardless if the frame size is larger or not than the fragment size.
62
The FECN, BECN, and DE bits of all fragments of a given FR frame are set to the
same value as the original frame. The FECN, BECN, and DE bits of a re-assembled
frame are set to the logical OR of the corresponding bits on the constituent
fragments.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 63
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The operator must delete all configured FR SAPs on a port before enabling or
disabling FRF.12 UNI/NNI on that port. Also, the user must shut down the port in
order to change the value of the fragmentation threshold.
A FR SAP on a FR circuit with FRF.12 UNI/NNI fragmentation enabled can be part
of a VLL, VPLS, IES, or VPRN service.
QoS for a link with FRF.12 UNI/NNI fragmentation is the same as for a MLFR bundle.
The FR class queue parameters and its scheduling parameters are configured by
applying an egress QoS profile to an FRF.12 UNI/NNI port. The FR scheduling class
ingress re-assembly timeout is not applicable to a FRF.12 UNI/NNI port.
2.3.2.9MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
The following APS support is provided:
• Single-chassis APS is supported on a SONET/SDH port with FRF.12 UNI/NNI
fragmentation enabled on the port or on a constituent TDM circuit.
Interfaces
• Single-chassis APS is supported on a SONET/SDH port with FRF.12 e2e
fragmentation enabled on one or more FR SAPs on the port or on a constituent
TDM circuit.
• Single-chassis APS is not supported on a SONET/SDH port with MLFR bundles
configured.
• Multi-chassis APS is not supported on a SONET/SDH port with FR
encapsulation configured on the port or on a constituent TDM circuit.
• APS is not supported on TDM satellite.
The following BFD support is provided:
• BFD is supported on an IP interface configured over a FR SAP with e2e
fragmentation enabled.
• BFD is supported on an IP interface configured over a FR SAP on a port or
channel with UNI/NNI fragmentation enabled.
• BFD is not supported on an FR SAP configured on an MLFR bundle.
The following mirroring support is provided:
• Port mirroring and FR SAP mirroring on an MLFR bundle.
• IP mirroring for an FR SAP on an MLFR bundle.
• A mirror source can be an MLFR bundle or a FR SAP on an FR bundle.
• Mirror destinations must be FR SAPs and must not be part of an APS group or
an MLFR bundle.
Issue: 013HE 11968 AAAC TQZZA 0163
Page 64
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.10Multilink Point-to-Point Protocol (MLPPP)
Multilink point-to-point protocol is defined in the IETF RFC 1990, The PPP Multilink
Protocol (MP), and provides a way to distribute data across multiple links within an
MLPPP bundle to achieve high bandwidth. MLPPP allows for a single frame to be
fragmented and transmitted across multiple links. This allows for lower latency and
also allows for a higher maximum receive unit (MRU).
MP is negotiated during the initial LCP option negotiations of a standard PPP
session. A router indicates to its peer that it is willing to perform MLPPP by sending
the MP option as part of the initial LCP option negotiation. This negotiation indicates
the following:
1. The system offering the option is capable of combining multiple physical links
into one logical link;
2. The system is capable of receiving upper layer protocol data units (PDU)
fragmented using the MP header and reassembling the fragments back into the
original PDU for processing;
3. The system is capable of receiving PDUs of size N octets where N is specified
as part of the option even if N is larger than the maximum receive unit (MRU) for
a single physical link.
Once MLPPP has been successfully negotiated, the sending system is free to send
PDUs encapsulated and/or fragmented with the MP header.
MP introduces a new protocol type with a protocol ID (PID) of Ox003d. Figure 12 and
Figure 13 show the MLPPP fragment frame structure. Framing to indicate the
beginning and end of the encapsulation is the same as that used by PPP, and
described in PPP in HDLC-like framing [RFC 1662]. MP frames use the same HDLC
address and control pair value as PPP, namely: Address - OxFF and Control - Ox03.
The two octet protocol field is also structured the same as in PPP encapsulation.
Figure 12MLPPP 24-bit Fragment Format
64
3HE 11968 AAAC TQZZA 01Issue: 01
Page 65
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Figure 13MLPPP 12-bit Fragment Format
The required and default format for MP is the 24-bit format. During the LCP state the
12-bit format can be negotiated. The SR-series routers can support and negotiate the
alternate 12-bit frame format.
2.3.2.10.1Protocol Field (PID)
Interfaces
The protocol field is two octets its value identifies the datagram encapsulated in the
Information field of the packet. In the case of MP the PID also identifies the presence
of a 4-octet MP header (or 2-octet, if negotiated).
A PID of Ox003d identifies the packet as MP data with an MP header.
The LCP packets and protocol states of the MLPPP session follow those defined by
PPP in RFC 1661, The Point-to-Point Protocol (PPP). The options used during the
LCP state for creating an MLPPP NCP session are described below.
2.3.2.10.2B & E Bits
The B&E bits are used to indicate the epoch of a packet. Ingress packets to the
MLPPP process will have an MTU, which may or may not be larger than the MRRU
of the MLPPP network. The B&E bits manage the fragmentation of ingress packets
when it exceeds the MRRU.
The B-bit indicates the first (or beginning) packet of a given fragment. The E-bit
indicates the last (or ending) packet of a fragment. If there is no fragmentation of the
ingress packet both B&E bits are set true (=1).
Issue: 013HE 11968 AAAC TQZZA 0165
Page 66
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.10.3Sequence Number
Sequence numbers can be either 12 or 24 bits long. The sequence number is zero
for the first fragment on a newly constructed AVC bundle and increments by one for
each fragment sent on that bundle. The receiver keeps track of the incoming
sequence numbers on each link in a bundle and reconstructs the desired unbundled
flow through processing of the received sequence numbers and B&E bits. For a
detailed description of the algorithm refer to RFC 1990.
2.3.2.10.4Information Field
The Information field is zero or more octets. The Information field contains the
datagram for the protocol specified in the protocol field.
The MRRU will have the same default value as the MTU for PPP. The MRRU is
always negotiated during LCP.
2.3.2.10.5Padding
On transmission, the Information field of the ending fragment may be padded with an
arbitrary number of octets up to the MRRU. It is the responsibility of each protocol to
distinguish padding octets from real information. Padding must not be added to any
but the last fragment (the E-bit set true).
2.3.2.10.6FCS
The FCS field of each MP packet is inherited from the normal framing mechanism
from the member link on which the packet is transmitted. There is no separate FCS
applied to the reconstituted packet as a whole if transmitted in more than one
fragment.
2.3.2.10.7LCP
The Link Control Protocol (LCP) establishes the connection through an exchange of
configure packets. This exchange is complete, and the LCP opened state entered,
once a Configure-Ack packet has been both sent and received.
66
LCP allows for the negotiation of multiple options in a PPP session. MLPPP is
somewhat different than PPP and therefore the following options are set for MLPPP
and not negotiated:
3HE 11968 AAAC TQZZA 01Issue: 01
Page 67
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• No async control character map
• No link quality monitoring
• No compound frames
• No self-describing-padding
Any non-LCP packets received during this phase must be silently discarded.
2.3.2.10.8Link Fragmentation and Interleaving Support
Link Fragmentation and Interleaving (LFI) provides the ability to interleave high
priority traffic within a stream of fragmented lower priority traffic. This feature helps
avoid excessive delays to high priority, delay-sensitive traffic over a low-speed link.
This can occur if this traffic type shares a link with lower priority traffic that utilizes
much larger frames. Without this ability, higher priority traffic must wait for the entire
packet to be transmitted before being transmitted, which could result in a delay that
is too large for the application to function properly
Interfaces
For example, if VoIP traffic is being sent over a DS-1 or fractional DS-1 which is also
used for Best Effort Internet traffic, LFI could be used so the small (usually 64-128B)
VoIP packets can be transmitted between the transmission of fragments from the
lower priority traffic.
