Documentos de Académico
Documentos de Profesional
Documentos de Cultura
10.3
NN47263-503, 04.01
October 2010
Copyright
Except where expressly stated otherwise, no use should be made of
materials on this site, the Documentation(s) and Product(s) provided
by Avaya. All content on this site, the documentation(s) and the
product(s) provided by Avaya including the selection, arrangement and
design of the content is owned either by Avaya or its licensors and is
October 2010
Contents
Chapter 1: New in this release.................................................................................................9
Other changes...................................................................................................................................................9
October 2010
Route refresh..........................................................................................................................................39
BGP planning considerations.................................................................................................................40
BGP multicast.................................................................................................................................................42
Protocol Independent Multicast-Sparse Mode................................................................................................42
PIM-SM concepts and terminology.........................................................................................................43
Shared trees and shortest-path trees.....................................................................................................47
Receiver joining group............................................................................................................................48
Receiver leaving group...........................................................................................................................49
Source sending packets to group...........................................................................................................49
Required elements for PIM-SM operation..............................................................................................50
PIM-SM simplified example....................................................................................................................50
PIM-SM static source groups.................................................................................................................51
Static source groups...............................................................................................................................52
PIM-SM Multipath............................................................................................................................................52
Anycast RP for PIM-SM..................................................................................................................................53
Static Multicast Routing Support.....................................................................................................................53
PIM-SSM.........................................................................................................................................................53
SSM features..........................................................................................................................................53
PIM-SSM architecture............................................................................................................................54
Avaya Secure Router 2330/4134 implementation of SSM and IGMP....................................................56
PIM-SSM static source groups...............................................................................................................59
Configuration limitations.........................................................................................................................59
Multicast link discovery...................................................................................................................................59
MLD versions 1 and 2.............................................................................................................................60
IPv6 Routing over VLAN.................................................................................................................................60
October 2010
October 2010
October 2010
October 2010
October 2010
Other changes
This document is rebranded to Avaya.
October 2010
10
October 2010
October 2010
11
12
October 2010
IPv6 addresses
IPv6 addresses are 128 bits in length. The address identifies a single interface or multiple
interfaces. IPv4 addresses, in comparison, are 32 bits in length. The increased number of
possible addresses in IPv6 solves the inevitable IP Address exhaustion inherent to IPv4.
The IPv6 address contains two parts: an address prefix and an IPv6 interface ID. The first 3
bits indicate the type of address that follows. Figure 2: 128-Bit IPv6 address format on
page 13 shows the IPv6 address format.
Interface ID
The interface ID is a unique number that identifies an IPv6 node (a host or a router). For
stateless autoconfiguration the ID is 64 bits in length.
In IPv6 stateless autoconfiguration, the interface ID is derived by a formula that uses the link
layer 48-bit MAC address. (In most cases, the interface ID is a 64-bit interface ID that contains
the 48-bit MAC address.) The IPv6 interface ID is as unique as the MAC address.
If you manually configure interface IDs or MAC addresses (or both), no relationship between
the MAC address and the interface ID is necessary. A manually configured interface ID can
be longer or shorter than 64 bits.
Anycast Address
An IPv6 anycast address is a unicast address identifying a group of IPv6 nodes that share a
common variable-length address prefix. A packet bearing an anycast address is delivered to
one node in the group. There is no visual way of distinguishing an anycast address from an
unicast address.
Multicast Address
An IPv6 multicast address identifies a group of nodes. A packet bearing a multicast address
is delivered to all members of the group. (The function of IPv4 broadcast addresses has been
superseded by IPv6 multicast addresses.)
October 2010
13
Figure 3: Multicast Address Format on page 14 shows the format of an IPv6 multicast
address.
A value of FF (11111111) in the 8 high-order bits of an IPv6 address indicates that the address
specifies a multicast group. The 4-bit flags field indicates whether the group is permanent or
transient. The 4-bit scope field indicates the scope of the group specified in the 112-bit group
ID field. The scope options are:
1 - node local
2 - link-local
3 - subnet local
4 - admin local
5 - site-local
8 - organization-local
B - community-local
E - global
An example of a multicast address is: FF01:0:0:0:0:0:0:101
IPv4-Compatible Address
The IPv4-compatible address, which includes an IPv4 address in the low-order 32 bits, is
intended for IPv6 nodes that need to inter operate with IPv4 nodes. Figure 4: IPv4Compatible Unicast Address Format on page 14 shows the format of an IPv4-compatible
address.
Address formats
The format for representing an IPv6 address is
14
October 2010
n:n:n:n:n:n:n:n
n is the hexadecimal representation of 16 bits in the address. For example:
FF01:0:0:0:0:0:0:43
Each non zero field must contain at least one numeral. Within a given hexadecimal field
however, leading zeros are not required.
Certain classes of IPv6 addresses commonly include multiple contiguous fields containing
hexadecimal 0. The following sample address includes five contiguous fields containing 0
represents contiguous fields containing zeroes with a double colon (::):
FF01::43
You can use a double colon to compress the leading zero fields in a hexadecimal address. A
double colon can appear once in an address.
An IPv4-compatible address combines hexadecimal and decimal values as follows:
x:x:x:x:x:x:d.d.d.d
x:x:x:x:x:x is a hexadecimal representation of the six high-order 16-bit pieces of the address,
and d.d.d.d is a decimal representation of the four 8-bit pieces of the address. For example:
0:0:0:0:0:0:13.1.68.3
or
::13.1.68.3
IPv6 examines the destination address in the main header of each packet it receives: this
examination determines whether the router is the packet destination or an intermediate node
in the packet data path. If the router is the destination of the packet, IPv6 examines the header
extensions that contain options for destination processing. If the router is an intermediate node,
IPv6 examines the header extensions that contain forwarding options.
October 2010
15
By examining only the extension headers that apply to the operations it performs, IPv6 reduces
the amount of time and processing resources required to process a packet.
IPv6 defines the following extension headers:
The hop-by-hop extension header contains optional information that all intermediate IPv6
routers examine between the source and the destination.
The end-to-end extension header contains optional information for the destination node.
The source routing extension header contains a list of one or more intermediate nodes
that define a path for the packet to follow through the network, to its destination. The
packet source creates this list. This function is similar to the IPv4 source routing options.
The fragmentation extension header uses by an IPv6 source to send packets larger than
the size specified for the path MTU.
The authentication extension header and the security encapsulation extension header,
used singly or jointly, provide security services for IPv6 datagrams.
16
IPv4
IPv6
Address length
32 bits
128 bits
IPSec support
Optional
Required
QoS support
Limited
Improved
Fragmentation
Hosts only
576 bytes
1280 bytes
Checksum in header
Yes
No
Options in header
Yes
No
Link-layer address
resolution
ARP (broadcast)
Multicast Neighbor
Discovery Messages
Multicast membership
IGMP
Router Discovery
Optional
Required
Uses broadcasts
Yes
No
Configuration
Manual, DHCP
Automatic, DHCP
October 2010
ICMPv6
ICMPv6
Internet Control Message Protocol (ICMP) version 6 maintains and improves upon features
from ICMP for IPv4. ICMPv6 reports the delivery of forwarding errors, such as Destination
Unreachable, Packet Too Big, Time Exceeded, and Parameter Problem. ICMPv6 also delivers
information messages such as echo request and echo reply.
Important:
ICMPv6 plays an important role in IPv6 features such as Neighbor Discovery, Multicast
Listener Discovery and Path MTU Discovery.
Neighbor discovery
Neighbor discovery (ND) allows IPv6 nodes (routers and hosts) on the same link to discover
link layer addresses and to obtain and advertise various network parameters and reachability
information. ND combines the services provided for IPv4 with the Address Resolution Protocol
(ARP) and router discovery. ND replaces ARP in IPv6.
Hosts use ND to discover the routers in the network that you can use as the default routers,
and to determine the link layer address of their neighbors attached on their local links. Routers
also use ND to discover their neighbors and their link layer information. ND also updates the
neighbor database with valid entries, invalid entries, and entries migrated to different locations.
ND protocol provides you with the following:
Address and prefix Discovery: hosts determine the set of addresses that are on-link for
the given link. Nodes determine which addresses or prefixes are locally reachable and
are remote with address and prefix discovery.
Router Discovery: hosts discover neighboring routers with router discovery. Hosts then
establish neighbors as default packet-forwarding routers.
Parameter Discovery: host and routers discover link parameters such as the link MTU or
the hop limit value placed in outgoing packets.
Duplicate address detection: hosts and nodes determine if an address is assigned to
another router or a host.
Address Resolution: hosts determine link layer addresses (MAC for Ethernet) of the local
neighbors (attached on the local net), provided the IP address is known.
Next-Hop determination: hosts determine how to forward local or remote traffic with nexthop determination. The next-hop can be a local or remote router.
October 2010
17
ND messages
Table 2: IPv6 and IPv4 Neighbor comparison on page 18 shows new ICMPv6 message types.
Table 2: IPv6 and IPv4 Neighbor comparison
IPv4 Neighbor
Function
18
IPv6 Neighbor
Function
Description
Neighbor
Advertisement
ARP cache
Neighbor cache
October 2010
Neighbor discovery
IPv4 Neighbor
Function
IPv6 Neighbor
Function
Description
the network. See ND cache on
page 19.
Gratuitous ARP
Duplicate address
detection
Router Solicitation
message (optional)
Router Solicitation
(required)
Router Advertisement
message (optional)
Router Advertisement
(required)
Redirect message
Redirect message
ND cache
The neighbor discovery cache lists information about neighbors in your network.
The neighbor discovery cache can contain the following types of neighbors:
Static: a configured neighbor
Local: a device on the local system
Dynamic: a discovered neighbor
Table 3: Neighbor cache states on page 20 describes neighbor cache states.
October 2010
19
Description
Incomplete
Reachable
Stale
Delay
Probe
The following events affect the Neighbor cache. Processing the following events involves layer
2 and layer 3 interaction:
Important:
Administrative actions cause certain events. These events affect system stability.
Flushing the VLAN MAC.
Remove VLANr.
