Juniper Layer 2 VPNs Feature Guide For EX9200 Switches
Juniper Layer 2 VPNs Feature Guide For EX9200 Switches
Published
2022-03-11
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. All other trademarks, service marks, registered marks, or registered service
marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use
with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such
software, you agree to the terms and conditions of that EULA.
iii
Table of Contents
About This Guide | x
Pinging VPNs | 6
Requirements | 19
Quick Configurations | 21
Verification | 38
BFD Support for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS | 70
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS | 71
Requirements | 97
Overview | 98
Configuration | 99
Requirements | 120
Overview | 121
Configuration | 122
Verification | 128
aggregate-label | 135
backup-neighbor | 136
instance-type | 144
no-forwarding | 149
proxy-generate | 151
route-distinguisher | 156
route-distinguisher-id | 159
route-target-filter | 161
switchover-delay | 163
unicast-reverse-path | 164
vpn-apply-export | 166
vrf-export | 167
vrf-import | 169
vi
vrf-mtu-check | 171
vrf-target | 172
auto-discovery-only | 177
connection-protection | 184
encapsulation | 204
end-interface | 216
flow-label-receive-static | 226
flow-label-transmit-static | 228
hot-standby | 230
vii
ignore-encapsulation-mismatch | 234
ignore-mtu-mismatch | 236
install-nexthop | 242
l2circuit | 243
l2ckt | 246
l2vpn | 247
l2vpn-id | 251
mtu | 258
no-l2ckt | 271
no-l2vpn | 272
oam | 276
path-selection | 278
viii
ping-interval | 282
protect-interface | 285
protected-l2circuit | 286
protector-interface | 288
protector-pe | 289
pseudowire-status-tlv | 291
psn-tunnel-endpoint | 292
remote-site-id | 294
routing-instances | 295
send-oam | 297
site-preference | 301
template | 310
virtual-circuit-id | 323
vlan-id | 325
ix
vlan-tagging | 328
Overview | 2
Pinging VPNs | 6
CHAPTER 1
Overview
IN THIS CHAPTER
NOTE: On EX9200 switches, graceful Routing Engine switchover (GRES), nonstop active routing
(NSR), and logical systems are not supported on Layer 2 VPN configurations. Layer 2 VPN is not
supported on the EX9200 Virtual Chassis.
As the need to link different Layer 2 services to one another for expanded service offerings grows, Layer
2 Multiprotocol Label Switching (MPLS) VPN services are increasingly in demand.
Implementing a Layer 2 VPN on a router is similar to implementing a VPN using a Layer 2 technology
such as Asynchronous Transfer Mode (ATM) or Frame Relay. However, for a Layer 2 VPN on a router,
traffic is forwarded to the router in a Layer 2 format. It is carried by MPLS over the service provider’s
network, and then converted back to Layer 2 format at the receiving site. You can configure different
Layer 2 formats at the sending and receiving sites. The security and privacy of an MPLS Layer 2 VPN are
equal to those of an ATM or Frame Relay VPN. The service provisioned with Layer 2 VPNs is also known
as Virtual Private Wire Service (VPWS).
On a Layer 2 VPN, routing occurs on the customer’s routers, typically on the customer edge (CE) router.
The CE router connected to a service provider on a Layer 2 VPN must select the appropriate circuit on
which to send traffic. The provider edge (PE) router receiving the traffic sends it across the service
provider’s network to the PE router connected to the receiving site. The PE routers do not need to store
or process the customer’s routes; they only need to be configured to send data to the appropriate
tunnel.
3
For a Layer 2 VPN, customers need to configure their own routers to carry all Layer 3 traffic. The service
provider needs to know only how much traffic the Layer 2 VPN will need to carry. The service provider’s
routers carry traffic between the customer’s sites using Layer 2 VPN interfaces. The VPN topology is
determined by policies configured on the PE routers.
Customers need to know only which VPN interfaces connect to which of their own sites. Figure 1 on
page 3 illustrates a Layer 2 VPN in which each site has a VPN interface linked to each of the other
customer sites.
• Service providers do not have to invest in separate Layer 2 equipment to provide Layer 2 VPN
service. A Layer 2 MPLS VPN allows you to provide Layer 2 VPN service over an existing IP and
MPLS backbone.
• You can configure the PE router to run any Layer 3 protocol in addition to the Layer 2 protocols.
• Customers who prefer to maintain control over most of the administration of their own networks
might want Layer 2 VPN connections with their service provider instead of a Layer 3 VPN.
• Because Layer 2 VPNs use BGP as the signaling protocol, they have a simpler design and require less
overhead than traditional VPNs over Layer 2 circuits. BGP signaling also enables autodiscovery of
Layer 2 VPN peers. Layer 2 VPNs are similar to BGP or MPLS VPNs and VPLS in many respects; all
three types of services employ BGP for signaling.
4
• Terminating a Layer 2 VPN into a Layer 2 VPN using the interworking (iw0) software interface
eliminates the limitation of bandwidth on the tunnel interfaces used for these configuration
scenarios. Instead of using a physical Tunnel PIC for looping the packet received from the Layer 2
VPN to another Layer 2 VPN, Junos OS is used to link both the Layer 2 VPN routes.
• Layer 2 VPNs enable the sharing of a provider's core network infrastructure between IP and Layer 2
VPN services, reducing the cost of providing those services. A Layer 2 MPLS VPN allows you to
provide Layer 2 VPN service over an existing IP and MPLS backbone.
• From a service provider’s point of view, a Layer 2 MPLS VPN allows the use of a single Layer 3 VPN
(such as RFC 2547bis), MPLS traffic engineering, and Differentiated Services (DiffServ).
• Service providers do not have to invest in separate Layer 2 equipment to provide Layer 2 VPN
service. You can configure the PE router to run any Layer 3 protocol in addition to the Layer 2
protocols. Customers who prefer to maintain control over most of the administration of their own
networks might want Layer 2 VPN connections with their service provider instead of a Layer 3 VPN.
RELATED DOCUMENTATION
Junos OS substantially supports the following standards and Internet drafts, which define standards for
Layer 2 virtual private networks (VPNs).
• RFC 7348, Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized
Layer 2 Networks over Layer 3 Networks
RELATED DOCUMENTATION
CHAPTER 2
Pinging VPNs
IN THIS CHAPTER
For testing purposes, you can ping Layer 2 VPNs, Layer 3 VPNs, and Layer 2 circuits by using the ping
mpls command. The ping mpls command helps to verify that a VPN or circuit has been enabled and tests
the integrity of the VPN or Layer 2 circuit connection between the PE routers. It does not test the
connection between a PE router and a CE router. To ping a VPLS routing instance, you issue a ping vpls
instance command (see Pinging a VPLS Routing Instance).
You issue the ping mpls command from the ingress PE router of the VPN or Layer 2 circuit to the egress
PE router of the same VPN or Layer 2 circuit. When you execute the ping mpls command, echo requests
are sent as MPLS packets.
The payload is a User Datagram Protocol (UDP) packet forwarded to the address 127.0.0.1. The contents
of this packet are defined in RFC 4379, Detecting Multi-Protocol Label Switched (MPLS) Data Plane
Failures. The label and interface information for building and sending this information as an MPLS packet
is the same as for standard VPN traffic, but the time-to-live (TTL) of the innermost label is set to 1.
When the echo request arrives at the egress PE router, the contents of the packet are checked, and then
a reply that contains the correct return is sent by means of UDP. The PE router sending the echo request
waits to receive an echo reply after a timeout of 2 seconds (you cannot configure this value).
You must configure MPLS at the [edit protocols mpls] hierarchy level on the egress PE router (the router
receiving the MPLS echo packets) to be able to ping the VPN or Layer 2 circuit. You must also configure
the address 127.0.0.1/32 on the egress PE router’s lo0 interface. If this is not configured, the egress PE
router does not have this forwarding entry and therefore simply drops the incoming MPLS pings.
• You cannot ping a VPN or Layer 2 circuit from a router that is attempting a graceful restart.
You can also determine whether an LSP linking two PE routers in a VPN is up by pinging the end point
address of the LSP. The command you use to ping an MPLS LSP end point is ping mpls lsp-end-point
address. This command tells you what type of LSP (RSVP or LDP) terminates at the address specified and
whether that LSP is up or down.
For a detailed description of this command, see the Junos Routing Protocols and Policies Command
Reference.
You ping an interface configured for the Layer 2 VPN on the egress PE router.
You ping a combination of the Layer 2 VPN routing instance name, the local site identifier, and the
remote site identifier to test the integrity of the Layer 2 VPN connection (specified by the identifiers)
between the ingress and egress PE routers.
RELATED DOCUMENTATION
You ping an interface configured for the Layer 2 circuit on the egress PE router.
8
You ping a combination of the IPv4 prefix and the virtual circuit identifier on the egress PE router to
test the integrity of the Layer 2 circuit between the ingress and egress PE routers.
9
CHAPTER 3
IN THIS CHAPTER
To configure Layer 2 virtual private network (VPN) functionality, you must enable Layer 2 VPN support
on the provider edge (PE) router. You must also configure PE routers to distribute routing information to
the other PE routers in the VPN and configure the circuits between the PE routers and the customer
edge (CE) routers.
Each Layer 2 VPN is configured under a routing instance of type l2vpn. An l2vpn routing instance can
transparently carry Layer 3 traffic across the service provider’s network. As with other routing instances,
all logical interfaces belonging to a Layer 2 VPN routing instance are listed under that instance.
The configuration of the CE routers is not relevant to the service provider. The CE routers need to
provide only appropriate Layer 2 circuits (with appropriate circuit identifiers, such as data-link
connection identifier [DLCI], virtual path identifier/virtual channel identifier [VPI/VCI], or virtual LAN
[VLAN] ID) to send traffic to the PE router.
NOTE: On the EX9200 switches, replace encapsulation-type with the encapsulation statement.
description text;
instance-type l2vpn;
interface interface-name;
route-distinguisher (as-number:id| ip-address:id);
vrf-export [ policy-names ];
10
vrf-import [ policy-names ];
vrf-target {
community;
import community-name;
export community-name;
}
protocols {
l2vpn {
(control-word | no-control-word);
encapsulation-type type;
site site-name {
interface interface-name {
description text;
remote-site-id remote-site-id;
}
site-identifier identifier;
site-preference preference-value {
backup;
primary;
}
}
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
}
For Layer 2 VPNs, only some of the statements in the [edit routing-instances] hierarchy are valid. For the
full hierarchy, see Junos OS Routing Protocols Library.
In addition to these statements, you must configure MPLS label-switched paths (LSPs) between the PE
routers, IBGP sessions between the PE routers, and an interior gateway protocol (IGP) on the PE and
provider (P) routers. You must also configure the statements that are required for all types of VPN
configuration.
Many of the configuration procedures for Layer 2 VPNs are identical to the procedures for Layer 3 VPNs
and virtual private LAN service (VPLS).
IN THIS SECTION
For each local site, the PE router advertises a set of VPN labels to the other PE routers servicing the
Layer 2 VPN. The VPN labels constitute a single block of contiguous labels; however, to allow for
reprovisioning, more than one such block can be advertised. Each label block consists of a label base, a
range (the size of the block), and a remote site ID that identifies the sequence of remote sites that
connect to the local site using this label block (the remote site ID is the first site identifier in the
sequence). The encapsulation type is also advertised along with the label block.
The following sections explain how to configure the connections to the local site on the PE router.
NOTE: Not all subtasks are supported on all platforms; check the CLI on your device.
To configure a Layer 2 VPN on your network, configure a Layer 2 VPN routing instance on the PE router
by including the l2vpn statement:
12
NOTE: On the EX9200 switches, replace encapsulation-type with the encapsulation statement.
l2vpn {
(control-word | no-control-word);
encapsulation-type type;
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
site site-name {
site-identifier identifier;
site-preference preference-value {
backup;
primary;
}
interface interface-name {
description text;
remote-site-id remote-site-id;
}
}
}
NOTE: You cannot configure a routing protocol (OSPF, RIP, IS-IS or BGP) inside a Layer 2 VPN
routing instance (instance-type l2vpn). The Junos CLI disallows this configuration.
Instructions for how to configure the remaining statements are included in the sections that follow.
All the Layer 2 circuits provisioned for a local site are listed as the set of logical interfaces (specified by
including the interface statement) within the site statement.
13
On each PE router, you must configure each site that has a circuit to the PE router. To do this, include
the site statement:
site site-name {
site-identifier identifier;
site-preference preference-value {
backup;
primary;
}
interface interface-name {
description text;
remote-site-id remote-site-ID;
}
}
• site-identifier identifier—Unsigned 16-bit number greater than zero that uniquely identifies the local
Layer 2 VPN site. The site identifier corresponds to the remote site ID configured on another site
within the same VPN.
• interface interface-name—The name of the interface and, optionally, a remote site ID for remote site
connections. See "Configuring the Remote Site ID" on page 13.
The remote site ID allows you to configure a sparse Layer 2 VPN topology. A sparse topology means
that each site does not have to connect to all the other sites in the VPN; thus it is unnecessary to
allocate circuits for all the remote sites. Remote site IDs are particularly important if you configure a
topology more complicated than full-mesh, such as a hub-and-spoke topology.
14
The remote site ID (configured with the remote-site-id statement) corresponds to the site ID (configured
with the site-identifier statement) configured at a separate site. Figure 2 on page 14 illustrates the
relationship between the site identifier and the remote site ID.
Figure 2: Relationship Between the Site Identifier and the Remote Site ID
As illustrated by the figure, the configuration for Router PE1 connected to Router CE1 is as follows:
site-identifier 1;
interface so-0/0/0 {
remote-site-id 2;
}
site-identifier 2;
interface so-0/0/1 {
remote-site-id 1;
}
The remote site ID (2) on Router PE1 corresponds to the site identifier (2) on Router PE2. On Router PE2,
the remote site ID (1) corresponds to the site identifier (1) on Router PE1.
remote-site-id remote-site-id;
If you do not explicitly include the remote-site-id statement for the interface configured at the [edit
routing-instances routing-instance-name protocols l2vpn site site-name] hierarchy level, a remote site ID is
assigned to that interface.
The remote site ID for an interface is automatically set to 1 higher than the remote site ID for the
previous interface. The order of the interfaces is based on their site-identifier statements. For example,
if the first interface in the list does not have a remote site ID, its ID is set to 1. The second interface in
the list has its remote site ID set to 2, and the third has its remote site ID set to 3. The remote site IDs of
any interfaces that follow are incremented in the same manner if you do not explicitly configure them.
The encapsulation type you configure at each Layer 2 VPN site varies depending on which Layer 2
protocol you choose to configure. If you configure ethernet-vlan as the encapsulation type, you need to
use the same protocol at each Layer 2 VPN site.
You do not need to use the same protocol at each Layer 2 VPN site if you configure any of the following
encapsulation types:
• ethernet—Ethernet
• frame-relay—Frame Relay
If you configure different protocols at your Layer 2 VPN sites, you need to configure a translational
cross-connect (TCC) encapsulation type. For more information, see Configuring TCC Encapsulation for
Layer 2 VPNs and Layer 2 Circuits.
To configure the Layer 2 protocol accepted by the PE router, specify the encapsulation type by including
the encapsulation-type statement:
encapsulation-type type;
For EX9200 switches, specify the encapsulation type by including the encapsulation statement:
encapsulation type;
You can specify the preference value advertised for a particular Layer 2 VPN site. The site preference
value is encoded in the BGP local preference attribute. When a PE router receives multiple
advertisements with the same CE device identifier, the advertisement with the highest local preference
value is preferred.
You can also use the site-preference statement to enable multihoming for Layer 2 VPNs. Multihoming
allows you to connect a CE device to multiple PE routers. In the event that a connection to the primary
PE router fails, traffic can be automatically switched to the backup PE router.
To configure a site preference for a Layer 2 VPN, include the site-preference statement:
site-preference preference-value {
backup;
primary;
}
You can also specify either the backup option or the primary option for the site-preference statement. The
backup option specifies the preference value as 1, the lowest possible value, ensuring that the Layer 2
VPN site is the least likely to be selected. The primary option specifies the preference value as 65,535,
the highest possible value, ensuring that the Layer 2 VPN site is the most likely to be selected.
For Layer 2 VPN multihoming configurations, specifying the primary option for a Layer 2 VPN site
designates the connection from the PE router to the CE device as the preferred connection if the CE
device is also connected to another PE router. Specifying the backup option for a Layer 2 VPN site
designates the connection from the PE router to the CE device as the secondary connection if the CE
device is also connected to another PE router.
To trace Layer 2 VPN protocol traffic, specify options for the traceoptions statement in the Layer 2 VPN
configuration:
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
The following trace flags display the operations associated with Layer 2 VPNs:
• error—Error conditions.
• general—General events.
• normal—Normal events.
• policy—Policy processing.
• route—Routing information.
• state—State transitions.
18
To diagnose networking problems related to VPNs, it can be useful to disable normal time-to-live (TTL)
decrementing. In Junos, you can do this with the no-propagate-ttl and no-decrement-ttl statements.
However, when you are tracing VPN traffic, only the no-propagate-ttl statement is effective.
For the no-propagate-ttl statement to have an effect on VPN behavior, you need to clear the PE-router-
to-PE-router BGP session, or disable and then enable the VPN routing instance.
For more information about the no-propagate-ttl and no-decrement-ttl statements, see the MPLS
Applications User Guide..
IN THIS SECTION
Requirements | 19
Quick Configurations | 21
Verification | 38
This example shows how to configure and validate an MPLS-based Layer 2 VPN on routers or switches
running Junos OS.
NOTE: Our content testing team has validated and updated this example.
19
You can deploy an MPLS-based Layer 2 virtual private network using routers and switches running
Junos OS to interconnect customer sites with Layer 2 connectivity. Layer 2 VPNs give customers
complete control over their choice of transport and routing protocols.
MPLS-based VPNs require baseline MPLS functionality in the provider network. Once basic MPLS is
operational, you are able to configure VPNs that use Label-switched paths (LSPs) for transport over the
provider’s core.
The addition of VPN services does not affect the basic MPLS switching operations in the provider
network. In fact, the provider (P) devices require only a baseline MPLS configuration because they are
not VPN aware. VPN state is maintained only on the PE devices. This is a key reason why MPLS-based
VPNs are so scalable.
Requirements
This example uses the following hardware and software components:
The example focuses on how to add Layer 2 VPN to a pre-existing MPLS baseline. A basic MPLS
configuration is provided in case your network does not already have MPLS deployed.
To support MPLS-based VPNs the underlying MPLS baseline must provide the following functionality:
• An interior gateway protocol such as OSPF or IS-IS to provide reachability between the loopback
addresses of the provider (P and PE) devices
LSPs are needed between each pair of PE devices that participate in a given VPN. Its a good idea to
build LSPs between all PE devices to accommodate future VPN growth. You configure LSPs at the [edit
protocols mpls] hierarchy level. Unlike an MPLS configuration for circuit cross-connect (CCC) , you do not
need to manually associate the LSP with the PE device’s customer-facing (edge) interface. Instead, Layer
2 VPNs use BGP signalling to convey Layer 2 site reachability. This BGP signaling automates the
mapping of remote Layer 2 VPN sites to LSP forwarding next hops. This means that with a Layer 2 VPN
explicit mapping of an LSP to a PE device’s edge-facing interface is not required.
20
For details on CCC, refer to Configuring an MPLS-Based VLAN CCC Using a Layer 2 Circuit.
Definition of a VPN involves changes to the local and remote PE devices only. No additional
configuration is needed on the provider devices (aside from baseline MPLS support), because these
devices only provide basic MPLS switching functions. The CE devices do not use MPLS. They require
only a basic interface, and if desired, protocol configuration, to operate over the Layer 2 VPN. For a
Layer 2 VPN you configure the CE devices as if they were attached to a shared link.
Once an MPLS baseline is in place, you must configure the following functionality on the PE devices to
establish an MPLS-based Layer 2 VPN:
• Specify ethernet-ccc or vlan-ccc physical layer encapsulation depending on whether VLAN tagging is
in use.
• Configure the logical interface (unit) used for the Layer 2 VPN with family ccc.
Figure 3 on page 21 provides the topology for this MPLS-based Layer 2 VPN example. The figure
details the interface names, IP addressing, and protocols used in the provider network. It also highlights
the end-to-end nature of the CE device addressing and protocol stack operation. Unlike a Layer 3 VPN,
CE device operation is opaque to the provider network in a Layer 2 VPN. There is no peering
21
relationship between the CE devices and the provider network. As a result you expect the CE devices to
form an OSPF adjacency across, not to, the provider network.
Quick Configurations
IN THIS SECTION
Use the configurations in this section to quickly get your MPLS-based Layer 2 VPN up and running. The
configurations include a functional MPLS baseline to support your Layer 2 VPN. This example focuses
on the VPN aspects of the configuration. Refer to the following links for additional information on the
baseline MPLS functionality used in this example:
• Configuring MPLS on Provider Edge EX8200 and EX4500 Switches Using Circuit Cross-Connect
NOTE: The device configurations omit the management interface, static routes, system logging,
system services, and user login information. These parts of the configuration vary by location and
are not directly related to MPLS or VPN functionality.
Edit the following commands as needed for the specifics of your environment and paste them into the
local CE (CE1) device terminal window:
22
Edit the following commands as needed for the specifics of your environment and paste them into the
local PE (PE1) device terminal window:
Be sure to commit the configuration changes on all devices when satisfied with your work.
Congratulations on your new MPLS-based Layer 2 VPN! Refer to the "Verification" on page 38 section
for the steps needed to confirm your VPN is working as expected.
IN THIS SECTION
Procedure | 26
Results | 29
This section covers the steps needed to configure the PE1 device for this example. Refer to the No Link
Title section for the CE device and P device configurations used in this example.
25
Before you configure the Layer 2 VPN make sure the PE device has a working MPLS baseline. If you
already having a an MPLS baseline you can skip to the step-by-step procedure to add the Layer 2 VPN
to the local PE device.
[edit]
user@pe1# set system host-name pe1
[edit]
user@pe1# set interfaces ge-0/0/1 description "Link from PE1 to P-router"
[edit]
user@pe1# set interfaces ge-0/0/1 mtu 4000
[edit]
user@pe1# set interfaces ge-0/0/1 unit 0 family inet address 10.1.23.1/24
[edit]
user@pe1# set interfaces ge-0/0/1 unit 0 family mpls
[edit]
user@pe1# set interfaces lo0 unit 0 family inet address 192.168.0.1/32
NOTE: Traffic engineering is supported for RSVP-signaled LSPs but is not required for basic
MPLS switching or VPN deployment. The provided MPLS baseline uses RSVP to signal LSPs,
26
and enables traffic engineering for OSPF. However, no path constraints are configured so you
expect the LSPs to be routed over the interior gateway protocol’s shortest path.
[edit
]user@pe1# set protocols ospf area 0.0.0.0 interface lo0.0
[edit]
user@pe1# set protocols ospf area 0.0.0.0 interface ge-0/0/1.0
[edit]
user@pe1# set protocols ospf traffic-engineering
[edit]
user@pe1# set protocols mpls interface ge-0/0/1.0
[edit]
user@pe1# set protocols rsvp interface lo0.0
[edit]
user@pe1# set protocols rsvp interface ge-0/0/1.0
[edit]
user@pe1# set protocols mpls label-switched-path lsp_to_pe2 to 192.168.0.3
Procedure
Step-by-Step Procedure
Follow these steps to configure the PE1 device for a Layer 2 VPN.
1. Configure the edge-facing interface. Specify a physical encapsulation type of ethernet-ccc with family
ccc on unit 0. This is the only valid unit number for an untagged Ethernet interface. If you are using
VLAN tagging specify vlan-ccc encapsulation and add the CCC family to the desired unit(s).
TIP: You can configure both an MPLS-based Layer 2 VPN and an MPLS-based Layer 3 VPN
on the same PE device. However, you cannot configure the same customer edge-facing
interface to support both a Layer 2 VPN and a Layer 3 VPN.
NOTE: A Layer 2 VPN requires that the PE device’s edge-facing interfaces be configured
with CCC encapsulation at the physical device level with the CCC family configured at the
unit level. The provider devices are configured in the same way whether you are deploying
CCC, an MPLS-based Layer 2 VPN, or an MPLS-based Layer 3 VPN. This is because they
have no edge-facing interfaces or VPN awareness.
2. Configure a BGP group for the peering between the local and remote PE devices. Use the PE
device’s loopback address as the local address and enable family l2vpn signaling.
[edit routing-options]
user@pe1# set autonomous-system 65412
28
6. Configure the routing instance. Start by specifying the instance name l2vpn1, with an instance-type
of l2vpn.
[edit routing-instances]
user@pe1# set l2vpn1 instance-type l2vpn
[edit routing-instances]
user@pe1# set l2vpn1 interface ge-0/0/0
8. Configure the routing instance’s route distinguisher. This setting is used to distinguish the routes
sent from a particular VRF on a particular PE device. It should be unique for each routing instance
on each PE device.
[edit routing-instances]
user@pe1# set l2vpn1 route-distinguisher 192.168.0.1:12
9. Configure the instance’s virtual routing and forwarding (VRF) table route target. The vrf-target
statement adds the specified community tag to all advertised routes while automatically matching
the same value for route import. Configuring matching route targets on the PE devices that share a
given VPN is required for proper route exchange.
[edit routing-instances]
user@pe1# set l2vpn1 vrf-target target:64512:12
NOTE: You can create more complex policies by explicitly configuring VRF import and
export policies using the import and export options. See vrf-import and vrf-export for
details.
10. Configure the l2vpn protocol in the instance and specify the encapsulation that is used on the edge-
facing link. If the edge interface is VLAN tagged, be sure to specify ethernet-vlan.
[edit routing-instances]
user@pe1# set l2vpn1 protocols l2vpn encapsulation-type ethernet
29
11. Add the edge-facing interface under the instance’s l2vpn stanza along with a description.
[edit routing-instances]
user@pe1# set l2vpn1 protocols l2vpn interface ge-0/0/0.0 description "L2vpn Link Between
PE1 and CE1"
12. Configure the Layer 2 VPN site information and associate the edge-facing interface with the local
customer site.
[edit routing-instances]
user@pe1# set l2vpn1 protocols l2vpn site CE-1 site-identifier 1 interface ge-0/0/0.0
remote-site-id 2
NOTE: In this example, the site ID for the PE1 device is 1 and the site ID for the PE2 device
is 2. For the local PE device (PE1), the remote site is correctly configured with a remote-site-id
value of 2.
13. Commit your changes at the PE1 device and return to CLI operational mode.
[edit]
user@pe1# commit and-quit
Results
Display the results of the configuration on the PE1 device. The output reflects only the functional
configuration added in this example.
bgp {
group ibgp {
type internal;
local-address 192.168.0.1;
family l2vpn {
signaling;
}
neighbor 192.168.0.3;
}
}
mpls {
label-switched-path lsp_to_pe2 {
to 192.168.0.3;
}
interface ge-0/0/1.0;
}
ospf {
traffic-engineering;
area 0.0.0.0 {
interface lo0.0;
interface ge-0/0/1.0;
}
}
rsvp {
interface lo0.0;
interface ge-0/0/1.0;
}
}
IN THIS SECTION
Procedure | 33
This section covers the steps needed to configure the PE2 device for this example. Refer to the No Link
Title section for the CE device and P device configurations used in this example.
Before you configure the Layer 2 VPN make sure the PE device has a working MPLS baseline. If you
already having an MPLS baseline you can skip to the step-by-step procedure to add the Layer 2 VPN to
the local PE device.
[edit]
user@pe2# set system host-name pe2
[edit]
user@pe2# set interfaces ge-0/0/1 description "Link from PE2 to P-router"
[edit]
user@pe2# set interfaces ge-0/0/1 mtu 4000
[edit]
user@pe2# set interfaces ge-0/0/1 unit 0 family inet address 10.1.34.1/24
[edit]
user@pe2# set interfaces ge-0/0/1 unit 0 family mpls
[edit]
user@pe2# set interfaces lo0 unit 0 family inet address 192.168.0.3/32
NOTE: Traffic engineering is supported for RSVP-signaled LSPs but is not required for basic
MPLS switching or VPN deployment. The provided MPLS baseline uses RSVP to signal LSPs,
33
and enables traffic engineering for OSPF. However, no path constraints are configured so you
expect the LSPs to be routed over the interior gateway protocol’s shortest path.
[edit]
user@pe2# set protocols ospf area 0.0.0.0 interface lo0.0
[edit]
user@pe2# set protocols ospf area 0.0.0.0 interface ge-0/0/1.0
[edit]
user@pe2# set protocols ospf traffic-engineering
[edit]
user@pe2# set protocols mpls interface ge-0/0/1.0
[edit]
user@pe2# set protocols rsvp interface lo0.0
[edit]
user@pe2# set protocols rsvp interface ge-0/0/1.0
[edit]
user@pe2# set protocols mpls label-switched-path lsp_to_pe1 to 192.168.0.1
Procedure
Step-by-Step Procedure
Follow these steps to configure the PE2 device for a Layer 2 VPN.
1. Configure the edge-facing interface encapsulation and family. Recall this is an untagged interface,
therefore only unit 0 is valid for the ccc family.
2. Configure a BGP group. Specify the PE device’s loopback address as the local address and enable
family l2vpn signaling.
4. Configure the PE1 device as a BGP neighbor. Be sure to specify PE1’s loopback address as the BGP
neighbor.
[edit routing-options]
user@pe2# set autonomous-system 65412
6. Configure the routing instance. Start by specifying the instance name l2vpn1 with an instance-type of
l2vpn.
[edit routing-instances]
user@pe2# set l2vpn1 instance-type l2vpn
7. Configure the PE device’s customer edge-facing interface to belong to the routing instance.
[edit routing-instances]
user@pe2# set l2vpn1 interface ge-0/0/0
35
[edit routing-instances]
user@pe2# set l2vpn1 route-distinguisher 192.168.0.3:12
9. Configure the instance’s VPN virtual routing and forwarding (VRF) table route target. The assigned
target must match the one configured at the PE1 device.
[edit routing-instances]
user@pe2# set l2vpn1 vrf-target target:64512:12
10. Configure the instance for the l2vpn protocol and specify the encapsulation used on the edge-facing
link.
[edit routing-instances]
user@pe2# set l2vpn1 protocols l2vpn encapsulation-type ethernet
11. Add the PE device’s edge-facing interface under the instance’s l2vpn hierarchy along with a
description .
[edit routing-instances]
user@pe2# set l2vpn1 protocols l2vpn interface ge-0/0/0.0 description "L2vpn Link Between
PE2 and CE2"
12. Configure the instance’s Layer 2 VPN site information and list the PE device's edge-facing interface
under the local site. The local site ID configured on the PE2 device must match the remote site ID
you configured on the PE1 device, and vice versa.
[edit routing-instances]
user@pe1# set l2vpn1 protocols l2vpn site CE-2 site-identifier 2 interface ge-0/0/0.0
remote-site-id 1
NOTE: In this example, the site ID for the PE2 device is 2 and the site ID for the PE1 device
is 1. For the PE2 device the remote site is correctly configured with a remote-site-id value of
1.