Figure 14 shows the sequence of events as low priority and high priority frames
arrive and are handled by LFI.
Figure 14Frame Sequence of Events
4
High Priority Queue
Low Priority Queue
12653
MLPPP
Fragmentation
1. A low priority frame arrives in the low priority queue. At this particular instant,
there are no packets in the high priority queue so low priority frame is de-queued
and passed to the fragmentation mechanism for MLPPP.
Egress
Fig_2
2. The original packet is divided into ‘n’ fragments based on the size of the packet
and the fragment threshold configuration.
Issue: 013HE 11968 AAAC TQZZA 0167
Page 68
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
3. The fragments are then transmitted out the egress port.
4. After the transmission of the fragments has begun, high priority frames arrive in
the high priority queue.
5. The transmission of the remaining fragments stops and the high priority packets
are transmitted out the egress interface. Note that high priority packets are not
fragmented.
6. When the high priority traffic is transmitted, the remaining lower priority
fragments are then transmitted.
On the ingress side, LFI requires that the ingress port can receive non-fragmented
packets within the fragment stream and pass these packets directly on to the
forwarding engine and then continue with the reassembly process for the fragmented
frames.
2.3.2.11Multi-Class MLPPP
Multi-class MLPPP (MC-MLPPP) allows for the prioritization of multiple types of
traffic flowing between the cell site routers and the mobile operator’s aggregation
routers. MC-MLPPP is an extension of the MLPPP standard which allows multiple
classes of service to be transmitted over a MLPPP bundle. Originally, link
fragmentation and interleaving (LFI) was added to MLPPP that allowed two classes,
but in some applications, two classes of service can be insufficient.
The MLPPP header includes two class bits to allow for up to four classes of service.
This enhancement to the MLPPP header format is detailed in RFC 2686, The Multi-Class Extension to Multi-Link PPP. This allows multiple classes of services over a
single MLPPP connection and allows the highest priority traffic to be transmitted over
the MLPPP bundle with minimal delay regardless of the order in which packets are
received.
Table 15 shows the header formats and Table 16 shows the original MLPP header
format and the enhanced header format.
68
3HE 11968 AAAC TQZZA 01Issue: 01
Page 69
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 15Header Formats
Original MLPPP Header FormatMC-MLPPP Short Sequence Header Format
Interfaces
The new MC-MLPPP header format uses the two (previously unused) bits before the
sequence number as the class identifier. This allows four distinct classes of service
to be identified into separate re-assembly contexts.
2.3.2.11.1QoS in MC-MLPPP
If the user enables the multiclass option under an MLPPP bundle, the MDA egress
data path provides a queue for each of the four classes of MLPPP. The user
configures the required number of MLPPP classes to use on a bundle. The
forwarding class of the packet, as determined by the ingress QoS classification,
determines the MLPPP class for the packet and hence which of the four egress MDA
queues to store the packet. The mapping of forwarding class to MLPPP class is a
function of the user configurable number of MLPPP classes. The default mapping for
a 4-class, 3-class, and 2-class MLPPP bundle is shown in Table 16.
Table 16Default Packet Forwarding Class to MLPPP Class Mapping
FC IDFC NameScheduling Priority
(Default)
7NCExpedited000
MLPPP Class 4class bundle
MLPPP Class 3class bundle
MLPPP Class
2-class bundle
6H1Expedited000
5EFExpedited111
Issue: 013HE 11968 AAAC TQZZA 0169
Page 70
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 16Default Packet Forwarding Class to MLPPP Class Mapping (Continued)
FC IDFC NameScheduling Priority
(Default)
4H2Expedited111
3L1Non-Expedited221
2AFNon-Expedited221
1L2Non-Expedited321
0BENon-Expedited321
MLPPP Class 4class bundle
MLPPP Class 3class bundle
Table 17 shows a different mapping enabled when the user applies one of three pre-
defined egress QoS profiles in the 4-class bundle configuration only.
Table 17Packet Forwarding Class to MLPPP Class Mapping
FC IDFC NameScheduling Priority (Default)MLPPP Class
(MLPPP Egress QoS profile 1, 2,
and 3)
7NCExpedited0
6H1Expedited0
MLPPP Class
2-class bundle
5EFExpedited1
4H2Expedited2
3L1Non-Expedited2
2AFNon-Expedited2
1L2Non-Expedited2
0BENon-Expedited3
The MLPPP class queue parameters and its scheduling parameters are also
configured by applying one of the three pre-defined egress QoS profiles to an
MLPPP bundle.
Table 18 and Figure 15 provide the details of the class queue threshold parameters.
Packets marked with a high drop precedence, such as out-of-profile, by the service
or network ingress QoS policy will be discarded when any class queue reaches the
OOP threshold. Packet with a low drop precedence marking, such as in-profile, will
be discarded when any class queue reaches the max threshold.
70
3HE 11968 AAAC TQZZA 01Issue: 01
Page 71
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 18MLPPP Class Queue Threshold Parameters
Class 0Class 1Class 2Class 3
Interfaces
Queue Threshold (in ms
Max Oop Max Oop Max Oop Max Oop
@ Available bundle rate)
2-Class Bundle Default
250125750375N/AN/AN/AN/A
Egress QoS Profile
3-Class Bundle Default
5025200100750375N/AN/A
Egress QoS Profile
4-Class Bundle Default
105502515075750375
Egress QoS Profile
4-Class Bundle
2512532001001000500
Egress QoS Profile 1
4-Class Bundle
2512532001001000500
Egress QoS Profile 2
4-Class Bundle
2512532001001000500
Egress QoS Profile 3
Figure 15MLPPP Class Queue Thresholds for In-Profile and Out-of-Profile Packets
Service Egress SAP Queue
MDA Class Queue
Fabric
Out
Mbs
In
Scheduler
(pir, cir)
Cbs
High-prio-only
Out
In
MaxOut of Profile
(oop)
OSSG258
Table 19 and Figure 16 provide the details of the class queue scheduling
parameters.
Table 19MLPPP Class Queue Scheduling Parameters
WRR Parameters
4-class MLPPP
Egress QoS Profile
Profile 185%<1%66%33%
Issue: 013HE 11968 AAAC TQZZA 0171
MIRW1W2W3
Page 72
Interfaces
OSSG259
Class0
> 100%
No
RR
Strict
Priority
Class1
> MIR
No
Yes
wrr
Class2
W2
W1
Class3
W3
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 19MLPPP Class Queue Scheduling Parameters (Continued)
WRR Parameters
Profile 290%<1%89%10%
Profile 385%<1%87%12%
Figure 16MLPPP Class Queue Scheduling Scheme
Note that all queue threshold and queue scheduling parameters are adjusted to the
available bundle rate. If a member link goes down or a new member link is added to
the bundle, the scheduling parameters MIR, W1, W2, W3, as well as the per class
queue thresholds OOP and max are automatically adjusted to maintain the same
values.
Class 0 queue is serviced at MLPPP at available bundle rate. Class 1 queue is
guaranteed a minimum service rate but is allowed to share additional bandwidth with
class 2 and 3 queues based on the configuration of WRR weight W1.
Class queues 2 and 3 can be given bandwidth guarantee by limiting MIR of class 1
queue to less than 100% and by setting the WRR weights W1, W2, and W3 to
achieve the desired bandwidth distribution among all three class queues.
Note that there is one queue per bundle member link to carry link control packets,
such as LCP: PPP, and which are serviced with strict priority over the 4 class queues
(not shown).
In the default 2-class, 3-class, and 4-class egress QoS profile, the class queues are
service with strict priority in ascending order of class number.