Performing an action on all VLANs.
Remove a port from a VLAN.
Performing an action that disables a VLAN, such as removing all ports from VLAN.
Disable a tagged port that is a member of multiple routable VLANs.
Table 4: IPv4 and IPv6 Neighbor Discovery comparison on page 20 shows a comparison of
IPv4 and IPv6 Neighbor Discovery.
Table 4: IPv4 and IPv6 Neighbor Discovery comparison
IPv4 Neighbor Functions
20
ARP cache
Neighbor cache
October 2010
Multicast
Gratuitous ARP
Redirect message
Redirect message
Router discovery
IPv6 nodes discover routers on the local link with router discovery. The IPv6 router discovery
process uses the following messages:
Router advertisement on page 21
Router solicitation on page 21
Router advertisement
Configured interfaces on an IPv6 router send out router-advertisement messages. Routeradvertisements are also sent in response to router-solicitation messages from IPv6 nodes on
the link.
Router solicitation
An IPv6 host without a configured unicast address sends router solicitation messages.
Multicast
Most of the IPv6 routing protocols use multicast addresses for sending some of the protocol
information, especially during the discovery phase. In order to receive these messages the
device has register the well-known multicast addresses when a particular protocol is enabled
and deregisters when the protocol is disabled.
As in IPv4, a multicast address is assigned to a set of interfaces belonging to different nodes. A
packet destined to a multicast address is routed to all interfaces identified by that address. The
IPv6 multicast address uses the FF00::/8 prefix which is equivalent to the Ethernet multicast
address of 33-33-.
There is multicast neighbor solicitation for address resolution, duplicate address detection and
multicast router solicitation and router advertisement
October 2010
21
Management access
The Avaya Secure Router 2330/4134 contains an Ethernet port for both master and standby
CPU. These Ethernet ports are configured differently from the regular switch ports. In IPv4,
the protocol stack operating for these ports is different than the switch IP stack. The IPv6
functionality for the CPU Ethernet port is offered only when the switch operational state is up,
and is not offered from the boot monitor level.
The management port has three functions:
enabling IPv6 from the boot monitor and from the CLI.
configurating IPv6 after the system boots up in the CLI and device management through
the configured IPv6 address
configuring static routes reachable through the management route for connectivity
IPv6 supports multiple addresses on each interface. This is supported for multiple addresses to
management IP interface.
In addition to the management port, you can configure management routes to reach non local
destinations.
The Avaya Secure Router 2330/4134 advertises the management port and the management
route to the regular routing domain (OSPFv3), but does not include the prefix for the interface in
the router advertisement.
22
October 2010
Tunneling
Tunneling
Tunneling is a forwarding technique in which a packet is encapsulated inside another packet.
IPv6 supports two kinds of encapsulating tunnels: IPv4 tunnels and IPv6 tunnels.
In IPv4 tunneling, a router running both IPv6 and IPv4 encapsulates an IPv6 packet within an
IPv4 packet. This technique allows IPv6 nodes in noncontiguous IPv6 regions to forward
messages through an intervening region of IPv4 nodes.
In IPv6 tunneling, a router running IPv6 encapsulates an IPv6 packet in another IPv6 packet.
This section covers the following topics:
Static IPv4 Tunnel on page 23
Automatic IPv4 Tunnel on page 25
IPv6 Tunnels on page 26
October 2010
23
In Figure 7: Configured IPv4 Static Tunnel on page 24, for example, a user connected to router
B in Region 1 sends a packet addressed to a user on router F in Region 3. The following steps
occur:
1. Router C receives the IPv6 packet and determines that it must be forwarded out its
tunnel interface.
2. Router C encapsulates the IPv6 packet in an IPv4 header.
The source address in the IPv4 header is the IPv4 address of the local tunnel
interface on router C. The destination address is the IPv4 address of the remote
tunnel interface on router D.
3. Using the IPv4 header, intermediate IPv4 routers in Region 2 forward the
encapsulated packet through the IPv4 region to router D.
4. Router D decapsulates the packet (removing the IPv4 header) and forwards the
original IPv6 packet to router F.
After you have configured the IPv4 interfaces on the end point routers, the tunnel becomes a
permanent point-to-point link in the IPv6 topology.
24
October 2010
Tunneling
October 2010
25
IPv6 Tunnels
Tunneling provides a mechanism for transferring IPv6 traffic through an IPv4 network.
26
October 2010
Routing
The source IPv6 node then resends a packet equal to the size of the MTU included in the ICMP
message.
The default value for a regular interface is 1500.
Routing
A routing table is present on all nodes. The table stores information about IPv6 network prefixes
and how they are reached. IPv6 checks the destination neighbor cache first. If the destination is
not in the destination neighbor cache, the routing table determines:
the interface used for forwarding (the next-hop interface)
the next-hop address
Routing protocols to exchange IPv6 routing prefixes are required. IPv6 routes in a routing table
can be:
directly attached network routes using a 64-bit prefix
remote network routes using a 64-bit or lower prefix
host routes using a 128-bit prefix length
the default route using a prefix of ::/0
Route redistribution is limited to static routes and local device using the OSPFv3 protocol. The
dynamic protocols supported are OSPFv3, RIPng and BGP.
When routing on a VLAN, an IP address is assigned to the VLAN and is not associated with
any particular physical port. Brouter ports are VLANs that route IP packets and bridge
nonroutable traffic in a single-port VLAN.
This section has the following topics:
Static routes on page 27
Open Shortest Path First (OSPF) protocol on page 30
Static routes
Static routes provide an alternative method for establishing route reachability. This, with
dynamic routes, provides routing information from the forwarding database to the forwarding
plane. Only enabled static routes are submitted to the Route Table Manager (RTM), which
determines the best route based on reachability, route preference, and cost. The RTM
communicates all the updates to best routes to the forwarding plane.
You must provide the following options to configure a static route:
Route preference: you can specify the route preference for the static routes as follows:
- Global value for all static routes: either static or dynamic routes are preferred.
October 2010
27
- Preference per static-route-entry: if specified, this value over-rides the global value
for the entry. This provides flexibility to change the general behavior of a specific
static route.
Multiple static routes: specify alternative paths to the same destination. Multiple static
routes provide stability and load balancing.
To configure a default static route, supply a value of 0 for the prefix and the prefix length.
Events that affect static route operation include user-configured changes or other system
events, such as:
Deleting the Ipv6 addresses of a VLAN.
The static route with the corresponding local neighbors are permanently deleted from the
RTM, the forwarding database, and the configuration database.
Deleting a VLAN.
Static routes with a local next-hop option set are removed from the configuration
database. Static routes with a non local next-hop option become inactive (they are
removed from the forwarding database).
Disabling forwarding on a VLAN.
Static routes that are reachable through the locally attached network become inactive.
Disabling a VLAN, making the static routes inactive.
Disabling IPv6 forwarding globally.
A change in a dynamically learned neighbor.
When a neighbor becomes unreachable or is deleted, the static route with the neighbor
becomes inactive, and the configuration is not affected. The static route with the neighbor
becomes active in the configuration and is added to the RTM and forwarding database.
Enable a static route
Add the route to the RTM to change certain static routes to active.
Delete a static route.
Permanently delete a static route from the configuration.
Disable a static route.
Change a preference.
When the static route preference changes, the selection of best routes for the entries have
both static and dynamic paths.
Delete or disable a tunnel.
Deleting or disabling a tunnel removes the tunnel entry from the forwarding table.
Enable the tunnel.
Enabling a tunnel activates the tunnel static routes and adds an entry to the forwarding
table.
28
October 2010
Routing
The local-nexthop-flag is not required in IPv6. An Ipv4 device cannot learn a neighbor ARP
entry unless the device has a local route entry. In Ipv6, a host can learn a neighbor entry if the
device is physically connected to the neighbor (one hop).
The static route becomes active when the next-hop is reachable by a dynamic route neighbor
resolution. The static route takes the forwarding information from the dynamic route. If the
next-hop is reachable via local route, the neighbor resolution is required.
October 2010
29
Overview
In an OSPF network, each router maintains a link-state database that describes the topology of
the autonomous system (AS). The database contains the local state for each router in the AS,
including usable interfaces and reachable neighbors. If the router detects any changes, it
shares them by flooding link-state advertisements (LSAs) throughout the AS. Routers
synchronize topological databases based on the sharing of information from LSAs.
From the topological database, each router constructs a shortest-path tree, with itself as the
root. The shortest-path tree gives the optimal route to each destination in the AS. Routing
information from outside the AS appears on the tree as leaves.
OSPF routes IP traffic based solely on the destination IP address and the prefix contained in
the IP packet header.
30
October 2010
OSPFv3
OSPFv3 is supported in IPv6 routing. OSPFv3 runs on a per-link basis, rather than a persubnet basis. Multiple instances are possible on a single link. OSPFv3 does not support the
OSPFv2 authentication feature.
Benefits
In large networks, OSPF offers the following benefits:
Fast convergence: in the event of topological changes, OSPF recalculates routes quickly.
Minimal routing protocol traffic
Load sharing: OSPF provides support for equal-cost multipath routing. If several equalcost routes to a destination exist, traffic is distributed equally among them.
Type of Service: separate routes can be calculated for each IP Type of Service.
Neighbors
In an OSPF network, any two routers with an interface to the same network are neighbors.
Routers use the Hello Protocol to discover their neighbors and maintain neighbor relationships.
On a broadcast or point-to-point network, the Hello Protocol dynamically discovers neighbors.
On a non broadcast multiaccess network (NBMA), you must manually configure neighbors for
the network.
The Hello Protocol provides bi directional communication between neighbors. Periodically,
OSPF routers send out hello packets over all interfaces. These hello packets include the
following information:
the priority
the Hello Timer and Dead Timer values
a list of routers that sent hello packets on the interface
the choice between designated router (DR) and backup designated router (BDR)
Routers establish bidirectional communication when one router discovers itself listed in the
neighbor router hello packet.
OSPFv3
This section is an overview of the differences between Open Shortest Path First (OSPF)v3
protocol, developed for IPv6, and OSPFv2, used in IPv4. This information is compiled from
RFC 2740.
