Professional Documents
Culture Documents
NN46220-504 - 02.01 - CFG - (Configuration Provider Backbone Transport)
NN46220-504 - 02.01 - CFG - (Configuration Provider Backbone Transport)
Configuration — Provider
Backbone Transport
This document is protected by copyright laws and international treaties. All information, copyrights and any other
intellectual property rights contained in this document are the property of Nortel Networks. Except as expressly
authorized in writing by Nortel Networks, the holder is granted no rights to use the information contained herein and
this document shall not be published, copied, produced or reproduced, modified, translated, compiled, distributed,
displayed or transmitted, in whole or part, in any form or media.
The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented without
express or implied warranty. Users must take full responsibility for their applications of any products specified in this
document. The information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may be used only in accordance
with the terms of that license. The software license agreement is included in this document.
Statement of conditions
In the interest of improving internal design, operational function, and/or reliability, Nortel Inc. reserves the right to
make changes to the products described in this document without notice.
Nortel Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
1. License grant. Nortel Inc. ("Nortel") grants the end user of the Software ("Licensee") a personal, nonexclusive,
nontransferable license: a) to use the Software either on a single computer or, if applicable, on a single authorized
device identified by host ID, for which it was originally acquired; b) to copy the Software solely for backup purposes in
support of authorized use of the Software; and c) to use and copy the associated user manual solely in support
of authorized use of the Software by Licensee. This license applies to the Software only and does not extend to
Nortel Agent software or other Nortel software products. Nortel Agent software or other Nortel software products are
licensed for use under the terms of the applicable Nortel Inc. Software License Agreement that accompanies such
software and upon payment by the end user of the applicable license fees for such software.
2. Restrictions on use; reservation of rights. The Software and user manuals are protected under copyright
laws. Nortel and/or its licensors retain all title and ownership in both the Software and user manuals, including any
revisions made by Nortel or its licensors. The copyright notice must be reproduced and included with any copy of any
portion of the Software or user manuals. Licensee may not modify, translate, decompile, disassemble, use for any
competitive analysis, reverse engineer, distribute, or create derivative works from the Software or user manuals or
any copy, in whole or in part. Except as expressly provided in this Agreement, Licensee may not copy or transfer the
Software or user manuals, in whole or in part. The Software and user manuals embody Nortel’ and its licensors’
confidential and proprietary intellectual property. Licensee shall not sublicense, assign, or otherwise disclose to
any third party the Software, or any information about the operation, design, performance, or implementation of the
Software and user manuals that is confidential to Nortel and its licensors; however, Licensee may grant permission to
its consultants, subcontractors, and agents to use the Software at Licensee’s facility, provided they have agreed to
use the Software only in accordance with the terms of this license.
3. Limited warranty. Nortel warrants each item of Software, as delivered by Nortel and properly installed and
operated on Nortel hardware or other equipment it is originally licensed for, to function substantially as described in its
accompanying user manual during its warranty period, which begins on the date Software is first shipped to Licensee.
If any item of Software fails to so function during its warranty period, as the sole remedy Nortel will at its discretion
provide a suitable fix, patch, or workaround for the problem that may be included in a future Software release. Nortel
further warrants to Licensee that the media on which the Software is provided will be free from defects in materials
and workmanship under normal use for a period of 90 days from the date Software is first shipped to Licensee. Nortel
will replace defective media at no charge if it is returned to Nortel during the warranty period along with proof of the
date of shipment. This warranty does not apply if the media has been damaged as a result of accident, misuse, or
abuse. The Licensee assumes all responsibility for selection of the Software to achieve Licensee’s intended results
and for the installation, use, and results obtained from the Software. Nortel does not warrant a) that the functions
contained in the software will meet the Licensee’s requirements, b) that the Software will operate in the hardware or
software combinations that the Licensee may select, c) that the operation of the Software will be uninterrupted or
error free, or d) that all defects in the operation of the Software will be corrected. Nortel is not obligated to remedy
any Software defect that cannot be reproduced with the latest Software release. These warranties do not apply to the
Software if it has been (i) altered, except by Nortel or in accordance with its instructions; (ii) used in conjunction
with another vendor’s product, resulting in the defect; or (iii) damaged by improper environment, abuse, misuse,
accident, or negligence. THE FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND
ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Licensee is responsible for
the security of its own data and information and for maintaining adequate procedures apart from the Software
to reconstruct lost or altered files, data, or programs.
4. Limitation of liability. IN NO EVENT WILL Nortel OR ITS LICENSORS BE LIABLE FOR ANY COST OF
SUBSTITUTE PROCUREMENT; SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES; OR ANY
DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR PROFITS ARISING OUT OF
OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE, EVEN IF Nortel HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT SHALL THE LIABILITY OF Nortel RELATING TO THE
SOFTWARE OR THIS AGREEMENT EXCEED THE PRICE PAID TO Nortel FOR THE SOFTWARE LICENSE.
5. Government licensees. This provision applies to all Software and documentation acquired directly or indirectly by
or on behalf of the United States Government. The Software and documentation are commercial products, licensed
on the open market at market prices, and were developed entirely at private expense and without the use of any U.S.
Government funds. The license to the U.S. Government is granted only with restricted rights, and use, duplication, or
disclosure by the U.S. Government is subject to the restrictions set forth in subparagraph (c)(1) of the Commercial
Computer Software––Restricted Rights clause of FAR 52.227-19 and the limitations set out in this license for civilian
agencies, and subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause of DFARS
252.227-7013, for agencies of the Department of Defense or their successors, whichever is applicable.
6. Use of software in the European Community. This provision applies to all Software acquired for use within
the European Community. If Licensee uses the Software within a country in the European Community, the
Software Directive enacted by the Council of European Communities Directive dated 14 May, 1991, will apply to
the examination of the Software to facilitate interoperability. Licensee agrees to notify Nortel of any such intended
examination of the Software and may procure support and assistance from Nortel.
7. Term and termination. This license is effective until terminated; however, all of the restrictions with respect to
Nortel’ copyright in the Software and user manuals will cease being effective at the date of expiration of the Nortel
copyright; those restrictions relating to use and disclosure of Nortel’ confidential information shall continue in effect.
Licensee may terminate this license at any time. The license will automatically terminate if Licensee fails to comply
with any of the terms and conditions of the license. Upon termination for any reason, Licensee will immediately
destroy or return to Nortel the Software, user manuals, and all copies. Nortel is not liable to Licensee for damages in
any form solely by reason of the termination of this license.
8. Export and re-export. Licensee agrees not to export, directly or indirectly, the Software or related technical
data or information without first obtaining any required export licenses or other governmental approvals. Without
limiting the foregoing, Licensee, on behalf of itself and its subsidiaries and affiliates, agrees that it will not, without
first obtaining all export licenses and approvals required by the U.S. Government: (i) export, re-export, transfer, or
divert any such Software or technical data, or any direct product thereof, to any country to which such exports or
re-exports are restricted or embargoed under United States export control laws and regulations, or to any national
or resident of such restricted or embargoed countries; or (ii) provide the Software or related technical data or
information to any military end user or for any military end use, including the design, development, or production of
any chemical, nuclear, or biological weapons.
9. General. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent
jurisdiction, the remainder of the provisions of this Agreement shall remain in full force and effect. This Agreement
will be governed by the laws of the state of California.
Should you have any questions concerning this Agreement, contact Nortel Inc., 2375 N. Glenville Dr., Richardson, TX
75082.
LICENSEE ACKNOWLEDGES THAT LICENSEE HAS READ THIS AGREEMENT, UNDERSTANDS IT, AND
AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. LICENSEE FURTHER AGREES THAT THIS
AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN Nortel AND LICENSEE, WHICH
SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND COMMUNICATIONS BETWEEN THE
PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS AGREEMENT. NO DIFFERENT OR ADDITIONAL
TERMS WILL BE ENFORCEABLE AGAINST Nortel UNLESS Nortel GIVES ITS EXPRESS WRITTEN CONSENT,
INCLUDING AN EXPRESS WAIVER OF THE TERMS OF THIS AGREEMENT.
5
Contents
New in this release 9
Features 9
Other changes 10
Introduction 11
Navigation 11
Overview 11
Acronyms 12
Features
See the following sections for information about new features in this release:
• Base chassis MAC address — Release 4.2 enables you to change the
base chassis MAC address. For information, see "Changing the base
chassis MAC address" (page 23).
• Loopback message (LBM) enhancements — The LBM enhancements
are additional flags that support throughput and round trip time modes
of operation, a timeout interval, an inter-frame transmit interval, and fill
test patterns. For information, see "Configuring loopback messages"
(page 35).
• Trunk labels — Use the PBT trunk and trunk group labels to provide
more information that traps can use. For information, see "Creating the
local end " (page 56) and "Configuring a trunk group" (page 61).
• PBT trunk statistics — This feature enables you to display statistics on
the PBT trunk queuing classes. For information, see "Displaying PBT
trunk statistics" (page 60).
• Local switching — Use this feature to configure endpoints on the same
MERS 8600 so they can transport data locally. For information, see
"Configuring PBT local switching" (page 65).