72
3HE 11968 AAAC TQZZA 01Issue: 01
Page 73
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Ingress MLPPP Class Reassembly
For an MLPPP bundle with the multi-class option enabled, there is a default profile
for setting the re-assembly timer value for each class. When the pre-defined MLPPP
ingress QoS profile 1 is applied to a 4-class bundle, the values of the timers are
modified as shown in Table 20.
A 4-class MLPPP bundle can be configured with user-defined MLPPP QoS
attributes. This feature cannot be used with MC-MLPPP bundles with fewer than 4
classes or with non-multiclass bundles.
The following describe the parameters and the configuration processes and rules
1. The user creates an ingress QoS profile in the mlppp-profile-ingress context,
to configure a preferred value of the ingress per-class re-assembly timer.
Ingress QoS profile 1 is reserved for the pre-defined profile with parameter
values shown in Table 20. The user is allowed to edit this profile and change the
parameter values. When a user creates a profile with a profile-id greater than 1,
or performs the no option command on the parameter, the parameter's default
value will always be the 1 in Table 20 for ingress QoS Profile #1 regardless of
the parameter value the edited Profile 1 has at that point.
2. The user creates an egress QoS profile in the mlppp-profile-egress context to
configure preferred values for the per-class queue and queue scheduling
parameters. The user can also configure system forwarding class mapping to
the MLPPP classes. Egress QoS profiles 1, 2, and 3, are reserved for the predefined profiles with parameter values shown in Table 17, Table 18, or Table 19.
Users can edit these profiles and change the parameter values. When a user
creates a profile with a profile-id higher than 3, or when the user specifies the no
Issue: 013HE 11968 AAAC TQZZA 0173
Page 74
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
option command on the parameter, the default value will be the one shown in
Table 17, Table 18, or Table 19 for the egress QoS Profile 1. This is regardless
of the parameter value the edited profiles have at that point in time.
3. A maximum of 128 ingress and 128 egress QoS profiles can be created on the
system.
4. The values of the ingress per-class re-assembly timer are configured in the
ingress QoS profile.
5. The mapping of the system forwarding classes to the MLPPP Classes are
configured in the egress QoS profile. There is a many-to-one relationship
between the system FC and an MLPPP class. See Table 17 for the mapping
when one of the three pre-defined 4-class egress QoS profiles is selected.
6. The maximum size for each MLPPP class queue in units of msec at the available
bundle rate is configured in the egress QoS profile. This is referred to as max in
Figure 15 and as max-queue-size in CLI. The out-of-profile threshold for an
MLPPP class queue, referred to as oop in Figure 15, is not directly configurable
and is set to 50% of the maximum queue size rounded up to the nearest higher
integer value.
7. The MLPPP class queue scheduling parameters is configured in the egress QoS
profile. The minimum information rate, referred to as MIR in Figure 16 and mir
in CLI, applies to Class 1 queue only. The MIR parameter value is entered as a
percentage of the available bundle rate. The WRR weight, referred to as W1,
W2, and W3 in Figure 16 and weight in CLI, applies to class 1, class 2, and class
3 queues. Note that W1 in Figure 16 is not configurable and is internally set to a
value of 1 such that Class 1 queue shares 1% of the available bundle rate when
the sum of W1, W2, and W3 equals 100. W2 and W3 weights are integer values
and are user configurable such that Class 2 queue shares (W2/(W1 + W2 + W3))
and Class 3 queue shares (W3/(W1 + W2 + W3)) of the available bundle rate.
74
8. The user applies the ingress and egress QoS profiles to a 4-class MLPPP
bundle for the configured QoS parameter values to take effect on the bundle.
9. The following operations require the bundles associated with a QoS profile to be
shutdown to take effect.
− A change of the numbered ingress or egress QoS profile associated with a
bundle.
− A change of the bundle associated ingress or egress QoS profile from
default profile to a numbered profile and vice-versa.
10. The following operations can be performed without shutting down the associated
bundles:
− Changes to any parameters in the ingress and egress QoS profiles.
The CLI commands for the creation of ingress and egress QoS profiles and
configuration of the individual QoS parameters are described in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 75
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.12Cisco HDLC
Cisco HDLC (cHDLC) is an encapsulation protocol for information transfer. It is a bitoriented synchronous data-link layer protocol that specifies a data encapsulation
method on synchronous serial links using frame characters and checksums.
cHDLC monitors line status on a serial interface by exchanging keepalive request
messages with peer network devices. It also allows routers to discover IP addresses
of neighbors by exchanging Serial Link Address Resolution Protocol (SLARP) (see
SLARP) address-request and address-response messages with peer network
devices.
The basic frame structure of a cHDLC frame is shown in Table 21. This frame
structure is similar to PPP in an HDLC-link frame (RFC 1662, PPP in HDLC-like Framing). The differences to PPP in and HDLC-like frames are in the values used in
the address, control, and protocol fields.
Table 21cHDLC I-Frame
Interfaces
FlagAddressControlProtocolInformation
Field
0x7E0x0F/0x8F0x00——16/32 bits
FCS
• Address field — The values of the address field include: 0x0F (unicast), 0x8F
(broadcast).
• Control field — The control field is always set to value 0x00.
• Protocol field — The following values are supported for the protocol field:
Table 22 shows the cHDLC protocol fields.
Table 22cHDLC Protocol Fields
ProtocolField Value
IP0x0800
Cisco SLARP0x8035
ISO CLNP/ISO ES-IS DSAP/SSAP10xFEFE
• Information field — The length of the information field is in the range of 0 to
9kbytes.
Issue: 013HE 11968 AAAC TQZZA 0175
Page 76
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• FCS field — The FCS field can assume a 16-bit or 32-bit value. The default is
16-bits for ports with a speed equal to or lower than OC-3, and 32-bits for all
other ports. The FCS for cHDLC is calculated in the same manner and same
polynomial as PPP.
2.3.2.12.1SLARP
A cHDLC interface on a Nokia router will transmit a SLARP address resolution reply
packet in response to a received SLARP address resolution request packet from
peers. The cHDLC interface will not transmit SLARP address resolution request
packets.
For the SLARP keepalive protocol, each system sends the other a keepalive packet
at a user-configurable interval. The default interval is 10 seconds. Both systems must
use the same interval to ensure reliable operation. Each system assigns sequence
numbers to the keepalive packets it sends, starting with zero, independent of the
other system. These sequence numbers are included in the keepalive packets sent
to the other system. Also included in each keepalive packet is the sequence number
of the last keepalive packet received from the other system, as assigned by the other
system. This number is called the returned sequence number. Each system keeps
track of the last returned sequence number it has received. Immediately before
sending a keepalive packet, it compares the sequence number of the packet it is
about to send with the returned sequence number in the last keepalive packet it has
received. If the two differ by 3 or more, it considers the line to have failed, and will not
route higher-level data across it until an acceptable keepalive response is received.
76
There is interaction between the SLARP address resolution protocol and the SLARP
keepalive protocol. When one end of a serial line receives a SLARP address
resolution request packet, it assumes that the other end has restarted its serial
interface and resets its keepalive sequence numbers. In addition to responding to the
address resolution request, it will act as if the other end had sent it a keepalive packet
with a sequence number of zero, and a returned sequence number the same as the
returned sequence number of the last real keepalive packet it received from the other
end.
2.3.2.12.2SONET/SDH Scrambling and C2-Byte
SONET/SDH scrambling and overhead for cHDLC follow the same rules used for
POS (RFC 2615, PPP over SONET/SDH).
3HE 11968 AAAC TQZZA 01Issue: 01
Page 77
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
The two key SONET/SDH parameters are scrambling and signal-label (C2-byte).