The IPV4 terms subnet and network are replaced in IPv6 by link. An IPv6 link is a
communication medium between nodes at the link layer. You can assign multiple IP subnets
October 2010
31
(prefixes) to a link. Two IPv6 nodes with common or different prefixes can communicate over
a single link.
OSPF for IPv6 operates on a per-link basis, rather than per-IP-subnet, as in IPv4. IPv6 makes
the following changes to how packets are received and to the contents of Network-LSAs and
hello packets:
The OSPF packet contains no IPv6 addresses. LSA payloads carried in Link State Update
packets contain IPv6 addresses.
The following IDs remain at 32-bits and are not assigned IPv6 addresses: Area IDs, LSA
Link State IDs, and OSPFRouter IDs.
Router IDs identify neighboring routers, identified by an IP address on broadcast and
NBMA networks in OSPFv2.
Flooding scope
LSA flooding scope is generalized in OSPFv3 and coded in the LS type field of the LSA. The
following three flooding scopes are available for LSAs:
Link-local scope: The LSA is not flooded beyond the local link.
Area scope: The LSA is flooded in a single OSPF area. Area scope is used in RouterLSAs, Network-LSAs, Inter-Area-Prefix-LSAs, Inter-Area-Router-LSAs, and Intra-AreaPrefix-LSAs.
AS scope: The LSA is flooded through the routing domain. AS scope is used for ASexternal-LSAs.
Link-local addresses
In IPv6, link-local addresses are used on a single link. Link-local addresses facilitate features
such as neighbor discovery and auto-configuration. Datagrams with link-local sources are not
forwarded. Instead, routers assign link-local unicast addresses from the IPv6 address range.
OSPF for IPv6 assigns link-local unicast addresses to physical segments attached to a router.
The source for all OSPF packets sent on OSPF physical interfaces is the associated link-
32
October 2010
OSPFv3
local unicast address. Routers learn link-local addresses for all other nodes on their links. The
learned addresses are included in next-hop information during packet forwarding.
For OSPF protocol packets, global scope or site-local IP addresses must be used as the source
for packets.
Link-LSA is the only OSPF LSA type that allows you to include link-local addresses. Linklocal addresses must not be advertised in other LSA types.
Authentication
OSPF for IPv6 requires the IP Authentication Header and the IP Encapsulating Security
Payload for authentication and security. OSPFv3 does not support the Authentication feature
from OSPFv2.
The IPv6 16-bit one's complement checksum protects against accidental data corruption.
Packet format
OSPFv3 runs directly over IPv6. All other addressing information is absent in OSPF packet
headers. OSPFv3 is essentially network-protocol-independent. LSA types now contain
addressing information.
OSPF packet changes:
Hello packets and database description packets operations fields are expanded to 24 bits.
Authentication and AuType fields are not included in the packet header.
The Interface ID replaces the address information in the Hello packet. The Interface ID
becomes the Network-LSA Link State ID if the router becomes the Designated Router on
the link.
R-bit and V6-bit in the options field process Router-LSAs during SPF calculation. R-bits
and V6-bits determine participation in topology distribution.
The packet header includes the Instance ID, which allows multiple OSPF protocol
instances on the same link.
New LSAs
OSPFv3 includes Link-LSAs and Intra-Area-Prefix.
October 2010
33
Link-LSA
Link-LSA has local-link flooding scope, not flooded beyond the associated link.
Link-LSAs have three purposes:
to provide the router's link-local address to all other nodes on the link
to provide the list of IPv6 prefixes associated with the link
to allow the router to associate options bits with the Network-LSA for the link
Intra-Area-Prefix-LSA
The Intra-Area-Prefix-LSA carries all IPv6 prefix information. In IPv4, this information is in
Router-LSAs and Network LSAs.
Stub area
OSPFv3 retains the concept of stub areas, which minimize link-state databases and routing
table sizes.
IPv6 stub areas carry only Router-LSAs, Network-LSAs, Inter-Area-Prefix-LSAs, Link-LSAs,
and Intra-Area-Prefix-LSAs.
Unlike IPv4, IPv6 allows LSAs with unrecognized LS types to be stored and flooded as though
understood. Rules applied to the stub area prevent the excessive growth of the link-state
database. An LSA with an unrecognized LS can be flooded only if the LSA has area or linklocal flooding scope, and the LSA U-bit is set to 0.
34
October 2010
October 2010
35
RIP version 1 was distributed in the early years of the Internet and advertised default class
address without subnet masking. RIP version 2 advertises more explicitly, based on the subnet
mask.
The Avaya Secure Router 2330/4134 supports RIP version 2, which advertises routing table
updates using multicast instead of broadcasting. RIP version 2 supports variable length subnet
masks (VLSM) and triggered updates of routers. RIP version 2 sends mask information. If
information about a network is not received for 180 seconds, the metric associated with the
network rises to infinity (U)the metric resets to 16, which means the network becomes
unreachable. If information about a network is not received for an additional 120 seconds (four
update intervals), it is removed from the routing table. You can change the default timers by
using the 'timers basic' command at the 'router rip' command level.
A directly connected network has a metric of zero. An unreachable network has a metric of 16.
Therefore, the highest metric between any two networks can be 15 hops or 15 routers.
36
October 2010
administered by a single authority, and with certain routing behaviors determined by common
routing policies.
Because BGP routes traffic between networks, it is also referred to as External BGP (EBGP)
as opposed to routing protocols like RIP and OSPF that route traffic within a network and are
referred to as Interior Gateway Protocols (IGP). BGP can also be used as an IGP (routing
within a single AS, and in this case is referred to as Interior BGP (IBGP).
The primary characteristics of BGP are its scalability and stability. For these reasons, BGP is
the routing protocol typically used by Internet Service Providers to route over the Internet.
A protocol that allows BGP to maximize the efficiency of routing tables is classless interdomain routing (CIDR). CIDR is used by BGP to reduce the size of the Internet routing tables.
CIDR allows BGP to manage blocks of IP address as single routing table entries.
BGP also maximizes routing efficiency by only exchanging full routing information when
connections are first established. Thereafter, only changes to routing tables are sent to
neighbors. Also BGP only advertises optimal routes.
Hierarchical mechanisms
A BGP network consists of BGP peers, peer groups, communities, and extended communities.
Multiple BGP neighbors can be assigned to a peer group. The peer group is internal if all of its
member peers reside within an AS. The peer group is external if all of its member peers reside
outside the AS. The peers within a peer group share the same configuration, including routing
policies. Any peer assigned to a peer group automatically inherits any configuration and
policies established for the peer group, but an administrator can override certain attributes of
this configuration at the individual peer level.
A BGP community is a collection of destinations larger than a BGP peer group. BGP identifies
members of a community by means of a community attribute inserted in the route to each
community destination. As with a BGP peer group, the BGP community can be an efficient
mechanism to identify a large number of routes to which an administrator can apply common
routing policies. The community attribute identifies the AS of origin and specific ID of the
community to which the route (or community destination) belongs.
BGP identifies members of an extended community by means of extended community
attributes. As with any BGP community, the BGP extended community is also an efficient
mechanism for identifying a set of routes to which an administrator can apply common routing
policies.
Policy-based routing
BGP uses import and export routing policies to control the types of routes advertised from the
routing table, or accepted into the routing table, respectively.
October 2010
37
Export policies allow BGP to advertise certain routes that match defined (default or configured)
criteria. Export policies also enable BGP to alter the properties of certain routes before
advertising them.
BGP import policies allow BGP to filter route updates received, and to assign properties to
accepted routes before installing them into the routing table. An administrator can create
routing policies to prefer, modify, or redistribute routes associated with a:
BGP peer
BGP peer group
BGP community
BGP extended community
Route redistribution
BGP can redistribute, to its domain, routes learned by other dynamic and static routing
protocols. BGP then advertises these routes to its external peers according to any export policy
configured. Note that connected routes and loopback addresses are not automatically
redistributed, but an administrator can use policies to export such routes.
BGP supports the redistribution of routing information from other routing protocols such as RIP,
OSPF, and static routes. BGP attributes of the routes can be altered by applying a routing
policy during redistribution.
Note that routes are redistributed only if they are in the forwarding table (that is, they are active
routes). The Avaya Secure Router 2330/4134 does not support extensions that allow BGP to
send out routes that are not active routes.
Security
BGP can authenticate peerings and routing protocol exchanges. Authentication guarantees
that BGP imports routing information from trusted peers only. An administrator can configure
a password for this purpose. By default, authentication security is disabled.
Route reflectors
Route Reflectors and Confederations are two different techniques used to solve the same
problem of full iBGP meshing.
BGP systems generally require full-mesh connectivity within an AS to facilitate redistribution
of external routes to all routers in the same AS. However, scaling issues can arise within an
AS that contains a significant number of BGP routers because they all exchange the same
information with each other, causing an unacceptable amount of BGP control traffic. To avoid
38
October 2010
this scenario, an administrator can configure Route Reflectors to decrease the BGP control
traffic inside the AS.
A Route Reflector is a cluster of BGP devices within an AS, with one system serving as a Route
Reflector server and other BGP systems serving as client peers. The server redistributes
intracluster routing information to its client peers. Outside the cluster, non-client peers receive
intercluster routing information from the server. Non-client peers may also be Route Reflectors.
Route refresh
When any import policies for the local BGP peer change, all of the routes advertised by a
remote peer must be re-evaluated against all existing (including new and modified) import
policies. One way to perform this operation is for the local peer, at great expense of available
resources, to:
Maintain a real-time database of all routes advertised by remote peers, at the expense of
local memory and CPU resources.
Reapply all import policies to the above routes.
Import into the BGP RIB-IN table only those routes accepted by the latest BGP import
policies on the local peer.
October 2010
39
Instead of the above approach, the route-refresh feature enables the local peer to:
Not maintain a real-time database of all routes advertised by remote peers, saving local
memory and CPU resources.
Request a remote peer to resend all of the routes currently in its RIB-OUT table. Upon
receiving the requested routes, the local peer can reapply all of its current import policies.