• Dropped packets — Use this feature to track dropped packets with
unknown destination MAC addresses and dropped packets per queuing
class. For information, see "Tracking dropped PBT packets" (page 67).
• PBT with MSTP — MERS 8600 supports PBT in an MSTP network.
MERS 8600 does not support RSTP. You can configure MSTP only.
The MSTP implementation is RSTP-based, as the CIST and MSTI are
Other changes
See the following sections for information about changes that are not related
to features:
• Reorganization of the Connectivity Fault Management (CFM) content —
CFM is a diagnostic tool that supports both PBB and PBT. This document
describes the CFM commands required for configuring PBT. For more
general CFM information, see Troubleshooting (NN46220-701).
Introduction
This guide provides instructions for configuring Provider Backbone
Transport (PBT) on the Nortel* Metro Ethernet Routing Switch 8600. It
includes information for using the Device Manager graphical user interface
(GUI) and the command line interface (CLI) to configure and manage PBT
on the switch. For information on PBT concepts, see Nortel Metro Ethernet
Routing Switch Fundamentals (NN46220-100).
Navigation
• "Overview" (page 11)
• "Acronyms" (page 12)
• "Configuring PBT with the CLI" (page 15)
• "Configuring PBT with Device Manager" (page 71)
• "PBT configuration example" (page 125)
Overview
PBT does not use or process layer 3 address information. PBT is strictly a
layer 2, connection-oriented feature. As such, you can use PBT to provision
point-to-point trunks and services. This enables a Service Provider (SP) to
add static provisioning to a standard Ethernet network.
PBT disables MAC address learning and Spanning Tree Protocol (STP). It
also disables broadcast-on-unknown. This means that it does not allow
broadcast and drops frames that do not have a forwarding record.
Acronyms
This manual uses the following acronyms.
Navigation
• "Roadmap of CLI commands" (page 16)
• "Discarding unknown MAC addresses" (page 22)
• "Changing the base chassis MAC address" (page 23)
• "Configuring CFM ethernet type" (page 24)
• "Creating a maintenance domain" (page 24)
• "Creating a maintenance association" (page 25)
• "Creating a maintenance endpoint" (page 27)
• "Displaying MEP statistics" (page 30)
• "Creating a remote maintenance endpoint" (page 32)
• "Displaying RMEP statistics" (page 33)
• "Configuring loopback messages" (page 35)
• "Configuring linktrace messages" (page 37)
• "Creating a maintenance intermediate point" (page 39)
• "Displaying MIP statistics" (page 39)
• "Creating a transparent domain identifier" (page 41)
• "Configuring the TDI endpoint" (page 43)
• "Creating service instance IDs" (page 46)
• "Configuring an I-SID endpoint" (page 47)
• "Configuring a PBT VLAN" (page 51)
Command Parameter
config bootconfig base-chassis-mac
<mac-address>
config bootconfig flags unknown-destmac-dis
card <true|false>
config cfm info
ethertype <ether type>
pm <enable|disable>
port-vid <value>
config cfm md <md-name> info
create [index <value>]
delete
event-trap <enable|disable>
maint-level <level>
pm <enable|disable>
config cfm md <md-name> ma <ma-name> info
auto-detect <enable|disable>
ccm-interval <integer>
ccm-rdi <enable|disable>
ccm-type <multicast|unicast>
create [index <value>]
delete
event-trap <enable|disable>
Command Parameter
pm <enable|disable>
remove-auto-discovered-rmep <rmep-id>
config cfm md <md-name> ma <ma-name> mep info
<mep-id>
create
delete
state <enable|disable>
ccm-priority <integer>
ccm-tx <enable|disable>
remove-auto-discovered-rmep <rmep-id>
lbm <1..8191|00.00.00.00.00.00> [-c <value>]
[-p <value>] [-d <value>]
ltm <1..8191|00.00.00.00.00.00> [-t <value>]
[-p <value>]
show cfm mep stats
[md <value>] [ma <value>] [mep-id <value>]
[defect] [no-defect]
config cfm md <md-name> ma <ma-name> info
rmep <rmep-id>
create
delete
remote-mac <value>
show cfm rmep stats
[md <value>] [ma <value>] [rmep-id <value>]
[up] [down]
lbm <mdName.maName.mepId.rmepId | -c <value>
mdName.maName.mepId.rmepMac>
-d <value>
-f <value>
-i <value>
-m <value>
-p <value>
-t <value>
ltm <mdName.maName.mepId.rmepId | -t <value>
mdName.maName.mepId.rmepMac>
-p <value>
config cfm md <md-name> mip <mip-name> info
Command Parameter
create [index <value>]
delete
show cfm mip stats
config tdi <tdi-id> info
create
delete
ForceDelete
clear-stats
flush-mac
mapped-vlan <vid>
mux-mode <oneToone|manyToone>
name <string>
state <disable|enable|ForceDisable>
pbt <enable|disable>
evpn-broadcast-optimization <enable|disable>
config tdi <tdi-id> end-point <endpt-id> info
create
delete
default-tdi <enable|disable>
add-qtags <qtags>
remove-qtags <qtags>
add-outer-qtag <outer-qtag>
clear-stats
bpdu-traffic <normal|expedite|drop>
flush-mac
local-mac-age-timer <aging>
policing-option <pre-encap|post-encap>
remote-mac-age-timer <aging>
state <enable|disable>
mac-table-size <size>
mac-table-watermark <size>
name <string>
connection <any2any|hub|spoke|p2p>
remote-uni <ipaddr> [mac <value>]
Command Parameter
ingress-cos-profile <string>
ingress-policer <enable|disable>
egress-cos-profile <string>
egress-policer <enable|disable
priority-mapping <pri-map-string>
override-pbit-pri <true|false>
override-type <tos|dscp>
color-based-remarking <enable|disable>
drop-red-packets <true|false>
trunk-group <string>
ingress-mirror <enable|disable>
egress-mirror <enable|disable>
add-user-label1 <string>
add-user-label2 <string>
config i-sid <isid-id> info
create
delete
ForceDelete
b-vlan <vid>
name <string>
state <enable|disable|ForceDisable>
flush-mac
mac-age-timer <secs>
mac-table-size <size>
mac-table-watermark <percent>
evpn-broadcast-optimization <enable|disable>
mux-mode <oneToone|manyToone>
pbt <enable|disable>
config i-sid <isid-id> end-point mlt <mltId> info
create
delete
add-c-vlan <c-vlan-ids>
add-user-label1 <string>
add-user-label2 <string>
Command Parameter
policing-option <pre-encap|post-encap>
remove-c-vlan <c-vlan-ids>
s-vlan <s-vlan-id>
bpdu-traffic <normal|expedite|drop>
state <enable|disable>
name <string>
connection <any2any|p2p>
ingress-cos-profile <string>
ingress-policer <enable|disable>
egress-cos-profile <string>
egress-policer <enable|disable
priority-mapping <pri-map-string>
override-pbit-pri <true|false>
override-type <tos|dscp>
color-based-remarking <enable|disable>
drop-red-packets <true|false>
service-type <tls-transparent|tls-switched|qnq1
|qnq2>
trunk-group <string>
defaullt-isid <enable|disable>
ingress-mirror <enable|disable>
egress-mirror <enable|disable>
config i-sid <isid-id> end-point port <slot/port> info
create
delete
add-c-vlan <c-vlan-ids>
add-user-label1 <string>
add-user-label2 <string>
policing-option <pre-encap|post-encap>
remove-c-vlan <c-vlan-ids>
s-vlan <s-vlan-id>
bpdu-traffic <normal|expedite|drop>
state <enable|disable>
name <string>
Command Parameter
connection <any2any|p2p>
ingress-cos-profile <string>
ingress-policer <enable|disable>
egress-cos-profile <string>
egress-policer <enable|disable
priority-mapping <pri-map-string>
override-pbit-pri <true|false>
override-type <tos|dscp>
color-based-remarking <enable|disable>
drop-red-packets <true|false>
service-type <tls-transparent|tls-switched|qnq1
|qnq2>
trunk-group <string>
defaullt-isid <enable|disable>
ingress-mirror <enable|disable>
egress-mirror <enable|disable>
cfm-vid <cfm-vid-id> add-client-mep
<mdName.maName.mep_id>
cfm-vid <cfm-vid-id> remove-client-mep
<mdName.maName.mep_id>
l2pt-mac-swap cdp <enable|disable>
l2pt-mac-swap vtp <enable|disable>
l2pt-mac-swap stp <enable|disable>
config vlan <vid> cfm-port <slot/port> info
add-mep <mdName.maName.mepId>
remove-mep <mdName.maName.mepId
add-mip <mdName.mipId
remove-mip <mdName.mipId>
config pbt-vlans <vid> info
add <vid>
remove <vid>
config pbt-trunk <trunk-name> info
create
port <port>
source-mac <value>
Command Parameter
remote-peer-mac <value>
delete
vlan <vid>
reverse-vlan <vid>
state <enable|disable>
hold-time <interval-timer>
add-mep <mdName.maName.mep-id>
remove <mep>
add-user-label1 <string>
add-user-label2 <string>
subport-queue-set <index>
config pbt-trunk info [name <value>] [port
<value>] [summary]
show pbt-trunk info [name <value>] [port
<value>] [summary]
config trunk-group <trunk-group-name> info
create
delete
loopback-vlan <vid>
primary-trunk <trunk-name>
secondary-trunk <trunk-name>
active-trunk <trunk-name>
revertive <enable|disable>
add-user-label1 <string>
add-user-label2 <string>
show pbt-nni info
[nni <value>] [uni <value>] [tdi <value>] [isid
<value>] [pw-index <value>]
show pbt-nni stats
[port <value>]
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definintions
Variable Value
ethertype <value> Specify the ethernet type as something other
than the default (0x88e6). The range is
0x1..xffff.