Scrambling is off by default. The default value of the C2-byte is 0xCF. These two
parameters can be modified using the CLI. The other SONET overhead values (for
example, j0) follow the same rules as the current POS implementation.
SONET/SDH scrambling and overhead for cHDLC is not supported on TDM satellite.
2.3.2.12.3Timers
Cisco HDLC (cHDLC) has two timers associated with the protocol, the keepalive
interval and the timeout interval. The keepalive interval sends periodic keepalive
packets. The receiver process expects to receive a keepalive packet at the rate
specified by the keepalive interval. The link is declared down if the receiver process
does not receive a keepalive within the timeout interval. The link is declared up when
the number of continual keepalive packets received equals the up-count.
It is recommended that the nodes at the two endpoints of the cHDLC link are
provisioned with the same values.
Interfaces
2.3.2.13Automatic Protection Switching (APS)
APS is designed to protect SONET/SDH equipment from linear unidirectional or
bidirectional failures. The Network Elements (NEs) in a SONET/SDH network
constantly monitor the health of the network. When a failure is detected, the network
proceeds through a coordinated pre-defined sequence of steps to transfer (or
switchover) live traffic to the backup facility (protection facility). This happens very
quickly to minimize lost traffic. Traffic remains on the protection facility until the
primary facility (working facility) fault is cleared, at which time the traffic may
optionally be reverted to the working facility. An example is shown in Figure 17.
Issue: 013HE 11968 AAAC TQZZA 0177
Page 78
Interfaces
R
R
R
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Figure 17APS Protection (Single Chassis APS) and Switchover
GigE
1
7750 SR
2
7750 SR
3
7750 SR
Data Flow
SAT
GigE
SAT
GigE
SAT
GigE
SAT
GigE
SAT
GigE
SAT
Working Facility
Protection Facility
7750 S
Working Facility
Protection Facility
7750 S
Working Facility
Protection Facility
7750 S
sw0092
Note that “facility” in the router’s context refers to the physical line (including
intermediate transport/switching equipment) and directly attached line terminating
hardware (SFP module, MDA and IOM). “Circuit” is also a term used for a link/facility
(working-circuit).
A 1+1 APS group contains two circuits.
APS is configured on a port by port basis. If all ports on an MDA or IOM need to be
protected then each port on the MDA or IOM must be individually added into an APS
group.
Working and protection circuits can be connected to a variety of types of network
elements (ADMs, DACSes, ATM switches, routers) and serve as an access or
network port providing one or more services or network interfaces to the router. APSprotected SONET/SDH ports may be further channelized, and may contain bundled
channels MLPPP or IMA Bundle Protection Groups). The ports may be one of a
variety of encapsulation types as supported by the MDA including PPP, ATM, FR and
more. For information about MDAs, port types, switching modes, bundles and
encapsulations supported with APS, see APS Applicability, Restrictions and
Interactions.
This section discusses the different APS architectures and their implementations.
• Single Chassis and Multi-Chassis APS
• APS Switching Modes
• APS Channel and SONET Header K Bytes
78
3HE 11968 AAAC TQZZA 01Issue: 01
Page 79
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
• Revertive Switching
• Bidirectional 1+1 Switchover Operation Example
• Protection of Upper Layer Protocols and Services
• APS User-Initiated Requests
• APS and SNMP
• APS Applicability, Restrictions and Interactions
• Sample APS Applications
2.3.2.13.1Single Chassis and Multi-Chassis APS
APS can operate in a single chassis configuration (SC-APS) or in a multi-chassis
configuration (MC-APS).
An SC-APS group can span multiple ports, MDAs or IOMs within a single node
whereas as MC-APS can span two separate nodes as shown in Table 23.
Interfaces
Table 23SC-APS versus MC-APS Protection
Single Chassis
APS
Short form nameSC-APSMC-APS
Link failure protection (including intermediate
transmission equipment failure)
The support of SC-APS and MC-APS depends on switching modes, MDAs, port
types and encaps. For a definitive description of the MDAs, port types, switching
modes, bundles and encapsulations supported with APS, see APS Applicability,
Restrictions and Interactions.
Issue: 013HE 11968 AAAC TQZZA 0179
Page 80
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
APS on a Single Node (SC-APS)
In a single chassis APS both circuits of an APS group are terminated on the same
node.
The working and protect lines of a single chassis APS group can be:
• Two ports on the same MDA
• Two ports on different MDAs but on the same IOM
• Two ports on different MDAs on two different IOMs (installed in different slots)
• Two ports on two TDM satellites
If the working and protection circuits are on the same MDA, protection is limited to
the physical port and the media connecting the two devices. If the working and
protection circuits are on different IOMs then protection extends to MDA or IOM
failure. Figure 18 shows a configuration that provides protection against circuit, port,
MDA or IOM failure on the 7750 SR connected to an Add-Drop-Multiplexer (ADM).
Figure 18SC-APS Group with MDA and IOM Protection
Link 1
sc-aps
Link 2
ADM
group
7750 SR
OSSG656
APS Across Two Nodes (MC-APS)
Multi-Chassis APS functionality extends the protection offered by SC-APS to include
protection against nodal (7750 SR) failure by configuring the working circuit of an
APS group on one 7750 SR node while configuring the protect circuit of the same
APS group on a different 7750 SR node.
These two nodes connect to each other with an IP link to establish an MC-APS
signaling path between the two 7750 SRs. Note that the working circuit and the
protect circuit must have compatible configurations (such as the same speed,
framing, and port-type). The relevant APS groups in both the working and protection
routers must have same group ID, but they can have different names (for example,
group port descriptions). Although the working and protection routers can be different
platforms (7750 SR-7 and a 7750 SR-c12), switchover performance may be
80
3HE 11968 AAAC TQZZA 01Issue: 01
Page 81
INTERFACE CONFIGURATION GUIDE
7
RELEASE 15.0.R5
impacted so it is recommended to avoid a mix of platforms in the same MC-APS
group where possible. The configuration consistency between the working circuit/
router and the protection circuit/router is not enforced by the 7750 SR. Service or
network-specific configuration data is not signaled nor synchronized between the two
service routers.
Signaling is provided using the direct connection between the two service routers. A
heartbeat protocol can be used to add robustness to the interaction between the two
routers. Signaling functionality includes support for:
• APS group matches between service routers.
• Verification that one side is configured as a working circuit and the other side is
configured as the protect circuit. In case of a mismatch, a trap (incompatible
neighbor) is generated.
• Change in working circuit status is sent from the working router to keep the
protect router in sync.
• Protect router, based on K1/K2 byte data, member circuit status, and external
request, selects the active circuit, and informs the working router to activate or
de-activate the working circuit.
Interfaces
Note that external requests like lockout, force, and manual switches are allowed only
on the APS group having the protection circuit.
The Figure 19 shows a Multi-Chassis APS group being used to protect against link,
port, MDA, IOM or node failure.
Figure 19MC-APS Group Protects Against Node Failure
7750 SR A
Link 1
mc-aps
group
Link 2
CE
mc-aps Signaling Link
7750 SR B
OSSG65
Issue: 013HE 11968 AAAC TQZZA 0181
Page 82
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.13.2APS Switching Modes
APS behavior and operation differs based on the switching mode configured for the
APS group as shown in Table 24. Several switching modes are supported in the
router.
The switching mode affects how the two directions of a link behave during failure
scenarios and how APS tx operates.
Unidirectional / Bidirectional configuration must be the same at both sides of the APS
group. The APS protocol (K byte messages) exchange switching mode information
to ensure that both nodes can detect a configuration mismatch.