The RIB-OUT table contains the routes that the router announces to adjacent peers.
Import into the BGP RIB-IN table only those routes qualified by the latest local BGP import
policies on the local peer. The RIB-IN table contains the routes that the router learns from
adjacent peers.
A BGP speaker uses the BGP Capabilities Advertisement to advertise to peers at session
OPEN its ability to originate and correctly process route-refresh messages. By using the BGPCAP mechanism, the BGP speaker will send route-refresh messages only to peers that also
support the feature.
40
October 2010
October 2010
41
BGP multicast
With BGP Multicast (MBGP), BGP can connect multicast topologies within and outside an AS.
Routers implementing this feature carry two separate sets of routing information for unicast
and multicast routing. Multicast protocols such as PIM use this multicast routing information to
build multicast distribution trees.
Using MBGP, it is possible to direct all the multicast traffic to designated access points other
than normal unicast forwarding paths. Combined with the power of BGP policies, MBGP
provides more control over the way multicast traffic is carried inside as well as outside the AS.
MBGP supports most applicable unicast BGP CLI commands, with the exception that MBGP
routes are not redistributed to other protocols and BGP routes are not redistributed to MBGP.
To configure multicast BGP, specify the IPv6 multicast address family (using the addressfamily command) before configuring the desired BGP property (the default address family is
IPv4 unicast).
42
October 2010
Hosts
A host can be a source, a receiver, or both.
A source, also known as a sender, sends multicast data to a multicast group.
A receiver receives multicast data from one or several sources that sends data to a
multicast group.
PIM-SM domain
PIM-SM operates in a domain of contiguous routers that have PIM-SM enabled. All these
routers are configured to operate within a common boundary defined by PIM Multicast Border
Routers (PMBRs).
Each PIM-SM domain requires the following routers:
Designated router (DR)
Rendezvous-point (RP) router
Bootstrap router (BSR)
Although a PIM-SM domain can have only one active RP router and one active BSR, you can
configure additional routers as candidate RP routers and as candidate BSRs. Candidate
routers provide backup protection in case the primary RP or BSR router fails.
October 2010
43
Designated router
The designated router (DR) is the router with the highest IP address on a LAN designated to
perform the following tasks:
sends register messages to the rendezvous-point (RP) router on behalf of directly
connected sources
sends join/prune messages to the RP router on behalf of directly connected receivers
maintains information about the status of the active RP router for local sources in each
multicast group
Important:
The DR is not a required configuration, and switches act automatically as such for directly
attached sources and receivers.
Rendezvous-Point router
PIM-SM builds a shared multicast distribution tree within each domain, and the rendezvous
point (RP) router is at the root of this shared tree. Although the RP can be physically located
anywhere on the network, it must be as close to the source as possible. There is only one
active RP router for a multicast group.
At the RP router, receivers meet new sources. Sources use the RP to identify themselves to
other routers on the network; receivers use the RP to learn about new sources.
The RP performs the following tasks:
registers a source that wants to announce itself and send data to group members
joins a receiver that wants to receive data for the group
forwards data to group
44
October 2010
about RPs through the BSR mechanism. Static RP-enabled switches cannot learn about RPs
through the BSR because the switch loses all dynamically-learned BSR information and
ignores BSR messages. When you configure static RP entries, the switch adds them to the
RP-set as if they were learned through the BSR.
Important:
In a PIM domain with both static and dynamic RP switches, the static RP switches cannot
have one of their (local) interfaces configured as RP.
While configuring a PIM static RP in a switch, consider that the next-hop of the unicast route
towards PIM static RP must be a PIM neighbor. The PIM protocol fails to work if due to a route
change the next-hop towards an already configured static RP becomes a non-PIM neighbor.
The configured RP does not activate until it can be reached through a PIM neighbor, and its
state remains invalid.
Static RP-enabled Avaya Secure Router 2330/4134 can communicate with switches from other
vendors that do not use the BSR mechanism. Some vendors use either early implementations
of PIM-SM v1 that do not support the BSR or proprietary mechanisms like the Cisco AutoRP. For a network to work properly with static RP, you must have all the switches in the network
(including switches from other vendors) map to the same RP or RPs, if several RPs are present
in the network.
To avoid a single point of failure, you can also configure redundant static RPs.
You use the static RP feature when dynamic learning mode is not needed, typically in small
networks or for security reasons, where RPs have to be forced to some devices in the network
so that they do not learn other RPs.
October 2010
45
devices use the hash function defined in the PIM-SM standard to elect the active RP;
other vendors can use the lowest IP address to break the tie.
Important:
To reduce convergence times, Avaya recommends you create only one static RP per
group. The more static RPs you configure for redundancy, the more time PIM requires
to rebuild the mroute table and associate RPs.
Static RP configured on the switch is assumed to be alive as long as the switch has a
unicast route to the static RP's network. If the switch loses this route, the static RP is
invalidated and the hash algorithm is invoked to remap all affected groups. If the switch
regains this route, the static RP is validated and the hash algorithm is invoked to remap
the affected groups.
Bootstrap router
The BSR receives RP router advertisement messages from the candidate RPs. The BSR adds
the RP router with its group prefix to the RP set. Only one BSR exists for each PIM-SM domain.
The BSR periodically sends bootstrap messages containing the complete RP set to all routers
in the domain. The BSR ensures that all PIM-SM routers send join/prune and register packets.
Candidate bootstrap router
Within a PIM-SM domain, you can configure a small set of routers as candidate BSRs (CBSRs). The candidate BSR with the highest configured priority becomes the BSR for the
domain. If two candidate BSRs have equal priority, the candidate with the higher IP address
becomes the BSR. If you add a new candidate BSR with a higher priority to the domain, it
automatically becomes the new BSR.
Join/prune messages
The DR sends join/prune messages from a receiver toward a RP for the group to either join
the shared tree or remove (prune) a branch from it. A single message contains both a join
and a prune list. This list includes a set of source addresses indicating the shortest-path trees or
the shared trees that the host wants to join. The DR sends join and prune messages hop by
hop to each PIM router on the path to the source or the RP.
46
October 2010
The DR stops sending encapsulated packets to the RP after receiving a register-stop message.
This traffic stops without delay because the RP sends a register-stop message immediately
after receiving the first multicast data packet, and joins the shortest-path tree.
Shared trees
Group members in a PIM-SM domain receive the first packet of data from sources across a
shared tree. A shared tree consists of a set of paths that connect all members of a multicast
group to the RP. PIM creates a shared tree when sources and receivers send messages toward
the RP.
Shortest-path trees
After receiving a certain number of packets from the RP, the DR switches from a shared tree
to a shortest-path tree (SPT). Switching to a shortest-path tree creates a direct route between
the receiver and the source. The Avaya Secure Router 2330/4134 switches to the SPT when it
receives the first packet from the RP.
Figure 10: Shared tree and shortest-path tree on page 48 shows a shared tree and a shortestpath tree.
October 2010
47
48
October 2010
SPT by sending an (S,G) Join message to the source. (S denotes the source unicast
IP address, and G denotes the multicast Group Address.)
4. If the switch to the SPT occurs:
All intermediate PIM routers along the path to the source create the (S,G) entry.
To trim the shared tree, the router sends an (S,G) Prune message to the RP.
October 2010
49
50
October 2010
October 2010
51
PIM-SM Multipath
In IPv6 Multicast Multipath, the reverse-path forwarding (RPF) interface for each (*, G) or (S,
G) state is selected among the available equal cost paths depending on the RPF address to
which the state resolves. For an (S, G) state, this is the address S of the source. For a (*, G)
state, this is the address of the RP associated with the group G of the state. As a result,
multicast traffic for different states can be received across more than just one equal-cost
interface.
PIM-SM supports the multipath functionality. The multipath functionality comprises two
methods for selecting the nexthop if multiple ECMP routes exist:
Round - Robin
Hashing
52
October 2010
The first method selects the nexthop in round-robin manner, while the latter selects the nexthop
based on the key calculated using source address, group address and nexthop address.
PIM-SSM
Source Specific Multicast (SSM) optimizes PIM-SM by simplifying the many-to-many model.
Since most multicast applications distribute content to a group in one direction, SSM uses a
one-to-many model that only uses a subset of the PIM-SM features. This model is more efficient
and puts less of a load on multicast routing devices.
SSM only builds source-based shortest path trees. Whereas PIM-SM always joins a shared
tree first and then switches to the source tree, SSM eliminates the need for starting with a
shared tree by immediately joining a source through the shortest path tree. This method
enables SSM to avoid using a rendezvous point (RP) and RP-based shared trees, which can be
a potential bottleneck.
Members of a SSM group can only receive from a single source. This is ideal for applications
like TV channel distribution and other content-distribution businesses. Banking and trade
applications can also use SSM because it provides more control over the hosts receiving and
sending data over their networks.
SSM features
SSM only uses a subset of the PIM-SM features such as the shortest path tree, designated
router (DR), and some messages (Hello, Join/Prune, and Assert). However, there are also
October 2010
53
some features that are unique to SSM. These features, which are described in the following
sections, are extensions of the IGMP and PIM protocols.
PIM requires a unicast protocol in order to forward multicast traffic within the network when
performing the Reverse Path Forwarding (RFP) check. PIM-SM uses the information from the
unicast routing table to create and maintain the shared and shortest multicast tree that enables
PIM-enabled routers to communicate. The unicast routing table must contain a route to every
multicast source in the network as well as to routes to PIM entities like the RPs and BSR.
PIM-SSM architecture
Figure 12: PIM-SSM architecture on page 55 illustrates how the PIM-SSM architecture
requires routers to:
support IGMPv3 source-specific host membership reports and queries at the edge routers
initiate PIM-SSM (S,G) joins directly and immediately after receiving an IGMPv3 join
report from the designated router
restrict forwarding to shortest-path trees within the SSM address range by all PIM-SSM
routers
54
October 2010
PIM-SSM
October 2010
55
SSM range
The standard SSM range is 232/8, but you can extend the range to include any IP Multicast
address with the Avaya Secure Router 2330/4134 implementation of SSM. Although you can
configure the SSM range, configuring it for all multicast groups is not allowed.