36
13. Commit your changes at the PE2 device and return to CLI operational mode.
[edit]
user@pe1# commit and-quit
Results
user@pe2# show
interfaces {
ge-0/0/0 {
description "Link from PE2 to CE2";
encapsulation ethernet-ccc;
unit 0 {
family ccc;
}
}
ge-0/0/1 {
description "Link from PE2 to P-router";
mtu 4000;
unit 0 {
family inet {
address 10.1.34.2/24;
}
family mpls;
}
}
lo0 {
unit 0 {
family inet {
address 192.168.0.3/32;
}
}
}
}
routing-instances {
l2vpn1 {
37
protocols {
l2vpn {
interface ge-0/0/0.0 {
description "L2vpn Link Between PE2 and CE2" ;
}
site CE-2 {
interface ge-0/0/0.0 {
remote-site-id 1;
}
site-identifier 2;
}
encapsulation-type ethernet;
}
}
instance-type l2vpn;
interface ge-0/0/0.0;
route-distinguisher 192.168.0.3:12;
vrf-target target:65412:12;
}
}
routing-options {
autonomous-system 65412;
}
protocols {
bgp {
group ibgp {
type internal;
local-address 192.168.0.3;
family l2vpn {
signaling;
}
neighbor 192.168.0.1;
}
}
mpls {
label-switched-path lsp_to_pe1 {
to 192.168.0.1;
}
interface ge-0/0/1.0;
}
ospf {
traffic-engineering;
area 0.0.0.0 {
38
interface lo0.0;
interface ge-0/0/1.0;
}
}
rsvp {
interface lo0.0;
interface ge-0/0/1.0;
}
}
Verification
IN THIS SECTION
Perform these tasks to verify that the MPLS-based Layer 2 VPN works properly:
Purpose
Confirm the OSPF protocol is working properly in the provider network by verifying adjacency status
and OSPF learned routes to the loopback addresses of the remote provider devices. Proper IGP
operation is critical for the successful establishment of MPLS LSPs.
39
Action
Meaning
The output shows that the PE1 device has established an OSPF adjacency to the P device (192.168.0.2). It
also shows that the P and remote PE device loopback addresses (192.168.0.2) and (192.168.0.3) are learned
via OSPF at the local PE device.
Purpose
Verify that the RSVP and MPLS protocols are configured to operate on the PE device’s core-facing
interfaces. This step also verifies that family mpls is correctly configured at the unit level of the core-
facing interfaces.
Action
Meaning
The output shows that MPLS and RSVP are correctly configured on the local PE device’s core-facing and
loopback interfaces.
Purpose
Verify that the RSVP sessions (ingress and egress) are properly established between the PE devices.
Action
Meaning
The output shows that both the ingress and egress RSVP sessions are correctly established between the
PE devices. Successful LSP establishment indicates the MPLS baseline is operational.
41
Purpose
Verify that the BGP session between the PE devices is correctly established with support for Layer 2
VPN network layer reachability information (NLRI).
Action
Meaning
The output shows the BGP session to the remote PE device (192.168.0.3) has been correctly established
(Establ), and through the Up/Dwn field, how long the session has been in the current state (1:34). It also
shows the number of BGP packets sent to (5) and received from (6) the remote PE device. The flaps field
confirms that no state transitions have occurred (0), indicating the session is stable. Also note that Layer
2 VPN NLRI is correctly exchanged between the PE devices. This output confirms the BGP peering
between the PE devices is ready to support a Layer 2 VPN.
Purpose
Verify that the routing table on the PE1 device is populated with the Layer 2 VPN routes used to
forward traffic between the CE devices.
42
Action
192.168.0.3:12:2:1/96
*[BGP/170] 00:51:36, localpref 100, from 192.168.0.3
AS path: I, validation-state: unverified
> to 10.1.23.2 via ge-0/0/1.0, label-switched-path lsp_to_pe2
192.168.0.1:12:1:1/96
*[L2VPN/170/-101] 01:48:30, metric2 1
Indirect
192.168.0.3:12:2:1/96
*[BGP/170] 00:51:57, localpref 100, from 192.168.0.3
AS path: I, validation-state: unverified
> to 10.1.23.2 via ge-0/0/1.0, label-switched-path lsp_to_pe2
Meaning
The command show route table bgp.l2vpn.0 displays all Layer 2 VPN routes that have been received on the
PE device. The command show route table l2vpn1.l2vpn.0 shows the Layer 2 VPN routes that have been
imported into the l2vpn1 routing instance as a result of a matching route target. The l2vpn1.l2vpn.0 table
contains both the local PE device’s Layer 2 VPN route as well as a remote route learned via the BGP
peering to the remote PE device. Both tables show the remote Layer 2 VPN route is correctly associated
with the lsp_to_pe2 LSP as a forwarding next hop. The outputs confirm the local PE device has learned
about the remote customer site from the PE2 device. It also shows that it can forward Layer 2 VPN
traffic to the PE2 device using MPLS transport over the provider network.
43
Purpose
Action
Instance: l2vpn1
Edge protection: Not-Primary
Local site: CE-1 (1)
connection-site Type St Time last up # Up trans
2 rmt Up Jul 28 10:47:18 2020 1
Remote PE: 192.168.0.3, Negotiated control-word: Yes (Null)
44
Meaning
The St field in the output shows that the Layer 2 VPN connection to Remote PE 192.168.0.3 at connection-site
2 is Up. The output also confirms the PE device’s edge-facing interface name ge-0/0/0.0 and operational
status as up. You also verify that Ethernet encapsulation is configured on the PE device’s customer-facing
interface. This is the correct encapsulation for the untagged Ethernet interfaces used in this example.
The verification steps performed thus far indicate that the Layer 2 VPN’s control plane is operational.
You verify the data plane of the Layer 2 VPN in the following steps.
Purpose
Verify Layer 2 VPN connectivity between the local and remote PE devices. Two forms of the ping mpls
l2vpn command are shown. Both test Layer 2 VPN routing and MPLS forwarding between the PE
devices. The first command assumes a single remote site while the second specifies the local and remote
site identifiers, which is useful when testing a multi-site Layer 2 VPN. This is because the remote site ID
can be used to target the desired remote PE device.
NOTE: The ping mpls l2vpn command validates Layer 2 VPN route exchange and MPLS forwarding
between the PE devices. This is done by generating traffic from the local PE’s Layer 2 VPN
routing instance to the remote PE device’s 127.0.0.1 loopback address. This command does not
validate the operation of the CE device interfaces or their configuration. This is because CE
device operation is opaque to the provider network in a Layer 2 VPN.
Action
!!!!!
45
Request for seq 1, to interface 334, labels <800002, 299840>, packet size 88
Reply for seq 1, return code: Egress-ok, time: 593.784 ms
Local transmit time: 2020-07-13 16:15:55 UTC 241.357 ms
Remote receive time: 2020-07-13 16:15:55 UTC 835.141 ms
Request for seq 2, to interface 334, labels <800002, 299840>, packet size 88
Reply for seq 2, return code: Egress-ok, time: 591.700 ms
Local transmit time: 2020-07-13 16:15:56 UTC 241.405 ms
Remote receive time: 2020-07-13 16:15:56 UTC 833.105 ms
Request for seq 3, to interface 334, labels <800002, 299840>, packet size 88
Reply for seq 3, return code: Egress-ok, time: 626.084 ms
Local transmit time: 2020-07-13 16:15:57 UTC 241.407 ms
Remote receive time: 2020-07-13 16:15:57 UTC 867.491 ms
Request for seq 4, to interface 334, labels <800002, 299840>, packet size 88
Reply for seq 4, return code: Egress-ok, time: 593.061 ms
Local transmit time: 2020-07-13 16:15:58 UTC 241.613 ms
Remote receive time: 2020-07-13 16:15:58 UTC 834.674 ms
Request for seq 5, to interface 334, labels <800002, 299840>, packet size 88
Reply for seq 5, return code: Egress-ok, time: 594.192 ms
Local transmit time: 2020-07-13 16:15:59 UTC 241.357 ms
Remote receive time: 2020-07-13 16:15:59 UTC 835.549 ms
Meaning
The output confirms that the Layer 2 VPN forwarding plane is operating correctly between the PE
devices.
46
Purpose
Verify Layer 2 VPN connectivity between the CE devices. This step confirms the CE devices have
operational interfaces and are properly configured for Layer 2 connectivity. This is done by verifying the
CE devices have established an OSPF adjacency and are able to pass traffic end-to-end between their
loopback addresses.
Action
Meaning
The output shows that Layer 2 VPN connectivity is working correctly between the CE devices. It
confirms that the local CE device has established an OSPF adjacency over the provider core to the
remote CE device 172.16.1.2, and that the local CE device has learned a route to the remote CE device's
loopback address 172.16.255.2 via OSPF. The output also shows that the CE devices are able to pass
47
1500-byte IP packets without evoking local fragmentation. The successful pings also verify the frames
did not exceed the MTU supported by the provider’s network.
NOTE: The size argument added to the ping command generates 1472 bytes of echo data. An
additional 8 bytes of Internet Control Message Protocol (ICMP) and 20 bytes of IP header are
added to bring the total packet size to 1500-bytes. Adding the do-not-fragment switch ensures the
CE device cannot perform fragmentation based on its local MTU. This method confirms that no
fragmentation is possible, or needed, when sending standard length Ethernet frames between
the CE devices.
RELATED DOCUMENTATION
CHAPTER 4
IN THIS CHAPTER
You need to specify a circuit cross-connect (CCC) encapsulation type for each PE-router-to-CE-router
interface running a Layer 2 VPN. This encapsulation type should match the encapsulation type
configured under the routing instance. For information about how to configure the encapsulation type
under the routing instance, see Configuring the Encapsulation Type .
NOTE: A Layer 2 VPN or Layer 2 circuit is not supported if the PE-router-to-P-router interface
has VLAN-tagging enabled and uses a nonenhanced Flexible PIC Concentrator (FPC).
For Layer 2 VPNs, you need to configure the CCC encapsulation on the logical interface. You also need
to configure an encapsulation on the physical interface. The physical interface encapsulation does not
have to be a CCC encapsulation. However, it should match the logical interface encapsulation. For
example, if you configure an ATM CCC encapsulation type on the logical interface, you should configure
a compatible ATM encapsulation on the physical interface.
NOTE: The EX9200 switches only use ethernet and ethernet-vlan encapsulation types.
49
encapsulation-type ccc-encapsulation-type;
encapsulation ccc-encapsulation;
To configure the CCC encapsulation type on the physical interface, include this statement at the
following hierarchy levels:
To configure the CCC encapsulation type on the logical interface, include this statement at the following
hierarchy levels:
You configure the encapsulation type at the [edit interfaces] hierarchy level differently from the [edit
routing-instances] hierarchy level. For example, you specify the encapsulation as frame-relay at the [edit
routing-instances] hierarchy level and as frame-relay-ccc at the [edit interfaces] hierarchy level.
You can run both standard Frame Relay and CCC Frame Relay on the same device. If you specify Frame
Relay encapsulation (frame-relay-ccc) for the interface, you should also configure the encapsulation at the
[edit interfaces interface name unit unit-number] hierarchy level as frame-relay-ccc. Otherwise, the logical
interface unit defaults to standard Frame Relay.
Also known as Layer 2.5 VPNs, the translation cross-connect (TCC) encapsulation types allow you to
configure different encapsulation types at the ingress and egress of a Layer 2 VPN or the ingress and
egress of a Layer 2 circuit. For example, a CE router at the ingress of a Layer 2 VPN path can send traffic
in a Frame Relay encapsulation. A CE router at the egress of that path can receive the traffic in an ATM
encapsulation.
50
NOTE: The EX9200 switches only use ethernet and ethernet-vlan encapsulation types.
For information about how to configure encapsulations for Layer 2 circuits, see Configuring the
Interface Encapsulation Type for Layer 2 Circuits
The configuration for TCC encapsulation types is similar to the configuration for CCC encapsulation
types. For Layer 2 VPNs, you specify a TCC encapsulation type for each PE-router-to-CE-router
interface. The encapsulation type configured for the interface should match the encapsulation type
configured under the routing instance. For information about how to configure the encapsulation type
under the routing instance, see Configuring the Encapsulation Type.
NOTE: Some platform and FPC combinations can not pass TCC encapsulated ISO traffic. See
Platforms/FPCs That Cannot Forward TCC Encapsulated ISO Traffic for details.
You need to configure the TCC encapsulation on both the physical and logical interfaces. To configure
the TCC encapsulation type, include the encapsulation-type statement:
encapsulation-type tcc-encapsulation-type;
encapsulation tcc-encapsulation;
To configure the TCC encapsulation type on the physical interface, include this statement at the
following hierarchy levels:
To configure the TCC encapsulation type on the logical interface, include this statement at the following
hierarchy levels:
You configure the encapsulation type at the [edit interfaces] hierarchy level differently than at the [edit
routing-instances] hierarchy level. For example, you specify the encapsulation as frame-relay at the [edit
routing-instances] hierarchy level and as frame-relay-tcc at the [edit interfaces] hierarchy level.
51
For Layer 2.5 VPNs employing an Ethernet interface as the TCC router, you can configure an Ethernet
TCC or an extended VLAN TCC.
To configure an Ethernet TCC or an extended VLAN TCC, include the proxy and remote statements:
proxy inet-address;
remote (inet-address | mac-address);
The proxy inet-address address statement defines the IP address for which the TCC router is acting as
proxy.
The remote (inet-address | mac-address) statement defines the location of the remote router.
Ethernet TCC is supported on interfaces that carry IP version 4 (IPv4) traffic only. However, Ethernet
TCC encapsulation is not supported on 8-port, 12-port, and 48-port Fast Ethernet PICs.
By default, the MTU used to advertise a Layer 2 pseudowire is determined by taking the interface MTU
for the associated physical interface and subtracting the encapsulation overhead for sending IP packets
based on the encapsulation. However, encapsulations that support multiple logical interfaces (and
multiple Layer 2 pseudowires) rely on the same interface MTU (since they are all associated with the
same physical interface). This can prove to be a limitation for VLAN Layer 2 pseudowires using the same
Ethernet interface or for Layer 2 pseudowire DLCIs using the same Frame Relay interface.
This can also affect multivendor environments. For example, if you have three PE devices supplied by
different vendors and one of the devices only supports an MTU of 1500, even if the other devices
support larger MTUs you must configure the MTU as 1500 (the smallest MTU of the three PE devices).
You can explicitly configure which MTU is advertised for a Layer 2 pseudowire, even if the Layer 2
pseudowire is sharing a physical interface with other Layer pseudowires. When you explicitly configure
an MTU for a Layer 2 pseudowire, be aware of the following:
• For BGP-based applications such as l2vpn and bgp-vpls, the advertised MTU will be zero unless an
MTU value is explicitly set at the [edit routing-instances routing-instance-name protocols (l2vpn | vpls)
site site-name] hierarchy level.
52
• An explicitly configured MTU is signaled to the remote PE device. The configured MTU is also
compared to the MTU received from the remote PE device. If there is a conflict, the Layer 2
pseudowire is taken down.
• If you configure an MTU for an ATM cell relay interface on an ATM II PIC, the configured MTU is
used to compute the cell bundle size advertised for that Layer 2 pseudowire, instead of the default
interface MTU.
• A configured MTU is used only in the control plane. It is not enforced in the data plane. You need to
ensure that the CE device for a given Layer 2 pseudowire uses the correct MTU for data
transmission.
The following procedure describes how to configure the MTU for the Layer 2 interface. This information
applies to the following Layer 2 technologies:
• Layer 2 VPNs
• Layer 2 Circuits
• VPLS
1. To configure the MTU for a Layer 2 circuit, include the mtu statement:
mtu mtu-number;
For a list of hierarchy levels at which you can include this statement, see the statement summary
section for this statement.
2. To allow a Layer 2 pseudowire to be established even though the MTU configured on the local PE
router does not match the MTU configured on the remote PE router, include the ignore-mtu-mismatch
statement:
ignore-mtu-mismatch;
For a list of hierarchy levels at which you can include this statement, see the statement summary
section for this statement.
RELATED DOCUMENTATION
ignore-mtu-mismatch
mtu
53
A 4-byte control word provides support for the emulated VC encapsulation for Layer 2 VPNs. This
control word is added between the Layer 2 protocol data unit (PDU) being transported and the VC label
that is used for demultiplexing. Various networking formats (ATM, Frame Relay, Ethernet, and so on) use
the control word in a variety of ways.
On networks with equipment that does not support the control word, you can disable it by including the
no-control-word statement:
no-control-word;
For more information about configuring the control word, see Configuring the Control Word for Layer 2
Circuits and the Layer 2 Circuits User Guide.
NOTE: Use the no-control-word statement to disable the control word when the topology uses
generic routing encapsulation (GRE) as the connection mechanism between PEs, and one of the
PEs is an M Series router.
RELATED DOCUMENTATION
CHAPTER 5
IN THIS CHAPTER
IN THIS SECTION
For each prefix in the routing table, the routing protocol process selects a single best path. After the best
path is selected, the route is installed in the routing table. The best path becomes the active route if the
same prefix is not learned by a protocol with a lower (more preferred) global preference value, also
known as the administrative distance. The algorithm for determining the active route is as follows:
2. Choose the path with the lowest preference value (routing protocol process preference).
Routes that are not eligible to be used for forwarding (for example, because they were rejected by
routing policy or because a next hop is inaccessible) have a preference of –1 and are never chosen.
For non-BGP paths, choose the path with the lowest preference2 value.
55
4. If the accumulated interior gateway protocol (AIGP) attribute is enabled, prefer the path with the
lower AIGP attribute.
5. Prefer the path with the shortest autonomous system (AS) path value (skipped if the as-path-ignore
statement is configured).
A confederation segment (sequence or set) has a path length of 0. An AS set has a path length of 1.
Routes learned from an IGP have a lower origin code than those learned from an exterior gateway
protocol (EGP), and both have lower origin codes than incomplete routes (routes whose origin is
unknown).
7. Prefer the path with the lowest multiple exit discriminator (MED) metric.
Depending on whether nondeterministic routing table path selection behavior is configured, there
are two possible cases:
• If nondeterministic routing table path selection behavior is not configured (that is, if the path-
selection cisco-nondeterministic statement is not included in the BGP configuration), for paths with
the same neighboring AS numbers at the front of the AS path, prefer the path with the lowest
MED metric. To always compare MEDs whether or not the peer ASs of the compared routes are
the same, include the path-selection always-compare-med statement.
• If nondeterministic routing table path selection behavior is configured (that is, the path-
selection cisco-nondeterministic statement is included in the BGP configuration), prefer the path
with the lowest MED metric.
Confederations are not considered when determining neighboring ASs. A missing MED metric is
treated as if a MED were present but zero.
NOTE: MED comparison works for single path selection within an AS (when the route does
not include an AS path), though this usage Is uncommon.
By default, only the MEDs of routes that have the same peer autonomous systems (ASs) are
compared. You can configure routing table path selection options to obtain different behaviors.
8. Prefer strictly internal paths, which include IGP routes and locally generated routes (static, direct,
local, and so forth).
9. Prefer strictly external BGP (EBGP) paths over external paths learned through internal BGP (IBGP)
sessions.
10. Prefer the path whose next hop is resolved through the IGP route with the lowest metric.
56
NOTE: A path is considered a BGP equal-cost path (and will be used for forwarding) if a tie-
break is performed after the previous step. All paths with the same neighboring AS, learned
by a multipath-enabled BGP neighbor, are considered.
BGP multipath does not apply to paths that share the same MED-plus-IGP cost yet differ in
IGP cost. Multipath path selection is based on the IGP cost metric, even if two paths have
the same MED-plus-IGP cost.
BGP compares the type of IGP metric before comparing the metric value itself in
rt_metric2_cmp. For example, BGP routes that are resolved through IGP are preferred over
discarded or rejected next-hops that are of type RTM_TYPE_UNREACH. Such routes are declared
inactive because of their metric-type.
11. If both paths are external, prefer the currently active path to minimize route-flapping. This rule is
not used if any one of the following conditions is true:
12. Prefer a primary route over a secondary route. A primary route is one that belongs to the routing
table. A secondary route is one that is added to the routing table through an export policy.
13. Prefer the path from the peer with the lowest router ID. For any path with an originator ID
attribute, substitute the originator ID for the router ID during router ID comparison.
14. Prefer the path with the shortest cluster list length. The length is 0 for no list.
15. Prefer the path from the peer with the lowest peer IP address.
The shortest AS path step of the algorithm, by default, evaluates the length of the AS path and
determines the active path. You can configure an option that enables Junos OS to skip this step of the
algorithm by including the as-path-ignore option.
NOTE: Starting with Junos OS Release 14.1R8, 14.2R7, 15.1R4, 15.1F6, and 16.1R1, the as-
path-ignore option is supported for routing instances.
57
The routing process path selection takes place before BGP hands off the path to the routing table to
makes its decision. To configure routing table path selection behavior, include the path-selection
statement:
path-selection {
(always-compare-med | cisco-non-deterministic | external-router-id);
as-path-ignore;
l2vpn-use-bgp-rules;
med-plus-igp {
igp-multiplier number;
med-multiplier number;
}
}
For a list of hierarchy levels at which you can include this statement, see the statement summary section
for this statement.
Routing table path selection can be configured in one of the following ways:
• Emulate the Cisco IOS default behavior (cisco-non-deterministic). This mode evaluates routes in the
order that they are received and does not group them according to their neighboring AS. With cisco-
non-deterministic mode, the active path is always first. All inactive, but eligible, paths follow the active
path and are maintained in the order in which they were received, with the most recent path first.
Ineligible paths remain at the end of the list.
As an example, suppose you have three path advertisements for the 192.168.1.0 /24 route:
• Path 2—learned through IBGP; AS Path of 65020; MED of 150; IGP cost of 5
• Path 3—learned through IBGP; AS Path of 65010; MED of 100; IGP cost of 10
These advertisements are received in quick succession, within a second, in the order listed. Path 3 is
received most recently, so the routing device compares it against path 2, the next most recent
advertisement. The cost to the IBGP peer is better for path 2, so the routing device eliminates path 3
from contention. When comparing paths 1 and 2, the routing device prefers path 1 because it is
received from an EBGP peer. This allows the routing device to install path 1 as the active path for the
route.
NOTE: We do not recommend using this configuration option in your network. It is provided
solely for interoperability to allow all routing devices in the network to make consistent route
selections.
58
• Always comparing MEDs whether or not the peer ASs of the compared routes are the same (always-
compare-med).
• Override the rule that If both paths are external, the currently active path is preferred (external-
router-id). Continue with the next step (Step "12" on page 56) in the path-selection process.
• Adding the IGP cost to the next-hop destination to the MED value before comparing MED values for
path selection (med-plus-igp).
BGP multipath does not apply to paths that share the same MED-plus-IGP cost, yet differ in IGP
cost. Multipath path selection is based on the IGP cost metric, even if two paths have the same
MED-plus-IGP cost.
8. Prefer routes from the peer with the lowest Router ID.
10. Prefer routes from the peer with the lowest peer IP address. Steps 2, 6 and 12 are the RPD criteria.
BGP advertises only the active path, unless you configure BGP to advertise multiple paths to a
destination.
Suppose a routing device has in its routing table four paths to a destination and is configured to
advertise up to three paths (add-path send path-count 3). The three paths are chosen based on path
selection criteria. That is, the three best paths are chosen in path-selection order. The best path is the
59
active path. This path is removed from consideration and a new best path is chosen. This process is
repeated until the specified number of paths is reached.
Release Description
14.1R8 Starting with Junos OS Release 14.1R8, 14.2R7, 15.1R4, 15.1F6, and 16.1R1, the as-path-ignore option
is supported for routing instances.
RELATED DOCUMENTATION
Example: Ignoring the AS Path Attribute When Selecting the Best Path
Examples: Configuring BGP MED
Example: Advertising Multiple BGP Paths to a Destination
Layer 2 VPNs and VPLS share the same path selection process for determining the optimal path to reach
all of the destinations shared within a single routing instance. For Layer 2 VPN and VPLS topologies, the
path selection process is straightforward if there is just a single path from each PE router to each CE
device. However, the path selection process becomes more complex if the PE routers receive two or
more valid paths to reach a specific CE device.
NOTE: In the VPLS documentation, the word router in terms such as PE router is used to refer to
any device that provides routing functions.
The following network scenarios provide examples of what might cause a PE router to receive more
than one valid path to reach a specific CE device:
• Multihoming—One or more CE devices within a routing instance are multihomed to two or more PE
routers. Each multihomed CE device has at least two valid paths.
• Route reflectors—There are multiple route reflectors deployed within the same network and they are
supporting PE routers within the same routing instance. Due to time delays in large complex
networks, the route reflectors can separately receive a different valid path to reach a CE device at
different times. When they readvertise these valid paths, a PE router could receive two or more
separate but apparently valid paths to the same CE device.
60
By default, Juniper Networks routers use just the designated forwarder path selection algorithm to
select the best path to reach each Layer 2 VPN or VPLS routing instance destination (for more
information, see VPLS Path Selection Process for PE Routers). However, you can also configure the
routers in your network to use both the BGP path selection algorithm and the designated forwarder
path selection algorithm as follows:
• On the Provider routers within the service providers network, the standard BGP path selection
algorithm is used (for more information, see Understanding BGP Path Selection). Using the standard
BGP path selection for Layer 2 VPN and VPLS routes allows a service provider to leverage the
existing Layer 3 VPN network infrastructure to also support Layer 2 VPNs and VPLS. The BGP path
selection algorithm also helps to ensure that the service provider’s network behaves predictably with
regard to Layer 2 VPN and VPLS path selection. This is particularly important in networks employing
route reflectors and multihoming.
When a Provider router receives multiple paths for the same destination prefix (for example, a
multihomed CE device), one path is selected based on the BGP path selection algorithm and placed
in the bgp.l2vpn.0 routing table and the appropriate instance.l2vpn.0 routing table.
• When a PE router receives all of the available paths to each CE device, it runs the designated
forwarder path selection algorithm to select the preferred path to reach each CE device,
independently of the results of the earlier BGP path selection algorithm run on the Provider router.
The VPLS designated forwarder algorithm uses the D-bit, preference, and PE router identifier to
determine which of the valid paths to each CE device to use. The PE router might select a path to
reach a CE device which is different from the path selected by the BGP-based Provider routers. In
this scenario, the following is the expected behavior for traffic sent to the multihomed CE device:
• If the path selected by the remote PE router is available, traffic will traverse the network to the
multihomed CE device using the remote PE router’s preferred path (again, ignoring the path
selected by the BGP-based Provider routers).
1. The Provider routers switch the traffic destined for the multihomed CE device to the alternate
path as soon as failure is detected.
2. The Provider routers notify the remote PE routers of the path failure.
For more information about the VPLS designated forwarder path selection algorithm, see VPLS Path
Selection Process for PE Routers. This algorithm is also described in the Internet draft draft-
kompella-l2vpn-vpls-multihoming-03.txt, Multi-homing in BGP-based Virtual Private LAN Service.
To enable the BGP path selection algorithm for Layer 2 VPN and VPLS routing instances, complete the
following steps:
61
1. Run Junos OS Release 12.3 or later on all of the PE and Provider routers participating in Layer 2 VPN
or VPLS routing instances.
Attempting to enable this functionality on a network with a mix of routers that both do and do not
support this feature can result in anomalous behavior.
2. Specify a unique route distinguisher on each PE router participating in a Layer 2 VPN or VPLS
routing instance.
3. Configure the l2vpn-use-bgp-rules statement on all of the PE and Provider routers participating in Layer
2 VPN or VPLS routing instances.
You can configure this statement at the [edit protocols bgp path-selection] hierarchy level to apply this
behavior to all of the routing instances on the router or at the [edit routing-instances routing-instance-
name protocols bgp path-selection] hierarchy level to apply this behavior to a specific routing instance.
RELATED DOCUMENTATION
CHAPTER 6
IN THIS CHAPTER
IN THIS SECTION
A redundant pseudowire can act as a backup connection between PE routers and CE devices,
maintaining Layer 2 circuit and VPLS services after certain types of failures. This feature can help
improve the reliability of certain types of networks (metro for example) where a single point of failure
could interrupt service for multiple customers. Redundant pseudowires cannot reduce traffic loss to
zero. However, they provide a way to gracefully recover from pseudowire failures in such a way that
service can be restarted within a known time limit.
When you configure redundant pseudowires to remote PE routers, you configure one to act as the
primary pseudowire over which customer traffic is being transmitted and you configure another
pseudowire to act as a backup in the event the primary fails. You configure the two pseudowires
statically. A separate label is allocated for the primary and backup neighbors.
63
For information about how to configure redundant pseudowires, see Configuring Redundant
Pseudowires for Layer 2 Circuits and VPLS.
The following sections provide an overview of redundant pseudowires for Layer 2 circuits and VPLS:
You can configure redundant pseudowires for Layer 2 circuits and VPLS in either of the following
manners:
• You can configure a single active pseudowire. The PE router configured as the primary neighbor is
given preference and this connection is the one used for customer traffic. For the LDP signalling,
labels are exchanged for both incoming and outgoing traffic with the primary neighbor. The LDP label
advertisement is accepted from the backup neighbor, but no label advertisement is forwarded to it,
leaving the pseudowire in an incomplete state. The pseudowire to the backup neighbor is completed
only when the primary neighbor fails. The decision to switch between the two pseudowires is made
by the device configured with the redundant pseudowires. The primary remote PE router is unaware
of the redundant configuration, ensuring that traffic is always switched using just the active
pseudowire.
• Alternatively, you can configure two active pseudowires, one to each of the PE routers. Using this
approach, control plane signalling is completed and active pseudowires are established with both the
primary and backup neighbors. However, the data plane forwarding is done only over a one of the
pseudowires (designated as the active pseudowire by the local device). The other pseudowire is on
standby. The active pseudowire is preferably established with the primary neighbor and can switch to
the backup pseudowire if the primary fails.
The decision to switch between the active and standby pseudowires is controlled by the local device.
The remote PE routers are unaware of the redundant connection, and so both remote PE routers
send traffic to the local device. The local device only accepts traffic from the active pseudowire and
drops the traffic from the standby. In addition, the local device only sends traffic to the active
pseudowire. If the active pseudowire fails, traffic is immediately switched to the standby pseudowire.
The two configurations available for pseudowire redundancy have the following limitations:
• For the single active pseudowire configuration, it takes more time (compared to the two active
pseudowire configuration) to switchover to the backup pseudowire when a failure is detected. This
approach requires additional control plane signalling to complete the pseudowire with the backup
neighbor and traffic can be lost during the switchover from primary to backup.
64
• If you configure two active pseudowires, bandwidth is lost on the link carrying the backup
pseudowire between the remote PE router and the local device. Traffic is always duplicated over both
the active and standby pseudowires. The single active pseudowire configuration does not waste
bandwidth in this fashion.
The following events are used to detect a failure (control and data plane) of the pseudowire configured
between a local device and a remote PE router and initiates the switch to a redundant pseudowire:
• Periodic pseudowire OAM procedure fails (Layer 2 circuit-based MPLS ping to the PE router fails)
When you configure a redundant pseudowire between a CE device and a PE router, a periodic (once
a minute) ping packet is forwarded through the active pseudowire to verify data plane connectivity. If
the ping fails, traffic is automatically switched to the redundant pseudowire.
When a failure is detected, traffic is switched from the failed active pseudowire to the redundant
pseudowire. The redundant pseudowire is then designated as the active pseudowire. The switch is
nonreversible, meaning that once the redundant pseudowire assumes the role of the active pseudowire
at the time of a failover, it remains as the active pseudowire even though the previously active
pseudowire comes up again.
For example, a primary pseudowire has failed and traffic has been successfully switched to the
redundant pseudowire. After a period of time, the cause of the failure of the primary pseudowire has
been resolved and it is now possible to reestablish the original connection. However, traffic is not
switched back to the original pseudowire unless a failure is detected on the currently active pseudowire.