• If one end of an APS group is configured in a Unidirectional mode (Uni 1+1 Sig
APS or Uni 1+1 Sig+Data APS) then the other end must also be configured in a
Unidirectional mode (Uni 1+1 Sig+Data APS).
• If one end of an APS group is configured in a Bidirectional mode then the other
end must also be configured in Bidirectional mode.
Table 24APS Switching Modes
Bidirectional 1+1
Signaling APS
Short form nameBidir 1+1 Sig APSUni 1+1 Sig APSUni 1+1 Sig+Data APS
CLI bi-directionaluni-directionaluni-1plus1
Interworks with a standards
compliant APS
implementation
Full 1+1 APS standardsbased signaling
Data is transmitted
simultaneously on both links/
circuits (1+1 Data)
YesYesYes
YesYesYes
NoNoYes
Unidirectional 1+1
Signaling APS
Unidirectional 1+1
Signaling and
Datapath APS
The support of switching modes depends on SC-APS / MC-APS, MDAs, port types
and encaps. For a definitive description of the MDAs, port types, switching modes,
bundles and encapsulations supported with APS, see APS Applicability, Restrictions
and Interactions.
82
3HE 11968 AAAC TQZZA 01Issue: 01
Page 83
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Bidirectional 1+1 Signaling APS
In Bidir 1+1 Sig APS switching mode the Tx data is sent on the active link only (it is
not bridged to both links simultaneously). 1+1 signaling, however, is used for full
interoperability with signaling-compliant 1+1 architectures.
In the ingress direction (Rx), the decision to accept data from either the working or
protection circuit is based on both locally detected failures/degradation and on what
circuit the far-end is listening on (as indicated in the K bytes). If the far-end indicates
that it has switched its active receiver, then the local node will also switch its receiver
(and Tx) to match the far-end. If the local Rx changes from one circuit to another it
notifies the far end using the K bytes.
In the egress direction (Tx), the data is only transmitted on the active circuit. If the
active Rx changes, then Tx will also change to the same circuit.
Bidirectional 1+1 Signaling APS ensures that both directions of active data flow
(including both Rx) are using the same link/circuit (using the two directions of the
same fiber pair) as required by the APS standards. If one end of the APS group
changes the active receiver, it will signal the far end using the K bytes. The far end
will then also change its receiver to listen on the same circuit.
Interfaces
Because the router transmits on active circuits only and keeps active TX and RX on
the same port, both local and remote switches are required to restore the service.
The APS channel (bytes K1 and K2 in the SONET header – K bytes) exchanges
requests and acknowledgments for protection switch actions. In Bidirectional 1+1
Signaling APS switching mode, the router sends correct status on the K bytes and
requires the far-end to also correctly update/send the K-bytes to ensure that data is
transmitted on the circuit on which the far-end has selected as its active receiver.
Line alarms are processed and generated independently on each physical circuit.
In Bidirectional 1+1 Signaling APS mode, the highest priority local request is
compared to the remote request (received from the far end node using an APS
command in the K bytes), and whichever has the greater priority is selected. The
relative priority of all events that affect APS 1+1 protection is listed in the Table 25 in
descending order. The requests can be automatically initiated (such as signal failure
or signal degrade), external (such as lockout, forced switch, request switch), and
state requests (such as revert-time timers, and so on).
Issue: 013HE 11968 AAAC TQZZA 0183
Page 84
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Unidirectional 1+1 Signaling APS
In Uni 1+1 Sig APS switching mode the Tx data is sent on the active link only (it is
not bridged to both links simultaneously). 1+1 signaling, however, is used for full
interoperability with signaling-compliant 1+1 architectures.
In the ingress direction (Rx), the decision to accept data from either the working or
protection circuit is based on both locally detected failures/degradation and on what
circuit the far-end is listening on (as indicated in the K bytes). Although it is not
required in the APS standards, the system’s implementation of Unidirectional 1+1
Signaling APS uses standards based signaling to keep both the Rx and Tx on the
same circuit / port. If the far-end indicates that it has switched its active receiver, then
the local node will also switch its receiver (and Tx) to match the far-end. If the local
Rx changes from one circuit to another it notifies the far end using the K bytes.
In the egress direction (Tx), the data is only transmitted on the active circuit. If the
active Rx changes, then Tx will also change to the same circuit.
Because the router transmits on active circuits only and keeps active TX and RX on
the same port, both local and remote switches are required to restore the service. For
a single failure a data outage is limited to a maximum of 100 milliseconds.
The APS channel (bytes K1 and K2 in the SONET header – K bytes) exchanges
requests and acknowledgments for protection switch actions. In Unidirectional 1+1
Signaling APS switching mode, the router sends correct status on the K bytes and
requires the far-end to also correctly update/send the K-bytes to ensure that data is
transmitted on the circuit on which the far-end has selected as its active receiver.
Line alarms are processed and generated independently on each physical circuit.
In Unidirectional 1+1 Signaling APS switching mode:
• K-bytes are generated/transmitted based on local request/condition only (as
required by the APS signaling).
• Local request priority is compliant to 1+1 U-APS specification.
• RX and TX are always forced on to the same (active) circuit (bi-directional). This
has the following caveats:
− If an APS switch is performed due to a local condition, then the TX direction
will be moved as well to the newly selected RX circuit (old inactive). The
router will send LAIS on the old active TX circuit to force the remote end to
APS switch to the newly active circuit. Note that some local request may not
cause an APS switch when a remote condition prevents both RX and TX
direction to be on the same circuit (for example an SD detected locally on a
working circuit will not cause a switch if the protection circuit is locked out
by the remote end).
84
3HE 11968 AAAC TQZZA 01Issue: 01
Page 85
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
− If the remote end indicates an APS switch and the router can RX and TX on
the circuit newly selected by the remote end, then the router will move its
TX direction and will perform an APS switch of its RX direction (unless the
router already TX and RX on the newly selected circuit).
− If the remote end indicates an APS switch and the router cannot RX and TX
on the circuit newly selected by the remote end (for example due to a higher
priority local request, like a force request or manual request, and so on),
then L-AIS are sent on the circuit newly selected by the remote end to force
it back to the previously active circuit.
− The sent L-AIS in the above cases can be either momentary or persistent.
The persistent L-AIS is sent under the following conditions:
• On the protection circuit when the protection circuit is inactive and
cannot be selected due to local SF or Lockout Request.
• On the working circuit as long as the working circuit remains inactive
due to a local condition. The persistent L-AIS is sent to prevent
revertive switching at the other end.
In all other cases a momentary L-AIS is sent. The system provides debugging
information that informs operators about the APS-induced L-AIS.
Interfaces
Unidirectional 1+1 Signaling and Datapath APS
Uni 1+1 Sig+Data APS supports unidirectional switching operations, 1+1 signaling
and 1+1 data path.
In the ingress direction (Rx) switching is done based on local requests only as per
the APS specifications. K-bytes are used to signal the far end the APS actions taken.
In the egress direction (Tx), the data is transmitted on both active and protecting
circuits.
Each end of the APS group may be actively listening on a different circuit.
The APS channel (bytes K1 and K2 in the SONET header) exchanges APS protocol
messages.
In Uni 1+1 Sig+Data APS a received L-RDI signal on the active circuit does not cause
that circuit (port) to be placed out of service. The APS group can continue to use that
circuit as the active receiver. This behavior is not configurable.
Uni 1+1 Sig+Data APS also supports configurable:
• Debounce timers for signal failure and degradation conditions
• Suppression of L-RDI alarm generation
Issue: 013HE 11968 AAAC TQZZA 0185
Page 86
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
2.3.2.13.3APS Channel and SONET Header K Bytes
The APS channel (bytes K1 and K2 in the SONET header) exchanges APS protocol
messages for all APS modes.