You can extend the SSM range to configure existing applications without changing their group
configurations. This flexibility allows applications to take immediate advantage of SSM.
56
October 2010
PIM-SSM
October 2010
57
the SSM channel table, it ignores the report. It also ignores the report if the group is in
the table, but the source/mask does not match what is in the table.
Important:
When IGMPv3 is enabled, changes to the query interval and robustness values on the
querier switch are propagated to other switches on the same VLAN through IGMP query.
Both IGMPv2 and IGMPv3 hosts use the SSM channel table:
An IGMPv2 host (with an IGMPv2 VLAN) must have an existing SSM channel entry if the
group is in SSM range.
An IGMPv3 host has dynamic learning that is enabled, the SSM channel automatically
learns the group. Otherwise, the SSM channel also needs a static entry.
Table 5: Summary of how PIM-SSM interacts with IGMPv2 and v3 on page 58 summarizes
how a switch in PIM-SSM mode works with IGMP. References to any matching static SSM
channel entry assumes that the entry is enabled. If an entry is disabled, it is treated the same as
if it is disallowed.
Table 5: Summary of how PIM-SSM interacts with IGMPv2 and v3
Host
58
VLAN
SSM Range
Action
IGMPv2 host
IGMPv3 VLAN
In or Out of
range
Drop report.
IGMPv3 host
IGMPv2 VLAN
In or Out of
range
Drop report.
IGMPv2 host
IGMPv2 VLAN
In SSM range
IGMPv2 host
IGMPv2 VLAN
Out of SSM
range
IGMPv3 host
IGMPv3 VLAN
Out of SSM
range
Drop report.
IGMPv3 host
IGMPv3 VLAN
In SSM range
IGMPv3 host
IGMPv3 VLAN
In SSM range
IGMPv3 host
IGMPv3 VLAN
In SSM range
October 2010
When an IGMPv3 group report enters the VLAN port and one or more of the groups in that
packet needs to be discarded after the IGMP access controls are applied, the entire packet is
dropped and is not forwarded on to any other ports of the VLAN.
When an IGMPv3 interface receives an IGMPv2 or v1 query, the interface backs down to
IGMPv2 or v1. As a result, all senders and receivers on this interface are flushed.
Configuration limitations
Avaya recommends running PIM-SSM on either all the switches in the domain or only on the
edge routers. If there is a mix of PIM-SSM and PIM-SM switches in the domain, run PIMSSM on all the edge routers and PIM-SM on all the core routers.
Important:
A PIM domain with edge routers running PIM-SM and core routers running PIM-SSM does
not work properly.
Avaya does not support SSM interoperability with DVMRP. However, the MBR functionality
works properly for non-SSM groups because SSM-enabled interfaces use PIM-SM behavior
for groups outside the SSM range.
SSM switches running IGMPv3 drop any reports that they receive out of the SSM range. The
SSM switch does not forward them to a PIM-SM switch.
Static source groups cannot conflict with SSM channels and vice versa. When you configure
a static source group or a SSM channel, the switch performs a consistency check to make sure
there are no conflicts. You cannot map one group (G) to different sources for both a static
source group and a SSM channel.
October 2010
59
router learns, for each directly attached link, which multicast addresses and which sources
have listeners on that link. The information that MLD gathers is provided to the multicast routing
protocols that the router uses. This ensures that multicast packets are delivered to all links
where listeners require such packets.
A multicast router can itself be a listener of one or more multicast addresses. That is, perform
both the multicast router part and the multicast address listener part of the protocol. The router
collects the multicast listener information needed by its multicast routing protocol and informs
itself and other neighboring multicast routers of its listening state.
60
October 2010
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable IPv6 unicast forwarding.
[no] ipv6 unicast-routing
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable IPv6 multicast routing.
[no] ipv6 multicast-routing
October 2010
61
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Enable IPv6 on the interface.
[no] ipv6 enable
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Create a bundle.
interface bundle <bundle>
3. Enable IPv6 on the bundle
[no] ipv6 enable
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the IPv6 address.
ipv6 address {<X:X::X:X/M> [eui-64 | anycast] | <prefixname> [<X:X::X:X/M>] }
62
October 2010
Value
<X:X::X:X/M>
<prefix-name>
[<X:X::X:X/M>]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure Neighbor Discovery (ND) parameters.
[no] ipv6 nd { dad-attempts <dad-attempts> | managed-configflag | ns-interval <ns-interval> | other-config-flag | rainterval <ra-interval> | ra-interval-min <ra-interval-min> |
ra-lifetime <ra-lifetime> | reachable-time <nd-reachabletime>| suppress-ra }
Table 7: Variable definitions
Variable
Value
dad-attempts <dad-attempts>
managed-config-flag
ns-interval <ns-interval>
other-config-flag
October 2010
63
ra-interval <ra-interval>
ra-interval-min <ra-interval-min>
ra-lifetime <ra-lifetime>
reachable-time <nd-reachable-time>
suppress-ra
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure redirects.
ipv6 redirects
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the general prefix.
ipv6 general-prefix <prefix-name> <NW-name>
64
October 2010
Value
<prefix-name>
Prefix name
<NW-name>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the hop-limit.
ipv6 hop-limit <hop-limit>
Table 9: Variable definitions
Variable
<hop-limit>
Value
Hop limit on outgoing IPv6 packets, in the
range 1 - 255.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the ICMP rate limit.
ipv6 icmp rate-limit <rate-limit>
October 2010
65
Value
Specifies the time interval for sending ICMP
messages in milliseconds (default : 500ms,
0 disables rate limit). Acceptable values are
in the range: 0 - 1000000
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure load balancing.
ipv6 load-balancing policy { per-flow | per-packet }
Table 11: Variable definitions
Variable
Value
per-flow
per-packet
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the neighbor.
ipv6 neighbor <neighbor-ip> <neighbor-mac> <interface_name>
66
October 2010
Value
<neighbor-ip>
<neighbor-mac>
<interface_name>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the next-hop address.
[no] set ipv6 next-hop [local] <X:X::X:X>
Table 13: Variable definitions
Variable
Value
local
<X:X::X:X>
Procedure steps
1. Enter Configuration mode.
October 2010
67
configure terminal
2. Specify the IPv6 destination.
[no] ipv6 route <X:X::X:X/M> <gatewayip|interface>
[<distvalue>]
Table 14: Variable definition
Variable
Value
<distvalue>
<gatewayip>
<interface>
<X:X::X:X/M>
Procedure steps
1. To enter the Configuration mode, enter:
configure terminal
2. To configure a multicast static route, enter:
[no] ipv6 mroute <source-address/mask> [<protocol>] [<RPFaddr>| <if-name>] [<distance>]
Table 15: Variable definitions
Variable
Value
[no]
<source-address/mask>
[<protocol>]
68
October 2010
Variable
Value
rip: RIP
static
[<RPF-addr>]
<if-name>
[<distance>]
Procedure steps
1. To enter Configuration mode, enter:
configure terminal
2. To configure the multicast lookup in MRIB only feature, enter:
[no] ipv6 multicast-lookup-mrib-only
Table 16: Variable definitions
Variable
[no]
Value
Disables the multicast lookup in MRIB only
feature.
October 2010
69
Procedure steps
To clear multicast static routes, enter:
clear {all ipv6 mroutes | <group-addr> [<source-addr>]}
Table 17: Variable definitions
Variable
Value
all
<group-addr>
[source-addr]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Create the access list entry.
[no] ipv6 access-list <listname> <permit|deny|remark>
<prefixmatch>
Table 18: Variable definition
Variable
<listname>
70
Value
The access list name.
October 2010
Variable
<prefixmatch>
Value
The prefix list to match.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Create the prefix list.
[no] ipv6 prefix-list <list> <seq|permit|deny|description>
<X:X::X:X/M|any>
Table 19: Variable definition
Variable
Value
<any>
<list>
<X:X::X:X/M>
Procedure steps
1. Enter configuration mode:
configure terminal
2. Specify a route map:
route-map <route-map-name> [deny|permit] <1-65535>
3. To specify an address, enter:
[no] match ipv6 address <accesslistname>
October 2010
71
Value
The IPv6 access list name.
Procedure steps
1. Enter configuration mode:
configure terminal
2. Specify a route map:
route-map <route-map-name> [deny|permit] <1-65535>
3. To specify a prefix list, enter:
[no] match ipv6 address prefix-list <listname>
Table 21: Variable definition
Variable
<listname>
Value
The IP address prefix list name.
Procedure steps
Display IPv6 access lists.
show ipv6 access-list <list>
Table 22: Variable definition
Variable
<list>
72
Value
The access list name.
October 2010
Procedure steps
Display general prefix information.
show ipv6 general-prefix
Procedure steps
Display IPv6 interface information.
show ipv6 interfaces [interface <name>] [format <detail|brief>]
Table 23: Variable definition
Variable
Value
<brief>
A brief display.
<detail>
A detailed display.
[format]
[interface]
<name>
Procedure steps
Display the IPv6 multicast routing table.
October 2010
73
Value
<summary>
<X:X::X:X>
Procedure steps
Display learned pmtu information.
show ipv6 mtu
Procedure steps
Display IPv6 multicast interface information.
show ipv6 mvif <interface>
Table 25: Variable definition
Variable
<interface>
Value
The interface name.
Procedure steps
Display Neighbor Discovery cache information.
74
October 2010
Procedure steps
Display IPv6 prefix list information.
show ipv6 prefix-list <WORD|detail|summary>
Table 26: Variable definition
Variable
Value
<detail>
<summary>
<WORD>
Procedure steps
Display the IPv6 routing table.
show ipv6 route <X:X::X:X|X:X::X:X/M|database|bgp|connected|
ospf|rip|static|summary>
Table 27: Variable definition
Variable
Value
<bgp>
<connected>
<database>
<ospf>
OSPF information.
<rip>
RIP information.