RELATED DOCUMENTATION
IN THIS SECTION
A redundant pseudowire can act as a backup connection between PE routers and CE devices,
maintaining Layer 2 circuit and VPLS services after certain types of failures. This feature can help
improve the reliability of certain types of networks (metro for example) where a single point of failure
could interrupt service for multiple customers. Redundant pseudowires cannot reduce traffic loss to
zero. However, they provide a way to gracefully recover from pseudowire failures in such a way that
service can be restarted within a known time limit.
For an overview of how redundant pseudowires work, see Redundant Pseudowires for Layer 2 Circuits
and VPLS.
To configure pseudowire redundancy for Layer 2 circuits and VPLS, complete the procedures in the
following sections:
You configure pseudowire redundancy on the PE router acting as the egress for the primary and standby
pseudowires using the backup-neighbor statement.
backup-neighbor {
community name;
psn-tunnel-endpoint address;
standby;
virtual-circuit-id number;
}
66
For a list of hierarchy levels at which you can include this statement, see the statement summary for this
statement.
• psn-tunnel-endpoint—Specifies the endpoint address for the packet switched network (PSN) tunnel on
the remote PE router. The PSN tunnel endpoint address is the destination address for the LSP on the
remote PE router.
• standby—Configures the pseudowire to the specified backup neighbor as the standby. When you
configure this statement, traffic flows over both the active and standby pseudowires to the CE
device. The CE device drops the traffic from the standby pseudowire, unless the active pseudowire
fails. If the active pseudowire fails, the CE device automatically switches to the standby pseudowire.
• virtual-circuit-id—Uniquely identifies the primary and standby Layer 2 circuits. This option is
configurable for Layer 2 circuits only.
To configure the time the router waits before switching traffic from the failed primary pseudowire to a
backup pseudowire, include the switchover-delay statement:
switchover-delay milliseconds;
For a list of hierarchy levels at which you can include this statement, see the statement summary for this
statement.
You can specify a revert time for redundant Layer 2 circuit and VPLS pseudowires. When you have
configured redundant pseudowires for Layer 2 circuits or VPLS, traffic is switched to the backup
pseudowire in the event that the primary pseudowire fails. If you configure a revert time, when the
configured time expires traffic is reverted back to the primary pseudowire, assuming the primary
pseudowire has been restored.
To configure a revert time for redundant pseudowires, specify the time in seconds using the revert-time
statement:
With the maximum option, specify a maximum reversion interval to add after the revert-time delay. If a
revert-time delay is defined but a maximum timer is not defined, VCs are restored upon the revert-
timer's expiration.
To reduce as much as possible the amount of traffic discarded, and potential data-path asymmetries
observed during primary-to-backup transition periods, you can use this restoration timer. This
restoration timer is activated when the backup path is performing as active, and then the primary path is
restored. The goal is to avoid moving traffic back to the primary path right away, to make sure that the
control plane's related tasks (such as IGP, LDP, RSVP, and internal BGP) have enough time to complete
their updating cycle.
By enabling a gradual return of traffic to the primary path, you can ensure that the relatively-slow
control-plane processing and updating does not have a negative impact on the restoration process.
The maximum option extends the revert timer’s functionality to provide a jittered interval over which a
certain number of circuits can be transitioned back to the primary path. By making use of this maximum
value, you can define a time interval during which circuits are expected to switch over. As a
consequence, circuits’ effective transitions are scattered during restoration periods.
When making use of revert-time x maximum y statement, you can ensure that the corresponding circuit that
is active is moved to the primary path within a time-slot (t1) such as that: x <= t1 <= y. In other words,
by activating this statement, you can ensure the following:
• VCs stay in the backup path for at least x seconds after the primary path comes back up.
• VCs are moved back to the primary path before y seconds have elapsed.
The ideal values for x and y will are conditioned to internal aspects of your network. For this reason,
there are no default values for these settings. If no revert-time is set, the default behavior is non-
revertive. That is, circuits are not returned to the primary path upon restoration. They are kept on the
backup path.
For a list of hierarchy levels at which you can include this statement, see the statement summary for this
statement.
RELATED DOCUMENTATION
CHAPTER 7
IN THIS CHAPTER
BFD Support for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS | 70
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS | 71
The following procedure describes how to configure Bidirectional Forwarding Detection (BFD) for Layer
2 VPN and VPLS. For VPNs, you configure the BFD sessions on the interfaces carrying traffic from the
PE routers to the CE routers.
The BFD protocol is a simple hello mechanism that detects failures in a network. Hello packets are sent
at a specified, regular interval. A neighbor failure is detected when the routing device stops receiving a
reply after a specified interval. BFD works with a wide variety of network environments and topologies.
The failure detection timers for BFD have shorter time limits than default failure detection mechanisms
for BGP, so they provide faster detection.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower. The lower the
BFD failure detection timer value, the faster the failure detection and vice versa. For example, the
timers can adapt to a higher value if the adjacency fails (that is, the timer detects failures more slowly).
Or a neighbor can negotiate a higher value for a timer than the configured value. The timers adapt to a
higher value when a BFD session flap occurs more than three times in a span of 15 seconds. A back-off
algorithm increases the receive interval by two if the local BFD instance is the reason for the session
flap. The transmission interval is increased by two if the remote BFD instance is the reason for the
session flap. You can use the clear bfd adaptation command to return BFD interval timers to their
configured values. The clear bfd adaptation command is hitless, meaning that the command does not
affect traffic flow on the routing device.
1. You can enable BFD failure detection. The BFD failure detection timers are adaptive and can be
adjusted to be faster or slower. The lower the BFD failure detection timer value, the faster the failure
detection and vice versa. For example, the timers can adapt to a higher value if the adjacency fails
(that is, the timer detects failures more slowly). Or a neighbor can negotiate a higher value for a timer
69
than the configured value. The timers adapt to a higher value when a BFD session flap occurs more
than three times in a span of 15 seconds. A back-off algorithm increases the receive (Rx) interval by
two if the local BFD instance is the reason for the session flap. The transmission (Tx) interval is
increased by two if the remote BFD instance is the reason for the session flap.
To enable BFD failure detection and specify the threshold for the adaptation of the BFD session
detection time, specify a time in milliseconds using the threshold statement. When the detection
time adapts to a value equal to or greater than the threshold, a single trap and a single system log
message are sent.
NOTE: The threshold time must be equal to or greater than the value specified in the
minimum-interval or the minimum-receive-interval statement.
You can use the clear bfd adaptation command to return BFD interval timers to their configured values.
The clear bfd adaptation command is hitless, meaning that the command does not affect traffic flow on
the routing device.
2. You can specify the minimum interval after which the local routing device transmits hello packets and
then expects to receive a reply from a neighbor with which it has established a BFD session. You
specify the interval in milliseconds using the minimum-interval statement.
Optionally, instead of using this statement, you can specify the minimum transmit and receive
intervals separately using the minimum-interval (specified under the transmit-interval statement) and
minimum-receive-interval statements.
3. You can configure the minimum interval after which the local routing device must receive a reply
from a neighbor with which it has established a BFD session. Specify the number of milliseconds
using the minimum-receive-interval statement.
4. You can specify that an interface be declared down when a certain number of hello packets have not
been received from a neighboring router through that interface. Specify the number of hello packets
by including the multiplier statement.
5. You can configure BFD sessions not to adapt to changing network conditions by including the no-
adaptation statement. We recommend that you do not disable BFD adaptation unless it is preferable
to have BFD adaptation disabled in your network.
6. Specify the transmit interval options for bfd-liveness-detection statement by including the transmit-
interval statement. The negotiated transmit interval for a peer is the interval between the sending of
BFD packets to peers. The receive interval for a peer is the minimum time that it requires between
packets sent from its peer; the receive interval is not negotiated between peers. To determine the
transmit interval, each peer compares its configured minimum transmit interval with its peer's
minimum receive interval. The larger of the two numbers is accepted as the transmit interval for that
peer.
The transmit-interval statement specifies how often BFD statements are transmitted and includes the
following options:
70
• threshold milliseconds—Specify the threshold for the adaptation of the BFD session transmit
interval. When the transmit interval adapts to a value greater than the threshold, a single trap and
a single system message are sent.
NOTE: The threshold value specified in the threshold statement must be greater than the
value specified in the minimum-interval statement for the transmit-interval statement.
7. Specify the BFD version by including the version statement. You can set BFD to version 1 or allow
BFD to determine what version it needs to be by including the automatic option.
RELATED DOCUMENTATION
bfd-liveness-detection
clear bfd adaptation
BFD Support for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Bidirectional Forwarding Detection (BFD) support for virtual circuit connectivity verification (VCCV) on
MX Series devices enables you to configure a control channel for a pseudowire, in addition to the
corresponding operations, administration, and management functions to be used over that control
channel.
BFD provides a low resource mechanism for the continuous monitoring of the pseudowire data path and
for detecting data plane failures. This feature provides support for asynchronous mode BFD for VCCV as
described in RFC 5885, Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit
Connectivity Verification (VCCV). Alternatively, you can use a ping operation to detect pseudowire
failures. However, the processing resources required for a ping operation are greater than what is
needed for BFD. In addition, BFD is capable of detecting data plane failure faster than a VCCV ping.
BFD for pseudowires is supported for Layer 2 circuits (LDP-based), Layer 2 VPNs (BGP-based), and
VPLS (LDP-based or BGP-based).
Starting with Release 12.1, Junos OS introduces a distributed model for the BFD for VCCV. Unlike in
previous releases where the BFD for VCCV followed a Routing Engine-based implementation, in Release
12.1 and later, the BFD for VCCV follows a distributed implementation over PIC concentrators, such as
DPC, FPC, and MPC.
71
For distributed BFD, you need to configure the lo0 interface with unit 0 and the appropriate family
enabled.
NOTE: For the distributed BFD for VCCV to work, you must configure MPLS family (family mpls)
on the loopback interface.
In Junos OS Release 12.1 and later, the periodic packet management process (ppmd) on the PIC
concentrators handles the periodic packet management (send and receive) for BFD for VCCV. This
enables Junos OS to create more BFD for VCCV sessions, and to reduce the time taken for error
detection. Similarly, the distributed implementation improves the performance of Routing Engines
because the Routing Engine resources used for BFD for VCCV implementation become available for
Routing Engine-related applications when the BFD for VCCV-related processing moves to the PIC
concentrators. The distributed BFD for VCCV implementation also enables the BFD for VCCV sessions
to remain across graceful restarts.
RELATED DOCUMENTATION
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Bidirectional Forwarding Detection (BFD) support for virtual circuit connection verification (VCCV)
allows you to configure a control channel for a pseudowire, in addition to the corresponding operations
and management functions to be used over that control channel. BFD provides a low resource
mechanism for the continuous monitoring of the pseudowire data path and for detecting data plane
failures.
This feature provides support for asynchronous mode BFD for VCCV as described in RFC 5885,
Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification
(VCCV). You can also use a ping operation to detect pseudowire failures. However, the processing
resources required for a ping operation are greater than what is needed for BFD. In addition, BFD is
capable of detecting data plane failure faster than VCCV ping. BFD for pseudowires is supported for
Layer 2 circuits (LDP-based), Layer 2 VPNs (BGP-based), and VPLS (LDP-based or BGP-based).
72
To configure OAM and BFD for Layer 2 VPNs, include the oam statement and sub-statements at the [edit
routing-instances routing-instance-name protocols l2vpn] hierarchy level:
oam {
bfd-liveness-detection;
ping-interval ;
ping-multiplier;
}
You can configure many of the same OAM statements for VPLS and Layer 2 circuits:
• To enable OAM for VPLS, configure the oam statement and substatements at the [edit routing-instances
routing-instance-name protocols vpls] hierarchy level and at the [edit routing-instances routing-instance-
name protocols vpls neighbor address] hierarchy level. The pwe3-control-word statement configured at the
[edit routing-instances routing-instance-name protocols l2vpn oam control-channel] hierarchy level is not
applicable to VPLS configurations.
• To enable OAM for Layer 2 circuits, configure the oam statement and substatements at the [edit
protocols l2circuit neighbor address interface interface-name] hierarchy level. The control-channel
statement and sub-statements configured at the [edit routing-instances routing-instance-name protocols
l2vpn oam] hierarchy level do not apply to Layer 2 circuit configurations.
You can use the show ldp database extensive command to display information about the VCCV control
channel and the show bfd session extensive command to display information about BFD for Layer 2 VPNs,
Layer 2 circuits, and VPLS.
RELATED DOCUMENTATION
Overview | 74
CHAPTER 8
Overview
IN THIS CHAPTER
A Layer 2 circuit is a point-to-point Layer 2 connection transported using Multiprotocol Label Switching
(MPLS) or other tunneling technology on the service provider’s network. A Layer 2 circuit is similar to a
circuit cross-connect (CCC), except that multiple virtual circuits (VCs) are transported over a single
shared label-switched path (LSP) tunnel between two provider edge (PE) routers. In contrast, each CCC
requires a separate dedicated LSP.
The Junos OS implementation of Layer 2 circuits supports only the remote form of a Layer 2 circuit; that
is, a connection from a local customer edge (CE) router to a remote CE router. Figure 4 on page 74
illustrates the components of a Layer 2 circuit.
To establish a Layer 2 circuit, the Label Distribution Protocol (LDP) is used as the signaling protocol to
advertise the ingress label to the remote PE routers. For this purpose, a targeted remote LDP neighbor
session is established using the extended discovery mechanism described in LDP, and the session is
brought up to the remote PE loopback IP address. Because LDP looks at the Layer 2 circuit
configuration and initiates extended neighbor discovery for all the Layer 2 circuit neighbors (the remote
PEs), no new configuration is necessary in LDP. Each Layer 2 circuit is represented by the logical
interface connecting the local PE router to the local customer edge (CE) router. Note that LDP must be
enabled on the lo0.0 interface for extended neighbor discovery to function correctly.
Packets are sent to remote CE routers over an egress VPN label advertised by the remote PE router,
using a targeted LDP session. The VPN label is sent over an LDP LSP to the remote PE router connected
to the remote CE router. Return traffic from the remote CE router destined to the local CE router is sent
using an ingress VPN label advertised by the local PE router, which is also sent over the LDP LSP to the
local PE router from the remote PE router.
RELATED DOCUMENTATION
CHAPTER 9
IN THIS CHAPTER
You can configure static Layer 2 circuit pseudowires. Static pseudowires are designed for networks that
do not support LDP or do not have LDP enabled. You configure a static pseudowire by configuring static
values for the in and out labels needed to enable a pseudowire connection. The ignore-mtu-mismatch,
ignore-vlan-id, and ignore-encapsulation-mismatch statements are not relevant for static pseudowire
configurations since the peer router cannot forward this information.
When you configure static pseudowires, you need to manually compare the encapsulation, TDM bit
rate, and control word of the router with the remote peer router and ensure that they match, otherwise
the static pseudowire might not work.
static {
incoming-label label;
outgoing-label label;
send-oam;
}
For a list of hierarchy levels at which you can configure this statement, see the statement summary
section for this statement.
77
You can configure a static pseudowire as a standalone Layer 2 circuit or in conjunction with a redundant
pseudowire. You configure the static pseudowire statement at the [edit protocols l2circuit neighbor
address interface interface-name] hierarchy level. You configure the redundant pseudowire at the [edit
protocols l2circuit neighbor address interface interface-name backup-neighbor neighbor] hierarchy level. If you
configure a static pseudowire to a neighbor and also configure a redundant pseudowire, the redundant
pseudowire must also be static.
You can enable the ability to ping a static pseudowire by configuring the send-oam statement. This
functionality applies to the backup neighbor as well. Once you have configured this statement, you can
ping the static pseudowire by issuing the ping mpls l2circuit command.
For information about how to configure redundant pseudowires, see Configuring Redundant
Pseudowires for Layer 2 Circuits and VPLS.
RELATED DOCUMENTATION
IN THIS SECTION
Enabling Local Interface Switching When the MTU Does Not Match | 79
You can configure a virtual circuit entirely on the local router, terminating the circuit on a local interface.
Possible uses for this feature include being able to enable switching between Frame Relay DLCIs.
local-switching {
interface interface-name {
description text;
end-interface {
interface interface-name;
78
no-revert;
protect-interface interface-name;
}
ignore-mtu-mismatch;
no-revert;
protect-interface interface-name;
}
}
NOTE: ACX Series routers do not support the [edit logical-systems] hierarchy level.
• Starting interface—Include the interface statement at the [edit protocols l2circuit local-switching]
hierarchy level.
• Ending interface—Include the end-interface statement at the [edit protocols l2circuit local-switching
interface interface-name] hierarchy level.
You can also configure virtual circuit interface protection for each local interface:
• Protect interface for the starting interface—Include the protect-interface statement at the [edit
protocols l2circuit local-switching interface interface-name] hierarchy level.
• Protect interface for the ending interface—Include the protect-interface statement at the [edit
protocols l2circuit local-switching interface interface-name end-interface] hierarchy level.
For more information about how to configure protect interfaces, see Configuring the Protect Interface.
Typically, when the primary interface goes down, the pseudowire starts using the protect interface. By
default, when the primary interface comes back online, the interface is switched-over back from the
protect interface to the primary interface. To prevent the switchover back to the primary interface,
unless the primary interface goes down, include the no-revert statement. This prevents loss of traffic
during the switchover.
79
NOTE: If the protect interface fails, the interface is switched-over back to the primary interface,
irrespective of whether or not the no-revert statement is included in the configuration.
You can configure the no-revert statement both for the starting interface and the ending interface.
NOTE: The protect interface must be configured prior to configuring the no-revert statement.
Enabling Local Interface Switching When the MTU Does Not Match
You can configure a local switching interface to ignore the MTU configuration set for the associated
physical interface. This enables you to bring up a circuit between two logical interfaces that are defined
on physical interfaces with different MTU values.
To configure the local switching interface to ignore the MTU configured for the physical interface,
include the ignore-mtu-mismatch statement:
ignore-mtu-mismatch;
NOTE: ACX Series routers do not support the [edit logical-systems] hierarchy level.
80
IN THIS SECTION
The following sections describe how to configure interfaces for Layer 2 circuits:
NOTE: Not all subtasks are supported on all platforms; check the CLI on your device.
All the Layer 2 circuits using a particular remote PE router designated for remote CE routers are listed
under the neighbor statement (“neighbor” designates the PE router). Each neighbor is identified by its IP
address and is usually the end-point destination for the label-switched path (LSP) tunnel transporting
the Layer 2 circuit.
To configure a PE router as a neighbor for a Layer 2 circuit, specify the neighbor address using the
neighbor statement:
neighbor address {
...
}
Each Layer 2 circuit is represented by the logical interfaceencapsulation connecting the local provider
edge (PE) router to the local customer edge (CE) router. This interface is tied to the Layer 2 circuit
neighbor configured in "Configuring the Address for the Neighbor of the Layer 2 Circuit" on page 80.
To configure the interface for a Layer 2 circuit neighbor, include the interface statement:
NOTE: The commit operation fails, if the same logical interface is configured for both Layer 2
circuit and ccc connection.
NOTE: On the EX9200 switches, replace encapsulation-type with the encapsulation statement.
interface interface-name {
bandwidth (bandwidth | ctnumber bandwidth);
community community-name;
(control-word | no-control-word);
description text;
encapsulation-type type;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
mtu mtu-number;
no-revert;
protect-interface interface-name;
pseudowire-status-tlv;
psn-tunnel-endpoint address;
virtual-circuit-id identifier;
}
The following sections describe how to configure the interface for the Layer 2 circuit neighbor:
82
community community-name;
For information about how to configure a routing policy for a Layer 2 circuit, see Configuring Policies for
Layer 2 Circuits.
To emulate the virtual circuit (VC) encapsulation for Layer 2 circuits, a 4-byte control word is added
between the Layer 2 protocol data unit (PDU) being transported and the VC label that is used for
demultiplexing. For most protocols, a null control word consisting of all zeroes is sent between Layer 2
circuit neighbors.
However, individual bits are available in a control word that can carry Layer 2 protocol control
information. The control information is mapped into the control word, which allows the header of a
Layer 2 protocol to be stripped from the frame. The remaining data and control word can be sent over
the Layer 2 circuit, and the frame can be reassembled with the proper control information at the egress
point of the circuit.
The following Layer 2 protocols map Layer 2 control information into special bit fields in the control
word:
• Frame Relay—The control word supports the transport of discard eligible (DE), forward explicit
congestion notification (FECN), and backward explicit congestion notification (BECN) information.
For configuration information, see "Configuring the Control Word for Frame Relay Interfaces" on
page 83.
• ATM AAL5 mode—The control word supports the transport of sequence number processing, ATM
cell loss priority (CLP), and explicit forward congestion indication (EFCI) information. When you
configure an AAL5 mode Layer 2 circuit, the control information is carried by default and no
additional configuration is needed.
83
• ATM cell-relay mode—The control word supports sequence number processing only. When you
configure a cell-relay mode Layer 2 circuit, the sequence number information is carried by default
and no additional configuration is needed.
The Junos OS implementation of sequence number processing for ATM cell-relay mode and AAL5 mode
is not the same as that described in Sec. 3.1.2 of the IETF draft Encapsulation Methods for Transport of
Layer 2 Frames Over IP and MPLS Networks. The differences are as follows:
• A packet that does not have the next incremental sequence number is considered out of sequence.
• When out-of-sequence packets arrive, the sequence number in the Layer 2 circuit control word
increments by one and becomes the expected sequence number for the neighbor.
The following sections discuss how to configure the control word for Layer 2 circuits:
On interfaces with Frame Relay CCC encapsulation, you can configure Frame Relay control bit
translation to support Frame Relay services over IP and MPLS backbones by using CCC, Layer 2 VPNs,
and Layer 2 circuits. When you configure translation of Frame Relay control bits, the bits are mapped
into the Layer 2 circuit control word and preserved across the IP or MPLS backbone.
For information about how to configure the control bits, see the Configuring Frame Relay Control Bit
Translation.
The Junos OS can typically determine whether a neighboring router supports the control word.
However, if you want to explicitly disable its use on a specific interface, include the no-control-word
statement:
no-control-word;
For a list of hierarchy levels at which you can configure this statement, see the statement summary
section for this statement.
Configuring the Encapsulation Type for the Layer 2 Circuit Neighbor Interface
You can specify the Layer 2 circuit encapsulation type for the interface receiving traffic from a Layer 2
circuit neighbor. The encapsulation type is carried in the LDP-signaling messages exchanged between
Layer 2 circuit neighbors when pseudowires are created. The encapsulation type you configure for each
Layer 2 circuit neighbor varies depending on the type of networking equipment or the type of Layer 2
84
protocol you have deployed in your network. If you do not specify an encapsulation type for the Layer 2
circuit, the encapsulation of the CE device interface is used by default.
Specify the encapsulation type for the Layer 2 circuit neighbor interface by including the encapsulation-
type statement:
Enabling the Layer 2 Circuit When the Encapsulation Does Not Match
You can configure the Junos OS to allow a Layer 2 circuit to be established even though the
encapsulation configured on the CE device interface does not match the encapsulation configured on
the Layer 2 circuit interface by including the ignore-encapsulation-mismatch statement. You can configure
the ignore-encapsulation-mismatch statement for the connection to the remote connection by including the
statement at the [edit protocols l2circuit neighbor address interface interface-name] hierarchy level or for
the local connection by including this statement at the [edit protocols l2circuit local-switching interface
interface-name] hierarchy level.
ignore-encapsulation-mismatch;
For a list of hierarchy levels at which you can include this statement, see the statement summary section
for this statement.
By default, the MTU used to advertise a Layer 2 circuit is determined by taking the interface MTU for
the associated physical interface and subtracting the encapsulation overhead for sending IP packets
based on the encapsulation.
However, encapsulations that support multiple logical interfaces (and multiple Layer 2 circuits) rely on
the same interface MTU (since they are all associated with the same physical interface). This can prove
to be a limitation for VLAN Layer 2 circuits using the same Ethernet interface or for Layer 2 circuit
DLCIs using the same Frame Relay interface.
85
This can also affect multivendor environments. For example, if you have three PE devices supplied by
different vendors and one of the devices only supports an MTU of 1500, even if the other devices
support larger MTUs you must to configure the MTU as 1500 (the smallest MTU of the three PE
devices).
You can explicitly configure which MTU is advertised for a Layer 2 circuit, even if the Layer 2 circuit is
sharing a physical interface with other Layer 2 circuits. When you explicitly configure an MTU for a
Layer 2 circuit, be aware of the following:
• An explicitly configured MTU is signaled to the remote PE device. The configured MTU is also
compared to the MTU received from the remote PE device. If there is a conflict, the Layer 2 circuit is
taken down.
• If you configure an MTU for an ATM cell relay interface on an ATM II PIC, the configured MTU is
used to compute the cell bundle size advertised for that Layer 2 circuit, instead of the default
interface MTU.
• A configured MTU is used only in the control plane. It is not enforced in the data plane. You need to
ensure that the CE device for a given Layer 2 circuit uses the correct MTU for data transmission.
To configure the MTU for a Layer 2 circuit, include the mtu statement at the [edit protocols l2circuit
neighbor address interface interface-name] hierarchy level.
mtu mtu-number;
Enabling the Layer 2 Circuit When the MTU Does Not Match
You can configure the Junos OS to allow a Layer 2 circuit to be established even though the MTU
configured on the PE router does not match the MTU configured on the remote PE router by including
the ignore-mtu-mismatch statement at the [edit protocols l2circuit neighbor address interface interface-name]
hierarchy level.
You can configure a protect interface for the logical interface linking a virtual circuit to its destination,
whether the destination is remote or local. A protect interface provides a backup for the protected
interface in case of failure. Network traffic uses the primary interface only so long as the primary
interface functions. If the primary interface fails, traffic is switched to the protect interface. The protect
interface is optional.
86
protect-interface interface-name;
NOTE: The protect interface must be configured prior to configuring the no-revert statement.
For a list of hierarchy levels at which you can include this statement, see the statement summary section
for this statement.
For an example of how to configure a protect interface for a Layer 2 circuit, see Example: Configuring
Layer 2 Circuit Protect Interfaces.
Configuring the Protect Interface From Switching Over to the Primary Interface
Typically, when the primary interface goes down, the pseudowire starts using the protect interface. By
default, when the primary interface comes back online, the interface is switched-over back from the
protect interface to the primary interface. To prevent the switchover back to the primary interface,
unless the protect interface goes down, include the no-revert statement. This prevents loss of traffic
during the switchover.
NOTE: If the protect interface fails, the interface is switched-over back to the primary interface,
irrespective of whether or not the no-revert statement is included in the configuration.
You can configure the no-revert statement at the [edit protocols l2circuit neighbor address interface
interface-name] hierarchy level:
The pseudowire status type length variable (TLV) is used to communicate the status of a pseudowire
back and forth between two PE routers. For Layer 2 circuit configurations, you can configure the PE
router to negotiate the pseudowire with its neighbor using the pseudowire status TLV. This same
functionality is also available for LDP VPLS neighbor configurations. The pseudowire status TLV is
configurable for each pseudowire connection and is disabled by default. The pseudowire status
87
negotiation process assures that a PE router reverts back to the label withdraw method for pseudowire
status if its remote PE router neighbor does not support the pseudowire status TLV.
Unlike the control word, a PE router’s ability to support the pseudowire status TLV is communicated
when the initial label mapping message is sent to its remote PE router. Once the PE router transmits its
support for the pseudowire status TLV to its remote PE router, it includes the pseudowire status TLV in
every label mapping message sent to the remote PE router. If you disable support for the pseudowire
status TLV on the PE router, a label withdraw message is sent to the remote PE router and then a new
label mapping message without the pseudowire status TLV follows.
To configure the pseudowire status TLV for the pseudowire to the neighbor PE router, include the
pseudowire-status-tlv statement:
pseudowire-status-tlv;
For a list of the hierarchy levels at which you can include this statement, see the statement summary
section for this statement.
You can configure two Layer 2 circuits between the same two routers, and have one Layer 2 circuit
traverse an RSVP LSP and the other traverse an LDP LSP. To accomplish this, you need to configure two
loopback addresses on the local router. You configure one of the loopback address for the Layer 2 circuit
traversing the RSVP LSP. You configure the other loopback address to handle the Layer 2 circuit
traversing the LDP LSP. For information about how to configure multiple loop back interfaces, see
Configuring Logical Units on the Loopback Interface for Routing Instances in Layer 3 VPNs.
You also need to configure a packet switched network (PSN) tunnel endpoint for one of the Layer 2
circuits. It can be either the Layer 2 circuit traversing the RSVP LSP or the one traversing the LDP LSP.
The PSN tunnel endpoint address is the destination address for the LSP on the remote router.
To configure the address for the PSN tunnel endpoint, include the psn-tunnel-endpoint statement:
psn-tunnel-endpoint address;
By default, the PSN tunnel endpoint for a Layer 2 circuit is identical to the neighbor address, which is
also the same as the LDP neighbor address.
88
The tunnel endpoints on the remote router do not need to be loopback addresses.
The following example illustrates how you might configure a PSN tunnel endpoint:
The Layer 2 circuit configured for the t1-0/2/2.0 interface resolves in the inet3 routing table to 192.0.2.0.
This could be either an RSVP route or a static route with an LSP next hop.
You configure a virtual circuit ID on each interface. Each virtual circuit ID uniquely identifies the Layer 2
circuit among all the Layer 2 circuits to a specific neighbor. The key to identifying a particular Layer 2
circuit on a PE router is the neighbor address and the virtual circuit ID. An LDP-FEC-to-label binding is
associated with a Layer 2 circuit based on the virtual circuit ID in the FEC and the neighbor that sent
this binding. The LDP-FEC-to-label binding enables the dissemination of the VPN label used for sending
traffic on that Layer 2 circuit to the remote CE device.
You also configure a virtual circuit ID for each redundant pseudowire. A redundant pseudowire is
identified by the backup neighbor address and the virtual circuit ID. For more information, see
Configuring Pseudowire Redundancy on the PE Router.
virtual-circuit-id identifier;
For a list of hierarchy levels at which you can include this statement, see the statement summary section
for this statement.
89
The Layer 2 encapsulation type is carried in the LDP forwarding equivalence class (FEC). You can
configure either circuit cross-connect (CCC) or translational cross-connect (TCC) encapsulation types for
Layer 2 circuits. For more information, see the MPLS Applications User Guide and Junos OS Network
Interfaces Library for Routing Devices.
NOTE: Some platform and FPC combinations can not pass TCC encapsulated ISO traffic. See
Platforms/FPCs That Cannot Forward TCC Encapsulated ISO Traffic for details.
To configure the interface encapsulation for a Layer 2 circuit, include the encapsulation statement:
encapsulation encapsulation;
You can configure Asynchronous Transfer Mode 2 (ATM2) intelligent queuing (IQ) interfaces for Layer 2
circuits by using Layer 2 circuit ATM Adaptation Layer 5 (AAL5) transport mode, Layer 2 circuit ATM cell
relay mode, and the Layer 2 circuit ATM trunk mode.
• atm-l2circuit-mode aal5
• atm-l2circuit-mode cell
• atm-l2circuit-mode trunk
For more information about these statements, see the Junos OS Administration Library. For more
information about how to configure ATM2 IQ interfaces, see theJunos OS Network Interfaces Library
for Routing Devices.
The Junos OS implementation of sequence number processing for Layer 2 circuit ATM cell relay mode
and Layer 2 circuit AAL5 mode differs from that described in the Internet draft draft-martini-l2circuit-
encap-mpls-11.txt, Encapsulation Methods for Transport of Layer 2 Frames over MPLS Networks
(expires August 2006).
90
2. A packet that does not have the next incremental sequence number is considered out of sequence.
When out-of-sequence packets arrive, the expected sequence number for the neighbor is set to the
sequence number in the Layer 2 circuit control word.