K1 Byte
The switch priority of a request is assigned as indicated by bits 1 through 4 of the K1
byte (as described in the rfc3498 APS-MIB); see Table 25.
Table 25K1 Byte, Bits 1 to 4: Type of Request
Bit 1234Condition
1111Lockout of protection
1110Force switch
1101SF - High priority
1100SF - Low priority
1011SD - High priority
1010SD - Low priority
1001(not used)
1000Manual switch
0111(not used)
0110Wait-to-restore
0101(not used)
0100Exercise
0011(not used)
0010Reverse request
0001Do not revert
0000No request
86
The channel requesting switch action is assigned by bits 5 through 8. When channel
number 0 is selected, the condition bits show the received protection channel status.
When channel number 1 is selected, the condition bits show the received working
channel status. Channel values of 0 and 1 are supported.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 87
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Interfaces
Table 26 shows bits 5 to 8 of a K1 byte and K2 Bits 1 to 4 and the channel number
code assignments.
Table 26K1 Byte, Bits 5 to 8 (and K2 Bits 1 to 4), Channel Number Code Assignments
Channel Number
Code
0Null channel.
1 to 14Working channel.
15Extra traffic channel.
Channel and Notes
SD and SF requests apply to conditions detected on the protection line.
For 1+1 systems, Forced and Request Switch requests apply to the protection line
(for the 7750 SR only).
Only code 0 is used with Lockout of Protection request.
Only code 1 applies in a 1+1 architecture.
Codes 1 through n apply in a 1:n architecture (for the 7750 SR only).
SD and SF conditions apply to the corresponding working lines.
May exist only when provisioned in a 1:n architecture.
Only No Request is used with code 15.
K2 Byte
The K2 byte indicates the bridging actions performed at the line-terminating
equipment (LTE), the provisioned architecture and mode of operation.
The bit assignment for the K2 byte is listed in Table 27.
Table 27K2 Byte Functions
Bits 1 to 8Function
1 to 4Channel number. The 7750 SR supports only values of 0 and 1.
50 Provisioned for 1+1 mode
1 Provisioned for 1:n mode
Issue: 013HE 11968 AAAC TQZZA 0187
Page 88
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 27K2 Byte Functions (Continued)
Bits 1 to 8Function
6 to 8111 Line AIS
110 Line RDI
101 Provisioned for bi-directional switching
100 Provisioned for uni-directional switching
011 (reserved for future use)
010 (reserved for future use)
001 (reserved for future use)
000 (reserved for future use)
Differences in SONET/SDH Standards for K Bytes
SONET and SDH standards are slightly different with respect to the behavior of K1
and K2 Bytes.
Table 28 shows the differences between the two standards.
Table 28Differences Between SONET and SDH Standards
SONETSDHComments
SONET/SDH standards
use different codes in the
transmitted K1 byte (bits 1-
4) to notify the far-end of a
signal fail/signal degrade
detection.
SONET systems signal the
switching mode in bits 5-8
of the K2 byte whereas
SDH systems do not signal
at all.
1100 for signal fail
1010 for signal
degrade
1101 unused
1011 unused
101 for bi-dir
100 for uni-dir
1101 for signal fail
1011 for signal degrade
1100 unused
1010 unused
Not used. 000 is signaled
in bits 5 to 8 of K2 byte for
both bi-directional as well
as uni-directional
switching.
Failures Indicated by K Bytes
The following sections describe failures indicated by K bytes.
None.
SONET systems raise a mode
mismatch alarm as soon as a
mismatch in the TX and RX K2
byte (bits 5 to 8) is detected.
SDH systems do not raise the
mode mismatch alarm.
88
3HE 11968 AAAC TQZZA 01Issue: 01
Page 89
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
APS Protection Switching Byte Failure
An APS Protection Switching Byte (APS-PSB) failure indicates that the received K1
byte is either invalid or inconsistent. An invalid code defect occurs if the same K1
value is received for 3 consecutive frames (depending on the interface type (framer)
used, the 7750 SR may not be able to strictly enforce the 3 frame check per GR-253
and G.783/G.841) and it is either an unused code or irrelevant for the specific
switching operation. An inconsistent APS byte defect occurs when no three
consecutive received K1 bytes of the last 12 frames are the same.
If the failure detected persists for 2.5 seconds, a Protection Switching Byte alarm is
raised. When the failure is absent for 10 seconds, the alarm is cleared. This alarm
can only be raised by the active port operating in bi-directional mode.
APS Channel Mismatch Failure
An APS channel mismatch failure (APS-CM) identifies that there is a channel
mismatch between the transmitted K1 and the received K2 bytes. A defect is
declared when the received K2 channel number differs from the transmitted K1
channel number for more than 50 ms after three identical K1 bytes are sent. The
monitoring for this condition is continuous, not just when the transmitted value of K1
changes.
Interfaces
If the failure detected persists for 2.5 seconds, a channel mismatch failure alarm is
raised. When the failure is absent for 10 seconds, the alarm is cleared. This alarm
can only be raised by the active port operating in a bi-directional mode.
APS Mode Mismatch Failure
An APS mode mismatch failure (APS-MM) can occur for two reasons. The first is if
the received K2 byte indicates that 1:N protection switching is being used by the farend of the OC-N line, while the near end uses 1+1 protection switching. The second
is if the received K2 byte indicates that uni-directional mode is being used by the farend while the near-end uses bi-directional mode.
This defect is detected within 100 ms of receiving a K2 byte that indicates either of
these conditions. If the failure detected persists for 2.5 seconds, a mode mismatch
failure alarm is raised. However, it continues to monitor the received K2 byte, and
should it ever indicate that the far-end has switched to a bi-directional mode the
mode mismatch failure clearing process starts. When the failure is absent for 10
seconds, the alarm is cleared, and the configured mode of 1+1 bidirectional is used.
Issue: 013HE 11968 AAAC TQZZA 0189
Page 90
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
APS Far-End Protection Line Failure
An APS far-end protection line (APS-FEPL) failure corresponds to the receipt of a K1
byte in 3 consecutive frames that indicates a signal fail (SF) at the far end of the
protection line. This forces the received signal to be selected from the working line.
If the failure detected persists for 2.5 seconds, a far-end protection line failure alarm
is raised. When the failure is absent for 10 seconds, the alarm is cleared. This alarm
can only be raised by the active port operating in a bi-directional mode.
2.3.2.13.4Revertive Switching
The APS implementation also provides the revertive and non-revertive modes with
non-revertive switching as the default option. In revertive switching, the activity is
switched back to the working port after the working line has recovered from a failure
(or the manual switch is cleared). In non-revertive switching, a switch to the
protection line is maintained even after the working line has recovered from a failure
(or if the manual switch is cleared).
A revert-time is defined for revertive switching so frequent automatic switches as a
result of intermittent failures are prevented. A change in this value takes effect upon
the next initiation of the wait to restore (WTR) timer. It does not modify the length of
a WTR timer that has already been started. The WTR timer of a non-revertive switch
can be assumed to be infinite.
In case of failure on both working and the protection line, the line that has less severe
errors on the line will be active at any point in time. If there is signal degrade on both
ports, the active port that failed last will stay active. When there is signal failure on
both ports, the working port will always be active. The reason is that the signal failure
on the protection line is of a higher priority than on the working line.
2.3.2.13.5Bidirectional 1+1 Switchover Operation Example
Table 29 outlines the steps that a bi-directional protection switching process will go
through during a typical automatic switchover.
90
3HE 11968 AAAC TQZZA 01Issue: 01
Page 91
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Table 29Actions for the Bi-directional Protection Switching Process
Interfaces
StatusAPS Commands Sent in K1 and
K2 Bytes on Protection Line
B -> AA -> BAt Site BAt Site A
No failure
(Protection line is not in use).