<static>
<summary>
October 2010
75
Variable
Value
<X:X::X:X>
<X:X::X:X/M>
Procedure steps
Display IPv6 Router Advertisement information.
show ipv6 routers
Procedure steps
Remove the neighbor entries.
clear ipv6 neighbors
Procedure steps
Clear the prefix list.
clear ipv6 prefix-list <list> <X:X::X:X/M>
Table 28: Variable definition
Variable
76
Value
<list>
<X:X::X:X/M>
October 2010
Procedure steps
Clear the prefix list.
clear ipv6 mroute <all|X:X::X:X>
Table 29: Variable definition
Variable
Value
<all>
<X:X::X:X/M>
October 2010
77
78
October 2010
Enabling RIPng
Enable RIPng to use the Avaya Secure Router 2330/4134 in a RIPng network.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIPng.
router ipv6 rip
3. Enable RIPng on an interface.
interface <interface> ipv6 router rip
Table 30: Variable definition
Variable
<interface>
Value
Interface name. Example: Ethernet 0/1
October 2010
79
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the aggregate address.
[no] aggregate-address X:X::X:X/P
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure default routes.
[no] default-information originate
Procedure steps
1. Enter Configuration mode.
80
October 2010
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure default metrics.
[no] default-metric <1-16>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the administrative distance.
distance <distancevalue>
Table 31: Variable definitions
Variable
<distancevalue>
Value
The administrative distance value.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure update filtering.
October 2010
81
Value
<prefix>
<accesslist>
<direction>
<interface>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the neighbor router.
[no] neighbor <address> <interface>
Table 33: Variable definitions
Variable
82
Value
<address>
<interface>
RIPng interface.
October 2010
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the offset list.
offset-list <name> <direction> <metricvalue> <interfacename>
Table 34: Variable definitions
Variable
Value
<name>
<direction>
<metricvalue>
<interfacename>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the passive interface.
[no] passive-interface <interface>
October 2010
83
Value
The interface for which you want to suppress
routing updates.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIP.
router ipv6 rip
3. Configure the route map.
[no] route-map <route-map-name> {in|out} <if-name>
Table 36: Variable definitions
Variable
Value
<route-map-name>
<if-name>
Configuring split-horizon
Configure split horizon to prevent loops by not advertising erroneous routes from neighbors.
Use the no form of this command to disable this function.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter interface mode.
interface <interface>
3. Enable split-horizon with poison reverse.
84
October 2010
Value
Interface name. Example: Ethernet 0/1
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIPng.
router ipv6 rip
3. Redistribute routes.
redistribute [<connected>|<static>|<ospf>|
<bgp>]<metric><routemap>
Table 38: Variable definition
Variable
Value
<connected>
<static>
<ospf>
<bgp>
<metric>
<routemap>
Configuring timers
Use this command to adjust routing network timers. Use the no form of this command to return
to default setting.
October 2010
85
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enable RIPng.
router ipv6 rip
3. Enable timers.
timers basic <update><timeout><garbage>
Table 39: Variable definition
Variable
Value
<update>
<timeout>
<garbage>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter interface mode.
interface <interface>
3. Delete learned RIPng routes.
no ipv6 router rip
Table 40: Variable definition
Variable
<interface>
86
Value
Interface name. Example: Ethernet 0/1
October 2010
Procedure steps
Show RIPng information.
show ipv6 rip
Procedure steps
Show RIPng protocol information.
show ipv6 protocols rip
Procedure steps
Show RIP interface information.
show ipv6 rip interface
Procedure steps
Display RIP information.
October 2010
87
Procedure steps
Display the RIP database.
show ipv6 rip database
Procedure steps
Display RIP interface information.
show ipv6 rip interface [<if-name>]
Procedure steps
Clear the routing table.
clear ipv6 rip route [X:X::X:X/M | static | connected | rip |
ospf | bgp |all]
Table 41: Variable definitions
Variable
88
Value
X:X::X:X/M
static
October 2010
Variable
Value
connected
rip
ospf
bgp
all
October 2010
89
90
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enable OSPFv3 routing.
[no] router ipv6 ospf <ospf>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Set the address range.
[no] area <areaid> range X:X::X:X/M [advertise|not-advertise]
October 2010
91
OSPFv3 procedures
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Define an area as a stub area.
[no] area <areaid> stub [no-summary]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure the link.
[no] area <areaid> virtual-link <X:X::X:X> [interval|instid]
Procedure steps
1. Enter Configuration Mode.
92
October 2010
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure the link.
[no] area <areaid> default-cost <cost>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Set the default metric value.
[no] default-metric <metricvalue>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure an interface as passive.
passive-interface <interfacename>
October 2010
93
OSPFv3 procedures
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Redistribute the route.
[no] redistribute <protocol> <metric|metric-type|route-map>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure the ABR type.
abr-type <type>
Table 42: Variable definitions
Variable
<type>
94
Value
Type of implementation. Possible choices
are:
October 2010
Variable
Value
cisco - Alternative ABR, Cisco
implementation (RFC3509)
ibm - Alternative ABR, IBM
implementation (RFC3509)
standard - Standard behavior
(RFC2328)
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure the cost.
auto-cost reference-bandwidth <bandwidth>
Table 43: Variable definitions
Variable
<bandwidth>
Value
Reference bandwidth in terms of Mbits per
second, in the range 1 to 4294967.
October 2010
95
OSPFv3 procedures
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure the administrative distance.
distance [ospf {external | inter-area | intra-area}]
<distance>
Table 44: Variable definitions
Variable
Value
<distance>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Specify the OSPF process.
router ipv6 ospf <processid>
3. Configure logging.
log-adjacency-changes [detail]
Table 45: Variable definitions
Variable
[detail]
96
Value
Log all state changes.
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Configure OSPFv3 routing.
[no] ipv6 router ospf area <areaid> [instid|tag]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Set the dead interval.
[no] ipv6 ospf dead-interval <interval> [instid]
October 2010
97
OSPFv3 procedures
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Set the hello interval.
[no] ipv6 ospf hello-interval <interval> [instid]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Set the priority.
[no] ipv6 ospf priority <priority> [instid]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the link cost.
[no] ipv6 ospf cost <cost> [instance-id <1-255>]
98
October 2010
Value
<cost>
[instance-id <1-255>]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure MTU.
ipv6 ospf mtu <576-65535>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure to ignore MTU in DBD packets.
ipv6 ospf mtu-ignore
October 2010
99
OSPFv3 procedures
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the network type.
[no] ipv6 ospf network {broadcast | point-to-point}
[instance-id <1-255>]
Table 47: Variable definitions
Variable
{broadcast | point-to-point}
Value
The OSPF network type. Possible values
are:
broadcast - broadcast multi-access
network
point-to-point - point to point
network
[instance-id <1-255>]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
100
October 2010
interface <interface>
3. Configure the retransmit interval.
[no] ipv6 ospf retransmit-interval <interval> [instance-id
<1-255>]
Table 48: Variable definitions
Variable
Value
<interval>
[instance-id <1-255>]
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the transmission delay.
[no] ipv6 ospf transmit-delay <delay> [instance-id <1-255>]
Table 49: Variable definitions
Variable
Value
<delay>
[instance-id <1-255>]
October 2010
101
OSPFv3 procedures
Procedure steps
Display the OSPFv3 debugging option.
show debugging ipv6 ospf
Procedure steps
Display global and area information about OSPFv3.
show ipv6 ospf [tag]
Procedure steps
Display OSPFv3 interface information.
show ipv6 ospf interface [ifname]
Procedure steps
Display information about an OSPFv3 neighbor.
102
October 2010
Procedure steps
Display the IPv6 routing table for OSPFv3.
show ipv6 ospf [tag] route
Procedure steps
Display information about OSPFv3 virtual-links.
show ipv6 ospf [tag] virtual-links
Procedure steps
Display border routers.
show ipv6 ospf border-routers
Procedure steps
Display the OSPF database.
October 2010
103
OSPFv3 procedures
Procedure steps
Clear IPv6 OSPF routing processes.
clear ipv6 ospf {<processid> | process}
Table 50: Variable definitions
Variable
<processid>
104
Value
The OSPFv3 process to clear.
October 2010
Enabling BGP
Enable BGP to support the exchange of routes between autonomous systems. This procedure
enables BGP with mainly default configuration values. Any peer groups created under BGP
inherit these default values. You can choose to override (customize) many of these BGP global
values at the BGP group or individual peer level.
Procedure steps
Enable BGP.
router bgp <group-id>
Table 51: Variable definition
Variable
<group-id>
Value
BGP group ID, in the range 1 to 65535.
Procedure steps
1. Enable BGP.
router bgp <1-65535>
2. Specify address family.
address-family ipv6 [unicast|multicast]
October 2010
105
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify IPv6 address family
address-family ipv6
4. Set the session to passive.
neighbor <X:X::X:X> passive
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
106
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. Configure to always compare MED values.
bgp always-compare-med
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
October 2010
107
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. Configure a confederation.
bgp confederation <id>
Table 52: Variable definition
Variable
<id>
108
Value
Identifier name.
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. Configure a cluster-id.
bgp cluster-id <cluster-id>
Table 53: Variable definition
Variable
<cluster-id>
Value
Cluster identifier.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
October 2010
109
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. To set the minimum advertisement interval, enter:
neighbor <X:X::X:X> advertisement-interval <interval>
Table 54: Variable definition
Variable
<interval>
Value
The advertisement interval, in seconds, in the range 0 to 600.