IN THIS SECTION
You can configure Junos routing policies to control the flow of packets over Layer 2 circuits. This
capability allows you to provide different level of service over a set of equal-cost Layer 2 circuits. For
example, you can configure a circuit for high-priority traffic, a circuit for average-priority traffic, and a
circuit for low-priority traffic. By configuring Layer 2 circuit policies, you can ensure that higher-value
traffic has a greater likelihood of reaching its destination.
community community-name {
members [ community-ids ];
}
• [edit policy-options]
as-number:community-value
community-value is the identifier of the community member. It can be a number from 0 through 65,535.
type:administrator:assigned-number
type is the type of target community. The target community identifies the route’s destination.
administrator is either an AS number or an IP version 4 (IPv4) address prefix, depending on the type of
community.
You also need to configure the community for the Layer 2 circuit interface; see Configuring a
Community for the Layer 2 Circuit.
To configure a policy to send community traffic over a specific LSP, include the policy-statement
statement:
policy-statement policy-name {
term term-name {
from community community-name;
then {
install-nexthop (except | lsp lsp-name | lsp-regex lsp-regular-expression);
accept;
}
}
}
• [edit policy-options]
To prevent the installation of any matching next hops, include the install-nexthop statement with the
except option:
install-nexthop except;
To assign traffic from a community to a specific LSP, include the install-nexthop statement with the lsp
lsp-name option and the accept statement:
You can also use a regular expression to select an LSP from a set of similarly named LSPs for the install-
nexthop statement. To configure a regular expression, include the install-nexthop statement with the lsp-
regex option and the accept statement:
The following example illustrates how you might configure a regular expression in a Layer 2 circuit
policy. You create three LSPs to handle gold-tier traffic from a Layer 2 circuit. The LSPs are named alpha-
gold, beta-gold, and delta-gold. You then include the install-nexthop statement with the lsp-regex option with
93
the LSP regular expression .*-gold at the [edit policy-options policy-statement policy-name term term-name
then] hierarchy level:
[edit policy-options]
policy-statement gold-traffic {
term to-gold-LSPs {
from community gold;
then {
install-nexthop lsp-regex .*-gold;
accept;
}
}
}
The community gold Layer 2 circuits can now use any of the -gold LSPs. Given equal utilization across the
three -gold LSPs, LSP selection is made at random.
You need to apply the policy to the forwarding table. To apply a policy to the forwarding table, configure
the export statement at the [edit routing-options forwarding-table] hierarchy level:
To verify that you have configured a policy for the Layer 2 circuit, issue the show route table mpls detail
command. It should display the community for ingress routes that corresponds to the Layer 2 circuits, as
shown by the following example:
For more information about how to configure routing policies, see Routing Policies, Firewall Filters, and
Traffic Policers User Guide.
Use LDP as the signaling protocol to advertise ingress labels to the remote PE routers. When configured,
LDP examines the Layer 2 circuit configuration and initiates extended neighbor discovery for all the
Layer 2 circuit neighbors (for example, remote PEs). This process is similar to how LDP works when
tunneled over RSVP. You must run LDP on the lo0.0 interface for extended neighbor discovery to
function correctly.
For detailed information about how to configure LDP, see the MPLS Applications User Guide.
95
CHAPTER 10
IN THIS CHAPTER
An egress protection LSP provides link protection for link between PE routers and CE devices as
illustrated in Figure 5 on page 96.
Device CE1 is multihomed to router PE1 and router PE2. Device CE2 is multihomed to router PE3 and
router PE4. There are two paths connecting devices CE1 and CE2. The working path is CE2-PE3-P1-
PE1-CE1, using pseudowire PW1. The protecting path is CE2-PE4-P2-PE2-CE1, using pseudowire PW2.
Normally, traffic flows through the working path. When the end-to-end OAM between devices CE1 and
97
CE2 detects a failure on the working path, traffic will be switched from the working path to the
protecting path.
In the topology shown in Figure 5 on page 96, if there was a link or node failure in the core network (for
example, a link failure from router P1 to PE1, from router PE3 to P1, or a node failure of router P1),
MPLS fast reroute can be triggered on the transport LSPs between router PE3 and router PE1 to repair
the connection within tens of milliseconds. Egress protection LSPs address the problem of when a link
failure occurs at the edge of the network (for example, a link failure on router PE1 to device CE1).
An egress protection LSP has been configured from router PE1 to router PE2. In the event of a link
failure between router PE1 and device CE1, traffic can be switched to the egress protection LSP. Traffic
from device CE2 can now be routed through path PE3-P1-PE1-PE2 to reach device CE1.
IN THIS SECTION
Requirements | 97
Overview | 98
Configuration | 99
Unlike Layer 2 circuit protect interfaces (see Example: Configuring Layer 2 Circuit Protect Interfaces),
which provide traffic protection for paths configured between the PE routers and CE routers, Layer 2
circuit switching protection provides traffic protection for the paths configured between the PE routers.
In the event the path used by a Layer 2 circuit fails, traffic can be switched to an alternate path (or
protection path). Switching protection is supported for locally switched Layer 2 circuits and provides 1
to 1 protection for each Layer 2 circuit interface.
When you enable Layer 2 circuit switching protection, each Layer 2 circuit interface requires the
following paths:
• Protection path—Used by the Layer 2 circuit when the working path fails.
Requirements
This example uses the following hardware and software components:
98
Overview
IN THIS SECTION
Topology | 98
Each working path can be configured to have a either a protection path routed directly to the
neighboring PE router (as shown in Figure 6 on page 98) or indirectly using a pseudowire configured
through an intermediate PE router (as shown in Figure 7 on page 99 and Figure 8 on page 99). The
protection path provides failure protection for the traffic flowing between the PE routers. Ethernet
OAM monitors the status of these paths. When OAM detects a failure, it reroutes the traffic from the
failed working path to the protection path. You can configure OAM to revert the traffic automatically to
the working path when it is restored. You can also manually switch traffic between the working path, the
protection path, and back.
NOTE: Non-stop routing (NSR) and graceful routing engine switchover (GRES) do not support
Layer 2 circuit switching protection.
Topology
Figure 6 on page 98 illustrates Layer 2 circuit local switching. There are two OAM sessions running
between Router PE1 and Router PE2. One OAM session is configured over the working path and the
other is configured over the protection path.
Figure 6: Connection Protection Enabled Between Router PE1 and Router PE2
In Figure 7 on page 99 and Figure 8 on page 99, there are two OAM sessions running between Router
PE1 and Router PE2. For Figure 2, one OAM session is configured over the working path between
99
Router PE1 and Router PE2. The other OAM session is configured over the protection path between
Router PE1 and Router PE3 to Router PE2.
Figure 7: Connection Protection Using a Pseudowire Configured through Router PE3 as the Protection
Path
For Figure 8 on page 99, one OAM session is configured over the working path, the pseudowire
between Router PE1 and Router PE3, then to Router PE2. The other OAM session is configured on the
protect path between Router PE1 and Router PE2.
Figure 8: Connection Protection Using a Pseudowire Configured through Router PE3 as the Working
Path
Configuration
IN THIS SECTION
Configuring Connection Protection Using Another PE Router for the Protection Path | 105
Configuring Connection Protection Using an Another PE Router for the Working Path | 111
The following sections describe how to configure each of the variations of Layer 2 circuit connection
protection:
Step-by-Step Procedure
To configure Layer 2 Circuit switching protection as shown in Figure 6 on page 98 on Router PE1:
[edit policy-options]
user@PE1# set policy-statement protection-policy then load-balance per-packet
[edit routing-options]
user@PE1# set forwarding-table export protection-policy
4. Configure OAM on Router PE1. OAM is used to monitor the working path between Router PE1 and
Router PE2. In the event of a failure on the working path, traffic is switched automatically to the
101
protection path. A connectivity fault management (CFM) session is configured on the working path
and on the protection path. Begin by configuring the OAM maintenance domain.
Results
From configuration mode on Router PE1, confirm your configuration by entering the show protocols
l2circuit, show policy-options, show routing-options, and show protocols oam ethernet commands. If
the output does not display the intended configuration, repeat the configuration instructions in this
example to correct it.
interface ge-2/0/1.0;
backup-interface ge-2/0/1.1;
}
}
}
remote-mep 104;
}
}
}
}
From configuration mode on Router PE2, confirm your configuration by entering the show protocols
oam ethernet commands. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
connectivity-fault-management {
maintenance-domain l2circuit-example-md {
level 5;
maintenance-association working {
continuity-check {
interval 100ms;
}
mep 103 {
interface ge-2/0/1.0 working;
direction down;
remote-mep 1000;
}
}
maintenance-association protection {
continuity-check {
interval 100ms;
}
mep 104 {
interface ge-2/0/1.1 protect;
direction down;
remote-mep 1001;
}
}
}
}
Purpose
Verify that the CFM connections are active on each of the PE routers.
105
Action
Configuring Connection Protection Using Another PE Router for the Protection Path
Step-by-Step Procedure
To configure Layer 2 Circuit switching protection as shown in Figure 7 on page 99 on Router PE1:
[edit policy-options]
user@PE1# set policy-statement load-balance then load-balance per-packet
user@PE1# set policy-statement protection-policy term protect from community example
user@PE1# set policy-statement protection-policy term protect then install-nexthop lsp-regex
lsp-protect-*
[edit routing-options]
user@PE1# set forwarding-table export load-balance
4. Configure OAM on Router PE1 to setup the maintenance domain. OAM is used to monitor the
working path between Router PE1 and Router PE2. In the event of a failure on the working path,
traffic is switched automatically to the protection path.
Results
From configuration mode on Router PE1, confirm your configuration by entering the show protocols
l2circuit, show policy-options, show routing-options, and show protocols oam ethernet commands. If
the output does not display the intended configuration, repeat the configuration instructions in this
example to correct it.
export load-balance;
}
From configuration mode on Router PE2, confirm your configuration by entering the show protocols
oam ethernet commands. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
connectivity-fault-management {
maintenance-domain l2circuit-example-md {
level 5;
maintenance-association working {
mep 103 {
interface ge-2/0/1.0;
direction down;
remote-mep 1000;
}
}
maintenance-association protection {
mep 104 {
interface ge-2/0/0.0;
110
direction down;
remote-mep 1001;
}
}
}
}
Purpose
Verify that the CFM connections are active on each of the PE routers.
Action
Configuring Connection Protection Using an Another PE Router for the Working Path
Step-by-Step Procedure
To configure Layer 2 Circuit switching protection as shown in Figure 8 on page 99 on Router PE1:
[edit policy-options]
user@PE1# set policy-statement load-balance then load-balance per-packet
user@PE1# set policy-statement protection-policy term protect from community example
user@PE1# set policy-statement protection-policy term protect then install-nexthop lsp-regex
lsp-primary
[edit routing-options]
user@PE1# set forwarding-table export load-balance
112
4. Configure OAM on Router PE1 to setup the maintenance domain. OAM is used to monitor the
working path between Router PE1 and Router PE2. In the event of a failure on the working path,
traffic is switched automatically to the protection path.
Results
From configuration mode on Router PE1, confirm your configuration by entering the show protocols
l2circuit, show policy-options, show routing-options, and show protocols oam ethernet commands. If
the output does not display the intended configuration, repeat the configuration instructions in this
example to correct it.
}
policy-statement protection-policy {
term protect {
from community example;
then {
install-nexthop lsp-regex lsp-primary;
}
}
}
From configuration mode on Router PE2, confirm your configuration by entering the show protocols
oam ethernet commands. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
connectivity-fault-management {
maintenance-domain l2circuit-example-md {
level 5;
maintenance-association working {
mep 103 {
interface ge-2/0/0.0;
direction down;
remote-mep 1000;
}
}
maintenance-association protection {
mep 104 {
interface ge-2/0/1.0;
direction down;
remote-mep 1001;
}
}
}
}
Purpose
Verify that the CFM connections are active on each of the PE routers.
Action
RELATED DOCUMENTATION
CHAPTER 11
IN THIS CHAPTER
Bidirectional Forwarding Detection (BFD) support for virtual circuit connection verification (VCCV)
allows you to configure a control channel for a pseudowire, in addition to the corresponding operations
and management functions to be used over that control channel. BFD provides a low resource
mechanism for the continuous monitoring of the pseudowire data path and for detecting data plane
failures. This feature provides support for asynchronous mode BFD for VCCV as described in RFC 5885,
Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification
(VCCV). You can also use a ping to detect pseudowire failures. However, the processing resources
required for a ping are greater than what is needed for BFD. In addition, BFD is capable of detecting
data plane failure faster than VCCV ping. BFD for pseudowires is supported for Layer 2 circuits (LDP-
based).
1. Specify the threshold for the adaptation of the BFD session detection time.
For example, to set a detection time threshold of 40 milliseconds for OAM BFD liveness detection:
For example, to set the virtual circuit ID as 1 for OAM BFD liveness detection:
3. Configure the minimum interval after which the local routing device transmits hello packets and then
expects to receive a reply from a neighbor with which it has established a BFD session for the Layer
2 circuit.
For example, to set a minimum interval of 300 milliseconds for OAM BFD liveness detection:
4. Configure the minimum interval after which the local routing device must receive a reply from a
neighbor with which it has established a BFD session for the Layer 2 circuit protocol.
For example, to set a minimum receive interval of 10 milliseconds for OAM BFD liveness detection:
5. Configure the number of hello packets not received by a neighbor that causes the originating
interface to be declared down for the Layer 2 circuit protocol.
For example, to set the multiplier as 3 for OAM BFD liveness detection:
7. Configure the minimum interval at which the local routing device transmits hello packets to a
neighbor with which it has established a BFD session.
For example, to set a minimum transmit interval of 5 milliseconds for OAM BFD liveness detection:
8. Specify the threshold for the adaptation of the BFD session transmit interval.
For example, to set a transmit interval threshold of 30 milliseconds for OAM BFD liveness detection:
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 120
Overview | 121
Configuration | 122
Verification | 128
This example shows how to configure BFD for VCCV for Layer 2 circuits which enables faster detection
of failure in the data path.
Requirements
This example uses the following hardware and software components:
Overview
IN THIS SECTION
Topology | 121
Starting with Junos OS Release 12.1, Bidirectional Forwarding Detection (BFD) support for virtual circuit
connection verification (VCCV) allows you to configure a control channel for a pseudowire, in addition to
the corresponding operations and management functions to be used over that control channel. BFD
provides a low resource mechanism for the continuous monitoring of the pseudowire data path and for
detecting data plane failures. This feature provides support for asynchronous mode BFD for VCCV as
described in RFC 5885, Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit
Connectivity Verification (VCCV). You can also use a ping to detect pseudowire failures. However, the
processing resources required for a ping are greater than what is needed for BFD. In addition, BFD is
capable of detecting data plane failure faster than VCCV ping. BFD for pseudowires is supported for
Layer 2 circuits (LDP-based).
To configure BFD for VCCV for Layer 2 circuits, configure the oam configuration statement at the [edit
protocols l2circuit neighbor address interface interface-name] hierarchy level. The control-channel
configuration statement at the [edit routing-instances routing-instance-name protocols l2vpn oam] hierarchy
level does not apply to Layer 2 circuit configurations.
Topology
In the topology, BFD for VCCV for Layer 2 circuits is configured on Device R0.
122
Configuration
IN THIS SECTION
Results | 126
To quickly configure this example, copy the following commands, paste them into a text file, remove any
line breaks, change any details necessary to match your network configuration, copy and paste the
commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
R0
multiplier 3
set protocols l2circuit neighbor 203.0.113.0 interface ge-1/1/9.0 oam bfd-liveness-detection
transmit-interval minimum-interval 5
set protocols l2circuit neighbor 203.0.113.0 interface ge-1/1/9.0 oam bfd-liveness-detection
transmit-interval threshold 30
set protocols l2circuit neighbor 203.0.113.0 interface ge-1/1/9.0 oam bfd-liveness-detection
detection-time threshold 40
R1
Configuring Device R0
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For
information about navigating the CLI, see Using the CLI Editor in Configuration Mode in the CLI User
Guide.
NOTE: Repeat this procedure for Device R1 after modifying the appropriate interface names,
addresses, and any other parameters for the device.
[edit chassis]
user@R0# set redundancy graceful-switchover
[edit interfaces]
user@R0# set ge-1/1/9 vlan-tagging
user@R0# set ge-1/1/9 encapsulation vlan-ccc
user@R0# set ge-1/1/9 unit 0 encapsulation vlan-ccc
user@R0# set ge-1/1/9 unit 0 vlan-id 512
user@R0# set ge-2/0/0 unit 0 family inet address 192.0.2.1/24
user@R0# set ge-2/0/0 unit 0 family mpls
user@R0# set lo0 unit 0 family inet address 198.51.100.0/24
3. Configure the nonstop routing option, the static route, and the router ID routing options.
[edit routing-options]
user@R0# set nonstop-routing
user@R0# set static route 203.0.113.0/24 next-hop 192.0.2.2
user@R0# set router-id 198.51.100.0
125
8. Configure the virtual circuit ID for the neighbor of Layer 2 circuit protocols.
Results
From configuration mode, confirm your configuration by entering the show chassis, show interfaces, show
protocols, and show routing-options commands. If the output does not display the intended configuration,
repeat the instructions in this example to correct the configuration.
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
IN THIS SECTION
Purpose
Action
From operational mode, run the show l2circuit connections command for Device R0.
Meaning
The output shows the Layer 2 virtual circuit information from Device R0 to its neighbor.
Purpose
Action
From operational mode, run the show bfd session command for Device R0.
Detect Transmit
Address State Interface Time Interval Multiplier
1 sessions, 1 clients
Cumulative transmit rate 100.0 pps, cumulative receive rate 100.0 pps
Meaning
The output shows the address, and the interface on which the BFD session is active. The state Up
indicates that the BFD session is up. The BFD session has a time interval of 30 milliseconds to detect
BFD control packets , the transmitting system has a time interval of 10 milliseconds to send BFD control
packets, and the transmitting system determines the detection time by multiplying 3 with the time
interval. Total number of active BFD sessions and total number of clients that are hosting active BFD
sessions. Cumulative transmit rate indicates the total number of BFD control packets transmitted, per
second, on all active sessions and cumulative receive rate indicates the total number of BFD control
packets received, per second, on all active sessions.
Purpose
Action
From operational mode, run the show bfd session extensive command for Device R0.
Detect Transmit
131
1 sessions, 1 clients
Cumulative transmit rate 100.0 pps, cumulative receive rate 100.0 pps
Meaning
RELATED DOCUMENTATION
CHAPTER 12
IN THIS CHAPTER
To trace the creation of and changes to Layer 2 circuits, include the traceoptions statement:
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Specify the following flags to trace the indicated operations on Layer 2 circuits:
• error—Error conditions
CHAPTER 13
IN THIS CHAPTER
aggregate-label | 135
backup-neighbor | 136
instance-type | 144
no-forwarding | 149
proxy-generate | 151
route-distinguisher | 156
route-distinguisher-id | 159
route-target-filter | 161
switchover-delay | 163
unicast-reverse-path | 164
vpn-apply-export | 166
vrf-export | 167
vrf-import | 169
vrf-mtu-check | 171
vrf-target | 172
135
aggregate-label
IN THIS SECTION
Syntax | 135
Description | 135
Options | 136
Syntax
aggregate-label {
community community-name;
}
Hierarchy Level
Description
Specify matching criteria (in the form of a community) such that all routes which match are assigned the
same VPN label, selected from one of the several routes in the set defined by this criteria. This reduces
the number of VPN labels that the router must consider, and aggregates the received labels.
136
Options
community community-name—Specify the name of the community to which to apply the aggregate label.
Release Information
RELATED DOCUMENTATION
backup-neighbor
IN THIS SECTION
Syntax | 136
Description | 137
Options | 137
Syntax
backup-neighbor address {
community name;
mtu number;
137
hot-standby;
psn-tunnel-endpoint address;
standby;
static;
virtual-circuit-id number;
}
Hierarchy Level
Description
Configure pseudowire redundancy for Layer 2 circuits and VPLS. A redundant pseudowire can act as a
backup connection and can be configured between a PE router and a CE device or between PE routers,
maintaining Layer 2 circuit and VPLS services after certain types of failures. This feature can help
improve the reliability of certain types of networks where a single point of failure could interrupt service
for customers.
NOTE: VPLS is not supported on ACX Series routers. The psn-tunnel-endpoint statement is not
supported at the [edit protocols l2circuit local-switching interface interface-name end-interface
interface interface-name] hierarchy level.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 138
Description | 139
Syntax
description text;
139
Hierarchy Level
Description
Provide a text description for the routing instance. If the text includes one or more spaces, enclose it in
quotation marks (" "). Any descriptive text you include is displayed in the output of the show route instance
detail command and has no effect on the operation of the routing instance.
Release Information
family route-target
IN THIS SECTION
Syntax | 140
Description | 140
Options | 140
Syntax
family route-target {
advertise-default;
external-paths number;
prefix-limit number;
proxy-generate <route-target-policy route-target-policy-name>;
}
Hierarchy Level
Description
The family route-target statement is useful for filtering VPN routes before they are sent. Provider edge
(PE) routers inform the route reflector (RR) which routes to send, using family route-target to provide the
route-target-interest information. The RR then sends to the PE router only the advertisements
containing the specified route target.
Options
advertise-default—Cause the router to advertise the default route target route (0:0:0/0) and suppress all
routes that are more specific. This can be used by a route reflector on BGP groups consisting of
neighbors that act as provider edge (PE) routers only. PE routers often need to advertise all routes to the
route reflector. Suppressing all route target advertisements other than the default route reduces the
amount of information exchanged between the route reflector and the PE routers. The Junos OS further
helps to reduce route target advertisement overhead by not maintaining dependency information unless
a nondefault route is received.
external-paths number—Cause the router to advertise the VPN routes that reference a given route target.
The number you specify with the external-paths statement determines the number of external peer
routers (currently advertising that route target) that receive the VPN routes. The default value is 1.
prefix-limit number—The number of prefixes that can be received from a peer router.
141
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 142
Description | 142
Default | 143
Options | 143
Syntax
graceful-restart {
disable;
helper-disable;
maximum-helper-recovery-time seconds;
maximum-helper-restart-time seconds;
notify-duration seconds;
recovery-time seconds;
restart-duration seconds;
stale-routes-time seconds;
}
Hierarchy Level
Description
You configure the graceful restart routing option globally to enable the feature, but not to enable
graceful restart for all routing protocols in a routing instance. To enable graceful restart globally, include
the graceful-restart statement under the [edit routing options] hierarchy level. This enables graceful
restart globally for all routing protocols. You can, optionally, modify the global settings at the individual
protocol level.
NOTE:
• For VPNs, the graceful-restart statement allows a router whose VPN control plane is
undergoing a restart to continue to forward traffic while recovering its state from neighboring
routers.
• For BGP, if you configure graceful restart after a BGP session has been established, the BGP
session restarts and the peers negotiate graceful restart capabilities.
143
Default
Options
Release Information
RELATED DOCUMENTATION
instance-type
IN THIS SECTION
Syntax | 144
Description | 144
Options | 144
Syntax
instance-type type;
Hierarchy Level
Description
Options
NOTE: On ACX Series routers, you can configure only the forwarding, virtual router, and VRF
routing instances.
• evpn—(MX 3D Series routers, QFX switches and EX9200 switches)—Enable an Ethernet VPN (EVPN)
on the routing instance.
hierarchy level.
• evpn-vpws—Enable an Ethernet VPN (EVPN) Virtual Private Wire Service (VPWS) on the routing
instance.
• forwarding—Provide support for filter-based forwarding, where interfaces are not associated with
instances. All interfaces belong to the default instance. Other instances are used for populating RPD
learned routes. For this instance type, there is no one-to-one mapping between an interface and a
routing instance. All interfaces belong to the default instance inet.0.
• l2backhaul-vpn—Provide support for Layer 2 wholesale VLAN packets with no existing corresponding
logical interface. When using this instance, the router learns both the outer tag and inner tag of the
incoming packets, when the instance-role statement is defined as access, or the outer VLAN tag only,
when the instance-role statement is defined as nni.
• l2vpn—Enable a Layer 2 VPN on the routing instance. You must configure the interface, route-
distinguisher, vrf-import, and vrf-export statements for this type of routing instance.
• layer2-control—(MX Series routers only) Provide support for RSTP or MSTP in customer edge
interfaces of a VPLS routing instance. This instance type cannot be used if the customer edge
interface is multihomed to two provider edge interfaces. If the customer edge interface is
multihomed to two provider edge interfaces, use the default BPDU tunneling.
• mac-vrf—(MX Series and vMX routers; QFX5100, QFX5110, QFX5120, QFX5130-32CD, QFX5200,
QFX10002 (including QFX10002-60C), QFX10008, and QFX10016 switches; EX9200 Series
switches only) Use this routing instance type to configure multiple customer-specific EVPN instances
(EVIs) of type mac-vrf, each of which can support a different EVPN service type. This configuration
results in customer-specific virtual routing and forwarding (VRF) tables with MAC addresses on each
Juniper Networks device that serves as a virtual tunnel endpoint (VTEP) in the EVPN-VXLAN
network. This type of routing instance is for EVPN unicast routes only.
• mpls-forwarding—(MX Series routers only) Allow filtering and translation of route distinguisher (RD)
values in IPv4 and IPv6 VPN address families on both routes received and routes sent for selected
BGP sessions. In particular, for Inter-AS VPN Option-B networks, this option can prevent the
malicious injection of VPN labels from one peer AS boundary router to another.
• mpls-internet-multicast—(EX Series, M Series, MX Series, and T Series routers only) Provide support for
ingress replication provider tunnels to carry IP multicast data between routers through an MPLS
cloud, using MBGP or next-generation MVPN.
• no-forwarding—This is the default routing instance. Do not create a corresponding forwarding instance.
Use this routing instance type when a separation of routing table information is required. There is no
146
corresponding forwarding table. All routes are installed into the default forwarding table. IS-IS
instances are strictly nonforwarding instance types.
• virtual-router—Enable a virtual router routing instance. This instance type is similar to a VPN routing
and forwarding instance type, but used for non-VPN-related applications. You must configure the
interface statement for this type of routing instance. You do not need to configure the route-
distinguisher, vrf-import, and vrf-export statements.
• virtual-switch—(MX Series routers, EX9200 switches, and QFX switches only) Provide support for
Layer 2 bridging. Use this routing instance type to isolate a LAN segment with its Spanning Tree
Protocol (STP) instance and to separate its VLAN identifier space.
• vpls—Enable VPLS on the routing instance. Use this routing instance type for point-to-multipoint
LAN implementations between a set of sites in a VPN. You must configure the interface, route-
distinguisher, vrf-import, and vrf-export statements for this type of routing instance.
• vrf—VPN routing and forwarding (VRF) instance. Provides support for Layer 3 VPNs, where interface
routes for each instance go into the corresponding forwarding table only. Required to create a
Layer 3 VPN. Create a VRF table (instance-name.inet.0) that contains the routes originating from and
destined for a particular Layer 3 VPN. For this instance type, there is a one-to-one mapping between
an interface and a routing instance. Each VRF instance corresponds with a forwarding table. Routes
on an interface go into the corresponding forwarding table. You must configure the interface, route-
distinguisher, vrf-import, and vrf-export statements for this type of routing instance.
Release Information
mpls-internet-multicast option introduced in Junos OS Release 11.1 for the EX Series, M Series, MX Series,
and T Series.
evpn option introduced in Junos OS Release 17.3 for the QFX Series.
forwarding option introduced in Junos OS Release 14.2 for the PTX Series.
mac-vrf option introduced in Junos OS Release 20.4 for MX Series and vMX routers; QFX5100,
QFX5110, QFX5120, QFX5200, QFX10002 (including QFX10002-60C), QFX10008, QFX10016, and
EX9200 Series switches. Also introduced in Junos OS Evolved Release 21.2R1 on QFX5130-32CD
switches.
Support for logical systems on MX Series routers added in Junos OS Release 17.4R1.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 148
Description | 148
Options | 148
Syntax
interface interface-name {
description text;
}
Hierarchy Level
Description
Specify the interface over which the VPN traffic travels between the PE device and CE device. You
configure the interface on the PE device. If the value vrf is specified for the instance-type statement
included in the routing instance configuration, this statement is required.
Options
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
RELATED DOCUMENTATION
no-forwarding
IN THIS SECTION
Syntax | 149
Description | 149
Default | 150
Syntax
no-forwarding;
Hierarchy Level
Description
Do not add ingress routes to the inet.0 routing table even if traffic-engineering bgp-igp (configured at the
[edit protocols mpls] hierarchy level) is enabled.
150
Default
The no-forwarding statement is disabled. Ingress routes are added to the inet.0 routing table instead of the
inet.3 routing table when traffic-engineering bgp-igp is enabled.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 150
Description | 151
Syntax
vpn vpn-name {
ike-gateway gateway-number;
151
group group-number;
match-direction (input);
tunnel mtu mtu-size;
}
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
proxy-generate
IN THIS SECTION
Syntax | 152
Description | 152
152
Options | 152
Syntax
Hierarchy Level
Description
Enable proxy BGP route target filtering (also known as proxy route target constrain, or proxy RTC). This
feature is useful if you have a network environment where route target filtering is not widely deployed
or fully supported. When configured for proxy BGP route target filtering, the device creates route target
membership (RT membership) on behalf of its peers that do not have the route target filtering
functionality. The device then distributes the RT membership advertisements from incoming BGP VPN
routes to other devices in the network that need them.
Options
route-target- (Optional) Apply a routing policy that defines a subset of VPN routes to be used in
policy route- your proxy BGP route target filter. The subset of VPN routes control which proxy
target-policy-
name BGP route targets are used to create the proxy BGP route target routes.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 153
Description | 154
Default | 155
Options | 155
Syntax
Hierarchy Level
Description
Specify a revert time for redundant Layer 2 circuits and VPLS pseudowires. When you have configured
redundant pseudowires for Layer 2 circuits or VPLS, traffic is switched to the backup connection in the
event that the primary connection fails. If you configure a revert time, when the configured time expires
traffic is reverted to the primary path, assuming the primary path has been restored.
With the maximum option, specify a maximum reversion interval to add after the revert-time delay. If a
revert-time delay is defined but a maximum timer is not defined, VCs are restored upon the revert-
timer's expiration.
To reduce as much as possible the amount of traffic discarded, and potential data-path asymmetries
observed during primary-to-backup transition periods, you can use this restoration timer. This
restoration timer is activated when the backup path is performing as active, and then the primary path is
restored. The goal is to avoid moving traffic back to the primary path right away, to make sure that the
control plane's related tasks (such as IGP, LDP, RSVP, and internal BGP) have enough time to complete
their updating cycle.
By enabling a gradual return of traffic to the primary path, you can ensure that the relatively-slow
control-plane processing and updating does not have a negative impact on the restoration process.
The maximum option extends the revert timer’s functionality to provide a jittered interval over which a
certain number of circuits can be transitioned back to the primary path. By making use of this maximum
value, you can define a time interval during which circuits are expected to switch over. As a
consequence, circuits’ effective transitions are scattered during restoration periods.
When making use of revert-time x maximum y statement, you can ensure that the corresponding circuit that
is active is moved to the primary path within a time-slot (t1) such as that: x <= t1 <= y. In other words,
by activating this statement, you can ensure the following:
• VCs stay in the backup path for at least x seconds after the primary path comes back up.
• VCs are moved back to the primary path before y seconds have elapsed.
The ideal values for x and y will are conditioned to internal aspects of your network. For this reason,
there are no default values for these settings. If no revert-time is set, the default behavior is non-
revertive. That is, circuits are not returned to the primary path upon restoration. They are kept on the
backup path.