Working line
Degraded in direction A->B.
Site A receives SD failure
condition.
Site B receives Reverse
request.
No request.No request.No action.No action.
SD on working
channel 1.
Same.Reverse
Same.Same.No action.No action.
No request.Failure
request.
2.3.2.13.6Annex B (1+1 Optimized) Operation
Action
No action.
detected,
notify A and
switch to
protection
line.
No action.Remote failure detected,
acknowledge and switch
to protection line.
Operation and behavior conferment with Annex B of ITU.T G.841 can be configured
for an APS group. Characteristics of this mode include are the following:
• Annex B operates in non-revertive bi-directional switching mode only as defined
in G.841.
• Annex B operates with 1+1 signaling, but 1:1 data path where by data is
transmitted on the active link only.
• K bytes are transmitted on both circuits.
Due to the request/reverse-request nature of an Annex B switchover, the data outage
is longer than a typical (non Annex B single chassis) APS switchover. IMA bundles
that are protected with Annex B APS have to resynchronize after a switchover. It is
recommended to use maintenance commands (tools>perform>aps…) for planned
switchovers (not MDA or IOM shutdown) to minimize the outage.
Issue: 013HE 11968 AAAC TQZZA 0191
Page 92
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Annex B APS Outage Reduction Optimization
Typical standard Annex B behavior when a local SF is detected on the primary
section (circuit), and this SF is the highest priority request on both the local side and
from the remote side as per the APS specifications, is to send a request to the remote
end and then wait until a reverse request is received before switching over to the
secondary section. To reduce the recovery time for traffic, the router will switch over
to the secondary section immediately upon detecting the local SF on the primary
section instead of waiting for the reverse request from the remote side. If the remote
request is not received after a period of time then an “PSB Failure is declared” event
is raised (Protection Switching Byte Failure – indicates an inconsistent or invalid Rx
K1 Bytes), and the APS group on the local side switches back to the primary section.
When the remote side is in Lockout, and a local SF is detected then a reverse request
will not be received by the local side. In this case, the traffic will no longer flow on the
APS group since neither the primary nor secondary sections can carry traffic, and the
outage reduction optimization will cause a temporary switchover from the primary to
the secondary and then back again (which causes no additional outage or traffic
issue since neither section is usable). If this temporary switchover is not desired then
it is recommended to either perform Lockout from the router side, or to Lockout from
both sides, which will avoid the possibility of the temporary switchover.
Failures detected on the secondary section cause immediate switch over as per the
Annex B specification. There is no outage reduction optimization in the router for this
case as it is not needed.
Some examples of events that can cause a local SF to be detected include: a cable
being cut, laser transmitter or receiver failure, a port administratively “shutdown”,
MDA failure or shutdown, IOM failure or shutdown.
Note: In Annex B operation, all switch requests are for a switch from the primary section to
the secondary section. Once a switch request clears normally, traffic is maintained on the
section to which it was switched by making that section the primary section. The primary
section may be working circuit 1 or working circuit 2 at any particular moment.
2.3.2.13.7Protection of Upper Layer Protocols and Services
APS prevents upper layer protocols and services from being affected by the failure
of the active circuit.
The following example with figures and description illustrate how services are
protected during a single-chassis APS switchover.
92
3HE 11968 AAAC TQZZA 01Issue: 01
Page 93
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Figure 20 shows an example in which the APS working circuit is connected to IOM-
1/MDA-1 and the protection circuit is connected to IOM-2/MDA-1. In this example,
assume that the working circuit is currently used to transmit and receive data.
Figure 20APS Working and Protection Circuit Example
Interfaces
APS-CTL
Services
IOM-1
IOM-2
IOM-3
IOM-CPU
IOM-CPU
IOM-CPU
MDA-1
MDA-2
MDA-1
MDA-2
MDA-1
MDA-2
Flexible FastPath
Complex
Flexible FastPath
Complex
Flexible FastPath
Complex
Flexible FastPath
Complex
Flexible FastPath
Complex
Flexible FastPath
Complex
APS Working
APS Protect
Fig_4
Switchover Process for Transmitted Data
For packets arriving on all interfaces that need to be transmitted over APS protected
interfaces, the next hop associated with all these interfaces are programmed in all
Flexible Fast-Path complexes in each MDA with a logical next-hop index. This next
hop-index identifies the actual next-hop information used to direct traffic to the APS
working circuit on IOM-1/MDA-1.
All Flexible Fast-Path complexes in each MDA are also programmed with next hop
information used to direct traffic to the APS protect circuit on IOM-2/MDA-1. When
the transmitted data needs to be switched from the working to the protect circuit, only
the relevant next hop indexes need to be changed to the pre-programmed next-hop
information for the protect circuit on IOM-2/MDA-1.
Although the control CFM/CPM on the SF/CPM blade initiates the changeover
between the working to protect circuit, the changeover is transparent to the upper
layer protocols and service layers that the switchover occurs.
Physical link monitoring of the link is performed by the CPU on the relevant IOM for
both working and protect circuits.
Issue: 013HE 11968 AAAC TQZZA 0193
Page 94
Interfaces
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Switchover Process for Received Data
The Flexible Fast-Path complexes for both working and protect circuits are
programmed to process ingress. The inactive (protect) circuit however is
programmed to ignore all packet data. To perform the switchover from working circuit
to the protect circuit the Flexible Fast-Path complex for the working circuit is set to
ignore all data while the Flexible Fast-Path complex of the protect circuit will be
changed to accept data.
The ADM or compatible head-end transmits a valid data signal to both the working
and protection circuits. The signal on the protect line will be ignored until the working
circuit fails or degrades to the degree that requires a switchover to the protect circuit.
When the switchover occurs all services including all their QoS and filter policies are
activated on the protection circuit.
2.3.2.13.8APS User-Initiated Requests
The following subsections describe APS user-initiated requests.
Lockout Protection
The lockout of protection disables the use of the protection line. Since the
tools>perform>aps>lockout command has the highest priority, a failed working
line using the protection line is switched back to itself even if it is in a fault condition.
No switches to the protection line are allowed when locked out.
Request Switch of Active to Protection
The request or manual switch of active to protection command switches the active
line to use the protection line unless a request of equal or higher priority is already in
effect. If the active line is already on the protection line, no action takes place.
Request Switch of Active to Working
The request or manual switch of active to working command switches the active line
back from the protection line to the working line unless a request of equal or higher
priority is already in effect. If the active line is already on the working line, no action
takes place.
94
3HE 11968 AAAC TQZZA 01Issue: 01
Page 95
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
Forced Switching of Active to Protection
The forced switch of active to protection command switches the active line to the
protection line unless a request of equal or higher priority is already in effect. When
the forced switch of working to protection command is in effect, it may be overridden
either by a lockout of protection or by detecting a signal failure on the protection line.
If the active line is already on the protection line, no action takes place.
Forced Switch of Active to Working
The forced switch of active to working command switches the active line back from
the protection line to the working unless a request of equal or higher priority is already
in effect.
Exercise Command
Interfaces
The exercise command is only supported in the bi-directional mode of the 1+1
architecture. The exercise command is specified in the
tools>perform>aps>force>exercise context and exercises the protection line by
sending an exercise request over the protection line to the tail-end and expecting a
reverse request response back. The switch is not actually completed during the
exercise routine.
2.3.2.13.9APS and SNMP
SNMP Management of APS uses the APS-MIB (from rfc3498) and the TIMETRAAPS-MIB.
Table 30 shows the mapping between APS switching modes and MIB objects.