Procedure steps
1. Enter Configuration Mode.
110
October 2010
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. To set the minimum interval, enter:
neighbor <X:X::X:X> as-origination-interval <interval>
Table 55: Variable definition
Variable
<interval>
Value
The minimum interval, in seconds, in the range 1 to 600.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To advertise a capability, enter:
neighbor <X:X::X:X> capability <dynamic|orf|route-refresh>
Table 56: Variable definition
Variable
Value
<dynamic>
<orf>
<route-refresh>
October 2010
111
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To configure a default route, enter:
neighbor <X:X::X:X> default-originate route-map <mapname>
Table 57: Variable definition
Variable
<mapname>
Value
The route-map name.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
112
October 2010
address-family ipv6
4. To configure the description, enter:
neighbor <X:X::X:X> description <description>
Table 58: Variable definition
Variable
<description>
Value
A short description of this neighbor, up to 80 characters.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To filter updates, enter:
neighbor <X:X::X:X> distribute-list <identifier>
Table 59: Variable definition
Variable
<identifier>
Value
The distribute list identifier. Possible values are:
IP access list number, in the range 1 to 199
Expanded range IP access list number, in the range 1300
to 2699
The IP access list name
October 2010
113
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family:
address-family ipv6
4. To disallow capability negotiation, enter:
neighbor <X:X::X:X> dont-capability-negotiate
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family:
address-family ipv6
4. To allow EBGP neighbors, enter:
neighbor <X:X::X:X> ebgp-multihop <maxhop>
114
October 2010
Value
The maximum hop count, in the range 1 to 255.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure BGP filters.
neighbor <X:X::X:X> filter-list <listname> <in|out>
Table 61: Variable definition
Variable
Value
<in>
<listname>
<out>
October 2010
115
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family:
address-family ipv6
4. Enable BGP on the interface.
neighbor <X:X::X:X> interface <interface>
Table 62: Variable definition
Variable
<interface>
Value
The interface for which you want to enable BGP.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure the maximum number of prefixes.
neighbor <X:X::X:X> maximum-prefix <maxprefix>
116
October 2010
Value
The maximum number of prefixes, in the range 1 to
4294967295.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family.
address-family ipv6
4. Configure the neighbor password.
neighbor <X:X::X:X> password <password>
Table 64: Variable definition
Variable
<password>
Value
The password for the specified neighbor.
Procedure steps
1. Enter Configuration Mode.
October 2010
117
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure peer group members.
neighbor <X:X::X:X> peer-group <groupname>
Table 65: Variable definition
Variable
<groupname>
Value
The name of the peer group to join.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure the prefix list.
neighbor <X:X::X:X> prefix-list <name> <in|out>
Table 66: Variable definition
Variable
118
Value
<in>
<name>
<out>
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family.
address-family ipv6
4. Configure the AS number.
neighbor <X:X::X:X> remote-as <asnumber>
Table 67: Variable definition
Variable
<asnumber>
Value
The AS number of the specified remote BGP neighbor, in the
range 1 to 65535.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
October 2010
119
Value
<in>
<mapname>
<out>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure as route reflector client.
[no] neighbor <X:X::X:X> route-reflector-client
120
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure as route server client.
[no] neighbor <X:X::X:X> route-server-client
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure to send community attribute.
neighbor <X:X::X:X> send-community <both|extended|standard>
Table 69: Variable definition
Variable
Value
<both>
<extended>
<standard>
October 2010
121
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. Shutdown the neighbor.
neighbor <X:X::X:X> shutdown
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. Configure a neighbor timer.
neighbor <X:X::X:X> timers <keepalive> [connect <interval>]
122
October 2010
Value
[connect]
<interval>
<keepalive>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. Configure the routing update source.
neighbor <X:X::X:X> update-source <source>
Table 71: Variable definition
Variable
<source>
Value
The interface name or address of the update source.
October 2010
123
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. Configure the weight.
neighbor <X:X::X:X> weight <weight>
Table 72: Variable definition
Variable
<weight>
Value
The default weight, in the range 0 to 65535.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To modify the default selection, enter:
[no] bgp bestpath [as-path ignore] [compare-confed-aspath]
[compare-routerid] [med [confed [missing-as-worst]|[missingas-worst [confed]]]]
Table 73: Variable definition
Variable
[as-path ignore]
124
Value
Ignore as-path length in selecting a route.
October 2010
Variable
Value
[compare-confed-aspath]
[compare-routerid]
[confed]
[med]
[missing-as-worst]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To configure route reflection, enter:
bgp client-to-client reflection
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
October 2010
125
Value
The route reflector cluster-id. Can be configured as 32bit
quantity, in the range 1 to 4294967295 or in IP address
format.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To configure confederation parameters, enter:
bgp confederation [identifer <asnumber>] [peers <peer>]
Table 75: Variable definition
Variable
126
Value
[identifer <asnumber>]
[peers <peer>]
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To enable and configure flap dampening, enter:
bgp dampening [route-map <mapname>] [<hltime> <reuse>
<suppress> <duration> <uhltime>
Table 76: Variable definition
Variable
Value
<duration>
<hltime>
<reuse>
[route-map <mapname>]
<suppress>
<uhltime>
October 2010
127
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To configure BGP defaults, enter:
bgp default [ipv4-unicast] [local-preference <value>]
Table 77: Variable definition
Variable
Value
[ipv4-unicast]
[local-preference <value>]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To enforce the first AS, enter:
bgp enforce-first-as
128
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To configure the session to reset, enter:
bgp fast-external-failover
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To log neighbor changes, enter:
bgp log-neighbor-changes
October 2010
129
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address-family:
address-family ipv6
4. To override the router id, enter:
bgp router-id <id>
Table 78: Variable definition
Variable
<id>
Value
The manually configured router identifier, in IP address
format.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
130
October 2010
Value
The scan interval, in seconds, in the range 10 to 60. Default is
60.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To configure the administrative distance, enter:
distance [<distance>] [bgp <ext> <int> <local>]
Table 80: Variable definition
Variable
Value
[bgp]
[<distance>]
<ext>
<int>
<local>
October 2010
131
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To configure synchronization, enter:
synchronization
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family:
address-family ipv6
4. To configure timers, enter:
timers bgp <keepalive> <holdtime>
132
October 2010
Value
<holdtime>
<keepalive>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. To redistribute information, enter:
redistribute <protocol> route-map <mapname>
Table 82: Variable definition
Variable
Value
<mapname>
<protocol>
October 2010
133
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure aggregate entries.
aggregate-address <prefix> [as-set] [summary-only]
Table 83: Variable definition
Variable
Value
[as-set]
[summary-only]
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure EBGP-ECMP processing.
134
October 2010
ebgp-ecmp
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Activate the address family.
neighbor {<X:X::X:X> | <tag>} activate
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure to accept the AS-path.
neighbor {<X:X::X:X> | <tag>} allowas-in [<1-10>]
October 2010
135
Value
Number of occurences of AS number.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Configure to start storing updates.
[no] neighbor {<X:X::X:X> | <tag>} soft-reconfiguration
inbound
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
136
October 2010
Value
Name of the route map.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter router mode and specify the BGP AS number.
router bgp <1-65535>
3. Specify the IPv6 address family (if unicast or multicast is not specified, unicast is
the default):
address-family ipv6 [unicast|multicast]
4. Specify the network to announce.
network [<X:X::X:X/M>] [synchronization]
Table 86: Variable definitions
Variable
Value
<X:X::X:X/M>
[synchronization]
October 2010
137
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. To configure aggregation, enter:
bgp aggregate-nexthop-check
Procedure steps
Display routes matching communities.
show bgp ipv6 [unicast|multicast] community [<AA:NN>] [localas] [no-advertise] [no-export] [exact-match]
Table 87: Variable definitions
Variable
Value
[<AA:NN>]
[local-AS]
[no-advertise]
[no-export]
[exact-match]
Procedure steps
Display community information.
138
October 2010
Procedure steps
Display detailed neighbor information.
show bgp ipv6 [unicast|multicast] neighbors [<A.B.C.D> |
<X:X::X:X>] [advertised-routes | received | received-routes |
routes]
Table 88: Variable definitions
Variable
Value
[<A.B.C.D> | <X:X::X:X>]
advertised-routes
received
received-routes
routes
Procedure steps
Display routes.
show bgp ipv6 [unicast|multicast] quote-regexp <"quotedstring">
October 2010
139
Procedure steps
Display the scan status.
show bgp ipv6 [unicast|multicast] scan
Procedure steps
To display BGP attribute information, enter:
show bgp ipv6 [unicast|multicast] attribute-info
Procedure steps
To display BGP path information, enter:
show bgp ipv6 [unicast|multicast] paths
Procedure steps
To display a neighbor status summary, enter:
show bgp ipv6 [unicast|multicast] summary
140
October 2010
Procedure steps
To display inconsistent AS paths, enter:
show bgp ipv6 [unicast|multicast] inconsistent-as
Procedure steps
To display detailed dampening information, enter:
show bgp ipv6 [unicast|multicast] dampening <type>
Table 89: Variable definition
Variable
<type>
Value
The type of dampening information to display. Possible
choices are:
dampened-paths - Display paths suppressed due to
dampenin.
flap-statistics - Display flap statistics of routes.
parameters - Display details of configured dampening
parameters.
Procedure steps
To display routes, enter:
show bgp ipv6 [unicast|multicast] route-map <mapname>
Table 90: Variable definition
Variable
<mapname>
Value
The route map to match against.
October 2010
141
Procedure steps
To display routes, enter:
show bgp ipv6 [unicast|multicast] prefix-list <listname>
Table 91: Variable definition
Variable
<listname>
Value
The prefix list to match against.
Procedure steps
To display routes, enter:
show bgp ipv6 [unicast|multicast] filter-list <listname>
Table 92: Variable definition
Variable
<listname>
Value
The filter list to match against.
Procedure steps
To display routes, enter:
142
October 2010
Value
The community list to match against.
Procedure steps
To display routes, enter:
show bgp ipv6 [unicast|multicast] regexp <expression>
Table 94: Variable definition
Variable
<expression>
Value
A regular expression used to match the BGP AS paths.