Default
Without the revert-time statement, virtual circuit (VC) traffic is not transitioned to the primary path upon
restoration of the primary path.
Options
maximum seconds—Number of seconds to delay path restoration after the revert-time delay.
Release Information
RELATED DOCUMENTATION
route-distinguisher
IN THIS SECTION
Syntax | 156
Description | 156
Options | 157
Syntax
Hierarchy Level
Description
Specify an identifier attached to a route, enabling you to distinguish to which VPN or virtual private LAN
service (VPLS) the route belongs. Each routing instance must have a unique route distinguisher (RD)
associated with it. The RD is used to place bounds around a VPN so that the same IP address prefixes
157
can be used in different VPNs without having them overlap. If the instance type is vrf, the route-
distinguisher statement is required.
For Layer 2 VPNs and VPLS, if you configure the l2vpn-use-bgp-rules statement, you must configure a
unique RD for each PE router participating in the routing instance.
For Ethernet VPN (EVPN), you must configure a unique RD for each PE router participating in the
routing instance to ensure that the prefixes generated by different PEs are unique.
For other types of VPNs, we recommend that you use a unique RD for each provider edge (PE) router
participating in specific routing instance. Although you can use the same RD on all PE routers for the
same VPN routing instance, if you use a unique RD, you can determine the customer edge (CE) router
from which a route originated within the VPN.
For Layer 2 VPNs and VPLSs, if you configure mesh groups, the RD in each mesh group must be unique.
CAUTION: We strongly recommend that if you change an RD that has already been
configured, or change the routing-instance type from virtual-router to vrf, make the
change during a maintenance window, as follows:
This is not required if you are configuring the RD for the first time.
Options
as-number:number—as-number is an assigned AS number, and number is any 2-byte or 4-byte value. The AS
number can be from 1 through 4,294,967,295. If the AS number is a 2-byte value, the administrative
number is a 4-byte value. If the AS number is 4-byte value, the administrative number is a 2-byte value.
An RD consisting of a 4-byte AS number and a 2-byte administrative number is defined as a type 2 RD
in RFC 4364 BGP/MPLS IP VPNs.
NOTE: In Junos OS Release 9.1 and later, the numeric range for AS numbers is extended to
provide BGP support for 4-byte AS numbers, as defined in RFC 4893, BGP Support for Four-
octet AS Number Space. All releases of Junos OS support 2-byte AS numbers. To configure an
RD that includes a 4-byte AS number, append the letter “L” to the end of the AS number. For
example, an RD with the 4-byte AS number 7,765,000 and an administrative number of 1,000 is
represented as 77765000L:1000.
158
In Junos OS Release 9.2 and later, you can also configure a 4-byte AS number using the AS dot
notation format of two integer values joined by a period: <16-bit high-order value in
decimal>.<16-bit low-order value in decimal>. For example, the 4-byte AS number of 65,546 in
the plain-number format is represented as 1.10 in AS dot notation format.
number:id—Number and identifer expressed in one of these formats: 16-bit number:32-bit identifier or
32-bit number:16-bit identifier.
ip-address:id—IP address (ip-address is a 4-byte value) within your assigned prefix range and a 2-byte value
for the id. The IP address can be any globally unique unicast address.
• Range: 0 through 4,294,967,295 (232 – 1). If the router you are configuring is a BGP peer of a router
that does not support 4-byte AS numbers, you need to configure a local AS number. For more
information, see Using 4-Byte Autonomous System Numbers in BGP Networks Technology
Overview.
NOTE: For Ethernet VPN (EVPN), an RD that includes zero as the id value is reserved for the
default EVPN routing instance by default. Because the same RD cannot be assigned for two
routing instances, using a ip-address:id RD for another routing instance (default-switch), where the
id value is zero, throws a commit error.
Release Information
Support at the following hierarchy levels introduced in Junos OS Release 20.3R1 on QFX Series
switches: [edit protocols evpn interconnect] and [edit routing-instances routing-instance-name protocols evpn
interconnect].
159
RELATED DOCUMENTATION
route-distinguisher-id
IN THIS SECTION
Syntax | 159
Description | 160
Options | 160
Syntax
route-distinguisher-id ip-address;
Hierarchy Level
Description
If you configure the route-distinguisher statement in addition to the route-distinguisher-id statement, the
value configured for route-distinguisher supersedes the value generated from route-distinguisher-id.
NOTE: To avoid a conflict in the two route distinguisher values, you must ensure that the first
half of the route distinguisher obtained by configuring the route-distinguisher statement is
different from the first half of the route distinguisher obtained by configuring the route-
distinguisher-id statement.
Options
Release Information
RELATED DOCUMENTATION
route-target-filter
IN THIS SECTION
Syntax | 161
Description | 161
Options | 162
Syntax
route-target-filter destination {
group group-name;
local;
neighbor address;
}
Hierarchy Level
Description
Statically configure route target filtering. Route target filtering allows you to distribute VPN routes to
only the routers that need them. In VPN networks without route target filtering configured, BGP
distributes all static VPN routes to all of the VPN peer routers. You can add static routes to the
bgp.rtarget.0 routing table with specific NLRI-imposed constraints.
162
Options
destination Allows you to specify the static route destination. This value must be in the format x:y/
len. The x value is either an IP address or an AS number followed by an optional L to
indicate a 4 byte AS number, and y is a number (for example, 123456L:100/64).
group group- Installs an RT-Constrain filter for the destination for all peers in the specified BGP group.
name(s) The route and corresponding BGP group are displayed in the output of the show bgp group
rtf detail command.
local Causes the router to originate the route target constrain NLRI, but does not install any
filtering state for the prefix. This behavior can be useful when the router should always
receive VPN routes with this route-target regardless of the state of a given BGP peering
session or group status. The route is not displayed in the output of the show bgp group rtf
detail command unless it is also included in either the BGP neighbor or BGP group
configuration.
neighbor Installs an RT-Constrain filter for the destination for this BGP neighbor. The route is
address displayed in the output of the show bgp group rtf detail command. Specify the BGP
neighbor using the router’s IP address.
Release Information
RELATED DOCUMENTATION
switchover-delay
IN THIS SECTION
Syntax | 163
Description | 163
Options | 163
Syntax
switchover-delay milliseconds;
Hierarchy Level
Description
After the primary pseudowire goes down, specifies the delay (in milliseconds) to wait before the backup
pseudowire takes over. You configure this statement for each backup neighbor configuration to adjust
the switchover time after a failure is detected.
Options
milliseconds—Specify the time to wait before switching to the backup pseudowire after the primary
pseudowire fails.
164
Release Information
RELATED DOCUMENTATION
unicast-reverse-path
IN THIS SECTION
Syntax | 164
Description | 165
Options | 165
Syntax
Hierarchy Level
Description
Control the operation of unicast reverse-path-forwarding check. This statement enables the RPF check
to be used when routing is asymmetrical.
Options
• Default: If you omit the unicast-reverse-path statement, only the active paths to a particular
destination are considered.
Release Information
NOTE: This feature is not supported on the EX4300 switch, even though it is available on the
device.
RELATED DOCUMENTATION
vpn-apply-export
IN THIS SECTION
Syntax | 166
Description | 166
Syntax
vpn-apply-export;
Hierarchy Level
Description
Apply both the VRF export and BGP group or neighbor export policies (VRF first, then BGP) before
routes from the vrf or l2vpn routing tables are advertised to other PE routers.
167
Release Information
RELATED DOCUMENTATION
vrf-export
IN THIS SECTION
Syntax | 167
Description | 168
Default | 168
Options | 168
Syntax
vrf-export [ policy-names ];
168
Hierarchy Level
Description
Specify how routes are exported from the local device’ s routing table (routing-instance-name.inet.0) to
the remote device. If the value vrf is specified for the instance-type statement included in the routing
instance configuration, this statement is required.
Default
If the instance-type is vrf, vrf-export is a required statement. The default action is to reject.
Options
Release Information
Support at the following hierarchy levels introduced in Junos OS Release 20.3R1 on QFX Series
switches: [edit protocols evpn interconnect] and [edit routing-instances routing-instance-name protocols evpn
interconnect].
169
RELATED DOCUMENTATION
vrf-import
IN THIS SECTION
Syntax | 169
Description | 170
Options | 170
Syntax
vrf-import [ policy-names ];
Hierarchy Level
Description
Specify how routes are imported into the routing table (routing-instance-name.inet.0) of the local device
from the remote device.
• vrf-target - When you configure only the vrf-target statement without the vrf-import statement, by
default all routes matching the specified target community are accepted.
• vrf-import - When you configure only the vrf-import statement, there is no default action. Only routes
accepted in the configured vrf-import policy statement are imported.
Options
Release Information
Support at the following hierarchy levels introduced in Junos OS Release 20.3R1 on QFX Series
switches: [edit protocols evpn interconnect] and [edit routing-instances routing-instance-name protocols evpn
interconnect].
RELATED DOCUMENTATION
vrf-mtu-check
IN THIS SECTION
Syntax | 171
Description | 171
Default | 171
Syntax
vrf-mtu-check;
Hierarchy Level
[edit chassis]
Description
On M Series routers (except the M120 and M320 router) and on EX Series 8200 switches, configure
path maximum transmission unit (MTU) checks on the outgoing interface for unicast traffic routed on a
virtual private network (VPN) routing and forwarding (VRF) instance.
Default
Disabled.
Release Information
RELATED DOCUMENTATION
vrf-target
IN THIS SECTION
Syntax | 172
Description | 173
Options | 173
Syntax
vrf-target {
community;
auto
import community-name;
export community-name;
}
173
Hierarchy Level
Description
Specify a virtual routing and forwarding (VRF) target community. If you configure the community option
only, default VRF import and export policies are generated that accept and tag routes with the specified
target community. The purpose of the vrf-target statement is to simplify the configuration by allowing
you to configure most statements at the [edit routing-instances] hierarchy level. In effect, this statement
configures a single policy for import and a single policy for export to replace the per-VRF policies for
every community.
You can still create more complex policies by explicitly configuring VRF import and export policies using
the import and export options.
Options
community—Community name.
auto—Automatically derives the route target (RT). The auto-derived route targets have higher precedence
over manually configured RT in vrf-target, vrf-export policies, and vrf-import policies.
NOTE: Auto-derived route targets are supported only in virtual switch and EVPN routing
instances.
Release Information
Support at the following hierarchy levels introduced in Junos OS Release 20.3R1 on QFX Series
switches: [edit protocols evpn interconnect] and [edit routing-instances routing-instance-name protocols evpn
interconnect].
RELATED DOCUMENTATION
CHAPTER 14
IN THIS CHAPTER
auto-discovery-only | 177
connection-protection | 184
encapsulation | 204
end-interface | 216
flow-label-receive-static | 226
flow-label-transmit-static | 228
hot-standby | 230
ignore-encapsulation-mismatch | 234
176
ignore-mtu-mismatch | 236
install-nexthop | 242
l2circuit | 243
l2ckt | 246
l2vpn | 247
l2vpn-id | 251
mtu | 258
no-l2ckt | 271
no-l2vpn | 272
oam | 276
path-selection | 278
ping-interval | 282
protect-interface | 285
protected-l2circuit | 286
protector-interface | 288
protector-pe | 289
pseudowire-status-tlv | 291
psn-tunnel-endpoint | 292
remote-site-id | 294
177
routing-instances | 295
send-oam | 297
site-preference | 301
template | 310
virtual-circuit-id | 323
vlan-id | 325
vlan-tagging | 328
auto-discovery-only
IN THIS SECTION
Syntax | 178
Description | 178
Syntax
auto-discovery-only;
Hierarchy Level
Description
Enable the router to process only the autodiscovery network layer reachability information (NLRI)
update messages for VPWS and LDP-based Layer 2 VPN and VPLS update messages
(BGP_L2VPN_AD_NLRI) (FEC 129).
Specifically, the auto-discovery-only statement notifies the routing process (rpd) to expect autodiscovery-
related NLRI messages so that information can be deciphered and used by LDP, VPLS, and VPWS.
The auto-discovery-only statement must be configured on all provider edge (PE) routers in a VPLS or in a
VPWS. If you configure route reflection, the auto-discovery-only statement is also required on provider (P)
routers that act as the route reflector in supporting FEC 129-related updates.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 179
Description | 180
Syntax
backup-interface interface-name;
Hierarchy Level
Description
Specify the interface to be used by the protection pseduowire in connection protection configurations
for Layer 2 circuits.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 181
Description | 181
Syntax
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (1 | automatic);
}
Hierarchy Level
Description
The BFD failure detection timers are adaptive and can be adjusted to be more or less aggressive. For
example, the timers can adapt to a higher value if the adjacency fails, or a neighbor can negotiate a
higher value for a timer than the configured value. The timers adapt to a higher value when a BFD
182
session flap occurs more than three times in a span of 15 seconds. A back-off algorithm increases the
receive (Rx) interval by two if the local BFD instance is the reason for the session flap. The transmission
(Tx) interval is increased by two if the remote BFD instance is the reason for the session flap. You can
use the clear bfd adaptation command to return BFD interval timers to their configured values. The clear
bfd adaptation command is hitless, meaning that the command does not affect traffic flow on the routing
device.
Release Information
Statement introduced in Junos OS Release 13.2 for Layer 2 VPNs and VPLS.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 183
Description | 183
Options | 183
Syntax
community community-name {
invert-match;
members community-members;
}
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
connection-protection
IN THIS SECTION
Syntax | 184
Description | 185
Syntax
connection-protection;
185
Hierarchy Level
Description
Enable connection protection on the Layer 2 circuit. Connection protection enables you to configure a
redundant pseudowire to act as a backup connection and can be configured between PE routers,
maintaining Layer 2 circuit and VPLS services after certain types of failures. This feature helps to
improve the reliability of networks where a single point of failure could interrupt service for customers.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 186
Description | 186
Options | 186
Syntax
control-channel {
pwe3-control-word;
pw-label-ttl-1;
router-alert-label;
}
Hierarchy Level
Description
Configure the Virtual Circuit Connection Verification (VCCV) BFD control channel. VCCV provides a
control channel associated with a pseudowire. You can configure a number of different CV types for this
control channel, based on the configuration of the pseudowire.
Options
pwe3-control-word—For BGP-based pseudowires that send OAM packets with a control word that has
0001b as the first nibble.
pw-label-ttl-1—For BGP-based pseudowires that send OAM packets with the MPLS pseudowire label and
time-to-live (TTL) set to 1.
187
router-alert-label—For BGP-based pseudowires that send OAM packets with router alert label.
Release Information
RELATED DOCUMENTATION
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
IN THIS SECTION
Syntax | 187
Description | 188
Options | 188
Syntax
(control-word | no-control-word);
188
Hierarchy Level
Description
Specify the control word. The control word is four bytes long and is inserted between the Layer 2
protocol data unit (PDU) being transported and the virtual circuit (VC) label that is used for
demultiplexing.
Options
• Default: A null control word is enabled by default. You can also configure the control word explicitly
using the control-word statement.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 189
Description | 189
Default | 190
Syntax
control-word;
Hierarchy Level
Description
Specify the control word. The control word is 4 bytes long and is inserted between the Layer 2 protocol
data unit (PDU) being transported and the virtual connection (VC) label that is used for demultiplexing.
NOTE: The following configuration statements are ignored for time-division multiplexing
pseudowires at the [edit protocols l2vpn] hierarchy level:
• control-word
• no-control-word
190
Default
The control word is enabled by default. You can also configure the control word explicitly using the
control-word statement.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 190
Description | 191
Syntax
description text;
191
Hierarchy Level
Description
Provide a text description for the Layer 2 circuit. If the text includes one or more spaces, enclose the
entire text string in quotation marks (" ").
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 192
Description | 192
Options | 192
Syntax
description text;
Hierarchy Level
Description
Describe the VPN or virtual private LAN service (VPLS) routing instance.
Options
text—Provide a text description. If the text includes one or more spaces, enclose it in quotation marks ("
"). Any descriptive text you include is displayed in the output of the show route instance detail command
and has no effect on operation.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 193
BGP | 193
Description | 195
Options | 195
Syntax
detection-time {
threshold milliseconds;
}
BGP
[edit tenants name routing-instances name protocols (evpn | l2vpn | vpls) neighbor neighbor-id
oam bfd-liveness-detection],
[edit tenants name routing-instances name protocols (evpn | l2vpn | vpls)mesh-group mesh-group-
name neighbor neighbor-id oam bfd-liveness-detection],
Description
Enable BFD failure detection. The BFD failure detection timers are adaptive and can be adjusted to be
faster or slower. The lower the BFD failure detection timer value, the faster the failure detection and
vice versa. For example, the timers can adapt to a higher value if the adjacency fails (that is, the timer
detects failures more slowly). Or a neighbor can negotiate a higher value for a timer than the configured
value. The timers adapt to a higher value when a BFD session flap occurs more than three times in a
span of 15 seconds. A back-off algorithm increases the receive (Rx) interval by two if the local BFD
instance is the reason for the session flap. The transmission (Tx) interval is increased by two if the
remote BFD instance is the reason for the session flap. You can use the clear bfd adaptation command to
return BFD interval timers to their configured values. The clear bfd adaptation command is hitless,
meaning that the command does not affect traffic flow on the routing device.
Starting in Junos OS Release 20.3R1, we support distributed mode for BFD failure detection on the
SRX5000 line of devices with SPC3 card. The distributed mode provides faster BFD failure detection of
300 (3 x 100) ms. You can enable distributed mode when you configure the BFD failure detection timer
value less than 500 ms.
Starting in Junos OS Release 21.1R1, we support distributed mode for BFD on SRX1500, SRX4100,
SRX4200, and SRX4600. This mode provides a faster BFD failure detection time of 3 x 300 ms.
For optimization and performance enhancement, you must configure the BFD failure detection timer
value in multiples of 50 ms.
Options
threshold Specify the threshold for the adaptation of the BFD session detection time. When the
milliseconds detection time adapts to a value equal to or greater than the threshold, a single trap and
a single system log message are sent.
NOTE: The threshold value must be equal to or greater than the transmit
interval.
The threshold time must be equal to or greater than the value specified in the
minimum-interval or the minimum-receive-interval statement.
196
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 197
Description | 197
Options | 197
Syntax
egress-protection {
protected-l2circuit {
egress-pe address;
ingress-pe address;
virtual-circuit-id identifier;
}
protector-interface interface-name;
protector-pe address {
context-identifier identifier;
lsp lsp-name;
}
}
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
egress-protection (MPLS)
IN THIS SECTION
Syntax | 198
Description | 199
Options | 199
Syntax
egress-protection {
context-identifier context-id {
primary | protector;
metric igp-metric-value;
advertise-mode (stub-alias | stub-proxy);
}
}
Hierarchy Level
Description
Enables an Edge Protection Virtual Circuit (EPVC) for the MPLS protocol.
Options
(primary | protector) On the primary PE router, configure as type primary. On the protector PE
router, configure as type protector.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 200
200
Description | 200
Options | 201
Syntax
Hierarchy Level
Description
Configure a logical link-layer encapsulation type. Not all encapsulation types are supported on the
switches. See the switch CLI.
Starting in Junos OS Release 20.1R1, aggregated ethernet interfaces supports VLAN TCC (Translational
cross-connect) encapsulation on MX series platforms. See Configuring VLAN TCC Encapsulation for
more details. Non-ethernet media types, SONET and ATM interfaces are only supported. It is expected
that the user will have the member links of aggregated ethernet with supported hardware for
configuring VLAN TCC encapsulation and no commit check is performed externally for the aggregated
ethernet (AE) interfaces.
201
Options
atm-ccc-vc-mux—Use ATM virtual circuit (VC) multiplex encapsulation on CCC circuits. When you use this
encapsulation type, you can configure the ccc family only.
atm-cisco-nlpid—Use Cisco ATM network layer protocol identifier (NLPID) encapsulation. When you use
this encapsulation type, you can configure the inet family only.
atm-mlppp-llc—For ATM2 IQ interfaces only, use Multilink Point-to-Point (MLPPP) over AAL5 LLC. For
this encapsulation type, your router must be equipped with a Link Services or Voice Services PIC.
MLPPP over ATM encapsulation is not supported on ATM2 IQ OC48 interfaces.
atm-nlpid—Use ATM NLPID encapsulation. When you use this encapsulation type, you can configure the
inet family only.
atm-ppp-llc—(ATM2 IQ interfaces and MX Series routers with MPC/MIC interfaces using the ATM MIC
with SFP only) Use PPP over AAL5 LLC encapsulation.
atm-ppp-vc-mux—(ATM2 IQ interfaces and MX Series routers with MPC/MIC interfaces using the ATM
MIC with SFP only) Use PPP over ATM AAL5 multiplex encapsulation.
atm-snap—(All interfaces including MX Series routers with MPC/MIC interfaces using the ATM MIC with
SFP) Use ATM subnetwork attachment point (SNAP) encapsulation.
atm-tcc-vc-mux—Use ATM VC multiplex encapsulation on TCC circuits. When you use this encapsulation
type, you can configure the tcc family only.
atm-vc-mux—(All interfaces including MX Series routers with MPC/MIC interfaces using the ATM MIC
with SFP) Use ATM VC multiplex encapsulation. When you use this encapsulation type, you can
configure the inet family only.
ether-over-atm-llc—(All IP interfaces including MX Series routers with MPC/MIC interfaces using the
ATM MIC with SFP) For interfaces that carry IP traffic, use Ethernet over ATM LLC encapsulation. When
you use this encapsulation type, you cannot configure multipoint interfaces.
ether-vpls-over-atm-llc—For ATM2 IQ interfaces only, use the Ethernet virtual private LAN service (VPLS)
over ATM LLC encapsulation to bridge Ethernet interfaces and ATM interfaces over a VPLS routing
instance (as described in RFC 2684, Multiprotocol Encapsulation over ATM Adaptation Layer 5). Packets
from the ATM interfaces are converted to standard ENET2/802.3 encapsulated Ethernet frames with
the frame check sequence (FCS) field removed.
ether-vpls-over-fr—For E1, T1, E3, T3, and SONET interfaces only, use the Ethernet virtual private LAN
service (VPLS) over Frame Relay encapsulation to support Bridged Ethernet over Frame Relay
202
encapsulated TDM interfaces for VPLS applications, per RFC 2427, Multiprotocol Interconnect over
Frame Relay.
NOTE: The SONET/SDH OC3/STM1 (Multi-Rate) MIC with SFP, the Channelized SONET/SDH
OC3/STM1 (Multi-Rate) MIC with SFP, and the DS3/E3 MIC do not support Ethernet over
Frame Relay encapsulation.
ether-vpls-over-ppp—For E1, T1, E3, T3, and SONET interfaces only, use the Ethernet virtual private LAN
service (VPLS) over Point-to-Point Protocol (PPP) encapsulation to support Bridged Ethernet over PPP-
encapsulated TDM interfaces for VPLS applications.
ethernet—Use Ethernet II encapsulation (as described in RFC 894, A Standard for the Transmission of IP
Datagrams over Ethernet Networks).
ethernet-vpls—Use Ethernet VPLS encapsulation on Ethernet interfaces that have VPLS enabled and that
must accept packets carrying standard Tag Protocol ID (TPID) values.
NOTE: The built-in Gigabit Ethernet PIC on an M7i router does not support extended VLAN
VPLS encapsulation.
frame-relay-ccc—Use Frame Relay encapsulation on CCC circuits. When you use this encapsulation type,
you can configure the ccc family only.
frame-relay-ether-type—Use Frame Relay ether type encapsulation for compatibility with Cisco Frame
Relay. The physical interface must be configured with flexible-frame-relay encapsulation.
frame-relay-ether-type-tcc—Use Frame Relay ether type TCC for Cisco-compatible Frame Relay on TCC
circuits to connect different media. The physical interface must be configured with flexible-frame-relay
encapsulation.
frame-relay-ppp—Use PPP over Frame Relay circuits. When you use this encapsulation type, you can
configure the ppp family only.
frame-relay-tcc—Use Frame Relay encapsulation on TCC circuits for connecting different media. When
you use this encapsulation type, you can configure the tcc family only.
203
gre-fragmentation—For adaptive services interfaces only, use GRE fragmentation encapsulation to enable
fragmentation of IPv4 packets in GRE tunnels. This encapsulation clears the do not fragment (DF) bit in
the packet header. If the packet’ s size exceeds the tunnel’ s maximum transmission unit (MTU) value,
the packet is fragmented before encapsulation.
multilink-ppp—Use MLPPP encapsulation. This encapsulation is used only on multilink, link services, and
voice services interfaces and their constituent T1 or E1 interfaces.
ppp-over-ether—Use PPP over Ethernet encapsulation to configure an underlying Ethernet interface for a
dynamic PPPoE logical interface on M120 and M320 routers with Intelligent Queuing 2 (IQ2) PICs, and
on MX Series routers with MPCs.
ppp-over-ether-over-atm-llc—(MX Series routers with MPCs using the ATM MIC with SFP only) For
underlying ATM interfaces, use PPP over Ethernet over ATM LLC encapsulation. When you use this
encapsulation type, you cannot configure the interface address. Instead, configure the interface address
on the PPP interface.
vlan-bridge—Use Ethernet VLAN bridge encapsulation on Ethernet interfaces that have IEEE 802.1Q
tagging, flexible-ethernet-services, and bridging enabled and that must accept packets carrying TPID
0x8100 or a user-defined TPID.
vlan-ccc—Use Ethernet virtual LAN (VLAN) encapsulation on CCC circuits. When you use this
encapsulation type, you can configure the ccc family only.
vlan-vci-ccc—Use ATM-to-Ethernet interworking encapsulation on CCC circuits. When you use this
encapsulation type, you can configure the ccc family only.
vlan-tcc—Use Ethernet VLAN encapsulation on TCC circuits. When you use this encapsulation type, you
can configure the tcc family only.
Release Information
Release Description
20.1R1 Starting in Junos OS Release 20.1R1, aggregated ethernet interfaces supports VLAN TCC (Translational
cross-connect) encapsulation on MX series platforms.
RELATED DOCUMENTATION
encapsulation
IN THIS SECTION
Syntax | 205
205
Description | 206
Default | 206
Syntax
Description
Specify the physical link layer encapsulation type. For SRX Series devices, can you also specify the
logical link layer encapsulation type.
NOTE: Not all encapsulation types are supported on all switches. See the switch CLI.
Default
NOTE: EX Series switches do not support Frame Relay, ATM, PPP, SONET, or SATSOP
encapsulation.
ACX Series routers do not support CISCO HDLC encapsulation.
• atm-pvc—Defined in RFC 2684, Multiprotocol Encapsulation over ATM Adaptation Layer 5. When you
configure physical ATM interfaces with ATM PVC encapsulation, an RFC 2684-compliant ATM
Adaptation Layer 5 (AAL5) tunnel is set up to route the ATM cells over a Multiprotocol Label
Switching (MPLS) path that is typically established between two MPLS-capable routers using the
Label Distribution Protocol (LDP).
207
• cisco-hdlc—Use Cisco-compatible High-Level Data Link Control (HDLC) framing. E1, E3, SONET/SDH,
T1, and T3 interfaces can use Cisco HDLC encapsulation. Two related versions are supported:
• CCC version (cisco-hdlc-ccc)—The logical interface does not require an encapsulation statement.
When you use this encapsulation type, you can configure the ccc family only.
• TCC version (cisco-hdlc-tcc)—Similar to CCC and has the same configuration restrictions, but used
for circuits with different media on either side of the connection.
• cisco-hdlc-tcc—Use Cisco-compatible HDLC framing on TCC circuits for connecting different media.
• ethernet-bridge—Use Ethernet bridge encapsulation on Ethernet interfaces that have bridging enabled
and that must accept all packets.
• ethernet-over-atm—For interfaces that carry IPv4 traffic, use Ethernet over ATM encapsulation. When
you use this encapsulation type, you cannot configure multipoint interfaces. As defined in RFC 2684,
Multiprotocol Encapsulation over ATM Adaptation Layer 5, this encapsulation type allows ATM
interfaces to connect to devices that support only bridge protocol data units (BPDUs). Junos OS does
not completely support bridging, but accepts BPDU packets as a default gateway. If you use the
router as an edge device, then the router acts as a default gateway. It accepts Ethernet LLC/SNAP
frames with IP or ARP in the payload, and drops the rest. For packets destined to the Ethernet LAN, a
route lookup is done using the destination IP address. If the route lookup yields a full address match,
the packet is encapsulated with an LLC/SNAP and MAC header, and the packet is forwarded to the
ATM interface.
• ethernet-tcc—For interfaces that carry IPv4 traffic, use Ethernet TCC encapsulation on interfaces that
must accept packets carrying standard TPID values. For 8-port, 12-port, and 48-port Fast Ethernet
PICs, TCC is not supported.
• ethernet-vpls—Use Ethernet VPLS encapsulation on Ethernet interfaces that have VPLS enabled and
that must accept packets carrying standard TPID values. On M Series routers, except the M320
router, the 4-port Fast Ethernet TX PIC and the 1-port, 2-port, and 4-port, 4-slot Gigabit Ethernet
PICs can use the Ethernet VPLS encapsulation type.
packets, look at the MAC address from the Ethernet header, and use it to forward the packet into a
given VPLS instance.
• ether-vpls-over-atm-llc—For ATM intelligent queuing (IQ) interfaces only, use the Ethernet virtual
private LAN service (VPLS) over ATM LLC encapsulation to bridge Ethernet interfaces and ATM
interfaces over a VPLS routing instance (as described in RFC 2684, Multiprotocol Encapsulation over
ATM Adaptation Layer 5). Packets from the ATM interfaces are converted to standard ENET2/802.3
encapsulated Ethernet frames with the frame check sequence (FCS) field removed.
• extended-vlan-bridge—Use extended VLAN bridge encapsulation on Ethernet interfaces that have IEEE
802.1Q VLAN tagging and bridging enabled and that must accept packets carrying TPID 0x8100 or a
user-defined TPID.
• extended-vlan-ccc—Use extended VLAN encapsulation on CCC circuits with Gigabit Ethernet and 4-
port Fast Ethernet interfaces that must accept packets carrying 802.1Q values. Extended VLAN CCC
encapsulation supports TPIDs 0x8100, 0x9100, and 0x9901. When you use this encapsulation type,
you can configure the ccc family only. For 8-port, 12-port, and 48-port Fast Ethernet PICs, extended
VLAN CCC is not supported. For 4-port Gigabit Ethernet PICs, extended VLAN CCC is not
supported.
• extended-vlan-tcc—For interfaces that carry IPv4 traffic, use extended VLAN encapsulation on TCC
circuits with Gigabit Ethernet interfaces on which you want to use 802.1Q tagging. For 4-port
Gigabit Ethernet PICs, extended VLAN TCC is not supported.
• extended-vlan-vpls—Use extended VLAN VPLS encapsulation on Ethernet interfaces that have VLAN
802.1Q tagging and VPLS enabled and that must accept packets carrying TPIDs 0x8100, 0x9100,
and 0x9901. On M Series routers, except the M320 router, the 4-port Fast Ethernet TX PIC and the
1-port, 2-port, and 4-port, 4-slot Gigabit Ethernet PICs can use the Ethernet VPLS encapsulation
type.
NOTE: The built-in Gigabit Ethernet PIC on an M7i router does not support extended VLAN
VPLS encapsulation.
209
• flexible-ethernet-services—For Gigabit Ethernet IQ interfaces and Gigabit Ethernet PICs with small
form-factor pluggable transceivers (SFPs) (except the 10-port Gigabit Ethernet PIC and the built-in
Gigabit Ethernet port on the M7i router), and for Gigabit Ethernet interfaces, use flexible Ethernet
services encapsulation when you want to configure multiple per-unit Ethernet encapsulations.