Procedure steps
Step Action
—End—
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
auto-detect <enable|disable> Enables or disables the MA from automatically
detecting remote MEPs. The default is disable.
When you configure a trunk, PBT no longer
automatically adds or removes the MAC
address for the trunk VLAN to the forwarding
database entry. This eliminates the possibility of
the MAC address getting inadvertently removed
when the last trunk to this VLAN is removed.
ccm-interval <integer> Sets the time interval (in milliseconds) for how
often continuity check messages (CCM) are
sent between endpoints within a domain. The
options are: 10, 100, 1000, 10000, 60000, and
600000. The default is 10000.
create [index <value>] Creates a maintenance association.
remove-auto-discovered-rmep <rmep-id> Removes the specified remote MEP.
Step Action
—End—
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ccm-priority <integer> Sets the priority level for transmitting continuity
check messages. The range is from 0 to 7, and
the default is 7.
ccm-tx <enable|disable> Enables or disables sending continuity check
messages from this MEP. The default is enable.
create Creates a maintenance endpoint.
lbm <1..8191|00.00.00.00.00.00> [-c Configures the loopback messages sent from
<value>] [-d <value>] [-f <value>] this MEP.
[-i <value>] [-m <value>] [-p
• -c <value> specifies the burst count
<value>] [-t <value>]
number, which determines how many LBM
messages to send to the remote MEP. The
default burst count is 1, and the maximum
count is 10000.
• -d <value> sets the size of the LBM. The
maximum size is 400 (in bytes). The default
size is the size of the LBM PDU.
• -f <value> sets the fill test pattern in the
LBM PDU to one of the following options
(0-3):
— 0 – Null signal (all zeros) without cyclical
redundancy checking (CRC) - 32
— 1 – Null signal with CRC-32
— 2 – Pseudo-random bit sequence
(PRBS) without CRC-32
— 3 – PRBS with CRC-32
Variable Value
The default is 1.
• -p <value> sets the priority level for
transmitting continuity check messages.
The range is from 0 to 7, and the default
is 7.
• -t <value> sets the interval to wait for
an LBM timeout. The range is 1..10, (in
seconds). The default is 7.
ltm <1..8191|00.00.00.00.00.00> [-t Configures the linktrace messages sent from
<value>] [-p <value>] this MEP.
• -t <value> specifies the time-to-live (TTL)
value for the linktrace message. Each MP
on the way to the destination decrements
the TTL field in the linktrace frame. The
linktrace message is forwarded until it
reaches its destination or the TTL value is
decremented to 0. The default TTL is 64.
• -p <value> sets the priority level for
transmitting continuity check messages.
The range is from 0 to 7, and the default
is 7.
remove-auto-discovered-rmep Removes the specified remote MEP.
<rmep-id>
state <enable|disable> Administratively enables or disables the
maintenance endpoint. The default is disable.
Step Action
—End—
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
• Create a MEP. For information, see "Creating a maintenance endpoint"
(page 27).
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show cfm
mep stats command. For a description of the column names, see
the variable definitions table following this procedure.
—End—
Variable definitions
Variable Value
DOMAIN_NAME Shows the name of the maintenance domain
that these statistics are derived from.
ASSN_NAME Shows the name of the maintenance
association that these statistics are derived
from.
Variable Value
MEP_ID Shows the number of the maintenance
endpoint that these statistics are derived from.
TX_COUNT The total number of CFM messages
transmitted from the remote MEP.
DEFECT The total number of CFM messages missing
on the remote MEP.
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
• Create a MEP. For information, see "Creating a maintenance endpoint"
(page 27).
Procedure steps
Step Action
—End—
ATTENTION
If you see all zeros for the MAC addresses, disable the auto-detect feature. For
more information, see "Creating a maintenance association" (page 25). To see all
MAC addresses detected, enter show cfm rmep all.
Variable definitions
Variable Value
create Creates a maintenance endpoint.
remote-mac <mac-address> Specifies the MAC address of the remote
MEP MAC.
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
• Create a MEP. For information, see "Creating a maintenance endpoint"
(page 27).
• Create an RMEP. For information, see "Creating a remote maintenance
endpoint" (page 32).
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show cfm
rmep stats command. For a description of the column names,
see the variable definitions table following this procedure.
—End—
Variable definitions
Variable Value
DOMAIN_NAME Shows the name of the maintenance domain
that these statistics are derived from.
ASSN_NAME Shows the name of the maintenance
association that these statistics are derived
from.
MEP_ID Shows the number of the maintenance
endpoint that these statistics are derived from.
RMEP_ID The total number of CFM messages
transmitted from the .
STATE Shows the current state of the remote RMEP.
RX_COUNT The total number of CFM messages received
by the local MEP.
SEQ_ERR The total number of CFM messages missing
from the remote MEP.
RDI Set to true when RMEP is sending Remote
Defect Indication (RDI), otherwise false.
The CFM solution uses both linktrace and loopback messages to isolate
the exact point of failure. When a port fails, the MAC addresses are flushed
from the forwarding database (FDB) of the VLANs associated with that port.
When this happens, the linktrace message (LTM) sent to the remote MEP
isolates the area of failure because the destination MERS 8600 does not
respond to the LTM. When you send LBMs to the ports on the unresponsive
MERS 8600, you can discover exactly which port failed.
Loopback messages are unicast messages that you can address to either
a MEP or a MIP, but only a MEP can initiate a loopback message. The
receiving Maintenance Point (MP) responds with a loopback reply. This
mechanism provides fault verification for the MD.
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
-c <value> Sets the burst count number, which
determines how many LBM messages to
send to the remote MEP. The default burst
count is 1, and the maximum count is 200.
-d <value> Sets the size of the LBM. The maximum
size is 400 (in bytes). The default size is
the size of the LBM PDU.
-f <value> Sets the fill test pattern in the LBM PDU to
one of the following options (0–3):
• 0 — Null signal (all zeros) without
cyclical redundancy checking (CRC)
-32
• 1 — Null signal with CRC-32
• 2 — Pseudo-random bit sequence
(PRBS) without CRC-32
• 3 — PRBS with CRC-32
Variable Value
-i <value> The interval between LBM frames with
a range of (0, 10…1000) msecs with a
default value of 0 msecs. The value of 0
msecs indicates to send the frames as fast
as possible."
-m <value> Sets the mode for the transmit loopback
service: RoundTripTime or throughput
mode of operation.
• 1 — This is the throughput mode,
which transmits LBM frames at the
configured transmit interval rate for
the burst count number (-c).
• 2 — This is the RoundTripTime mode,
which transmits LBM frames one at
a time and records the transmit time
locally.
The default is 1.
-p <value> Sets the priority level for transmitting
continuity check messages. The range is
from 0 to 7, and the default is 7.
-t <value> Sets the interval to wait for an LBM
timeout. The range is 1..10, (in seconds),
the default value is 3.
The CFM solution uses both linktrace and loopback messages to isolate
the exact point of failure. When a port fails, the MAC addresses are flushed
from the forwarding database (FDB) of the VLANs associated with that port.
When this happens, the linktrace message (LTM) sent to the remote MEP
isolates the area of failure because the destination MERS 8600 does not
respond to the LTM. When you send LBMs to the ports on the unresponsive
MERS 8600, you can discover exactly which port failed.
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
Procedure steps
Step Action
2 Configure an LTM.
ltm <remote-mep-id|remote-mep-mac>
—End—
Variable definitions
Variable Value
-p <value> Sets the priority level for transmitting
continuity check messages. The range is
from 0 to 7, and the default is 7.
-t <value> Specifies the time-to-live (TTL) value
(1..64) for the linktrace message. Each
MP on the way to the destination does the
following:
• decrements the TTL field in the
linktrace frame
• sends a linktrace reply message to the
originating MEP
• forwards the original linktrace
message to the destination
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 24).
• Create an MA. For information, see "Creating a maintenance
association" (page 25).
• Create a MEP. For information, see "Creating a maintenance endpoint"
(page 27).
Procedure steps
Step Action
1 Create a MIP.
config cfm md <md-name> mip <mip-name> create
—End—
Prerequisites
• Create a MIP. For information, see "Creating a maintenance intermediate
point" (page 39).
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show cfm
mip stats command. For a description of the column names, see
the variable definitions table following this procedure.
—End—
Variable definitions
Variable Value
Domain Name Shows the name of the maintenance domain
that these statistics are derived from.
Domain Index Shows the index number of the domain.
Mip Id Shows the MIP ID number.
Loopback Received Shows the total number of CFM loopback
messages received.