Table 30Switching Mode to MIB Mapping
switching-modeTIMETRA-APS-MIB
tApsProtectionType
Bidir 1+1 Sig APS
(bi-directional)
onePlusOneSignalling (1)bidirectional
APS-MIB
apsConfigDirection
(2)
Uni 1+1 Sig APS
(uni-directional)
Issue: 013HE 11968 AAAC TQZZA 0195
onePlusOneSignalling (1)unidirectional
(1)
Page 96
Interfaces
Table 30Switching Mode to MIB Mapping (Continued)
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
switching-modeTIMETRA-APS-MIB
tApsProtectionType
Uni 1+1 Sig+Data APS
(uni-1plus1)
onePlusOne
(2)
apsConfigMode in the APS-MIB is set to onePlusOneOptimized for Annex B
operation.
2.3.2.13.10APS Applicability, Restrictions and Interactions
Note: The Release Notes for the relevant SR OS release should be consulted for details
about APS restrictions.
Table 31 shows the supported APS mode combinations.
Table 31Supported APS Mode Combinations
Bidirectional 1+1
Signaling APS
Unidirectional 1+1
Signaling APS
APS-MIB
apsConfigDirection
unidirectional
(1)
Unidirectional 1+1
Signaling and Datapath
APS
Single Chassis APS
(SC-APS)
Multi-Chassis APS
(MC-APS)
96
Supported
SupportedNot supportedNot supported
Note:
1. TDM satellite supports this mode only.
1
SupportedSupported for 7750 SR-c4/12
platforms only
APS and Bundles
Bundles (such as IMA and MLPPP) can be protected with APS through the use of
Bundle Protection Groups (BPGRP). For APS-protected bundles, all members of a
working bundle must reside on the working port of an APS group. Similarly all
members of a protecting bundle must reside on the protecting circuit of that APS
group. Bundles are not supported on TDM satellite.
3HE 11968 AAAC TQZZA 01Issue: 01
Page 97
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
IMA APS protection is supported only when the router is connected to another piece
of equipment (possibly through an ADM) running a single IMA instance at the far end.
By design, the IMA APS implementation is expected to keep the IMA protocol up as
long as the far end device can tolerate some frame loss. Similarly, the PPP protocol
state machine for PPP channels and MLPPP bundles remains UP when a switchover
occurs between the working and protect circuits.
When APS protects IMA groups, IMA control cells, but not user traffic, are sent on
the inactive circuit (as well as the active) to keep the IMA protocol up during an APS
switch.
For details on MLFR/FRF.12 support with APS see MLFR/FRF.12 Support of APS,
BFD, and Mirroring Features.
APS Switchover Impact on Statistics
All SAP-level statistics are retained with an APS switch. A SAP will reflect the data
received regardless of the number of APS switches that has occurred. ATM
statistics, however, are cleared after an APS switch. Thus, any ATM statistics viewed
on an APS port are only the statistics since the current active member port became
active.
Interfaces
Physical layer packet statistics on the APS group reflect what is currently on the
active member port.
Port and path-level statistics follow the same behavior as described above.
Any SONET physical-layer statistics (for example, B1,B2,B3,...) on the APS port are
only what is current on the active APS member port.
Supported APS MDA/Port Combinations
Table 32 shows examples of the port types that can be paired to provide APS
protection. Both ports must be the same type and must be configured at the same
speed.
Issue: 013HE 11968 AAAC TQZZA 0197
Page 98
Interfaces
Table 32MDA/Port Type Pairing for APS
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
MDA TypeUnchannelized
SONET/SDH
(POS)
For example:
m16-oc12/3sfp
Unchannelized
SONET/SDH
(POS)
For example:
m16-oc12/3-sfp
ATM
For example:
m4-atmoc12/3sfp
Circuit
Emulation
(CES)
For example:
m4-choc3-cessfp
Supported————
—Supported———
——Supported——
ATM
For example:
m4-atmoc12/3sfp
Circuit
Emulation
(CES)
For example:
m4-choc3-cessfp
Channelized
Any Service
Any Port
(ASAP)
For example:
m1-choc12-assfp
SONET/SDH
Satellite
Channelized
Any Service
Any Port
(ASAP)
For example:
m1-choc12-assfp
SONET/SDH
Satellite
———Supported—
————
Supported
For example, an APS group can be comprised of a pair of ports where each port is
on one of the two following MDAs:
• m16-atmoc3-sfp
• m4-atmoc12/3-sfp (port in oc3 mode)
For example, an APS group can not be comprised of a pair of ports where one port
is on an m16-oc12/3-sfp and the other port is on an m1-choc12-as-sfp.
98
3HE 11968 AAAC TQZZA 01Issue: 01
Page 99
INTERFACE CONFIGURATION GUIDE
RELEASE 15.0.R5
APS Switchover During CFM/CPM Switchover
An APS switchover immediately before, during or immediately after a CFM/CPM
switchover may cause a longer outage than normal.
Removing or Failure of a Protect MDA
The detection of a CMA/MDA removal or a CMA/MDA failure can take additional
time. This can affect the APS switchover time upon the removal or failure of a
protection CMA/MDA. If the removal is scheduled during maintenance, it is
recommended that the port and/or protect circuit be shutdown first to initiate an APS
switchover before the CMA/MDA maintenance is performed.
Mirroring Support
Mirroring parameters configured on a specific port or service, are maintained during
an APS failover.
Interfaces
2.3.2.13.11Sample APS Applications
The following subsections provide sample APS application examples.
Sample APS Application:
MLPPP with SC-APS and MC-APS on Channelized Interfaces
The 7750 SR supports APS on channelized interfaces. This allows the router to be
deployed as the radio access network (RAN) aggregation router which connects the
base transceiver station (BTS) and the radio network controller (RNC).
Figure 21 shows an example of MLPPP termination on APS protected channelized
OC-n/STM-n links. This example illustrates the following:
• SC-APS (the APS circuits terminate on the same node aggregation router A).
• APS protecting MLPPP bundles (bundles are between the BTS and aggregation
router A, but APS operates on the SONET links between the DACS and the
aggregation router).
• APS on channelized access interfaces (OC-3/OC-12 links).
Issue: 013HE 11968 AAAC TQZZA 0199
Page 100
Interfaces
INTERFACE CONFIGURATION GUIDE
Figure 21SC-APS MLPPP on Channelized Access Interfaces Example
OAMPDSN, AAA
RELEASE 15.0.R5
EV-DO
BTS
PRS
BITS I/F
T1 # 2
DACS
T1 # 1
RAN Data VLAN
Hand-off Network VLAN
PDSN, AAA VLAN
OAM VLAN
T3/OC-3/OC-12
DHCP Relay
Aggregation
Router A
MLS B
GigE
GigE
MLS A
Hand-off Network
GigE
GigE
GigE
Switch
B
GigE
Switch
A
AP
TP
TP
AP
TP
TP
OSSG142
Figure 22 shows an APS group between a digital access cross-connect system
(DACS) and a pair of aggregation routers. At one end of the APS group both circuits
(OC-3/STM-1 and/or OC-12/STM-4 links) are terminated on the DACS and at the
other end each circuit is terminated on a different aggregation routers to provide
protection against router failure. The MLPPP bundle operates between the BTS and
the aggregation routers. At any one time only one of the two aggregation routers is
actually terminating the MLPPP bundle (whichever aggregation router is processing
the active APS circuit).
100
This example shows the following:
• MC-APS (the APS circuits terminate on different aggregation routers)
• APS protecting MLPPP bundles (bundles are between the BTS and the
aggregation routers but APS operates on the SONET links between the DACS
and the aggregation routers)
• APS on channelized access interfaces (OC-3/OC-12 links)
3HE 11968 AAAC TQZZA 01Issue: 01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.