Aggregated Ethernet bundles can use this encapsulation type. This encapsulation type allows you to
configure any combination of route, TCC, CCC, Layer 2 virtual private networks (VPNs), and VPLS
encapsulations on a single physical port. If you configure flexible Ethernet services encapsulation on
the physical interface, VLAN IDs from 1 through 511 are no longer reserved for normal VLANs.
• flexible-frame-relay—For IQ interfaces only, use flexible Frame Relay encapsulation when you want to
configure multiple per-unit Frame Relay encapsulations. This encapsulation type allows you to
configure any combination of TCC, CCC, and standard Frame Relay encapsulations on a single
physical port. Also, each logical interface can have any DLCI value from 1 through 1022.
• frame-relay—Use Frame Relay encapsulation is defined in RFC 1490, Multiprotocol Interconnect over
Frame Relay. E1, E3, link services, SONET/SDH, T1, T3, and voice services interfaces can use Frame
Relay encapsulation.
• frame-relay-ether-type—Use Frame Relay ether type encapsulation for compatibility with the Cisco
Frame Relay. IETF frame relay encapsulation identifies the payload format using NLPID and SNAP
formats. Cisco-compatible Frame Relay encapsulation uses the Ethernet type to identify the type of
payload.
NOTE: When the encapsulation type is set to Cisco-compatible Frame Relay encapsulation,
ensure that the LMI type is set to ANSI or Q933-A.
• frame-relay-ether-type-tcc—Use Frame Relay ether type TCC for Cisco-compatible Frame Relay on TCC
circuits to connect different media. This encapsulation is Cisco-compatible Frame Relay for DLCIs 0
through 511. DLCIs 512 through 1022 are dedicated to TCC.
• frame-relay-port-ccc—Use Frame Relay port CCC encapsulation to transparently carry all the DLCIs
between two customer edge (CE) routers without explicitly configuring each DLCI on the two
provider edge (PE) routers with Frame Relay transport. The connection between the two CE routers
can be either user-to-network interface (UNI) or network-to-network interface (NNI); this is
completely transparent to the PE routers. When you use this encapsulation type, you can configure
the ccc family only.
210
• frame-relay-tcc—This encapsulation is similar to Frame Relay CCC and has the same configuration
restrictions, but used for circuits with different media on either side of the connection.
• ppp—Use serial PPP encapsulation. This encapsulation is defined in RFC 1661, The Point-to-Point
Protocol (PPP) for the Transmission of Multiprotocol Datagrams over Point-to-Point Links. PPP is the
default encapsulation type for physical interfaces. E1, E3, SONET/SDH, T1, and T3 interfaces can
use PPP encapsulation.
• ppp-ccc—Use serial PPP encapsulation on CCC circuits. When you use this encapsulation type, you
can configure the ccc family only.
• ppp-tcc—Use serial PPP encapsulation on TCC circuits for connecting different media. When you use
this encapsulation type, you can configure the tcc family only.
• vlan-ccc—Use Ethernet VLAN encapsulation on CCC circuits. VLAN CCC encapsulation supports TPID
0x8100 only. When you use this encapsulation type, you can configure the ccc family only.
• vlan-vci-ccc—Use ATM-to-Ethernet interworking encapsulation on CCC circuits. When you use this
encapsulation type, you can configure the ccc family only. All logical interfaces configured on the
Ethernet interface must also have the encapsulation type set to vlan-vci-ccc.
• vlan-vpls—Use VLAN VPLS encapsulation on Ethernet interfaces with VLAN tagging and VPLS
enabled. Interfaces with VLAN VPLS encapsulation accept packets carrying standard TPID values
only. On M Series routers, except the M320 router, the 4-port Fast Ethernet TX PIC and the 1-port,
2-port, and 4-port, 4-slot Gigabit Ethernet PICs can use the Ethernet VPLS encapsulation type.
NOTE:
• Label-switched interfaces (LSIs) do not support VLAN VPLS encapsulation. Therefore, you
can only use VLAN VPLS encapsulation on a PE-router-to-CE-router interface and not a
core-facing interface.
• Starting with Junos OS release 13.3, a commit error occurs when you configure vlan-vpls
encapsulation on a physical interface and configure family inet on one of the logical units.
Previously, it was possible to commit this invalid configuration.
• frame-relay—Configure a Frame Relay encapsulation when the physical interface has multiple logical
units, and the units are either point to point or multipoint.
• ppp—For normal mode (when the device is using only one ISDN B-channel per call). Point-to-Point
Protocol is for communication between two computers using a serial interface.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 212
Description | 213
Options | 213
Syntax
Hierarchy Level
Description
Options
ethernet—Ethernet
ethernet-vlan—Ethernet VLAN
frame-relay—Frame Relay
ppp—PPP
Release Information
RELATED DOCUMENTATION
Configuring the Encapsulation Type for the Layer 2 Circuit Neighbor Interface
IN THIS SECTION
Syntax | 214
Description | 215
Options | 215
Syntax
Hierarchy Level
Description
Specify the type of Layer 2 traffic originating from the CE device. Only the ethernet and ethernet-vlan
encapsulation types are supported for VPLS. Not all encapsulation types are supported on the switches.
See the switch CLI.
Options
ethernet—Ethernet
ethernet-vlan—Ethernet VLAN
frame-relay—Frame Relay
ppp—PPP
Release Information
RELATED DOCUMENTATION
end-interface
IN THIS SECTION
Syntax | 217
Description | 217
Syntax
end-interface {
interface interface-name;
no-revert;
protect-interface interface-name;
}
Hierarchy Level
Description
NOTE: The protect interface must be configured prior to configuring the no-revert statement.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 218
Description | 221
Options | 221
Syntax
family {
(inet | inet6 | inet-vpn | inet6-vpn | iso-vpn) {
(any | flow | labeled-unicast | multicast | unicast | segment-routing-te) {
accepted-prefix-limit {
maximum number;
teardown <percentage-threshold> idle-timeout (forever | minutes);
drop-excess <percentage>;
hide-excess <percentage>;
}
add-path {
receive;
send {
include-backup-path backup_path_number;
multipath;
path-count number;
path-selection-mode {
(all-paths | equal-cost-paths);
}
prefix-policy [ policy-names ];
}
}
aigp [disable];
loops number;
prefix-limit {
219
maximum number;
teardown <percentage> <idle-timeout (forever | minutes)>;
drop-excess <percentage>;
hide-excess <percentage>;
}
protection;
rib-group group-name;
topology name {
community {
target identifier;
}
}
flow {
no-install;
no-validate policy-name;
}
labeled-unicast {
accepted-prefix-limit {
maximum number;
teardown <percentage> <idle-timeout (forever | minutes)>;
drop-excess <percentage>;
hide-excess <percentage>;
}
aggregate-label {
community community-name:
}
explicit-null {
connected-only;
}
prefix-limit {
maximum number;
teardown <percentage> <idle-timeout (forever | minutes)>;
drop-excess <percentage>;
hide-excess <percentage>;
}
resolve-vpn;
rib (inet.3 | inet6.3);
rib-group group-name;
traffic-statistics {
file filename <world-readable | no-world-readable>;
interval seconds;
}
}
220
}
route-target {
accepted-prefix-limit {
maximum number;
proxy-generate <route-target-policy route-target-policy-name>;
teardown <percentage> <idle-timeout (forever | minutes)>;
drop-excess <percentage>;
hide-excess <percentage>;
}
advertise-default;
external-paths number;
prefix-limit {
maximum number;
teardown <percentage> <idle-timeout (forever | minutes)>;
drop-excess <percentage>;
hide-excess <percentage>;
}
}
(evpn | inet-mdt | inet-mvpn | inet6-mvpn | l2vpn) {
signaling {
accepted-prefix-limit {
maximum number;
teardown <percentage-threshold> idle-timeout (forever | minutes);
drop-excess <percentage>;
hide-excess <percentage>;
}
add-path {
receive;
send {
include-backup-path backup_path_number;
multipath;
path-count number;
path-selection-mode {
(all-paths | equal-cost-paths);
}
prefix-policy [ policy-names ];
}
}
aigp [disable];
damping;
loops number;
prefix-limit {
maximum number;
221
Hierarchy Level
Description
Enable multiprotocol BGP (MP-BGP) by configuring BGP to carry network layer reachability information
(NLRI) for address families other than unicast IPv4, to specify MP-BGP to carry NLRI for the IPv6
address family, or to carry NLRI for VPNs.
Options
inet-mdt—Configure NLRI parameters for the multicast distribution tree (MDT) subaddress family
identifier (SAFI) for IPv4 traffic in Layer 3 VPNs.
l2vpn—Configure NLRI parameters for IPv4 for MPLS-based Layer 2 VPNs and VPLS.
labeled-unicast—Configure the family type to be labeled-unicast. This means that the BGP peers are being
used only to carry the unicast routes that are being used by labeled-unicast for resolving the labeled-
unicast routes. This statement is supported only with inet and inet6.
multicast—Configure the family type to be multicast. This means that the BGP peers are being used only
to carry the unicast routes that are being used by multicast for resolving the multicast routes.
unicast—Configure the family type to be unicast. This means that the BGP peers only carry the unicast
routes that are being used for unicast forwarding purposes. The default family type is unicast.
segment-routing-te—Configure the family type to be segment routing traffic engineering. This means that
BGP peers only carry segment routing policies for traffic steering.
The remaining statements are explained separately. Search for a statement in CLI Explorer or click a
linked statement in the Syntax section for details.
Release Information
segment-routing-te option introduced in Junos OS Release 17.4R1 for QFX Series, MX Series, and PTX
Series with FPC-PTX-P1-A.
RELATED DOCUMENTATION
family multiservice
IN THIS SECTION
Syntax | 223
Description | 224
Options | 224
Syntax
family multiservice {
destination-mac;
label-1;
label-2;
224
payload {
ip {
layer-3 {
(source-ip-only | destination-ip-only);
}
layer-3-only;
layer-4;
}
}
source-mac;
symmetric-hash {
complement;
}
}
Hierarchy Level
Description
Configure load balancing based on Layer 2 media access control information. On MX Series routers,
configure VPLS load balancing. On M120 and M320 routers only, configure VPLS load balancing based
on MPLS labels and IP information. For IPv4 traffic, only the IP source and destination addresses are
included in the hash key. For MPLS and IPv4 traffic, one or two MPLS labels and IPv4 source and
destination addresses are included. For MPLS Ethernet pseudowires, only one or two MPLS labels are
included in the hash key.
Options
You can configure one or more options to load-balance using the packet information that you specify.
destination-mac—Include the destination-address MAC information in the hash key for Layer 2 load
balancing.
label-1 (M120 and M320 routers only)—Include the first MPLS label in the hash key. Used for including a
one-label packet for per-flow load balancing of IPv4 VPLS traffic based on IP information and MPLS
labels.
label-2 (M120 and M320 routers only)—Include the second MPLS label in the hash key. If both label-1
and label-2 are specified, the entire first label and the first 16 bits of the second label are hashed.
225
payload (MX Series, M120, and M320 routers only)—Include the packet’s IP payload in the hash key.
• ip (MX Series, M120, and M320 routers only)—Include the IP address of the IPv4 or IPv6 payload in
the hash key.
• layer-3 (MX Series routers only)—Use this to include Layer 3 information from the packet’s IP
payload in the hash key.
• destination-ip-only (MX Series routers only)—Use this to include only the destination IP address
in the payload in the hash key.
• source-ip-only (MX Series routers only)—Use this to include only the source IP address in the
payload in the hash key.
NOTE: You can include either the source-ip-only or the destination-ip-only statement, not
both. They are mutually exclusive.
• layer-3-only (M120, and M320 routers only)—Include only the Layer 3 information from the
packet’s IP payload in the hash key.
• layer-4 (MX Series routers only)—Include Layer 4 information from the packet’s IP payload in the
hash key.
NOTE: On MX Series routers only, you can configure either Layer 3 or Layer 4 load balancing,
or both at the same time.
symmetric-hash (MX Series routers only)—Configure the symmetric hash or symmetric hash complement
for configuring symmetrical load balancing on an 802.3ad Link Aggregation Group.
• complement —Include the complement of the symmetric hash in the hash key.
Release Information
ip, label-1, label-2, layer-3-only, and payload options introduced in Junos OS Release 9.4.
layer-3, layer-. source-ip-only, and destination-ip-only options introduced in Junos OS Release 9.5.
RELATED DOCUMENTATION
flow-label-receive-static
IN THIS SECTION
Syntax | 226
Description | 227
Syntax
flow-label-receive-static;
227
Hierarchy Level
Description
Configure the router to pop the flow label on pseudowire packets received from a remote provider edge
(PE) router. The ingress PE router inserts the flow label in the pseudowire packet regardless of the
information exchanged in the signaling plane. If the egress PE router cannot handle the pseudowire
packet with the flow label, it drops the packet.
Flow-aware transport of pseudowires (FAT) flow labels enable load balancing of MPLS packets across
equal-cost multipath (ECMP) paths or link aggregation groups (LAGs) without the need for deep packet
inspection of the payload. You can use this statement to enable devices to pop FAT flow labels for:
In these cases, configure this statement in the [edit protocols l2circuit neighbor neighbor-id interface
interface-name] hierarchy.
In this case, configure this statement in the [edit routing-instances instance-name protocols evpn]
hierarchy.
In this case, configure this statement in the [edit routing-instances instance-name protocols evpn
interface interface-name] hierarchy.
Release Information
RELATED DOCUMENTATION
Configuring the FAT Flow Label for FEC 128 VPWS Pseudowires for Load-Balancing MPLS Traffic
FAT Flow Labels in EVPN-VPWS Routing Instances
flow-label-transmit-static
IN THIS SECTION
Syntax | 228
Description | 229
Syntax
flow-label-transmit-static;
Hierarchy Level
Description
Configure the router to push the flow label on pseudowire packets it sends to a remote provider edge
(PE) router. The ingress PE router inserts the flow label in the pseudowire packet regardless of the
information exchanged in the signaling plane. If the egress PE router can't handle a pseudowire packet
that contains the flow label, it drops the packet.
Flow-aware transport of pseudowires (FAT) flow labels enable load balancing of MPLS packets across
equal-cost multipath (ECMP) paths or link aggregation groups (LAGs) without the need for deep packet
inspection of the payload. You can use this statement to enable devices to push FAT flow labels for:
In these cases, configure this statement in the [edit protocols l2circuit neighbor neighbor-id interface
interface-name] hierarchy.
In this case, configure this statement in the [edit routing-instances instance-name protocols evpn]
hierarchy.
In this case, configure this statement in the [edit routing-instances instance-name protocols evpn
interface interface-name] hierarchy.
Release Information
RELATED DOCUMENTATION
Configuring the FAT Flow Label for FEC 128 VPWS Pseudowires for Load-Balancing MPLS Traffic
FAT Flow Labels in EVPN-VPWS Routing Instances
hot-standby
IN THIS SECTION
Syntax | 230
Description | 230
Syntax
hot-standby;
Hierarchy Level
Description
Turn on the protector behavior for the site. This keeps backup pseudowire in continuous standby mode
and ready for traffic forwarding.
Release Information
RELATED DOCUMENTATION
Example: Configuring MPLS Egress Protection Service Mirroring for BGP Signaled Layer 2 Services
IN THIS SECTION
Syntax | 231
Description | 232
Syntax
hot-standby;
Hierarchy Level
Description
Configure the pseudowire to the specified backup neighbor as the hot-standby. When you configure this
statement, traffic flows over both the active and hot-standby pseudowires to the backup device (either a
CE device or PE router). The backup device drops the traffic from the hot-standby pseudowire, unless
the active pseudowire fails. If the active pseudowire fails, the backup device automatically switches to
the hot-standby pseudowire.
Configure the hot-standby statement on routers that have both active and standby virtual circuits.
Generally, these are access routers. On provider edge routers, configure the hot-standby-vc-on' statement
to indicate that a hot-standby pseudowire is desired upon arrival of a PW_FWD_STDBY status-TLV.
Release Information
Hierarchy levels associated with the backup-neighbor statement added in Junos OS Release 9.2.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 233
Description | 233
Syntax
hot-standby-vc-on;
Hierarchy Level
Description
On provider edge (PE) aggregation routers, configure the hot-standby-vc-on statement to indicate that a
hot-standby pseudowire is desired upon arrival of a PW_FWD_STDBY status-tlv. This flag indicates the
standby state. Configure in conjunction with the hot-standby statement on routers that have both active
and standby virtual circuits. Generally, these are access routers.
234
The goal of the hot-standby statement is to reduce the amount of traffic being discarded during primary-
to-backup transition periods. This statement enables the possibility of keeping both the active and
standby paths open within the Layer 2 domain. By having both the active and standby VCs able to send
and receive traffic, traffic loops could potentially occur within the Layer 2 domain. In consequence, Layer
2 VCs are kept open only in the PE-to-access direction. In other words, aggregation PE devices can send
traffic toward access devices, but access devices send traffic exclusively through the active VC.
In this regard, the hot-standby statement is quite similar to the standby statement. The hot-standby statement
allows for a faster forwarding-path switchover during transition periods, as compared to what is allowed
by the standby statement.
Release Information
RELATED DOCUMENTATION
ignore-encapsulation-mismatch
IN THIS SECTION
Syntax | 235
Description | 235
Syntax
ignore-encapsulation-mismatch;
Hierarchy Level
Description
Allow a Layer 2 circuit, VPLS, or EVPN to be established even though the encapsulation configured on
the CE device interface does not match the encapsulation configured on the Layer 2 circuit, VPLS, or
EVPN interface.
Release Information
RELATED DOCUMENTATION
ignore-mtu-mismatch
IN THIS SECTION
Syntax | 236
Description | 237
Syntax
ignore-mtu-mismatch;
Hierarchy Level
Description
Ignore the MTU configuration set for the physical interface associated with the local switching interface
or with the remote PE router. This allows a pseudowire to be brought up between two logical interfaces
that are defined on physical interfaces with different MTU values.
Release Information
Support for Layer 2 VPNs and VPLS added in Junos OS Release 10.4.
RELATED DOCUMENTATION
Enabling Local Interface Switching When the MTU Does Not Match
Configuring the MTU for Layer 2 Interfaces
IN THIS SECTION
Syntax | 238
Description | 239
Options | 239
Syntax
interface interface-name {
backup-neighbor address;
bandwidth (bandwidth | ctnumber bandwidth);
community community-name;
connection-protection;
(control-word | no-control-word);
description text;
egress-protection;
encapsulation-type type;
flow-label-receive;
flow-label-receive-static;
flow-label-transmit;
flow-label-transmit-static;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
mtu mtu-number;
no-revert;
oam;
protect-interface interface-name;
pseudowire-status-tlv hot-standby-vc-on;
psn-tunnel-endpoint address;
revert-time seconds;
send-ip-addr-list-tlv;
static {
switchover-delay milliseconds;
virtual-circuit-id identifier;
}
Hierarchy Level
Description
Options
NOTE: The commit operation fails, if the same logical interface is configured for
both layer 2 circuit and ccc connection.
flow-label-receive Advertise capability to pop flow label in receive direction to the remote provider
edge (PE) device.
flow-label- Pop flow label on the pseudowire packets received from the remote PE device. The
receive- ingress PE inserts the flow label in the pseudowire packet, irrespective of the information
static
exchanged in the signaling plane. If the egress PE cannot handle the pseudowire packet
marked with the flow label, the packet is dropped.
flow-label-transmit Advertise capability to push flow label in transmit direction to the remote PE device.
flow-label- Push flow label on the pseudowire packets sent to the remote PE device. If the
transmit-static incoming pseudowire packet is not marked with the flow label, the packet is dropped
by the egress PE.
send-ip-addr- On a PS service logical interface, signal that the IP address TLV is sent, allowing the
list-tlv access PE router to send the local CE router's address to the service PE router.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 240
Description | 241
Options | 241
Syntax
interface interface-name {
description text;
remote-site-id remote-site-id;
}
241
Hierarchy Level
Description
Configure an interface to handle traffic for a circuit configured for the Layer 2 VPN.
Options
Release Information
RELATED DOCUMENTATION
install-nexthop
IN THIS SECTION
Syntax | 242
Description | 242
Options | 242
Syntax
Hierarchy Level
Description
Select a specific label-switched path (LSP), or select an LSP from a set of similarly named LSPs as the
traffic destination for the configured community. Also can prevent the installation of any matching next
hops.
Options
lsp-regex lsp-regular-expression—Configure a range of similarly named LSPs. You can use the following
wildcard characters when configuring an LSP regular expression:
Release Information
RELATED DOCUMENTATION
l2circuit
IN THIS SECTION
Syntax | 243
Description | 245
Syntax
l2circuit {
auto-sensing{
244
password password;
}
local-switching {
interface interface-name {
description text;
end-interface {
interface interface-name;
protect-interface interface-name;
}
ignore-mtu-mismatch;
protect-interface interface-name;
}
}
neighbor address {
interface interface-name {
backup-neighbor address;
bandwidth (bandwidth | ctnumber bandwidth);
community community-name;
connection-protection;
(control-word | no-control-word);
description text;
egress-protection;
encapsulation-type type;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
mtu mtu-number;
protect-interface interface-name;
pseudowire-status-tlv hot-standby-vc-on;
psn-tunnel-endpoint address;
virtual-circuit-id identifier;
}
}
resolution {
preserve-nexthop-heirarchy;
}
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
245
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
l2ckt
IN THIS SECTION
Syntax | 246
Description | 246
Syntax
l2ckt {
l2vpn;
l3vpn;
labeled-bgp;
no-l2vpn;
}
Hierarchy Level
Description
Enable composite chained next hop for ingress Layer 2 circuit label-switched paths (LSPs).
Release Information
l2vpn
IN THIS SECTION
Syntax | 247
Description | 249
Syntax
l2vpn {
(control-word | no-control-word);
encapsulation-type type;
oam {
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
version (1 | automatic);
248
}
ping-interval seconds;
}
site site-name {
community COMM;
control-word ;
encapsulation-type ethernet;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
interface interface-name {
description text;
community COMM;
control-word ;
encapsulation-type ethernet;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
mtu 1500;
no-control-word;
oam {
bfd-liveness-detection {
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
version (1 | automatic);
}
ping-interval seconds; seconds;
}
remote-site-id remote-site-id;
target-attachment-identifier identifier;
}
mtu 1500;
no-control-word;
oam {
bfd-liveness-detection {
detection-time {
249
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
version (1 | automatic);
}
ping-interval seconds; seconds;
}
site-identifier identifier;
site-preference preference-value {
backup;
primary;
}
source-attachment-identifier identifier;
}
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
}
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
l2vpn (routing-options)
IN THIS SECTION
Syntax | 250
Description | 251
Syntax
l2vpn {
l2ckt;
l3vpn;
labeled-bgp;
no-l2ckt;
}
251
Hierarchy Level
Description
Enable composite chained next hop for ingress Layer 2 virtual private network (VPN) label-switched
paths (LSPs).
Release Information
l2vpn-id
IN THIS SECTION
Syntax | 252
Description | 252
Options | 252
Syntax
Hierarchy Level
Description
Specify a globally unique Layer 2 VPN community identifier for the instance.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 253
Description | 254
Syntax
local-switching {
interface interface-name {
description text;
encapsulation-type;
end-interface {
interface interface-name;
no-revert;
protect-interface interface-name;
}
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
no-revert;
protect-interface interface-name;
}
}
Hierarchy Level
Description
Configure a local switching interface. A local switching interface allows you to terminate a virtual circuit
on the local router.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 255
Description | 255
Options | 256
Syntax
minimum-interval milliseconds;
Hierarchy Level
Description
Configure the minimum interval after which the local routing device transmits hello packets and then
expects to receive a reply from a neighbor with which it has established a BFD session. Optionally,
instead of using this statement, you can specify the minimum transmit and receive intervals separately
using the minimum-interval (specified under the transmit-interval statement) and minimum-receive-interval
statements.
256
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 257
Description | 257
Options | 258
Syntax
minimum-receive-interval milliseconds;
Hierarchy Level
Description
Configure the minimum interval after which the local routing device must receive a reply from a
neighbor with which it has established a BFD session. Optionally, instead of using this statement, you
can configure the minimum receive interval using the minimum-interval statement.
258
Options
Release Information
RELATED DOCUMENTATION
mtu
IN THIS SECTION
Syntax | 259
Description | 260
Options | 261
Syntax
mtu bytes;
Hierarchy Level
Description
Specify the maximum transmission unit (MTU) size for the media or protocol. The default MTU size
depends on the device type. Changing the media MTU or protocol MTU causes an interface to be
deleted and added again.
To route jumbo data packets on an integrated routing and bridging (IRB) interface or routed VLAN
interface (RVI) on EX Series switches, you must configure the jumbo MTU size on the member physical
interfaces of the VLAN that you have associated with the IRB interface or RVI, as well as on the IRB
interface or RVI itself (the interface named irb or vlan, respectively).
CAUTION: For EX Series switches, setting or deleting the jumbo MTU size on an IRB
interface or RVI while the switch is transmitting packets might cause packets to be
dropped.
NOTE: The MTU for an IRB interface is calculated by removing the Ethernet header overhead
[6(DMAC)+6(SMAC)+2(EtherType)]. Because, the MTU is the lower value of the MTU configured
on the IRB interface and the MTU configured on the IRB’s associated bridge domain IFDs or IFLs,
the IRB MTU is calculated as follows:
• In case of Layer 2 IFL configured with the flexible-vlan-tagging statement, the IRB MTU is
calculated by including 8 bytes overhead (SVLAN+CVLAN).
• In case of Layer 2 IFL configured with the vlan-tagging statement, the IRB MTU is calculated by
including a single VLAN 4 bytes overhead.
NOTE:
• If a packet whose size is larger than the configured MTU size is received on the receiving
interface, the packet is eventually dropped. The value considered for MRU (maximum receive
unit) size is also the same as the MTU size configured on that interface.
• Not all devices allow you to set an MTU value, and some devices have restrictions on the
range of allowable MTU values. You cannot configure an MTU for management Ethernet
interfaces (fxp0, em0, or me0) or for loopback, multilink, and multicast tunnel devices.
• On ACX Series routers, you can configure the protocol MTU by including the mtu statement at
the [edit interfaces interface-name unit logical-unit-number family inet] or [edit interfaces
interface-name unit logical-unit-number family inet6] hierarchy level.
261
• If you configure the protocol MTU at any of these hierarchy levels, the configured value is
applied to all families that are configured on the logical interface.
• If you are configuring the protocol MTU for both inet and inet6 families on the same logical
interface, you must configure the same value for both the families. It is not recommended
to configure different MTU size values for inet and inet6 families that are configured on the
same logical interface.
• Starting in Release 14.2, MTU for IRB interfaces is calculated by removing the Ethernet
header overhead (6(DMAC)+6(SMAC)+2(EtherType)), and the MTU is a minimum of the two values:
• Configured MTU
• For Layer 2 logical interfaces configured with vlan-tagging, IRB MTU is calculated by
including single VLAN 4 bytes overhead.
NOTE: Changing the Layer 2 logical interface option from vlan-tagging to flexible-
vlan-tagging or vice versa adjusts the logical interface MTU by 4 bytes with the
existing MTU size. As a result, the Layer 2 logical interface is deleted and re-added,
and the IRB MTU is re-computed appropriately.
For more information about configuring MTU for specific interfaces and router or switch combinations,
see Configuring the Media MTU.
Options
bytes—MTU size.
• Range: 256 through 9192 bytes, 256 through 9216 (EX Series switch interfaces), 256 through 9500
bytes (Junos OS 12.1X48R2 for PTX Series routers), 256 through 9500 bytes (Junos OS 16.1R1 for
MX Series routers)
Starting in Junos OS Evolved Release 21.2R1, MTU 16KB is only for transiting traffic of WAN
interfaces on the PTX10001-36MR, PTX10008 and PTX10004 routers. MTU is 9500B for protocols
and 16KB for transit traffic.
262
NOTE: Starting in Junos OS Release 16.1R1, the MTU size for a media or protocol is
increased from 9192 to 9500 for Ethernet interfaces on the following MX Series MPCs:
• MPC1
• MPC2
• MPC2E
• MPC3E
• MPC4E
• MPC5E
• MPC6E
• Default: 1500 bytes (INET, INET6, and ISO families), 1448 bytes (MPLS), 1514 bytes (EX Series
switch interfaces)
Release Information
Support for Layer 2 VPNs and VPLS introduced in Junos OS Release 10.4.
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
Support at the[set interfaces interface-name unit logical-unit-number family ccc] hierarchy level introduced
in Junos OS Release 12.3R3 for MX Series routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 263
Description | 264
Options | 264
Syntax
multiplier number;
Hierarchy Level
Description
Configure the number of hello packets not received by a neighbor that causes the originating interface
to be declared down.
Options
• Default: 3
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 265
Description | 266
Options | 266
Syntax
neighbor address {
interface interface-name {
backup-neighbor address {
community name;
hot-standby;
psn-tunnel-endpoint address;
standby;
virtual-circuit-id number;
}
bandwidth (bandwidth | ctnumber bandwidth);
community community-name;
(control-word | no-control-word);
description text;
egress-protection {
protected-l2circuit {
egress-pe address;
ingress-pe address;
virtual-circuit-id identifier;
}
protector-interface interface-name;
protector-pe address {
context-identifier identifier;
lsp lsp-name;
}
266
}
}
encapsulation-type type;
ignore-encapsulation-mismatch;
ignore-mtu-mismatch;
mtu mtu-number;
no-revert;
protect-interface interface-name;
pseudowire-status-tlv hot-standby-vc-on;
psn-tunnel-endpoint address;
revert-time seconds;
static {
incoming-label label;
outgoing-label label;
send-oam;
}
switchover-delay milliseconds;
virtual-circuit-id identifier;
}
}
Hierarchy Level
Description
Each Layer 2 circuit is represented by the logical interface connecting the local provider edge (PE) router
or switch to the local customer edge (CE) router or switch. All the Layer 2 circuits using a particular
remote PE router or switch designated for remote CE routers or switches are listed under the neighbor
statement (neighbor designates the PE router or switch). Each neighbor is identified by its IP address
and is usually the end-point destination for the LSP tunnel (transporting the Layer 2 circuit).
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 267
Description | 268
Syntax
no-adaptation;
Hierarchy Level
Description
Configure BFD sessions not to adapt to changing network conditions. We recommend that you do not
disable BFD adaptation unless it is preferable to have BFD adaptation disabled in your network.
The BFD failure detection timers are adaptive and can be adjusted to be faster or slower. The lower the
BFD failure detection timer value, the faster the failure detection and vice versa. For example, the
timers can adapt to a higher value if the adjacency fails (that is, the timer detects failures more slowly).
Or a neighbor can negotiate a higher value for a timer than the configured value. The timers adapt to a
higher value when a BFD session flap occurs more than three times in a span of 15 seconds. A back-off
algorithm increases the receive (Rx) interval by two if the local BFD instance is the reason for the session
flap. The transmission (Tx) interval is increased by two if the remote BFD instance is the reason for the
session flap. However, include the no-adaptation statement in the configuration if you do not want BFD
sessions to adapt to changing network conditions.
You can use the clear bfd adaptation command to return BFD interval timers to their configured values.
The clear bfd adaptation command does not affect traffic flow on the routing device.
269
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 269
Description | 270
Default | 270
Syntax
no-control-word;
270
Hierarchy Level
Description
Disable the control word. This might be necessary on networks with equipment that does not support
the control word.