Variable Value
Loopback Replied Shows the total number of CFM loopback reply
messages sent.
Linktrace Received Shows the total number of CFM linktrace
messages received.
Linktrace Replied Shows the total number of CFM linktrace reply
messages sent.
This section describes the commands for using TDIs with PBT. For more
information about TDIs, see Configuration—UNI and Endpoints for non-PBT
VPNs (NN46220-506).
Procedure steps
Step Action
3 Enable PBT.
config tdi <tdi-id> pbt enable
—End—
Variable definitions
Variable Value
create Creates a TDI.
mux-mode <oneToone|manyT Sets the MUX mode so that you can map
oone> one or many qtags to the endpoints for this
TDI. PBT uses one-to-one mode.
• oneToone sets the MUX mode value
to one-to-one mode.
• manyToone sets the MUX mode value
to many-to-one mode.
name <string> Sets a unique name for this transparent
domain.
Variable Value
pbt <enable|disable> Enables or disables PBT on this domain.
The default is disable.
state <disable|enable|For Sets the administrative state of the TDI.
ceDisable>
• enable sets the TDI state to enable.
• disable sets the TDI state to disable.
• ForceDisable disables the TDI
even if the TDI endpoints are in the
active state. When you invoke this
command, the endpoints are placed
into the "operational down" state,
and the administrative state remains
unchanged.
This section describes the commands for using TDI endpoints with PBT.
For more information about TDI endpoints, see Configuration—UNI and
Endpoints for non-PBT VPNs (NN46220-506).
Prerequisites
• Create a TDI. For information, see "Creating a transparent domain
identifier" (page 41).
Procedure steps
Step Action
4 Add Q tags.
config tdi <tdi-id> end-point <endpt-id> add-qtags
<qtags>
—End—
Variable definitions
Variable Value
add-qtags <qtags> Sets the Qtags to the TLS-switched endpoints.
Variable Value
remote-uni Sets the remote-destination UNI ID for
<ipaddr> [mac point-to-point and spoke endpoints.
<value>]
ipaddr is the destination UNI ID (in IP notation).
Optional:
mac value is the MAC address of the destination
UNI ID.
state <enable|disa Administratively enables or disables the port or
ble> NPU. The default is disable.
trunk-group Identifies the trunk group associated with this
<string> endpoint.
Step Action
1 Create the local TDI endpoint using the port or NPU’s ID.
config tdi 100 end-point 2.2.2.2 create
3 Specify the remote TDI endpoint using the port or NPU’s ID.
config tdi 100 end-point 2.2.2.2 remote-uni 1.1.1.1
—End—
Procedure steps
Step Action
2 Enable PBT.
config i-sid <isid-id> pbt enable
—End—
Variable definitions
Variable Value
create Creates an I-SID.
name <string> Assigns a name to this I-SID.
pbt <enable|disable> Enables or disables PBT on this domain.
The default is disable.
state <disable|enable|For Sets the administrative state of the I-SID.
ceDisable>
• enable sets the I-SID state to enable.
• disable sets the I-SID state to
disable.
• ForceDisable disables the I-SID
even if the I-SID endpoints are in the
active state. When you invoke this
command, the endpoints are placed
into the "operational down" state,
and the administrative state remains
unchanged.
This section describes the commands for using I-SID endpoints with PBT.
For more information such as configuring client MEPs and displaying I-SID
and I-SID endpoint statistics, see Configuration—UNI and Endpoints for
non-PBT VPN (NN46220-506).
Prequisites
• Create an I-SID. For information, see "Creating service instance IDs"
(page 46).
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
create Creates an I-SID endpoint.
add-c-vlan Identifies the Customer VLAN to add to this
<c-vlan-ids> endpoint.
Variable Value
s-vlan <s-vlan-id> Identifies the Service VLAN to add to this endpoint.
state <enable|disab Enables or disables the endpoint. The default is
le> disable.
name <string> Names the endpoint, which by default is EP-<sid>
PORT <PortNum>. For example, if SID=1 and it
uses port 1/2, the endpoint name is EP-1 PORT
1/2.
connection Specifies the endpoint connection type.
<any2any|p2p>
If you select the p2p connection-type, you can
optionally specify the MAC address of the endpoint.
Variable Value
l2pt-mac-swap vtp
<enable|disable>
l2pt-mac-swap stp
<enable|disable>
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
config pbt-vlans
add <vid> Adds a VLAN to this PBT domain.
Variable Value
config vlan <vid>
create byport <stg-id> Creates a port-based VLAN.
[name <value> ] [color
<value> ]
• stg-id is the spanning tree group ID (1
to 64).
• name <value> is the name of the
VLAN (0 to 20 characters).
• color <value> is the color of the VLAN
(0 to 32) that Optivity uses to display
the VLAN.
ports add <ports> [member Adds ports to an existing VLAN.
<value> ]
<ports> is the list of ports.
Step Action
—End—
ATTENTION
The default VLAN for cfm-vid is set to 1, which means it is not set to any VLAN.
This means that no CFM messages are accepted or forwarded. To specify a VLAN
to use as the sending VLAN for port CFM packets, use the following command:
config ethernet <slot/port> cfm-vid value 0..4094
Procedure steps
Step Action
2 Add MEPs.
config vlan <vid> cfm-port <slot/port> add-mep
<mdName.maName.mepId>
3 Add MIPs.
config vlan <vid> cfm-port <slot/port> add-mip
<mdName.maName.mipId>
—End—
Variable definitions
Variable Value
info Displays the current configuration
information for this command.
Variable Value
add-mep <mdName.maName.m Specifies the list of MEPs that you
epId> want to add to this VLAN. A MEP list
consists of the Maintenance Domain,
Maintenance Association, and the
MEP ID and uses the following format:
<mdName>.<maName>.<mep_id>.
Separate the MEP components with a ’.’
and separate the MEPs in the list with a ’,’
so a list looks like the following:
<md1>.<ma1>.<mep_id1>,<md2>.<ma2
>.<mep_id2>,...
You can have up to eight MEPs in the list.
add-mip <mdName.maName.m Specifies the list of MIPs that you
ipId> want to add to this VLAN. A MIP list
consists of the Maintenance Domain,
Maintenance Association, and the
MIP ID and uses the following format:
<mdName>.<maName>.<mip_id>.
Separate the MEP components with a ’.’
and separate the MIPs in the list with a ’,’
so a list looks like the following:
<md1>.<ma1>.<mep_id1>,<md2>.<ma2
>.<mep_id2>,...
You can have up to eight MIPs in the list.
When you configure a trunk, PBT does not automatically add or remove
the MAC address for the trunk VLAN to the forwarding database. This
eliminates the possibility of the MAC address getting inadvertently removed
when the last trunk to this VLAN is removed.
ATTENTION
You have to manually add and remove MAC addresses for the trunk VLAN.
Procedure steps
Step Action
1 Create the local end with the following command and a string of 1 to
32 characters that uniquely identifies the PBT trunk.
config pbt-trunk <trunk-name> create
4 Specify the VLAN to use with the local end of this PBT trunk.
config pbt-trunk <trunk-name> vlan <vid>
5 Specify the VLAN used by the remote end of this PBT trunk.
config pbt-trunk <trunk-name> reverse-vlan <vid>
—End—
Variable definitions
Variable Value
add-mep <mdName.maName.m Adds a maintenance endpoint (MEP) to
epId> this PBT trunk. The range of valid MEP
IDs is from 1 to 8191.
Variable Value
add-user-label1 <string> Add a label to provide more management
information or data that would be included
in all traps related to this object. Check
with your network administrator to make
the label meaningful to the trap receiver.
add-user-label2 <string> Add a label to provide more management
information or data that would be included
in all traps related to this object. Check
with your network administrator to make
the label meaningful to the trap receiver.
create Creates a PBT trunk.
hold-time <interval-timer This is an optional parameter that sets the
> trunk hold timer value interval (in seconds).
The timer is used to wait after CCM has
come up before we declare the trunk up,
so as to avoid flapping. The range is from
1 to 120, and the default is 30.
name <value> Enter the name of the trunk for which you
want to display PBT trunk information.
port <port> Specifies the port to use for this PBT trunk.
port refers to the port name in the
slot/port format.
remote-peer-mac <value> Specifies the MAC address of the remote
peer.
value refers to the MAC address in the
0x00:0x00:0x00:0x00:0x00:0x00 format.
This command requires the remote MAC
address of the MERS 8600 on the other
end of this trunk. To get this address, enter
show sys info on the remote MERS
and note the address after PbtMacAddr
under Chassis Info.
reverse-vlan <vid> Specifies a VLAN to use with this PBT
trunk. The default is the configured VLAN
for the PBT trunk. The range is 0..4094.
Only 0,2,3..4094 is legal.
source-mac <value> Specifies the MAC address of the remote
trunk MEP. This is called the source MAC
because it is the source of the continuity
check messages that detect failures. This
field is optional.
Variable Value
subport-queue-set <index> Assign an index value to this subport
queue set. The range is 1..80, and the
default is 1.
state <enable|disable> Administratively enables or disables the
PBT trunk. The default is disable.
vlan <vid> Specifies the VLAN to use with this
unidirectional trunk. This trunk and the
opposing reverse-vlan unidirectional trunk
comprise one bidirectional PBT trunk. The
range is 0..4094. Only 0,2,3..4094 is legal.