Procedure steps
Clear BGP neighbors from the system.
clear bgp all
Procedure steps
To clear all IPv6 BGP peers, enter:
October 2010
143
Procedure steps
Reset the connection.
clear bgp ipv6 {unicast|multicast}{* | v4 | v6 | <1-65535> |
<A.B.C.D> | <X:X::X:X>} [in|out|soft] [prefix-filter]
Table 95: Variable definition
Variable
144
Value
v4
v6
<1-65535>
<A.B.C.D> | <X:X::X:X>
in
out
soft
[prefix-filter]
October 2010
Procedure steps
1. Enter configuration mode.
configure terminal
2. In configuration mode, enter the command to configure the accept filter.
[no] ipv6 pim accept-register list [<accesslist>|<word>]
Table 96: Variable definition
Variable
Value
<accesslist>
<word>
Procedure steps
1. Enter configuration mode.
configure terminal
2. In configuration mode, enter the command to enable BSR status.
October 2010
145
Value
<ifname>
<hash>
<priority>
Procedure steps
1. Enter configuration mode.
configure terminal
2. In configuration mode, enter the command to configure the source address.
[no] ipv6 pim register-source <sourceaddress> <ifname>
Table 98: Variable definition
Variable
146
Value
<sourceaddress>
<ifname>
October 2010
Procedure steps
1. Enter configuration mode.
configure terminal
2. In configuration mode, enter the command to configure SSM.
[no] ipv6 pim ssm [default] [range <word>]
Table 99: Variable definition
Variable
Value
[default]
[range]
<word>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the RP address.
[no] ipv6 pim rp-address <address>
Table 100: Variable definitions
Variable
<address>
Value
The address of the Rendezvous Point.
October 2010
147
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the RP candidate.
[no] ipv6 pim rp-candidate <X:X::X:X> [interval <1-16383>]
[priority <0-255>] [group-list <listname>]
Table 101: Variable definitions
Variable
Value
<X:X::X:X>
<interval>
<priority>
<group-list>
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Configure the group to not have a source-tree switching threshold.
[no] ipv6 pim spt-threshold-infinity [group-list
<accesslist>]
148
October 2010
Value
<accesslist>
Procedure steps
1. Enter configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. In Interface mode, enter the command to enable a border router.
[no] ipv6 pim bsr-border
Table 103: Variable definition
Variable
<interface>
Value
The Interface name. Example: ethernet 0/1
Procedure steps
1. Enter configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. In Interface mode, enter the command to configure the hello interval.
October 2010
149
Value
<interface>
<interval>
Procedure steps
1. Enter configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. In Interface mode, enter the command to enable PIM-SM.
[no] ipv6 pim sparse-mode
4. To enable passive mode, enter the following command:
[no] ipv6 pim sparse-mode passive
Table 105: Variable definition
Variable
<interface>
Value
The Interface name. Example: ethernet 0/1
150
October 2010
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the priority.
[no] ipv6 pim dr-priority <priority>
Table 106: Variable definitions
Variable
<priority>
Value
The PIM router DR priority, in the range 0 to
4294967294.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure to exclude gen-id.
[no] ipv6 pim exclude-genid
Procedure steps
1. Enter Configuration mode.
October 2010
151
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the PIM peering filter.
[no] ipv6 pim neighbor-filter <accesslist>
Table 107: Variable definitions
Variable
<accesslist>
Value
The IPv6 access list name used in filtering.
Procedure steps
1. To enter configuration mode, enter:
configure terminal
2. To configure PIM neighbor change logging to the console, enter:
[no] ipv6 pim log-neighbor-changes
Table 108: Variable definitions
Variable
[no]
Value
Disables PIM neighbor change logging.
Prerequisites
To perform this procedure, configure the anycast RP address as a static RP address.
Procedure steps
1. To enter the configuration mode, enter:
152
October 2010
configure terminal
2. To configure the anycast member RP address, enter:
[no] ipv6 pim anycast-rp <anycast-RP-address> <anycastmember-RP-address>
Table 109: Variable definitions
Variable
Value
[no]
<anycast-RP-address>
<anycast-member-RP-address>
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To configure PIM mutipath , enter:
[no] ipv6 pim multipath [hashing]
Table 110: Variable definitions
Variable
Value
[no]
[hashing]
October 2010
153
Procedure steps
To display the PIM RPF information, enter:
show ipv6 pim sparse-mode rpf <source-addr> [<group-addr>]
Table 111: Variable definitions
Variable
Value
<source-addr>
<group-addr>
Procedure steps
To clear PIM statistics, enter:
clear ipv6 pim sparse-mode statistics [ interface [<ifname>] |
all]
Table 112: Variable definitions
Variable
[interface <ifname>]
154
Value
Clears statistics for the particular interface. If
the interface name is not specified, the router
clears statistics for all interfaces.
October 2010
Variable
all
Value
Clears the interface and global statistics
counters and Tree Information Base (TIB)
information.
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To configure embedded RP mapping, enter:
[no] ipv6 pim rp embedded
Table 113: Variable definitions
Variable
[no]
Value
Disables embedded RP mapping.
Displaying PIM RP
Use this procedure to display RP (rendezvous point) to be chosen based on group selected.
Procedure steps
To display the RP to be chosen based on group selected, enter:
show ipv6 pim sparse-mode rp-hash <group-addr>
Table 114: Variable definitions
Variable
<group-addr>
Value
Specifies the IPv6 group address for which
to display PIM RP information.
October 2010
155
Procedure steps
To display the group-to-RP mappings, enter:
show ipv6 pim sparse-mode rp mapping
Procedure steps
To display the group-to-RP mappings, enter:
show ipv6 pim sparse-mode statistics
Procedure steps
Enter the command to show bootstrap router information.
show ipv6 pim sparse-mode bsr-router
Procedure steps
Enter the command to show the PIM Tree Information Base.
156
October 2010
Value
<src-addr>
<grp-addr>
Procedure steps
Enter the command to show PIM interface information.
show ipv6 pim sparse-mode interface <ifname> [detail]
Table 116: Variable definition
Variable
Value
<ifname>
[detail]
Procedure steps
Display mapping information.
show ipv6 pim rp mapping
October 2010
157
Procedure steps
Enter the command to show neighbor information.
show ipv6 pim sparse-mode neighbor <ifname> [detail]
Table 117: Variable definition
Variable
Value
<ifname>
[detail]
Procedure steps
Enter the command to show RP information.
show ipv6 pim rp-hash <group-address>
Table 118: Variable definition
Variable
<group-address>
Value
The IPv6 group address.
Procedure steps
Clear bootstrap router information.
clear ipv6 pim sparse-mode bsr rp-set all
158
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Configure group membership.
[no] ipv6 mld access-group <word>
<word> is the named standard IPv6 access list.
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Configure leave latency.
[no] ipv6 mld immediate-leave group-list <word>
<word> is the named standard IPv6 access list.
October 2010
159
MLD procedures
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Configure the query interval.
[no] ipv6 mld query-interval <interval>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. Configure the query timeout.
[no] ipv6 mld querier-timeout <timeout>
Table 119: Variable definition
Variable
<timeout>
160
Value
The timeout interval.
October 2010
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. To configure the robustness variable, enter:
[no] ipv6 mld robustness-variable <robustnessvalue>
Procedure steps
1. Enter Configuration Mode.
configure terminal
2. Enter Interface Mode.
interface <interface>
3. To set the MLD version, enter:
[no] ipv6 mld version <version>
Procedure steps
1. Enter Configuration mode.
October 2010
161
MLD procedures
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the query-count value.
ipv6 mld last-member-query-count <2-7>
Table 120: Variable definitions
Variable
<2-7>
Value
Specifies the last member query count value.
The default value is 2.
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the query interval
[no] ipv6 mld last-member-query-interval <interval>
Table 121: Variable definitions
Variable
<interval>
Value
Specifies the frequency (in seconds) at
which IGMP group-specific host query
messages are sent. It ranges from 1 to 25.
The default is 1 second.
162
October 2010
Procedure steps
1. Enter Configuration mode.
configure terminal
2. Enter Interface mode.
interface <interface>
3. Configure the maximum response time.
ipv6 mld query-max-response-time <responsetime>
Table 122: Variable definitions
Variable
<responsetime>
Value
Specifies the maximum response time (in
seconds) advertised in MLD queries. It
ranges from 1 to 240. The default is 10
seconds.
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To configure the state limit, enter:
[no] ipv6 mld limit <limit>
Table 123: Variable definitions
Variable
Value
[no]
<limit>
October 2010
163
MLD procedures
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To specify the VLAN to configure, enter:
interface vlan <vid>
3. To configure the group limit, enter:
[no] ipv6 mld limit <limit>
Important:
If the L2 VLAN is not created before you enter the interface vlan vlan<vid>
command, an error message is displayed.
Table 124: Variable definitions
Variable
Value
<vid>
[no]
<limit>
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To configure the SSM mapping status, enter:
164
October 2010
[no]
Value
Disables SSM mapping.
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To configure the static SSM map, enter:
[no] ipv6 mld ssm-map static [<access-list>>] <source-addr>
Table 126: Variable definitions
Variable
Value
[no]
<access-list>
<sorce-addr>
Procedure steps
1. To enter the configuration mode, enter:
configure terminal
2. To access the VLAN database, enter:
vlan database
October 2010
165
MLD procedures
Value
[no]
<vid>
<group-addr>
<source-addr>
ssm-map
<if-name>
Procedure steps
To display MLD statistics, enter:
show ipv6 mld statistics <if-name> [detail]
Table 128: Variable definitions
Variable
166
Value
<if-name>
[detail]
October 2010
Procedure steps
To clear MLD statistics, enter:
clear ipv6 mld statistics <if-name>
Table 129: Variable definitions
Variable
<if-name>
Value
Specifies the interface for which to clear the
MLD statistics. If no interface is specified, all
statistics information is set to zero.
Procedure steps
Displays the groups.
show ipv6 mld groups [<groupaddress>|<ifname>] [detail]
Procedure steps
Display interface information.
October 2010
167
MLD procedures
Value
The interface for which you want to display information.
Procedure steps
Clear MLD group entries.
clear ipv6 mld group [all|<groupaddress>|<ifname>]
Table 131: Variable definition
Variable
Value
[all]
<groupaddress>
<ifname>
Procedure steps
Clear MLD interface entries.
clear ipv6 mld interface <ifname>
Table 132: Variable definition
Variable
<ifname>
168
Value
The interface for which you want to clear MLD interface
entries.
October 2010