NOTE: The following configuration statements are ignored for time-division multiplexing
pseudowires at the [edit protocols l2vpn] hierarchy level:
• control-word
• no-control-word
Default
The control word is enabled by default. Use the no-control-word statement to disable the control word.
Release Information
RELATED DOCUMENTATION
no-l2ckt
IN THIS SECTION
Syntax | 271
Description | 271
Syntax
no-l2ckt;
Hierarchy Level
Description
Disable composite chained next hop for ingress Layer 2 circuit label-switched paths (LSPs).
NOTE: For PTX Series routers, it is recommended that you do not use this command and disable
composite chained next hop for ingress LSPs.
Release Information
no-l2vpn
IN THIS SECTION
Syntax | 272
Description | 273
Syntax
no-l2vpn {
l2ckt;
l3vpn;
labeled-bgp;
no-l2ckt;
}
Hierarchy Level
Description
Disable composite chained next hop for ingress Layer 2 virtual private networkk (VPN) label-switched
paths (LSPs).
Release Information
IN THIS SECTION
Syntax | 273
Description | 274
Syntax
no-revert;
274
Hierarchy Level
Description
(Optional) Prevent the local switching interface from reverting to the primary interface.
NOTE: The protect interface must be configured prior to configuring the no-revert statement.
Typically, when the primary interface goes down, the pseudowire starts using the protect interface. By
default, when the primary interface comes back online, the interface is switched-over back from the
protect interface to the primary interface. To prevent the switchover back to the primary interface,
unless the primary interface goes down, include the no-revert statement. This prevents loss of traffic
during the switchover.
NOTE: If the protect interface fails, the interface is switched-over back to the primary interface,
irrespective of whether or not the no-revert statement is included in the configuration.
This statement can be configured both for the starting interface and the ending interface.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 275
Description | 275
Syntax
no-revert;
Hierarchy Level
Description
(Optional) Prevent the protect interface from reverting to the primary interface.
NOTE: The protect interface must be configured prior to configuring the no-revert statement.
Typically, when the primary interface goes down, the pseudowire starts using the protect interface. By
default, when the primary interface comes back online, the interface is switched-over back from the
protect interface to the primary interface. To prevent the switchover back to the primary interface,
unless the protect interface goes down, include the no-revert statement. This prevents loss of traffic
during the switchover.
276
NOTE: If the protect interface fails, the interface is switched-over back to the primary interface,
irrespective of whether or not the no-revert statement is included in the configuration.
Release Information
RELATED DOCUMENTATION
oam
IN THIS SECTION
Syntax | 277
Description | 277
Options | 277
Syntax
oam {
bfd-liveness-detection;
ping-interval;
ping-multiplier ping-count;
}
Hierarchy Level
Description
Allows you to configure bidirectional forwarding detection (BFD) and a control channel for a
pseudowire, in addition to the corresponding operations and management functions to be used over
that control channel. BFD provides a low resource fault detection mechanism for the continuous
monitoring of the pseudowire data path and for detecting data plane failures. The control-channel
statement is not applicable to Layer 2 circuit pseudowires.
Options
bfd-liveness- The bfd-liveness-detection statement and substatements are described in the Junos OS
detection Routing Protocols Library.
ping-multiplier Specify the number of LSP ping packets to delay the virtual circuit connectivity
ping-count verification (VCCV) Bidirectional Forwarding Detection (BFD) session from going
down. The VCCV BFD session is signaled down only after the specified number of LSP
ping packets are lost. This feature is supported for Layer 2 Circuit, Layer 2 VPN, and
VPLS technologies.
Release Information
RELATED DOCUMENTATION
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
path-selection
IN THIS SECTION
Syntax | 278
Description | 279
Default | 279
Options | 279
Syntax
path-selection {
(always-compare-med | cisco-non-deterministic | external-router-id);
as-path-ignore;
l2vpn-use-bgp-rules;
med-plus-igp {
igp-multiplier number;
279
med-multiplier number;
}
}
Hierarchy Level
Description
Default
If the path-selection statement is not included in the configuration, only the multiple exit discriminators
(MEDs) of routes that have the same peer ASs are compared.
Options
always-compare- Always compare MEDs whether or not the peer ASs of the compared routes are the
med same.
as-path-ignore In the best-path algorithm, skip the step that compares the autonomous system (AS)
path lengths. By default, the best-path algorithm evaluates the length of the AS paths
and prefers the route with the shortest AS path length.
NOTE: Starting with Junos OS Release 14.1R8, 14.2R7, 15.1R4, 15.1F6, and
16.1R1, the as-path-ignore option is supported for routing instances.
280
cisco-non- Emulate the Cisco IOS default behavior. This mode evaluates routes in the order that
deterministic they are received and does not group them according to their neighboring AS. With
cisco-non-deterministic mode, the active path is always first. All inactive, but eligible,
paths follow the active path and are maintained in the order in which they were
received, with the most recent path first. Ineligible paths remain at the end of the list.
As an example, suppose you have three path advertisements for the 192.168.1.0 /24
route:
• Path 2—learned through IBGP; AS Path of 65020; MED of 150; IGP cost of 5
• Path 3—learned through IBGP; AS Path of 65010; MED of 100; IGP cost of 10
These advertisements are received in quick succession, within a second, in the order
listed. Path 3 is received most recently, so the routing device compares it against path
2, the next most recent advertisement. The cost to the IBGP peer is better for path 2,
so the routing device eliminates path 3 from contention. When comparing paths 1 and
2, the routing device prefers path 1 because it is received from an EBGP peer. This
allows the routing device to install path 1 as the active path for the route.
external-router- Compare the router ID between external BGP paths to determine the active path.
id
igp-multiplier The multiplier value for the IGP cost to a next-hop address. This option is useful for
number making the MED and IGP cost comparable.
• Default: 1
l2vpn-use-bgp- Enable routers to use both the BGP path selection algorithm and the designated
rules forwarder path selection algorithm when selecting the preferred path to each
destination in a Layer 2 VPN or VPLS routing instance. The BGP path selection
algorithm is used by all of the Provider routers participating in the routing instance.
The designated forwarder path selection algorithm is used by the PE router
participating in the routing instance.
281
med-multiplier The multiplier value for the MED calculation. This option is useful for making the
number MED and IGP cost comparable.
• Default: 1
med-plus-igp Add the IGP cost to the indirect next-hop destination to the MED before comparing
MED values for path selection. This statement only affects best-path selection. It does
not affect the advertised MED.
Release Information
RELATED DOCUMENTATION
ping-interval
IN THIS SECTION
Syntax | 282
Description | 283
Options | 283
Syntax
ping-interval seconds;
Hierarchy Level
Description
Configure the time interval between ping messages for bidirectional forwarding detection (BFD)
sessions enabled over pseudowires inside a VPN.
Options
Release Information
RELATED DOCUMENTATION
Configuring BFD for VCCV for Layer 2 VPNs, Layer 2 Circuits, and VPLS
Junos OS VPNs Library for Routing Devices
IN THIS SECTION
Syntax | 284
Description | 284
Options | 284
284
Syntax
policer {
input policer-template-name;
output policer-template-name;
}
Hierarchy Level
Description
Use policing to control the amount of traffic flowing over the interfaces servicing a Layer 2 VPN.
Options
input policer-template-name—Name of one policer to evaluate when packets are received on the interface.
output policer-template-name—Name of one policer to evaluate when packets are transmitted on the
interface.
Release Information
RELATED DOCUMENTATION
protect-interface
IN THIS SECTION
Syntax | 285
Description | 286
Options | 286
Syntax
protect-interface interface-name;
Hierarchy Level
Description
Provide a backup for the protected interface in case of failure. Network traffic uses the primary interface
only, as long as the primary interface functions.
Options
Release Information
Support at the following hierarchy levels introduced in Junos OS Release 17.4: [edit bridge domains], [edit
logical-systems], and [edit routing-instances].
RELATED DOCUMENTATION
protected-l2circuit
IN THIS SECTION
Syntax | 287
287
Description | 287
Options | 287
Syntax
protected-l2circuit {
egress-pe address;
ingress-pe address;
virtual-circuit-id identifier;
}
Hierarchy Level
Description
Configures the protected Layer 2 circuit as part of an egress protection virtual circuit (EPVC).
Options
egress-pe address Specify the address of the egress PE router for the protected Layer 2 circuit.
ingress-pe address Specify the address of the ingress PE router for the protected Layer 2 circuit.
virtual-circuit-id Specify the virtual circuit identifier for the protected Layer 2 circuit.
identifier
288
Release Information
RELATED DOCUMENTATION
protector-interface
IN THIS SECTION
Syntax | 288
Description | 289
Options | 289
Syntax
protector-interface interface-name;
289
Hierarchy Level
Description
Options
interface-name —Name of the interface used to protect traffic for an egress protection LSP.
Release Information
RELATED DOCUMENTATION
protector-pe
IN THIS SECTION
Syntax | 290
Description | 290
Options | 290
Syntax
protector-pe address {
context-identifier identifier;
lsp lsp-name;
}
}
Hierarchy Level
Description
Options
context-identifier identifier —Identifies the context for the egress protection LSP.
lsp lsp-name —Specifies the LSP for the egress protection LSP.
Release Information
RELATED DOCUMENTATION
pseudowire-status-tlv
IN THIS SECTION
Syntax | 291
Description | 292
Syntax
pseudowire-status-tlv hot-standby-vc-on;
Hierarchy Level
Description
Enables the pseudowire type length variable (TLV). The pseudowire status TLV is used to communicate
the status of a pseudowire back and forth between two PE routers. The pseudowire status TLV is
configurable for each pseudowire connection and is disabled by default.
Release Information
RELATED DOCUMENTATION
psn-tunnel-endpoint
IN THIS SECTION
Syntax | 293
Description | 293
Options | 293
Syntax
psn-tunnel-endpoint address;
Hierarchy Level
Description
Specify the endpoint of the packet switched network (PSN) tunnel on the remote PE router.
Options
Release Information
RELATED DOCUMENTATION
remote-site-id
IN THIS SECTION
Syntax | 294
Description | 294
Options | 295
Syntax
remote-site-id remote-site-ID;
Hierarchy Level
Description
Control the remote interface to which the interface should connect. If you do not explicitly configure the
remote site ID, the order of the interfaces configured for the site determines the default value. This
statement is optional.
295
Options
remote-site-ID—Identifier specifying the interface on the remote PE router the Layer 2 VPN routing
instance connects to.
Release Information
RELATED DOCUMENTATION
routing-instances
IN THIS SECTION
Syntax | 296
Description | 296
Default | 296
Options | 296
Syntax
Hierarchy Level
[edit],
[edit logical-systems logical-system-name]
Description
Configure an additional routing entity for a router or switch. You can create multiple instances of BGP,
IS-IS, OSPF, OSPF version 3 (OSPFv3), and RIP for a router or switch.
Default
Options
non-forwarding-vrf—Enable this option to not create a routing and forwarding (VRF) table for local or
transit routes belonging to the given VPN.
Release Information
RELATED DOCUMENTATION
send-oam
IN THIS SECTION
Syntax | 297
Description | 297
Syntax
send-oam;
Hierarchy Level
Description
Enable the ability to ping a static pseudowire. If you configure the send-oam statement, it applies to the
backup neighbor as well. Once you have configured this statement, you can ping the static pseudowire
by issuing the ping mpls l2circuit command.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 298
Description | 299
Options | 299
Syntax
site site-name {
hot-standby;
site-identifier identifier;
site-preference preference-value {
backup;
primary;
}
interface interface-name {
description text;
299
remote-site-id remote-site-ID;
}
}
Hierarchy Level
Description
Specify the site name, site identifier, and interfaces connecting to the site. Allows you to configure a
remote site ID for remote sites.
Options
hot-standby—Turn on the protector behavior for the site. This keeps backup pseudowire in continuous
standby mode and ready for traffic forwarding.
site-identifier identifier—Numerical identifier for the site used as a default reference for the remote site
ID.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 300
Description | 300
Options | 301
Syntax
site-identifier identifier;
Hierarchy Level
Description
Specify the numerical identifier for the local Layer 2 VPN site.
301
Options
identifier—The numerical identifier for the Layer 2 VPN site, which can be any number from 1
through 65,534.
Release Information
RELATED DOCUMENTATION
site-preference
IN THIS SECTION
Syntax | 302
Description | 302
Options | 302
Syntax
site-preference preference-value {
backup;
primary;
}
Hierarchy Level
Description
Specify the preference value advertised for a particular Layer 2 VPN or VPLS site. The site preference
value is encoded in the BGP local preference attribute. When a PE router receives multiple
advertisements with the same VE identifier, the advertisement with the highest local preference value is
preferred. You can use this statement to enable multihoming for Layer 2 VPNs and VPLS.
Options
preference-value—Specify the preference value advertised for a Layer 2 VPN or VPLS site.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 303
Description | 304
Options | 304
Syntax
source-attachment-identifier identifier;
Hierarchy Level
Description
For FEC 129, specify the VPWS source attachment identifier. The point-to-point nature of VPWS
requires that you specify the source access individual identifier (SAII) and the target access individual
identifier (TAII). This SAII-TAII pair defines a unique pseudowire between two PE devices.
Auto-discovery routes are used by BGP to allow auto-discovery of remote source access individual
identifiers (SAIIs) (the sources of the point-to-point pseudowires). One auto-discovery route is
advertised for each source attachment identifier (SAI) in the instance or mesh group.
The SAII is specified with the source-attachment-identifier statement within the FEC 129 VPWS routing
instance. You configure the source attachment identifier and the interfaces to associate with that source
attachment identifier. Under each interface, you can configure the TAII with the target-attachment-
identifier statement. If the configured target identifier matches a source identifier advertised by a
remote PE device by way of a BGP auto-discovery message, the pseudowire between that source-target
pair is signaled. If there is no match between an advertised source identifier and the configured target
identifier, the pseudowire is not established.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 305
Description | 305
Syntax
standby;
Hierarchy Level
Description
Configure the pseudowire to the specified backup neighbor as the standby. When you configure this
statement, traffic flows over both the active and standby pseudowires to the backup device (either a CE
device or PE router). The backup device drops the traffic from the standby pseudowire, unless the active
pseudowire fails. If the active pseudowire fails, the backup device automatically switches to the standby
pseudowire.
306
The standby statement is quite similar to the hot-standby statement introduced in Junos OS Release 12.3.
The hot-standby statement allows for a faster forwarding-path switchover during transition periods, as
compared to what is allowed by the standby statement.
Release Information
Hierarchy levels associated with the backup-neighbor statement added in Junos OS Release 9.2.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 307
Description | 307
Options | 307
Syntax
static {
incoming-label label;
outgoing-label label;
send-oam;
}
Hierarchy Level
Description
Configures static Layer 2 circuit pseudowires. Static pseudowires are designed for networks that do not
support LDP or do not have LDP enabled. You configure a static pseudowire by configuring static values
for the in and out labels needed to enable a pseudowire connection.
Options
incoming-label (Optional for PTX Series Packet Transport Routers only) Configure the Layer 2 circuit
incoming static pseudowire label.
outgoing-label (Optional for PTX Series Packet Transport Routers only) Configure the Layer 2 circuit
outgoing static pseudowire label.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 308
Description | 309
Options | 309
Syntax
target-attachment-identifier identifier;
Hierarchy Level
Description
For FEC 129, specify the VPWS target attachment identifier. The point-to-point nature of VPWS
requires that you specify the source access individual identifier (SAII) and the target access individual
identifier (TAII). This SAII-TAII pair defines a unique pseudowire between two PE devices.
Auto-discovery routes are used by BGP to allow auto-discovery of SAIIs (the sources of the point-to-
point pseudowires). One auto-discovery route is advertised for each source attachment identifier (SAI) in
the instance or mesh group.
The SAII is specified with the source-attachment-identifier statement within the FEC 129 VPWS routing
instance. You configure the source attachment identifier and the interfaces to associate with that source
attachment identifier. Under each interface, you can configure the TAII with the target-attachment-
identifier statement. If the configured target identifier matches a source identifier advertised by a
remote PE device by way of a BGP auto-discovery message, the pseudowire between that source-target
pair is signaled. If there is no match between an advertised source identifier and the configured target
identifier, the pseudowire is not established.
Options
Release Information
RELATED DOCUMENTATION
template
IN THIS SECTION
Syntax | 310
Description | 310
Syntax
template;
Hierarchy Level
Description
Specify a template for the dynamically generated point-to-multipoint LSPs used for VPLS flooding.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 311
Description | 311
Options | 312
Syntax
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag;
}
Hierarchy Level
Description
Options
filename Name of the file to receive the output of the tracing operation.
files (Optional) Maximum number of trace files. If you specify a maximum number of files, you
number must also include the size statement to specify the maximum file size. When a trace file
named trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file is
overwritten.
• Default: 2 files
flag Tracing operation to perform. To specify more than one tracing operation, include multiple
flag statements.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 313
Description | 313
Options | 313
Syntax
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
Hierarchy Level
Description
Options
disable—(Optional) Disable the tracing operation. You can use this option to disable a single operation
when you have defined a broad group of tracing operations, such as all.
file filename—Name of the file to receive the output of the tracing operation. Enclose the name in
quotation marks (" ").
314
files number—(Optional) Maximum number of trace files. When a trace file named trace-file reaches its
maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the maximum number of trace
files is reached. Then the oldest trace file is overwritten.
If you specify a maximum number of files, you also must specify a maximum file size with the size
option.
• Default: 2 files
flag flag—Tracing operation to perform. To specify more than one tracing operation, include multiple flag
statements.
• error—Error conditions
flag-modifier—(Optional) Modifier for the tracing flag. You can specify the detail modifier if you want to
provide detailed trace information.
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or gigabytes
(GB). When a trace file named trace-file reaches this size, it is renamed trace-file.0. When the trace-file
again reaches its maximum size, trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-file.0.
This renaming scheme continues until the maximum number of trace files is reached. Then the oldest
trace file is overwritten.
If you specify a maximum file size, you also must specify a maximum number of trace files with the files
option.
• Default: 1 MB
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 315
Description | 316
Options | 316
Syntax
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable>;
flag flag <flag-modifier> <disable>;
}
316
Hierarchy Level
Description
Options
disable—(Optional) Disable the tracing operation. You can use this option to disable a single operation
when you have defined a broad group of tracing operations, such as all.
file filename—Name of the file to receive the output of the tracing operation. Enclose the name in
quotation marks (" ").
files number—(Optional) Maximum number of trace files. When a trace file named trace-file reaches its
maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the maximum number of trace
files is reached. Then the oldest trace file is overwritten.
If you specify a maximum number of files, you also must specify a maximum file size with the size
option.
• Default: 2 files
flag flag—Tracing operation to perform. To specify more than one tracing operation, include multiple flag
statements.
• error—Error conditions
• general—General events
• normal—Normal events
• policy—Policy processing
317
• route—Routing information
• state—State transitions
flag-modifier—(Optional) Modifier for the tracing flag. You can specify the following modifier:
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or gigabytes
(GB). When a trace file named trace-file reaches this size, it is renamed trace-file.0. When trace-file again
reaches its maximum size, trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-file.0. This
renaming scheme continues until the maximum number of trace files is reached. Then the oldest trace
file is overwritten.
If you specify a maximum file size, you also must specify a maximum number of trace files with the files
option.
• Default: 1 MB
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 318
BGP | 318
Description | 320
Options | 320
Syntax
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
BGP
detection],
[edit logical-systems name routing-instances name
protocols bgp bfd-liveness-detection],
[edit logical-systems name routing-instances name
protocols bgpgroup bfd-liveness-detection],
[edit logical-systems name routing-instances name
protocols bgpgroup neighbor address bfd-liveness-detection],
[edit logical-systems name tenants name routing-instances name protocols
bgp bfd-liveness-detection],
[edit logical-systems name tenants name routing-instances name protocols
bgpgroup bfd-liveness-detection],
[edit logical-systems name tenants name routing-instances name protocols bgpgroup
neighbor address bfd-liveness-detection],
[edit protocols bgp bfd-liveness-detection],
[edit protocols bgp group bfd-liveness-detection],
[edit protocols bgp group neighbor address bfd-liveness-detection],
[edit routing-instances name protocols bgp bfd-liveness-detection],
[edit routing-instances name protocols bgp group bfd-liveness-detection],
[edit routing-instances name protocols bgp group neighbor address bfd-liveness-
detection],
[edit tenants name routing-instances name protocols bgp bfd-liveness-detection]
[edit tenants name routing-instances name protocols bgp group bfd-liveness-detection]
[edit tenants name routing-instances name protocols bgp groupneighbor address bfd-liveness-detection]
detection],
[edit routing-instances name protocols (evpn | l2vpn | vpls)mesh-group mesh-group-name neighbor
neighbor-id oam bfd-liveness-detection],
[edit tenants name routing-instances name protocols (evpn | l2vpn | vpls)
oam bfd-liveness-detection],
[edit tenants name routing-instances name protocols (evpn | l2vpn | vpls) neighbor neighbor-id
oam bfd-liveness-detection],
[edit tenants name routing-instances name protocols (evpn | l2vpn | vpls)mesh-group mesh-group-
name neighbor neighbor-id oam bfd-liveness-detection],
Description
Specify the transmit interval for the bfd-liveness-detection statement. The negotiated transmit interval for
a peer is the interval between the sending of BFD packets to peers. The receive interval for a peer is the
minimum time that it requires between packets sent from its peer; the receive interval is not negotiated
between peers. To determine the transmit interval, each peer compares its configured minimum transmit
interval with its peer's minimum receive interval. The larger of the two numbers is accepted as the
transmit interval for that peer.
Options
minimum- Configure the minimum interval at which the local routing device transmits hello packets
interval to a neighbor with which it has established a BFD session. Optionally, instead of using
milliseconds
this statement at this hierarchy level, you can configure the minimum transmit interval
using the minimum-interval statement at the bfd-liveness-detection hierarchy level.
NOTE: The threshold value specified in the threshold statement must be greater
than the value specified in the minimum-interval statement for the transmit-interval
statement.
threshold Specify the threshold for the adaptation of the BFD session transmit interval. When the
milliseconds transmit interval adapts to a value greater than the threshold, a single trap and a single
system message are sent.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 322
Description | 323
Options | 323
Syntax
version (1 | automatic);
Hierarchy Level
Description
Specify the BFD version for detection. You can explicitly configure BFD version 1 or the routing device
can automatically detect the BFD version. By default, the routing device automatically detects the BFD
version.
Options
Configure the BFD version to detect: 1 (BFD version 1) or automatic (autodetect the BFD version).
Release Information
RELATED DOCUMENTATION
virtual-circuit-id
IN THIS SECTION
Syntax | 324
Description | 324
324
Options | 324
Syntax
virtual-circuit-id identifier;
Hierarchy Level
Description
Uniquely identify a Layer 2 circuit for either a standard pseudowire or a redundant pseudowire.
Options
Release Information
Hierarchy levels for backup-neighbor (pseudowire redundancy) added in Junos OS Release 9.2.
RELATED DOCUMENTATION
vlan-id
IN THIS SECTION
Syntax | 325
Description | 326
Options | 326
Syntax
vlan-id number;
Hierarchy Level
Description
For Fast Ethernet and Gigabit Ethernet interfaces only, bind an 802.1Q VLAN tag ID to a logical
interface.
Options
• Range: For 4-port Fast Ethernet PICs configured to handle VPLS traffic, 512 through 1023. For 1-
port and 10-port Gigabit Ethernet PICs configured to handle VPLS traffic, 512 through 4094.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 327
Description | 327
327
Options | 327
Syntax
Hierarchy Level
Description
Options
• Range: For 4-port Fast Ethernet PICs, 512 through 1023. For 1-port and 10-port Gigabit Ethernet
PICs configured to handle VPLS traffic, 512 through 4094.
all—Include all VLAN identifiers specified on the logical interfaces included in the routing instance.
Release Information
RELATED DOCUMENTATION
vlan-tagging
IN THIS SECTION
Syntax | 328
Description | 329
Default | 330
Options | 330
Syntax
vlan-tagging;
329
vlan-tagging;
Hierarchy Level
Description
For Fast Ethernet and Gigabit Ethernet interfaces, aggregated Ethernet interfaces configured for VPLS,
and pseudowire subscriber interfaces, enable the reception and transmission of 802.1Q VLAN-tagged
frames on the interface.
NOTE: For QFX Series configure VLAN identifier for untagged packets received on the physical
interface of a trunk mode interface. Enable VLAN tagging. The platform receives and forwards
single-tag frames with 802.1Q VLAN tags.
330
On EX Series switches except for EX4300 and EX9200 switches, the vlan-tagging and family
ethernet-switching statements cannot be configured on the same interface. Interfaces on EX2200,
EX3200, EX3300, EX4200, and EX4500 switches are set to family ethernet-switching by the
default factory configuration. EX6200 and EX8200 switch interfaces do not have a default family
setting.
Default
Options
native-vlan-id— (SRX Series)Configures a VLAN identifier for untagged packets. Enter a number from 0
through 4094.
NOTE: The native-vlan-id can be configured only when either flexible-vlan-tagging mode or
interface-mode trunk is configured.
Release Information
Statement introduced in Junos OS Release 12.2 for ACX Series Universal Metro Routers.
RELATED DOCUMENTATION
CHAPTER 15
Operational Commands
IN THIS CHAPTER
IN THIS SECTION
Syntax | 333
Description | 333
Options | 333
Syntax
Description
Options
instance instance-name (Optional) Clear PIM snooping join information for the specified routing
instance.
logical-system logical- (Optional) Delete the IGMP snooping statistics for a given logical system or
system-name for all logical systems.
vlan-id vlan-identifier (Optional) Clear PIM snooping join information for the specified VLAN.
view
Output Fields
See show pim snooping join for an explanation of the output fields.
334
Sample Output
The following sample output displays information about PIM snooping joins before and after the clear
pim snooping join command is entered:
Group: 198.51.100.2
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 192.0.2.5, port: ge-1/3/7.20
Downstream port: ge-1/3/1.20
Downstream neighbors:
192.0.2.2 State: Join Flags: SRW Timeout: 185
Group: 198.51.100.3
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 192.0.2.4, port: ge-1/3/5.20
Downstream port: ge-1/3/3.20
Downstream neighbors:
192.0.2.3 State: Join Flags: SRW Timeout: 175
user@host> clear pim snooping join
Clearing the Join/Prune state for 203.0.113.0/24
Clearing the Join/Prune state for 203.0.113.0/24
user@host> show pim snooping join extensive
Instance: vpls1
Learning-Domain: vlan-id 10
Learning-Domain: vlan-id 20
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 335
Description | 335
Options | 335
Syntax
Description
Options
none Clear PIM snooping statistics for all family addresses, instances, and
interfaces.
336
interface interface-name (Optional) Clear PIM snooping statistics for a specific interface.
logical-system logical-system- (Optional) Delete the IGMP snooping statistics for a given logical
name system or for all logical systems.
vlan-id vlan-identifier (Optional) Clear PIM snooping statistics information for the specified
VLAN.
clear
Output Fields
See show pim snooping statistics for an explanation of the output fields.
Sample Output
The following sample output displays PIM snooping statistics before and after the clear pim snooping
statistics command is entered:
Tx J/P messages 0
RX J/P messages 660
Rx J/P messages -- seen 0
Rx J/P messages -- received 660
Rx Hello messages 1396
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
337
Rx Malformed Packet 0
Learning-Domain: vlan-id 20
user@host> clear pim snooping statistics
user@host> show pim snooping statistics
Instance: vpls1
Learning-Domain: vlan-id 10
Tx J/P messages 0
RX J/P messages 0
Rx J/P messages -- seen 0
Rx J/P messages -- received 0
Rx Hello messages 0
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
Rx Malformed Packet 0
Learning-Domain: vlan-id 20
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 338
338
Description | 338
Options | 339
Syntax
Description
Check the operability of the MPLS Layer 2 circuit connections. Type Ctrl+c to interrupt a ping mpls
l2circuit command.
Options
count count (Optional) Number of ping requests to send. If count is not specified, five ping
requests are sent. The range of values is 1 through 1,000,000. The default value
is 5.
destination address (Optional) Specify an address other than the default (127.0.0.1/32) for the ping
echo requests. The address can be anything within the 127/8 subnet.
detail (Optional) Display detailed information about the echo requests sent and
received.
exp forwarding-class (Optional) Value of the forwarding class for the MPLS ping packets.
interface interface- Ping an interface configured for the Layer 2 circuit on the egress provider
name edge (PE) router.
logical-system (all | (Optional) Perform this operation on all logical systems or on the specified
logical-system-name) logical system.
reply-mode (Optional) Reply mode for the ping request. This option has the following
suboptions:
size bytes (Optional) Size of the label-switched path (LSP) ping request packet (96
through 65468 bytes). Packets are 4-byte aligned. For example, If you enter a
size of 97, 98, 99, or 100, the router or switch uses a size value of 100 bytes.
If you enter a packet size that is smaller than the minimum size, an error
message is displayed reminding you of the 96-byte minimum.
340
source source-address (Optional) IP address of the outgoing interface. This address is sent in the IP
source address field of the ping request. If this option is not specified, the
default address is usually the loopback interface (lo.0).
sweep (Optional) Automatically determine the size of the maximum transmission unit
(MTU).
v1 (Optional) Use the type 9 Layer 2 circuit type, length, and value (TLV).
virtual-circuit virtual- Ping the virtual circuit identifier on the egress PE router or switch and the
circuit-id neighbor specified neighbor, testing the integrity of the Layer 2 circuit between the
address
ingress and egress PE routers or switches.
Additional Information
You must configure MPLS at the [edit protocols mpls] hierarchy level on the egress PE router or switch
(the router or switch receiving the MPLS echo packets) to ping a Layer 2 circuit.
In asymmetric MTU scenarios, the echo response might be dropped. For example, if the MTU from
System A to System B is 1000 bytes, the MTU from System B to System A is 500 bytes, and the ping
request packet size is 1000 bytes, the echo response is dropped because the PAD TLV is included in the
echo response, making it too large.
network
Output Fields
When you enter this command, you are provided feedback on the status of your request. An
exclamation point (!) indicates that an echo reply was received. A period ( .) indicates that an echo reply
was not received within the timeout period. An x indicates that an echo reply was received with an error
code. Packets with an error code are not counted in the received packets count. They are accounted for
separately.
341
Sample Output
Release Information
The size and sweep options were introduced in Junos OS Release 9.6.
The reply-mode option and its suboptions are introduced in Junos OS Release 10.4R1.
342
IN THIS SECTION
Syntax | 342
Description | 342
Options | 343
Syntax
Description
Check the operability of MPLS Layer 2 virtual private network (VPN) connections. Type Ctrl+c to
interrupt a ping mpls l2vpn command.
343
Options
bottom-label-ttl (Optional) Display the time-to-live value for the bottom label in the label
stack.
count count (Optional) Number of ping requests to send. If count is not specified, five ping
requests are sent. The range of values is 1 through 1,000,000. The default
value is 5.
destination address (Optional) Specify an address other than the default (127.0.0.1/32) for the ping
echo requests. The address can be anything within the 127/8 subnet.
detail (Optional) Display detailed information about the echo requests sent and
received.
exp forwarding-class (Optional) Value of the forwarding class for the MPLS ping packets.
instance instance-name Ping a combination of the Layer 2 VPN routing instance name, the local site
local-site-id local-site-id- identifier, and the remote site identifier, testing the integrity of the Layer 2
number remote-site-id
remote-site-id-number VPN circuit (specified by the identifiers) between the ingress and egress
provider edge (PE) routers or switches.
interface interface-name Ping an interface configured for the Layer 2 VPN on the egress PE router or
switch.
logical-system (all | (Optional) Perform this operation on all logical systems or on the specified
logical-system-name) logical system.
reply-mode (Optional) Reply mode for the ping request. This option has the following
suboptions:
size bytes (Optional) Size of the label-switched path (LSP) ping request packet (96
through 65468 bytes). Packets are 4-byte aligned. For example, If you enter a
size of 97, 98, 99, or 100, the router or switch uses a size value of 100 bytes.