Step Action
4 Specify the VLAN to use with the local end of this PBT trunk.
config pbt-trunk tr1901 vlan 90
5 Specify the VLAN used by the remote end of this PBT trunk.
config pbt-trunk tr1901 reverse-vlan 91
—End—
Prerequisites
• Create a PBT trunk. For information, see "Creating the local end "
(page 56).
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show
pbt-trunk stats command.
—End—
Traffic flows through the Primary or the Secondary trunk, never both.
Whichever one is in use is called the Active trunk.
In revertive mode, the primary trunk is the active trunk. If a failure occurs on
the primary trunk, the secondary trunk becomes active. Once the primary
trunk recovers from the failure, the primary trunk becomes the active trunk,
after the hold timer interval expires. The hold timer value is configured when
you create the local end.
In non-revertive mode, when the active trunk fails, the other trunk becomes
the active trunk. Traffic does not revert to the trunk that failed, when it
recovers from the failure.
If no endpoints are using the trunk group, the trunk group displays revertive
behavior, even when the revertive mode is disabled.
Prerequisites
• Create two PBT trunks. For information, see "Creating the local end "
(page 56).
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
active-trunk <trunk-name> Specifies this trunk as the active trunk.
Use this to cause a manual switch for a
non-revertive trunk group.
Variable Value
add-user-label1 <string> Add a label to provide more management
information or data that would be included
in all traps related to this object. Check
with your network administrator to make
the label meaningful to the trap receiver.
add-user-label2 <string> Add a label to provide more management
information or data that would be included
in all traps related to this object. Check
with your network administrator to make
the label meaningful to the trap receiver.
create Creates a PBT trunk group.
loopback-vlan <vid> Configure a loop back VLAN for PBT
local switching. This VLAN must be a
PBT VLAN. For more information, see
"Configuring PBT local switching" (page
65).
primary-trunk <trunk-name Specifies this trunk as the primary trunk.
>
revertive Enables or disables making the primary
trunk revert to its former status as the
<enable|disable>
active trunk.
When the primary trunk fails, the
secondary trunk becomes the active trunk.
• When revertive is enabled and the
primary trunk recovers from a failure,
the primary trunk becomes the active
trunk, after the hold timer interval
expires.
• When revertive is disabled, the
secondary trunk remains the active
trunk, after the primary trunk recovers
from failure.
Step Action
—End—
Prerequisites
• Configure a PBT VLAN. For information, see "Configuring a PBT VLAN"
(page 51).
• Configure a trunk group. For information, see "Configuring a trunk
group" (page 61).
Procedure steps
Step Action
2 Specify a PBT VLAN to be the loopback VLAN for this trunk group.
config trunk-group <trunk-group-name> loopback-vlan
<vid>
—End—
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show pbt-nni
info command. For a description of the column names, see the
variable definitions table.
—End—
Variable definitions
Variable Value
NNI Port Displays the PBT trunk port number.
SERVICE ID Displays the TDI or I-SID associated with this
NNI.
UNI PORT Displays the access port associated with this
NNI.
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show pbt-nni
stats command. For a description of the column names, see the
variable definitions table.
—End—
Variable definitions
Variable Value
NNI PORT Shows the slot/portnumber of the NNI.
OEL2 RX Shows the total number of Optical Ethernet
Layer 2 (OEL2) encapsulated bytes processed
on this ingress NNI port.
OEL2 DROPPED Shows the total number of OEL2 encapsulated
bytes dropped by this ingress NNI port.
MIM RX Shows the total number of MAC-in-MAC or
802.1ah (MIM) encapsulated bytes processed
on this ingress NNI port.
MIM DROPPED Shows the total number of MIM encapsulated
bytes dropped by this ingress NNI port.
Eight counters per port track dropped packets from each queuing class at
egress. The MERS 8600 generates a trap when the percentage of packets
being dropped exceeds a configurable threshold for each queuing class. To
avoid sending too many traps, you can configure an interval timer.
Procedure steps
Step Action
3 Use the following command when you want to clear the drop counter
for all ports.
clear port stats
5 Specify they class and set the threshold percentage for traps sent on
packets dropped on QoS queues.
config qos drop-trap drop-threshold-percentage class
<0..7> percentage <percentage>
—End—
Variable definitions
Variable Value
pbt-drop-trap-timer <value> Configures the timer interval for the PBT
unknown destination MAC counter. The range
is from 1..1440 (in minutes). The 1440 value
equals 24 hours. The default value is 900 (15
minutes).
qos drop-trap drop-threshold-percen Specifies the QoS class, which is from 0..7 and
tage class percentage <percentage> sets the percentage for the drop threshold.
A trap is generated when the dropped packets
exceed this threshold. The range is from 0..100,
and the default is 0%.
• 0% indicates that a trap is set if any packet
is discarded, no matter how many.
• 100% indicates that a trap is set only if all
the packets are being discarded.
qos drop-trap timer-interval Configures the timer interval for the QoS drop
counter. The range is from 1..1440 (in minutes).
The 1440 value equals 24 hours. The default
value is 900 (15 minutes).
qos drop-trap recv-page-drop-trap class {0..7} Specifies the QoS class, which is from 0..7, and
state {disable|enable} enables or disables drop traps on the specified
queuing class.
However, you can configure MSTP on a MERS 8600. Just like there is a
specific STP instance dedicated for PBT VLANs, an MSTP instance is also
dedicated for PBT VLANs. If you enable MSTP, then you must create all
PBT VLANs with this special MSTP instance. Furthermore, MSTP does not
operate in a compatibility mode. This means that all the switches in the
network must be MSTP enabled or none should be enabled.
Procedure steps
Step Action
—End—
Navigation
• "Creating a maintenance domain" (page 72)
• "Creating a maintenance association" (page 73)
• "Creating a maintenance endpoint" (page 76)
• "Displaying MEP statistics" (page 78)
• "Creating a remote maintenance endpoint" (page 79)
• "Displaying RMEP statistics" (page 81)
• "Creating a maintenance intermediate point" (page 82)
• "Displaying MIP statistics" (page 84)
• "Monitoring CFM loopback messages" (page 85)
• "Monitoring CFM linktrace messages" (page 87)
• "Creating a transparent domain identifier" (page 89)
• "Configuring a TDI endpoint" (page 91)
• "Configuring service instance IDs" (page 98)
• "Configuring an I-SID endpoint" (page 100)
• "Configuring a PBT VLAN" (page 105)
• "Configuring a CFM VLAN for MEPs" (page 109)
• "Configuring a CFM VLAN for MIPs" (page 111)
• "Creating the local end of a PBT trunk" (page 112)
• "Displaying PBT trunk statistics" (page 116)
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens, which shows existing
domains. See the following figure.
Maintenance Domain dialog box
2 Click Insert.
The Maintenance Domain, Insert dialog box opens (see the following
figure).
Maintenance Domain, Insert dialog box
5 Click Insert.
—End—
Variable definitions
Variable Value
Index Assigns a unique index number to this
maintenance domain. Device Manager assigns
this automatically, which you can overwrite.
Name Assigns a name to this maintenance domain.
Level Separates MDs from each other so you can
provide different functions to different areas in
the network. The 802.1ag draft recommends the
following assignments:
• level 5–7 to customer equipment
• level 3–4 to service provider equipment
• level 0–2 to operator equipment
Prerequisites
• Create an MD. For information, see "Creating a maintenance domain"
(page 72).
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD.
This activates its Maintenance Association button.
4 Click Insert.
The Maintenance Association, Insert dialog box opens (see the
following figure).
—End—
Variable definitions
Variable Value
AssociationIndex Assigns a unique index number to this
maintenance association. Device Manager
assigns this automatically, which you can
overwrite.
AssociationName Assigns a name to this maintenance
association.
Variable Value
CcmInterval Sets the time interval (in milliseconds) for how
often continuity check messages (CCM) are
sent between endpoints within a domain. The
default is 10000.
AutoDetect Enables or disables the MA from automatically
detecting remote MEPs. The default is disable.
When you configure a trunk, PBT no longer
automatically adds or removes the MAC
address for the trunk VLAN to the forwarding
database entry. This eliminates the possibility
of the MAC address getting inadvertently
removed when the last trunk to this VLAN is
removed.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
6 Click Insert.
The Maintenance Endpoint, Insert dialog box opens (see the
following figure).
Maintenance Endpoint, Insert dialog box
—End—
Variable definitions
Variable Value
Id Assigns a unique ID number to this
maintenance endpoint. Device Manager
assigns this automatically, which you can
overwrite.
AdminState Administratively enables or disables the
maintenance association. The default is
disable.
CcmPriority Sets the priority level for transmitting continuity
check messages. The range is from 0 to 7,
and the default is 7.
CcmTxEnable Enables or disables sending continuity check
messages from this MA. The default is disable.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
6 Select a MEP.
—End—
For a description of the column names, see "Variable definitions" (page 79).
Variable definitions
Variable Value
Absolute Value Shows the absolute value of the received,
transmitted, and dropped octets.
Cumulative Shows the total number of received,
transmitted, and dropped octets.
Average/Sec Shows the average number of received,
transmitted, and dropped octets per second.
Minimum/Sec Shows the minimum number of received,
transmitted, and dropped octets per second.
Maximum/Sec Shows the maximum number of received,
transmitted, and dropped octets per second.
LastVal/Sec Shows the last value received per second.
TxCnt Shows the total number of CFM messages
transmitted from the remote MEP.
RxCnt Shows the total number of CFM messages
received by the local MEP.
RxZeroCnt Shows the total number of CFM messages
received by the local MEP.
MissedCnt Shows the total number of CFM messages
missing on the remote MEP.
UpTimeCnt Shows the total time that CFM messages are
up on the MEP (in milliseconds).
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
ATTENTION
If you see all zeros for the MAC addresses, disable the AutoDetect
feature. For more information, see "Creating a maintenance association"
(page 73).
6 Click Insert.
The Remote Maintenance Endpoint, Insert dialog box opens (see
the following figure).
The Remote Maintenance Endpoint, Insert dialog box opens.
Remote Maintenance EndPoint, Insert dialog box
7 Click Insert.
—End—
Variable definitions
Variable Value
Id Assigns a unique ID number to this remote
maintenance endpoint. Device Manager
assigns this automatically, which you can
overwrite.
MacAddr Specifies the MAC address of the remote MEP
MAC.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
—End—
For a description of the column names, see "Variable definitions" (page 82).
Variable definitions
Variable Value
LearnType Shows how the remote MEP was learned.
• Static indicates the RMEP was manually created.
• Dynamic indicates the RMEP was automatically
detected.
MIPs are always associated with MEPs. Therefore, you cannot have a MIP
on a port that does not already have a MEP. Configuring a MEP with a
MIP is optional.
Prerequisites
• Create a MD. For information, see "Creating a maintenance domain"
(page 72).
• Create a MA. For information, see "Creating a maintenance association"
(page 73).
• Create a MEP. For information, see "Creating a maintenance endpoint"
(page 76).
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
4 Click Insert.
The Maintenance Intermediate Point, Insert dialog box opens (see
the following figure).
6 Click Insert.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Intermediate Point button.
4 Select a MIP.
—End—
For a description of the column names, see "Variable definitions" (page 85).
Variable definitions
Variable Value
LoopbackReceived Shows the total number of CFM loopback messages
received.
LoopbackReplied Shows the total number of CFM loopback reply messages
sent.
LinktraceReceived Shows the total number of CFM linktrace messages
received.
LinktraceReplied Shows the total number of CFM linktrace reply messages
sent.
Procedure Steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
—End—
Variable definitions
Variable Value
DestMacAddress Specifies the MAC address of the destination
MEP.
DestMepId Specifies the ID of the destination MEP.
DestIsMepId Indicates whether the destination is the MEP
ID: true or false.
Messages Specifies the burst count number, which
determines how many LBM messages to send
to the remote MEP. The default burst count is 1,
and the maximum count is 10000.
Variable Value
Priority Sets the priority level for transmitting continuity
check messages. The range is from 0 to 7, and
the default is 7.
Status Shows the status of the loopback command:
• ready indicates that the MEPs are ready for
you to initiate a loopback message.
• not ready indicates that the MEPs are not
configured so you cannot initiate a loopback
messaged.
• transmit initiates a loopback message.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
—End—
Variable definitions
Variable Value
Sets the priority level for transmitting continuity
Vlan Priority check messages. The range is from 0 to 7, and
the default is 7.
Specifies the MAC address of the destination
DestMacAddress
MEP.
DestMepId Specifies the ID of the destination MEP.
Indicates whether the destination is the MEP
DestIsMepId
ID: true or false.
Variable Value
Ttl Specifies the time-to-live (TTL) value for the
linktrace message. Each MP on the way to the
destination does the following:
• decrements the TTL field in the linktrace
frame
• sends a linktrace reply message to the
originating MEP
• forwards the original linktrace message to
the destination
Procedure steps
Step Action
The TDI dialog box opens with the General tab displayed (see the
following figure).
Transparent Domain dialog box
2 Click Insert.
The TDI, Insert General dialog box opens (see the following figure).
TDI, Insert General dialog box
8 Click Insert.
—End—
Variable definitions
Variable Value
Id Assigns a unique index number to this TDI.
Device Manager assigns this automatically,
which you can overwrite.
Name Assigns a name to this TDI.
MappedVlan PBT does not support mapped VLANs. If you
enable PBT, the MERS ignores this parameter.
See PbtEnable.
Procedure steps
Step Action
2 Select Endpoint.
The TDI dialog box opens with the Endpoint tab displayed (see the
following figure).
TDI Endpoint dialog box
3 Click Insert.
The TDI, Insert Endpoint dialog box opens (see the following figure).
TDI, Insert Endpoint dialog box
11 Click Insert.
—End—
Variable definitions
Variable Value
TdId Sets a unique numeric value, in the range 1 and 16 777 215, that
represents the id of the transparent domain you are configuring.
UniAddr Sets the UNI ID (in IP notation)
Name Allows you to enter a unique name that identifies the TDI endpoint.
• Enter a string length in the range 1 and 32 alphanumeric
characters.
ConMode Allows you to set the connection-type value for the endpoint.
• any2any sets the connection-type value to any-to-any mode.
• hub sets the connection-type value to hub mode.
• spoke sets the connection-type value to spoke mode.
• pt2pt sets the connection-type value to point-to-point mode.
RemoteUni Sets the remote-destination UNI ID for point-to-point and spoke
endpoints.
• Enter a destination UNI ID (in IP notation).
Optional:
• Enter the MAC address of the destination UNI ID.
MacAddr Sets the MAC address for the endpoint in the format of
0x00:0x00:0x00:0x00:0x00:0x00
BpduTraffic Sets the BPDU Traffic control for the specified endpoint. The
default setting is normal.
• normal all BPDU traffic forwards without restriction.
• expedite sets the endpoint to expedite forwarding of BPDU
packets by raising the QoS level to the highest level defined
within the priority mapping values.
• drop drops selected BPDU traffic.
LocalMacAgeTimer Sets the MAC address ageing timer for locally learned customer
destination MAC address. This variable is valid for end-points
created on ESM ports only.
.
• number is an integer value in the range 1 and 65 535 seconds,
that represents the ageing time.
Variable Value
RemoteMacAgeTimer Sets the MAC address ageing timer for customer destination MAC
address learned from remote network UNI IDs. This variable is
valid for end-points created on ESM ports only.
• number is an integer value in the range 1 and 65 535 seconds,
that represents the ageing time.
MacTblSize Sets the maximum MAC table size for the endpoint. This variable
is valid for end-points created on ESM ports only.
• Enter an integer value in the range 0 and 97 000 entries, that
represents the MAC table size. This is true for ESM only, not
for R modules
If you enter a value of 0 (zero) you disable the MAC table size
parameter.
MacTblWaterMk Defines a high-watermark threshold for the MAC table size. When
this threshold is exceeded, the system sends an SNMP trap
to inform you that the threshold limit has been exceeded. This
variable is valid for end-points created on ESM ports only.
• Enter an integer value in the range 0 and 90%, that represents
the MAC table size threshold limit.
Variable Value
PriMapping Sets the SP priority mapping for the endpoint.
• Enter a string length in the format a:b:c:d:e:f:g:h.
Where:
Each string character represents a value in the range 0 and 7,
which indicates the SP QoS remarking.
PriOverride Configures the endpoint to use DSCP/TOS bits for QoS
classification.
• Checked indicates that the endpoint uses DSCP/TOS bits
for QoS classification.
• Unchecked indicates that the endpoint uses P-bits for QoS
classification.
Qtags Sets the q-tags to the TLS-switched endpoints.
• Enter an integer value in the range 1 and 4 096, that
represents the customer 802.1 q-tag ID.
For a full discussion of policing and other QoS features, see QoS
and Traffic Management (NN46220-508).
Variable Value
PriOverrideType When PriOverride is enabled (checked), this command specifies
what QoS field to use.
• tos specifies Type of Service (ToS).
• dscp specifies Differentiated Services Code Point (DSCP).
Procedure steps
Step Action
1 From the Device Manager menu bar, select VPN > I-SID.
The ISID dialog box appears with the General tab displayed (see
the following figure).
ISID dialog box, General tab
2 Click Insert.
The ISID, Insert General dialog box appears (see the following
figure).
7 Click Insert.
—End—
Variable definitions
Variable Value
Id Assigns a unique index number to this I-SID. Device Manager
assigns this automatically, which you can overwrite.
Name Assigns a name to this I-SID.
AdminState Enables or disable the I-SID. The ForceDisable administration
state disables the I-SID even if the I-SID endpoints are in the active
state. When you invoke this command, the endpoints are placed
into the "operational down" state, and the administrative state
remains unchanged.
PbtEndable Enables or disables PBT on the I-SID.
Procedure steps
Step Action
1 From the Device Manager menu bar, select VPN > I-SID .
The ISID dialog box open with the General tab displayed.
2 Click Endpoint.
The ISID dialog box, Endpoint tab opens.