344
If you enter a packet size that is smaller than the minimum size, an error
message is displayed reminding you of the 96-byte minimum.
source source-address (Optional) IP address of the outgoing interface. This address is sent in the IP
source address field of the ping request. If this option is not specified, the
default address is usually the loopback interface (lo.0).
Additional Information
You must configure MPLS at the [edit protocols mpls] hierarchy level on the egress PE router or switch
(the router or switch receiving the MPLS echo packets) to ping a Layer 2 circuit.
In asymmetric MTU scenarios, the echo response might be dropped. For example, if the MTU from
System A to System B is 1000 bytes, the MTU from System B to System A is 500 bytes, and the ping
request packet size is 1000 bytes, the echo response is dropped because the PAD TLV is included in the
echo response, making it too large.
network
Output Fields
When you enter this command, you are provided feedback on the status of your request. An
exclamation point (!) indicates that an echo reply was received. A period (.) indicates that an echo reply
was not received within the timeout period. An x indicates that an echo reply was received with an error
code these packets are not counted in the received packets count. They are accounted for separately.
Sample Output
Release Information
The size and sweep options were introduced in Junos OS Release 9.6.
The reply-mode option and its suboptions are introduced in Junos OS Release 10.4R1.
346
request l2circuit-switchover
IN THIS SECTION
Syntax | 346
Description | 346
Options | 346
Syntax
request l2circuit-switchover
<logical-system (all | logical-system-name)>
<neighbor address>
<virtual-circuit-id identifier>
Description
Manually trigger a switch from the active pseudowire to the redundant pseudowire. This command can
be useful when performing network maintenance.
Options
logical-system (all | (Optional) Perform this operation on all logical systems or on a particular logical
logical-system-name) system.
neighbor address (Optional) Trigger a switch of all of the active pseudowire connections with the
specified neighbor to their respective redundant pseudowires.
virtual-circuit-id (Optional) Trigger a switch from the active pseudowire connection of the
identifier specified Layer 2 circuit to its redundant pseudowire.
347
maintenance
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 348
Description | 348
Options | 348
Syntax
Description
Options
brief | detail | extensive | terse (Optional) Display the specified level of output.
routing-instance instance- (Optional) Display information for the specified routing instance.
name
snmp-index snmp-index (Optional) Display information for the specified SNMP index of the
interface.
view
Output Fields
Table 1 on page 349 lists the output fields for the show interfaces (logical tunnel) command. Output fields
are listed in the approximate order in which they appear.
349
Physical
Interface
Logical Interface
Index Logical interface index number, which reflects its initialization sequence. detail extensive
none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the logical interface. Possible values are described in All levels
the “Logical Interface Flags” section under Common Output Fields
Description.
Traffic statistics Total number of bytes and packets received and transmitted on the detail extensive
logical interface. These statistics are the sum of the local and transit
statistics. When a burst of traffic is received, the value in the output
packet rate field might briefly exceed the peak cell rate. It takes awhile
(generally, less than 1 second) for this counter to stabilize.
Local statistics Statistics for traffic received from and transmitted to the Routing detail extensive
Engine. When a burst of traffic is received, the value in the output
packet rate field might briefly exceed the peak cell rate. It takes awhile
(generally, less than 1 second) for this counter to stabilize.
Transit statistics Statistics for traffic transiting the router. When a burst of traffic is detail extensive
received, the value in the output packet rate field might briefly exceed
the peak cell rate. It takes awhile (generally, less than 1 second) for this
counter to stabilize.
Protocol Protocol family configured on the logical interface, such as iso, inet6, detail extensive
mpls. none
Generation Unique number for use by Juniper Networks technical support only. detail extensive
Flags Information about the protocol family flags. Possible values are detail extensive
described in the “Family Flags” section under Common Output Fields none
Description.
351
Sample Output
Logical interface lsi.84934656 (Index 363) (SNMP ifIndex 586) (Generation 194)
Flags: Up Point-To-Point SNMP-Traps 0x4000000 Encapsulation: LSI-NULL
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Protocol vpls, MTU: Unlimited, Generation: 279, Route table: 10
Logical interface lsi.84934657 (Index 366) (SNMP ifIndex 589) (Generation 197)
Flags: Up Point-To-Point SNMP-Traps 0x4000000 Encapsulation: LSI-NULL
Traffic statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Local statistics:
Input bytes : 0
Output bytes : 0
Input packets: 0
Output packets: 0
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
352
Release Information
IN THIS SECTION
Syntax | 352
Description | 353
Options | 353
Syntax
Description
Display status information about Layer 2 virtual circuits from the local provider edge (PE) router to its
neighbors.
Options
brief | extensive | summary (Optional) Display the specified level of output. Use history to display
information about connection history. Use status to display information
about the connection and interface status.
logical-system (all | logical- (Optional) Perform this operation on all logical systems or on a
system-name) particular logical system. This option is only supported on Junos OS.
view
Output Fields
Table 2 on page 354 lists the output fields for the show l2circuit connections command. Output fields are
listed in the approximate order in which they appear.
354
Layer-2 Circuit Displays the legends for connection and interface status.
Connections
• MM—The two routers do not agree on an MTU value, which causes an MTU mismatch.
• EM—The encapsulation type received on this virtual circuit from the neighbor does not
match the local virtual circuit interface encapsulation type.
• CM—The two routers do not agree on a control word, which causes a control word
mismatch.
• VM—The remote and local VLAN IDs do not match across the Layer 2 circuit.
• OL—No advertisement has been received for this virtual circuit from the neighbor.
There is no outgoing label available for use by this virtual circuit.
• CB—The remote PE router is advertising a different cell bundle from that configured
on the local PE router.
• LD—The connection to the local site is signaled down, because the CE-facing interface
to the local site is down.
• RD—The remote neighbor is down. It has signaled a problem using the pseudowire
status code.
• NP—The router detects that interface hardware is not present. The hardware may be
offline, a PIC may not be of the desired type, or the interface may be configured in a
different routing instance.
• VC-Dn—The virtual circuit is down because there is no tunnel LSP from the local PE
router to the neighbor.
• CF—The router cannot find enough bandwidth to the remote router to satisfy the
Layer 2 circuit bandwidth requirement.
• XX—The virtual circuit is down for an unknown reason. This is a programming error.
Time last up Date and time the virtual circuit was last operational.
Up Interface is operational.
Negotiated control- Whether the use of the control word has been negotiated for this virtual circuit: Yes
word (Null) or No.
Incoming label Label used by the remote side of the virtual circuit to send packets destined to the local
side. This label is routed to the local virtual circuit interface.
Outgoing label Label used by the local side of the virtual circuit to send packets to the remote side of
the virtual circuit. Packets originated on the local virtual circuit interface are
encapsulated with this label before being placed on the tunnel LSP to the neighbor for
this virtual circuit. This label is allocated by the neighbor and is used in demultiplexing
incoming packets destined for this virtual circuit.
Negotiated PW status Displays the pseudowire status type, length, and value (TLV). TLVs are a method of
TLV encoding variable-length or optional information. If the pseudowire status TLV is used,
the corresponding local or neighbor PE router status code is also displayed.
local PW status code If the pseudowire status TLV is used, displays the local PE router status code.
Neighbor PW status If the pseudowire status TLV is used, displays the neighbor PE router status code.
code
Local interface Name of the local interface used for the Layer 2 circuit connection.
Connection protection Whether or not connection protection is configured for the Layer 2 circuit to the
neighbor: Yes or No.
• VC Dn—Remote side indicated that its end of the virtual circuit is down (if the tunnel
LSP from the remote side to the local side is down).
• status update timer—Status update timer processing. It computes the state of the
virtual circuit, and determines whether it should be advertised to or withdrawn from
the remote side.
359
Sample Output
Sample Output
Sample Output
Sample Output
Release Information
IN THIS SECTION
Syntax | 363
Description | 363
Options | 363
Syntax
Description
Options
none Display all Layer 2 VPN connections for all routing instances.
364
instance instance (Optional) Display connections for the specified routing instance only.
local-site local-site (Optional) Display connections for the specified Layer 2 VPN local site
name or ID only.
logical-system (all | logical- (Optional) Perform this operation on all logical systems or on a
system-name) particular logical system.
remote-site remote-site (Optional) Display connection for the specified Layer 2 VPN remote
site ID only.
view
Output Fields
Table 3 on page 364 lists the output fields for the show l2vpn connections command. Output fields are listed
in the approximate order in which they appear.
L2vpn-id For BGP autodiscovery, a globally unique Layer 2 VPN community identifier for the
instance.
Local source- For FEC 129, the VPWS source attachment identifier. The point-to-point nature of
attachment-id VPWS requires that you specify the source access individual identifier (SAII) and the
target access individual identifier (TAII). This SAII-TAII pair defines a unique pseudowire
between two PE devices.
Target-attachment-id For FEC 129, the VPWS target attachment identifier. If the configured target identifier
matches a source identifier advertised by a remote PE device by way of a BGP auto-
discovery message, the pseudowire between that source-target pair is signaled. If there
is no match between an advertised source identifier and the configured target identifier,
the pseudowire is not established.
Label Offset Numbers within the label block that are skipped to find the next label base.
Label-base Advertises the first label in a block of labels. A remote PE router uses this first label
when sending traffic toward the advertising PE router.
status-vector Bit vector advertising the state of local PE-CE circuits to remote PE routers. A bit value
of 0 indicates that the local circuit and LSP tunnel to the remote PE router are up,
whereas a value of 1 indicates either one or both are down.
366
St Status of the connection. (For a list of possible values, see the Legend for connection
status (St) field.)
Time last up Time that the connection was last in the Up condition.
St Status of the Layer 2 VPN connection (corresponds with Legend for Connection Status):
• EI—The local Layer 2 VPN interface is configured with an encapsulation that is not
supported.
• EM—The encapsulation type received on this Layer 2 VPN connection from the
neighbor does not match the local Layer 2 VPN connection interface encapsulation
type.
• CM—The two routers do not agree on a control word, which causes a control word
mismatch.
• OL—No advertisement has been received for this virtual circuit from the neighbor.
There is no outgoing label available for use by this virtual circuit.
• LD—All of the CE-facing interfaces to the local site are down. Therefore, the
connection to the local site is signaled as down to the other PE routers. No
pseudowires can be established.
• RD—All the interfaces to the remote neighbor are down. Therefore, the remote site
has been signaled as down to the other PE routers. No pseudowires can be
established.
• LN—The local site has lost path selection to the remote site and therefore no
pseduowires can be established from this local site.
• RN—The remote site has lost path selection to a local site or other remote site and
therefore no pseudowires are established to this remote site.
• XX—The Layer 2 VPN connection is down for an unn reason. This is a programming
error.
• WE—The encapsulation configured for the interface does not match the encapsulation
configured for the associated connection within the Layer 2 VPN routing instance.
368
• NP—The router detects that interface hardware is not present. The hardware might be
offline, a PIC might not be of the desired type, or the interface might be configured in
a different routing instance.
• CF—The router cannot find enough bandwidth to the remote router to satisfy the
Layer 2 VPN connection bandwidth requirement.
• SC—The local site identifier matches the remote site identifier. No pseudowire can be
established between these two sites. You should configure different values for the
local and remote site identifiers.
• LM—The local site identifier is not the minimum designated, meaning it is not the
lowest. There is another local site with a lower site identifier. Pseudowires are not
being established to this local site. and the associated local site identifier is not being
used to distribute Layer 2 VPN label blocks. However, this is not an error state.
Traffic continues to be forwarded to the PE router interfaces connected to the local
sites when the local sites are in this state.
• RM—The remote site identifier is not the minimum designated, meaning it is not the
lowest. There is another remote site connected to the same PE router which has
lower site identifier. The PE router cannot established a pseduowire to this remote
site and the associated remote site identifier cannot be used to distribute VPLS label
blocks. However, this is not an error state. Traffic can continue to be forwarded to
the PE router interface connected to this remote site when the remote site is in this
state.
• IL—The incoming packets for the Layer 2 VPN connection have no MPLS label.
Egress Protection Whether the given PVC is protected by connection protection logic using egress
protection for BGP signaled layer 2 services.
Flow Label Receive Capability to pop the flow label in the receive direction to the remote provider edge (PE)
router
Flow Label Transmit Capability to push the flow label in the transmit direction to the provider edge (PE)
router
Sample Output
Dn -- down
Instance: l2vpn-inst
Edge protection: Not-Primary
Local site: pe2 (2)
connection-site Type St Time last up # Up trans
1 rmt Up Jun 22 14:46:50 2015 1
Remote PE: 10.255.255.1, Negotiated control-word: Yes (Null)
Incoming label: 800002, Outgoing label: 800003
Local interface: ge-0/0/1.300, Status: Up, Encapsulation: VLAN
Flow Label Transmit: Yes, Flow Label Receive: Yes
Instance: FEC129-VPWS
L2vpn-id: 100:100
Number of local interfaces: 1
Number of local interfaces up: 1
ge-2/0/5.0
Local source-attachment-id: 1 (ONE)
Target-attachment-id Type St Time last up # Up trans
2 rmt Up Nov 28 16:16:14 2012 1
Remote PE: 198.51.100.2, Negotiated control-word: No
Incoming label: 299792, Outgoing label: 299792
Local interface: ge-2/0/5.0, Status: Up, Encapsulation: ETHERNET
Connection History:
Nov 28 16:16:14 2012 status update timer
Nov 28 16:16:14 2012 PE route changed
Nov 28 16:16:14 2012 Out lbl Update 299792
Nov 28 16:16:14 2012 In lbl Update 299792
Nov 28 16:16:14 2012 loc intf up ge-2/0/5.0
373
Release Information
IN THIS SECTION
Syntax | 373
Description | 373
Options | 374
Syntax
Description
Options
instance <instance-name> (Optional) Display PIM snooping interface information for the specified
routing instance.
interface <interface-name> (Optional) Display PIM snooping information for the specified interface
only.
vlan-id <vlan-identifier> (Optional) Display PIM snooping interface information for the specified
VLAN.
view
Output Fields
Table 4 on page 374 lists the output fields for the show pim snooping interface command. Output fields are
listed in the approximate order in which they appear.
Name Router interfaces that are part of this learning domain. All levels
NbrCnt Number of neighboring routers connected through the specified interface. All levels
Sample Output
Learning-Domain: vlan-id 20
Name State IP-Version NbrCnt
ge-1/3/1.20 Up 4 1
ge-1/3/3.20 Up 4 1
ge-1/3/5.20 Up 4 1
ge-1/3/7.20 Up 4 1
DR address: 192.0.2.6
DR flooding is ON
376
Learning-Domain: vlan-id 10
Name State IP-Version NbrCnt
ge-1/3/1.10 Up 4 1
ge-1/3/3.10 Up 4 1
ge-1/3/5.10 Up 4 1
ge-1/3/7.10 Up 4 1
DR address: 192.0.2.5
DR flooding is ON
Learning-Domain: vlan-id 20
Name State IP-Version NbrCnt
ge-1/3/1.20 Up 4 1
ge-1/3/3.20 Up 4 1
ge-1/3/5.20 Up 4 1
ge-1/3/7.20 Up 4 1
DR address: 192.0.2.6
DR flooding is ON
Learning-Domain: vlan-id 20
DR address: 192.0.2.6
DR flooding is ON
377
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 378
Description | 378
Options | 378
Syntax
Description
Options
instance instance-name (Optional) Display PIM snooping join information for the specified
routing instance.
vlan-id vlan-identifier (Optional) Display PIM snooping join information for the specified
VLAN.
view
Output Fields
Table 5 on page 379 lists the output fields for the show pim snooping join command. Output fields are listed
in the approximate order in which they appear.
379
• * (wildcard value)
• <ipv4-address>
• <ipv6-address>
• Local RP—Sending neither join messages nor prune messages toward the
RP, because this router is the rendezvous point.
NOTE: RP group range entries have None in the Upstream state field because
RP group ranges do not trigger actual PIM join messages between routers.
Upstream neighbor Information about the upstream neighbor: Direct, Local, Unknown, or a specific All levels
IP address.
For bidirectional PIM, Direct means that the interface is directly connected to
a subnet that contains a phantom RP address.
Upstream port RPF interface toward the source address for the source-specific state (S,G) or All levels
toward the rendezvous point (RP) address for the non-source-specific state
(*,G).
For bidirectional PIM, RP Link means that the interface is directly connected
to a subnet that contains a phantom RP address.
Timeout Time remaining until the downstream join state is updated (in seconds). extensive
381
Sample Output
Learning-Domain: vlan-id 10
Group: 198.51.100.2
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 192.0.2.4, port: ge-1/3/5.10
Learning-Domain: vlan-id 20
Group: 198.51.100.3
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 203.0.113.4, port: ge-1/3/5.20
Group: 198.51.100.2
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 192.0.2.4, port: ge-1/3/5.10
Downstream port: ge-1/3/1.10
Downstream neighbors:
192.0.2.2 State: Join Flags: SRW Timeout: 166
Learning-Domain: vlan-id 20
Group: 198.51.100.3
Source: *
382
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 203.0.113.4, port: ge-1/3/5.20
Downstream port: ge-1/3/3.20
Downstream neighbors:
203.0.113.3 State: Join Flags: SRW Timeout: 168
Learning-Domain: vlan-id 10
Group: 198.51.100.2
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 192.0.2.4, port: ge-1/3/5.10
Learning-Domain: vlan-id 20
Group: 198.51.100.3
Source: *
Flags: sparse,rptree,wildcard
Upstream state: None
Upstream neighbor: 203.0.113.4, port: ge-1/3/5.20
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 383
Description | 383
Options | 384
Syntax
Description
Options
instance instance-name (Optional) Display PIM snooping neighbor information for the specified
routing instance.
interface interface-name (Optional) Display information for the specified PIM snooping neighbor
interface.
vlan-id vlan-identifier (Optional) Display PIM snooping neighbor information for the specified
VLAN.
view
Output Fields
Table 6 on page 384 lists the output fields for the show pim snooping neighbors command. Output fields are
listed in the approximate order in which they appear.
Interface Router interface for which PIM snooping neighbor details are displayed. All levels
385
Option PIM snooping options available on the specified interface: All levels
• G = Generation Identifier
• T = Tracking Bit
Uptime Time the neighbor has been operational since the PIM process was last All levels
initialized, in the format dd:hh:mm:ss ago for less than a week and
nwnd:hh:mm:ss ago for more than a week.
Neighbor addr IP address of the PIM snooping neighbor connected through the specified All levels
interface.
Hello Option Time for which the neighbor is available, in seconds. The range of values is detail
Holdtime 0 through 65,535.
Hello Option DR Designated router election priority. The range of values is 0 through detail
Priority 4294967295.
Hello Option 9-digit or 10-digit number used to tag hello messages. detail
Generation ID
Hello Option LAN Time to wait before the neighbor receives prune messages, in the format detail
Prune Delay delay nnn ms override nnnn ms.
386
Sample Output
Instance: vpls1
Learning-Domain: vlan-id 10
Learning-Domain: vlan-id 20
Interface: ge-1/3/1.10
Address: 192.0.2.2
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 83 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 830908833
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
387
Interface: ge-1/3/3.10
Address: 192.0.2.3
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 97 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 2056520742
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Interface: ge-1/3/5.10
Address: 192.0.2.4
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 81 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 1152066227
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Interface: ge-1/3/7.10
Address: 192.0.2.5
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 96 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 1113200338
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Learning-Domain: vlan-id 20
Interface: ge-1/3/1.20
Address: 192.0.2.12
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 81 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 963205167
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Interface: ge-1/3/3.20
Address: 192.0.2.13
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 104 remaining
Hello Option DR Priority: 1
388
Interface: ge-1/3/5.20
Address: 192.0.2.14
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 88 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 789422835
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Interface: ge-1/3/7.20
Address: 192.0.2.15
Uptime: 00:44:51
Hello Option Holdtime: 105 seconds 88 remaining
Hello Option DR Priority: 1
Hello Option Generation ID: 1563649680
Hello Option LAN Prune Delay: delay 500 ms override 2000 ms
Tracking is supported
Instance: vpls1
Learning-Domain: vlan-id 10
Learning-Domain: vlan-id 20
389
Instance: vpls1
Learning-Domain: vlan-id 10
Learning-Domain: vlan-id 20
Instance: vpls1
Learning-Domain: vlan-id 10
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 390
Description | 390
Options | 391
Syntax
Description
Options
instance instance-name (Optional) Display statistics for a specific routing instance enabled
by Protocol Independent Multicast (PIM) snooping.
interface interface-name (Optional) Display statistics about the specified interface for PIM
snooping.
vlan-id vlan-identifier (Optional) Display PIM snooping statistics information for the
specified VLAN.
view
Output Fields
Table 7 on page 391 lists the output fields for the show pim snooping statistics command. Output fields are
listed in the approximate order in which they appear.
Rx J/P messages Number of join/prune packets seen but not received on the upstream All levels
-- seen interface.
Rx J/P messages Number of join/prune packets received on the downstream interface. All levels
-- received
Rx Version Number of packets received with an unknown version number. All levels
Unknown
Rx Upstream Number of packets received with unknown upstream neighbor information. All levels
Neighbor Unknown
Rx Bad Length Number of packets received containing incorrect length information. All levels
Rx J/P Busy Drop Number of join/prune packets dropped while the router is busy. All levels
Rx J/P Group Number of join/prune packets received containing the aggregate group All levels
Aggregate 0 information.
Rx No PIM Number of packets received without the interface information. All levels
Interface
Rx No Upstream Number of packets received without upstream neighbor information. All levels
Neighbor
393
Rx Unknown Hello Number of hello packets received with unknown options. All levels
Option
Sample Output
Tx J/P messages 0
RX J/P messages 8
Rx J/P messages -- seen 0
Rx J/P messages -- received 8
Rx Hello messages 37
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
Rx Malformed Packet 0
Rx No PIM Interface 0
Rx No Upstream Neighbor 0
Rx Bad Length 0
Rx Neighbor Unknown 0
Rx Unknown Hello Option 0
Rx Malformed Packet 0
Learning-Domain: vlan-id 20
Tx J/P messages 0
RX J/P messages 2
Rx J/P messages -- seen 0
394
Tx J/P messages 0
RX J/P messages 9
Rx J/P messages -- seen 0
Rx J/P messages -- received 9
Rx Hello messages 45
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
Rx Malformed Packet 0
Rx No PIM Interface 0
Rx No Upstream Neighbor 0
Rx Bad Length 0
Rx Neighbor Unknown 0
Rx Unknown Hello Option 0
Rx Malformed Packet 0
395
Learning-Domain: vlan-id 20
Tx J/P messages 0
RX J/P messages 3
Rx J/P messages -- seen 0
Rx J/P messages -- received 3
Rx Hello messages 47
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
Rx Malformed Packet 0
Rx No PIM Interface 0
Rx No Upstream Neighbor 0
Rx Bad Length 0
Rx Neighbor Unknown 0
Rx Unknown Hello Option 0
Rx Malformed Packet 0
Tx J/P messages 0
RX J/P messages 11
Rx J/P messages -- seen 0
Rx J/P messages -- received 11
Rx Hello messages 64
Rx Version Unknown 0
Rx Neighbor Unknown 0
Rx Upstream Neighbor Unknown 0
Rx Bad Length 0
Rx J/P Busy Drop 0
Rx J/P Group Aggregate 0
Rx Malformed Packet 0
Rx No PIM Interface 0
Rx No Upstream Neighbor 0
Rx Bad Length 0
Rx Neighbor Unknown 0
Release Information
RELATED DOCUMENTATION
show route
IN THIS SECTION
Syntax | 397
Description | 398
Options | 398
Syntax
show route
<all>
<destination-prefix>
<logical-system (all | logical-system-name)>
<private>
<te-ipv4-prefix-ip te-ipv4-prefix-ip>
<te-ipv4-prefix-node-ip te-ipv4-prefix-node-ip>
<te-ipv4-prefix-node-iso te-ipv4-prefix-node-iso>
<rib-sharding (main | rib-shard-name)>
show route
<all>
<destination-prefix>
<private>
398
Description
Options
none Display brief information about all active entries in the routing tables.
all (Optional) Display information about all routing tables, including private,
or internal, routing tables.
destination-prefix (Optional) Display active entries for the specified address or range of
addresses.
logical-system (all | logical- (Optional) Perform this operation on all logical systems or on a particular
system-name) logical system.
private (Optional) Display information only about all private, or internal, routing
tables.
display-client-data (Optional) Display client id and cookie information for routes installed by
the routing protocol process client applications.
te-ipv4-prefix-ip te-ipv4- (Optional) Display IPv4 address of the traffic-engineering prefix, without
prefix-ip the mask length if present in the routing table.
te-ipv4-prefix-node-ip te- (Optional) Display all prefixes that have originated from the traffic-
ipv4-prefix-node-ip engineering node. You can filter IPv4 node addresses from the traffic-
engineered routes in the lsdist.0 table.
te-ipv4-prefix-node-iso te- (Optional) Display all prefixes that have originated from the traffic-
ipv4-prefix-node-iso engineering node. You can filter IPv4 routes with the specified ISO circuit
ID from the lsdist.0 table.
view
399
Output Fields
Table 8 on page 399 describes the output fields for the show route command. Output fields are listed in
the approximate order in which they appear.
number destinations Number of destinations for which there are routes in the routing table.
number routes Number of routes in the routing table and total number of routes in the following states:
• holddown (routes that are in the pending state before being declared inactive). A
holddown route was once the active route and is no longer the active route. The route is
in the holddown state because a protocol still has interest in the route, meaning that the
interest bit is set. A protocol might have its interest bit set on the previously active route
because the protocol is still advertising the route. The route will be deleted after all
protocols withdraw their advertisement of the route and remove their interest bit. A
persistent holddown state often means that the interested protocol is not releasing its
interest bit properly.
However, if you have configured advertisement of multiple routes (with the add-path or
advertise-inactive statement), the holddown bit is most likely set because BGP is
advertising the route as an active route. In this case, you can ignore the holddown state
because nothing is wrong.
If you have configured uRPF-loose mode, the holddown bit is most likely set because
Kernel Routing Table (KRT) is using inactive route to build valid incoming interfaces. In
this case, you can ignore the holddown state because nothing is wrong.
destination-prefix Route destination (for example:10.0.0.1/24). Sometimes the route information is presented
in another format, such as:
• control-word-status—Whether the use of the control word has been negotiated for
this virtual circuit: NoCtrlWord or CtrlWord.
[ protocol, Protocol from which the route was learned and the preference value for the route.
preference ]
• +—A plus sign indicates the active route, which is the route installed from the routing
table into the forwarding table.
• *—An asterisk indicates that the route is both the active and the last active route. An
asterisk before a to line indicates the best subpath to the route.
In every routing metric except for the BGP LocalPref attribute, a lesser value is preferred. In
order to use common comparison routines, Junos OS stores the 1's complement of the
LocalPref value in the Preference2 field. For example, if the LocalPref value for Route 1 is
100, the Preference2 value is -101. If the LocalPref value for Route 2 is 155, the
Preference2 value is -156. Route 2 is preferred because it has a higher LocalPref value and a
lower Preference2 value.
401
weeks:days How long the route been known (for example, 2w4d 13:11:14, or 2 weeks, 4 days, 13 hours,
hours:minutes:secon 11 minutes, and 14 seconds).
ds
metric Cost value of the indicated route. For routes within an AS, the cost is determined by the IGP
and the individual protocol metrics. For external routes, destinations, or routing domains,
the cost is determined by a preference value.
AS path AS path through which the route was learned. The letters at the end of the AS path indicate
the path origin, providing an indication of the state of the route at the point at which the AS
path originated:
• I—IGP.
• E—EGP.
When AS path numbers are included in the route, the format is as follows:
• [ ]—Brackets enclose the local AS number associated with the AS path if more than one
AS number is configured on the routing device, or if AS path prepending is configured.
• { }—Braces enclose AS sets, which are groups of AS numbers in which the order does
not matter. A set commonly results from route aggregation. The numbers in each AS set
are displayed in ascending order.
NOTE: In Junos OS Release 10.3 and later, the AS path field displays an unrecognized
attribute and associated hexadecimal value if BGP receives attribute 128 (attribute set) and
you have not configured an independent domain in any routing instance.
402
encapsulated Extended next-hop encoding capability enabled for the specified BGP community for
routing IPv4 traffic over IPv6 tunnels. When BGP receives routes without the tunnel
community, IPv4-0ver IPv6 tunnels are not created and BGP routes are resolved without
encapsulation.
• Invalid—Indicates that the prefix is found, but either the corresponding AS received from
the EBGP peer is not the AS that appears in the database, or the prefix length in the
BGP update message is longer than the maximum length permitted in the database.
• Unknown—Indicates that the prefix is not among the prefixes or prefix ranges in the
database.
• Unverified—Indicates that the origin of the prefix is not verified against the database.
This is because the database got populated and the validation is not called for in the
BGP import policy, although origin validation is enabled, or the origin validation is not
enabled for the BGP peers.
• Valid—Indicates that the prefix and autonomous system pair are found in the database.
to Next hop to the destination. An angle bracket (>) indicates that the route is the selected
route.
via Interface used to reach the next hop. If there is more than one interface available to the
next hop, the interface that is actually used is followed by the word Selected. This field can
also contain the following information:
• Weight—Value used to distinguish primary, secondary, and fast reroute backup routes.
Weight information is available when MPLS label-switched path (LSP) link protection,
node-link protection, or fast reroute is enabled, or when the standby state is enabled for
secondary paths. A lower weight value is preferred. Among routes with the same weight
value, load balancing is possible.
• label-action—MPLS label and operation occurring at the next hop. The operation can be
pop (where a label is removed from the top of the stack), push (where another label is
added to the label stack), or swap (where a label is replaced by another label). For VPNs,
expect to see multiple push operations, corresponding to the inner and outer labels
required for VPN routes (in the case of a direct PE-to-PE connection, the VPN route
would have the inner label push only).
Private unicast (Enhanced subscriber management for MX Series routers) Indicates that an access-internal
route is managed by enhanced subscriber management. By contrast, access-internal routes
not managed by enhanced subscriber management are displayed with associated next-hop
and media access control (MAC) address information.
balance Distribution of the load based on the underlying operational interface bandwidth for equal-
cost multipaths (ECMP) across the nexthop gateways in percentages.
Sample Output
show route
1:65500:1:10.0.0.20/240
*[MVPN/70] 19:53:41, metric2 1
Indirect
1:65500:1:10.0.0.40/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
[BGP/170] 19:53:26, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.24.4 via lt-0/3/0.24, label-switched-path toD
1:65500:1:10.0.0.60/240
*[BGP/170] 19:53:29, localpref 100, from 10.0.0.30
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
[BGP/170] 19:53:25, localpref 100, from 10.0.0.33
AS path: I
> to 10.0.28.8 via lt-0/3/0.28, label-switched-path toF
show route
The following sample output shows route hierarchy for translation route.
comp 624 2
The following sample output shows a VPN route with composite next hops enabled. The first Push
operation corresponds to the outer label. The second Push operation corresponds to the inner label.
Release Information
Option display-client-data introduced in Junos OS Release 16.2R1 on MX80, MX104, MX240, MX480,
MX960, MX2010, MX2020, vMX Series routers.
RELATED DOCUMENTATION