3 Click Insert.
The I-SID Endpoint Insert dialog box appears (see the following
figure).
6 Click Insert.
—End—
Variable definitions
Variable Value
IsidId Assigns a unique index number to this I-SID.
Port Identifies the port assigned to this endpoint.
MltID Identifies MLT assigned to this endpoiont. The system supports up
to 128 UNI MLTs. You can assign MltIDs in the range of 0 to 256.
However, the maximum number of MLT identifiers you can configure
is 128.
RingId A unique integer value, in the range of 1 and 254, which represents
the ESU ring number that the Metro ESU 1800 or 1850 is connected
to.
ModId A unique integer value (in the range of 1 to 23) that identifies the
Metro ESU 1800 or 1850 within the ring.
EsuPort A unique integer value (in the range 1 to 28) that identifies the
physical port on the Metro ESU 1800 or 1850.
Name Names the endpoint, which by default is EP-<sid> PORT
<PortNum>. For example, if SID=1 and it uses port 1/2, the endpoint
name is EP-1 PORT 1/2.
ConnectType Specifies the type of endpoint connection: any2any or pt2pt.
RemoteMacAddr Identifies the remote MAC address of the other endpoint.
IngressCosProfileName Sets the Cos profile for the ingress endpoint. Choose from a
predefined selection of cos profiles. Default value is Default_Profile.
EgressCosProfileName Sets the Cos profile for the egress endpoint. Choose from a
predefined selection of cos profiles. Default value is Default_Profile.
IngressPolicer Allows you to enable or disable the specified endpoint’s ingress
cos-profile command.
• enable enables the ingress cos-profile command.
• disable disables the ingress cos-profile command.
Variable Value
EgressPolicer Allows you to enable or disable the specified endpoint’s egress
cos-profile command.
• enable enables the egress cos-profile command.
• disable disables the egress cos-profile command.
Variable Value
ServiceType Set the service type value.
• transparent sets the service type value to TLS transparent mode.
• switched sets the service type value to TLS switched mode.
• qnq1 sets the service type value to Q&Q (1) mode.
• qnq2 sets the service type value to Q&Q (2) mode.
•
C-Vlans Identifier for the customer VLAN. Use 4096 to represent untagged
customer packets.
S-Vlan Adds the specified s-VLAN to this endpoint. Applicable only to
endpoints with service type qnq1 or qnq2.
TrunkGroup Identifies the Trunk Group.
PolicingOption Specify to polices frames before or after encapsulating packets with
OEL2.
• preEncap polices frames before encapsulating packets with
OEL2.
• postEncap polices frames after encapsulating packets with
OEL2.
For a full discussion of policing and other QoS features, see QoS
and Traffic Management (NN46220-508).
PriOverrideType When PriOverride is enabled (checked), this command specifies
what QoS field to use.
• tos specifies Type of Service (ToS).
• dscp specifies Differentiated Services Code Point (DSCP).
Variable Value
DefaultIsid Configures this port as a default I-SID endpoint. You can configure
one default I-SID endpoint per port only.
• enable means that ingress packets that do not belong to any of
the configured I-SID ports are sent to this port.
• disable means that ingress packets that do not belong to any of
the configured I-SID ports are dropped.
L2ptMacSwapCdp Enable or disable L2pt (Layer 2 Tunneling Protocol) MAC swapping
for a CDP (Cisco Discovery Protocol) endpoint.
L2ptMacSwapVtp Enable or disable L2pt (Layer 2 Tunneling Protocol) MAC swapping
for a VTP (Vlan Trunking Protocol) endpoint.
L2ptMacSwapStp Enable or disable L2pt (Layer 2 Tunneling Protocol) MAC swapping
for an STP endpoint.
UserLabel1 Add a label to provide more management information or data that
would be included in all traps related to this object. Check with
your network administrator to make the label meaningful to the trap
receiver.
UsersLabel2 Add a second label to provide more management information or
data that would be included in all traps related to this object. Check
with your network administrator to make the label meaningful to
the trap receiver.
AdminState Enables or disables the endpoint.
For information about STG, STP, and VLANs, see Configuring VLANs,
Spanning Tree, and Link Aggregation (314725-E).
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > Vlans.
The PBT VLANs dialog box opens (see "PBT VLANs dialog box"
(page 106)).
PBT VLANs dialog box
2 Enter the VLAN ID numbers that you want to reserve for PBT.
3 Click Apply.
5 Click Insert.
The STG, Insert Configuration dialog box opens (see "STG, Insert
Configuration dialog box" (page 107)).
8 In the EnableStp field, clear the check mark to disable STP on this
STG.
9 Click Insert.
15 Click Insert.
—End—
Variable definitions
Variable Value
PBT VLANs dialog box
Vlans Adds a VLAN to this PBT domain.
Variable Value
PortMembers Adds ports to an existing VLAN.
ATTENTION
The default VLAN for cfm-vid is set to 1, which means it is not set to any VLAN.
This means that no CFM messages are accepted or forwarded. To specify a VLAN
to use as the sending VLAN for port CFM packets, use the following command:
config ethernet <slot/port> cfm-vid <value 0..4094>
Procedure steps
Step Action
3 Click Insert.
The CFM Port MEP, Insert dialog box opens (see the following
figure).
7 Click Insert.
—End—
Variable definitions
Variable Value
VlanId Specifies a unique ID for this VLAN.
Specifies the port that you want to associate
Port
with this VLAN.
MepList Specifies the list of MEPs that you want
to add to this VLAN. A MepList consists
of the Maintenance Domain, Maintenance
Association, and the MEP ID and uses the
following format: <md>.<ma>.<mep_id>.
Separate the MEP components with a ’.’ and
separate the MEPs in the list with a ’,’ so a list
looks like the following:
<md1>.<ma1>.<mep_id1>,<md2>.<ma2>.<m
ep_id2>,...
You can have up to eight MEPs in the MepList.
Procedure steps
Step Action
3 Click Insert.
The CFM Port MIP, Insert dialog box opens (see the following figure).
7 Click Insert.
—End—
Variable definitions
Variable Value
VlanId Specifies a unique ID for this VLAN.
Specifies the port that you want to associate
Port
with this VLAN.
MipList Specifies the list of MIPs that you want
to add to this VLAN. A MipList consists
of the Maintenance Domain, Maintenance
Association, and the MIP ID and uses the
following format: <md>.<ma>.<mip_id>.
Separate the MEP components with a ’.’ and
separate the MEPs in the list with a ’,’ so a list
looks like the following:
<md1>.<ma1>.<mip_id1>,<md2>.<ma2>.<m
ip_id2>,...
You can have up to eight MIPs in the MipList.
When you configure a trunk, PBT does not automatically add or remove
the MAC address for the trunk VLAN to the forwarding database. This
eliminates the possibility of the MAC address getting inadvertently removed
when the last trunk to this VLAN is removed.
ATTENTION
You have to manually add and remove MAC addresses for the trunk VLAN.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > Trunk.
The PBT Trunk dialog box opens (see the following figure).
PBT trunk dialog box
2 Click Insert.
The PBT Trunk, Insert dialog box opens (see the following figure).
4 In the Port field, specify the local NNI port that the trunk should use.
5 In the AdminState field, select enable.
6 In the MAC field, specify the MAC address of the remote NNI port.
To find the MAC address of the remote NNI, log on to the MERS
8600 on the other end of this trunk. Click Edit > Chassis > Chassis
tab and note the address in the BaseMacAddr field.
10 In the ReverseVlanId field, specify the VLAN that the remote end
of this trunk should use.
11 In the MepId field, associate this trunk to a MEP.
14 Click Insert.
—End—
Variable definitions
Variable Value
Name Assigns a name to this trunk.
Port Specifies the port to use for this PBT trunk.
AdminState Administratively enables or disables the PBT
trunk.
Mac Specifies the MAC address of the MERS 8600
on the other end of this trunk.
Variable Value
UserLabel2 Add a label to provide more management
information or data that would be included
in all traps related to this object. Check with
your network administrator to make the label
meaningful to the trap receiver.
SubportQueueSet Assign an index value to this subport queue
set. The range is 1..80, and the default is 1.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > Trunk.
The PBT Trunk dialog box opens.
2 Select a trunk.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > Trunk
Group.
The Trunk Group dialog box opens (see the following figure).
Trunk Group dialog box
2 Click Insert.
The Trunk Group, Insert dialog box opens (see the following figure).
8 Click Insert.
—End—
Variable definitions
Variable Value
Name Assigns a name to this trunk group.
PrimaryTrunk Specifies this trunk as the primary trunk.
SecondaryTrunk Specifies this trunk as the secondary trunk,
which serves as a backup to the primary trunk.
ActiveTrunk Specifies this trunk as the active trunk, which
means that it is currently in use.
Revertive Enables or disables making the primary trunk
revert to its former status as the active trunk.
Variable Value
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > Trunk
Group.
2 Specify a PBT VLAN to be the loopback VLAN for this trunk group.
—End—
Variable definitions
Variable Value
Port Displays the PBT trunk port number.
ServiceId Displays the TDI or I-SID ID.
PwIndex Displays the pseudowire index associated with this NNI.
TlsIndex Displays the access port index associated with this NNI.
TgName Displays the PBT trunk group name.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > PBT > NNI.
The NNI dialog box opens.
2 Select an NNI.
—End—
Variable definitions
Variable Value
Oel2RxOctets Shows the total number of Optical Ethernet Layer 2
(OEL2) encapsulated bytes processed on this ingress
NNI port.
Oel2RxDroppedOctets Shows the total number of OEL2 encapsulated bytes
dropped by this ingress NNI port.
MimRxOctets Shows the total number of MAC-in-MAC or 802.1ah (MIM)
encapsulated bytes processed on this ingress NNI port.
MimRxDroppedOctets Shows the total number of MIM encapsulated bytes
dropped by this ingress NNI port.
PweRxOctets Shows the total number of Pseudowire (Pwe)
encapsulated bytes processed on this ingress NNI port.
PweRxDroppedOctets Shows the total number of Pwe encapsulated bytes
dropped by this ingress NNI port.
Procedure steps
Step Action
1 From the Device Manager menu bar, select one of the following
paths to select either a TDI or an I-SID:VPN > TDI or VPN > I-SID.
The I-SID dialog box open with the General tab displayed.
2 Click Endpoint.
3 Click Insert.
The I-SID Endpoint Insert dialog box appears (see the following
figure).
4 In the PolicingOption field, select how you want to police the frames:
pre or post encapsulation.
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VLAN > Spanning Tree
> Globals.
The Globals dialog box opens (see the following figure).
2 Click mstp.
3 Click Apply.
4 Click Yes.
—End—
ATTENTION
To maintain backward compatibility, the CLI hierarchy changed for the
unknown-destmac-discard command. This command is now under flags.
When you first upgrade the boot monitor with oe8b4100.img, the existing boot.cfg
loads with no problem. After the switch is up and running and before you start
configuring PBT, set the bootconfig flag to discard unknown MAC destinations.
The default setting is false. Use the following command to set the bootconfig flag
to true. Then save boot.cfg and reboot the MERS 8600.
config bootconfig flags unknown-destmac-discard true
If you are not upgrading the boot monitor, use the following steps to stop
in monitor mode:
Step Action
6 Reboot.
—End—
Each section within the example shows the commands related to a specific
task. To learn more about these commands and their parameters, there is a
link to the CLI and Device Manager step-by-step procedures related to that
task. This chapter includes the following topics.
Navigation
• "PBT domains" (page 126)
• "MERS 8600 number 1" (page 129)
• "MERS 8600 number 2" (page 134)
• "MERS 8600 Three Switch Configuration" (page 139)
PBT domains
The following figures show the domains configured in this example.
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance domain" (page 24).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance domain" (page 72).
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance association" (page 25).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance association" (page 73).
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance endpoint" (page 27).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance endpoint" (page 76).
For more information and to see how to configure this command with the
CLI, see "Creating a remote maintenance endpoint" (page 32)
For more information and to see how to configure this command with Device
Manager, see "Creating a remote maintenance endpoint" (page 79)
Port configuration
The following commands show how to tag ports to maintain the customer’s
QoS requirements. This is not a PBT-specific command so it is documented
in another manual. See Configuring VLANs, Spanning Tree, and Link
Aggregation (314725-E).
PBT-VLANs configuration
The following command shows how to reserve VLANs for PBT to use.
For more information and to see how to configure this command with the
CLI, see "Configuring a PBT VLAN" (page 51).
For more information and to see how to configure this command with Device
Manager, see "Configuring a PBT VLAN" (page 105).
STG configuration
The following commands show how to configure STG and disable STP. This
is not a PBT-specific command so it is documented in another manual. See
Configuring VLANs, Spanning Tree, and Link Aggregation (314725-E).
VLAN configuration
The following commands show how to configure VLANs. This is not a
PBT-specific command so it is documented in another manual. See
Configuring VLANs, Spanning Tree, and Link Aggregation (314725-E).
Trunk configuration
The following commands show how to configure two PBT trunks.
For more information and to see how to configure this command with the
CLI, see "Creating the local end " (page 56).
For more information and to see how to configure this command with Device
Manager, see "Creating the local end of a PBT trunk" (page 112).
Trunk-group configuration
The following commands show how to configure a PBT trunk group.
For more information and to see how to configure this command with the
CLI, see "Configuring a trunk group" (page 61).
For more information and to see how to configure this command with Device
Manager, see "Configuring a trunk group" (page 117).
UNI configuration
The following commands show how to configure a UNI. This is not a
PBT-specific command so it is documented in other manuals.
I-SID configuration
The following commands show how to configure an I-SID and assign an
I-SID endpoint.
For more information and to see how to configure this command with the
CLI, see "Creating service instance IDs" (page 46)and "Configuring an
I-SID endpoint" (page 47).
For more information and to see how to configure this command with Device
Manager, see "Configuring service instance IDs" (page 98)and "Configuring
an I-SID endpoint" (page 100).
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance domain" (page 24).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance domain" (page 72).
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance association" (page 25).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance association" (page 73).
For more information and to see how to configure this command with the
CLI, see "Creating a maintenance endpoint" (page 27).
For more information and to see how to configure this command with Device
Manager, see "Creating a maintenance endpoint" (page 76).
For more information and to see how to configure this command with the
CLI, see "Creating a remote maintenance endpoint" (page 32)
For more information and to see how to configure this command with Device
Manager, see "Creating a remote maintenance endpoint" (page 79)
Port configuration
The following commands show how to tag ports to maintain the customer’s
QoS requirements. This is not a PBT-specific command so it is documented
in another manual. See Configuring VLANs, Spanning Tree, and Link
Aggregation (314725-E).
PBT-VLANs configuration
The following command shows how to reserve VLANs for PBT to use.
For more information and to see how to configure this command with the
CLI, see "Configuring a PBT VLAN" (page 51).
For more information and to see how to configure this command with Device
Manager, see "Configuring a PBT VLAN" (page 105).
STG configuration
The following commands show how to configure STG and disable STP. This
is not a PBT-specific command so it is documented in another manual. See
Configuring VLANs, Spanning Tree, and Link Aggregation (314725-E).
VLAN configuration
The following commands show how to configure VLANs. This is not a
PBT-specific command so it is documented in another manual. See
Configuring VLANs, Spanning Tree, and Link Aggregation (314725-E).
Trunk configuration
The following commands show how to configure two PBT trunks.
For more information and to see how to configure this command with the
CLI, see "Creating the local end " (page 56).
For more information and to see how to configure this command with Device
Manager, see "Creating the local end of a PBT trunk" (page 112).
Trunk-group configuration
The following commands show how to configure a PBT trunk group.
For more information and to see how to configure this command with the
CLI, see "Configuring a trunk group" (page 61).
For more information and to see how to configure this command with Device
Manager, see "Configuring a trunk group" (page 117).
UNI configuration
The following commands show how to configure a UNI. This is not a
PBT-specific command so it is documented in other manuals.
I-SID configuration
The following commands show how to configure an I-SID and assign an
I-SID endpoint.
For more information and to see how to configure this command with the
CLI, see "Creating service instance IDs" (page 46)and "Configuring an
I-SID endpoint" (page 47).
For more information and to see how to configure this command with Device
Manager, see "Configuring service instance IDs" (page 98)and "Configuring
an I-SID endpoint" (page 100).
Index
A L
active trunk 61, 117 linktrace messages 37
loopback messages 35
B
broadcast-on-unknown 12 M
MAC address
C finding remote trunk 132
CCM learning 12
MA parameters in CLI 26 maintenance association
MA parameters in Device configuration example 130
Manager 76 configuring with CLI 25
MEP parameters in CLI 28 configuring with Device Manager 72
MEP parameters in Device maintenance domain
Manager 77 configuration example 130
cfm ethernet type configuring with CLI 24
configuring with CLI 24 configuring with Device Manager 71
connection type 43, 47 maintenance endpoint
configuration example 130
E configuring with CLI 27
configuring with Device Manager 73
enabling PBT 41, 46, 77 statistics 30, 33, 65, 66, 76
encapsulation method 41, 46, 77 maintenance intermediate point
ethernet type (cfm) configuring with CLI 39
configuring with CLI 24 maintenance intermediate point statistics 39
mux mode 41, 46, 77
F
failover protection 61, 117 N
fdb -static option 139 NNI 56, 112
I P
I-SID PBT trunk
configuring with CLI 46 configuration example 132, 133, 139
configuring with CLI 56
S
secondary trunk 61, 117
Publication: NN46220-504
Document status: Standard
Document version: 02.01
Document date: 3 August 2007
This document is protected by copyright laws and international treaties. All information, copyrights and any other intellectual
property rights contained in this document are the property of Nortel Networks. Except as expressly authorized in writing by Nortel
Networks, the holder is granted no rights to use the information contained herein and this document shall not be published, copied,
produced or reproduced, modified, translated, compiled, distributed, displayed or transmitted, in whole or part, in any form or media.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty.
Users must take full responsibility for their applications of any products specified in this document. The information in this document
is proprietary to Nortel Networks Inc.
Nortel, the Nortel logo, the Globemark, and Passport are trademarks of Nortel Networks.