|
Table Of Contents
A Commands for Cisco DSLAMs with NI-2
atm connection-traffic-table-row
A Commands for Cisco DSLAMs with NI-2
This chapter documents commands that you use to configure Cisco DSLAMs with NI-2. Commands in this chapter are listed alphabetically. For information on how to configure DSL features, refer to the Configuration Guide for Cisco DSLAMs with NI-2.
Note Commands that are identical to those documented in the Cisco IOS Configuration Fundamentals Command Reference and the ATM and Layer 3 Switch Router Command Reference have been removed from this chapter.
This chapter discusses the following commands:
atm connection-traffic-table-row
aaa authentication ppp
To specify one or more AAA authentication methods for use on ATM and DSL interfaces running PPP, use the aaa authentication ppp global configuration command. Use the no form of this command to disable authentication.
aaa authentication ppp {default | list-name} method1 [...[method4]]
no aaa authentication ppp {default | list-name} method1 [...[method4]]
Syntax Description
default
Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in.
list-name
Character string that you use to name the list of authentication methods tried when a user logs in.
method
At least one and up to four of the keywords described in Table 2-1.
Defaults
If the default list is not set, only the local user database is checked. This version has the same effect as the following command:
aaa authentication ppp default local
Command Modes
Global configuration
Command History
Usage Guidelines
The system uses lists that you create by using the aaa authentication ppp command with the ppp authentication command. These lists contain up to three authentication methods that the system uses when a user tries to log in to the serial interface.
Create a list by entering the aaa authentication ppp list-name method command, where list-name is any character string used to name this list, such as MIS-access. The method argument identifies the list of methods the authentication algorithm tries in the given sequence. You can enter up to four methods. Method keywords are described in Table 2-1.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to have authentication succeed even if all methods return an error.
If authentication is not specifically set for a function, the default is none and no authentication is performed. Use the show running-config command to view lists of authentication methods.
Examples
The following example creates an AAA authentication list called MIS-access for serial lines that use PPP. The user is allowed access with no authentication.
DSLAM(config)# aaa new-model
DSLAM(config)# aaa authentication ppp mis-access group radius
Related Commands
aaa authorization
To set parameters that restrict a user's network access, use the aaa authorization global configuration command. To disable authorization for a function, use the no form of this command.
aaa authorization {network | exec | commands level | reverse-access | auth-proxy} {default | list-name} [method1 [method2...]]
no aaa authorization {network | exec | commands level | reverse-access | auth-proxy}
Syntax Description
network
Runs authorization for all network-related service requests, including SLIP, PPP, PPP NCPs, and ARA.
exec
Runs authorization to determine if the user is allowed to run an EXEC shell. This facility might return user profile information such as autocommand information.
commands
Runs authorization for all commands at the specified privilege level.
level
Specifies command level that should be authorized. Valid entries are
0 through 15.reverse-access
Runs authorization for reverse access connections, such as reverse Telnet.
auth-proxy
Runs authorization for the authentication proxy.
default
Uses the listed authorization methods that follow this argument as the default list of methods for authorization.
list-name
Use this character string to name the list of authorization methods.
method1 [method2...]
One of the keywords listed in Table 2-2.
Defaults
Authorization is disabled for all actions (equivalent to the method keyword none). If you issue the aaa authorization command for a particular authorization type without specifying a named method list , the system automatically applies the default method list to all interfaces or lines (where this authorization type applies) except those that have a named method list explicitly defined. (A defined method list overrides the default method list.) If you do not define a default method list, then no authorization takes place.
Command Modes
Global configuration
Command History
Usage Guidelines
Use the aaa authorization command to enable authorization and to create named method lists that define authorization methods for user access to the specified function. Method lists for authorization define the ways that the system performs authorization and the sequence in which the system performs these methods. A method list is a named list that describes the authorization methods to be queried (such as RADIUS), in sequence. You can use method lists to designate one or more security protocols that are to be used for authorization, thus ensuring a backup system if the initial method fails. Cisco IOS software uses the first method listed to authorize users for specific network services; if that method fails to respond, the Cisco IOS software selects the next method listed in the method list. This process continues until communication with a listed authorization method succeeds, or all methods defined are exhausted.
Note The Cisco IOS software attempts authorization with the next listed method only when there is no response from the previous method. If authorization fails at any point in this cycle—meaning that the security server or local username database responds by denying the user services—the authorization process stops and no other authorization methods are attempted.
Use the aaa authorization command to create a list by entering the list-name and the method, where list-name is any character string that is used to name this list (excluding all method names) and method identifies the list of authorization method(s) tried in the given sequence.
Method keywords are described in Table 2-2.
Cisco IOS software supports the following five methods for authorization:
•If-Authenticated—The user can access the requested function if the user was authenticated successfully. Not supported with the auth-proxy authorization type.
•None—The network access server does not request authorization information; authorization is not performed over this line/interface. Not supported with the auth-proxy authorization type.
•Local—The router or access server consults its local database, as defined by the username command, to authorize specific rights for users. The local database can control only a limited set of functions. Not supported with the auth-proxy authorization type.
•RADIUS—The network access server requests authorization information from the RADIUS security server. RADIUS authorization defines specific rights for users by associating attributes, which are stored in a database on the RADIUS server, with the appropriate user.
•Kerberos Instance Map—The network access server uses the instance that the kerberos instance map command defines for authorization. Not supported with the auth-proxy authorization type.
Method lists are specific to the type of authorization being requested. AAA supports five different types of authorization:
•Network—Applies to network connections which can include a PPP, SLIP, or ARA connection.
•EXEC—Applies to the attributes that are associated with a user EXEC terminal session.
•Commands—Applies to the EXEC mode commands a user issues. Command authorization attempts authorization for all EXEC mode commands, including global configuration commands, associated with a specific privilege level.
•Reverse Access—Applies to reverse Telnet sessions.
•Auth-proxy—Applies to HTTP sessions that trigger the authentication proxy feature.
When you create a named method list, you are defining a particular list of authorization methods for the indicated authorization type.
After you define them, you must apply method lists to specific lines or interfaces before any defined method is performed.
The authorization command causes a request packet that contains a series of AV pairs to be sent to the RADIUS server as part of the authorization process. The server can do one of the following:
•Accept the request as is
•Make changes to the request
•Refuse the request and refuse authorization
For a list of supported RADIUS attributes, refer to the RADIUS attributes appendix in the Security Configuration Guide.
Note Five commands are associated with privilege level 0: disable, enable, exit, help, and logout. If you configure AAA authorization for a privilege level greater than 0, these five commands will be excluded from the privilege level command set.
When you enable the authentication proxy, the AAA server, you must configure the database used for authentication and the authentication proxy service for authorization.
Note Use the ip auth-proxy name command in conjunction with the aaa authorization auth-proxy command. Together these commands set up the authorization policy that the firewall can download.
Examples
In this example, the first method of authorization using the authentication proxy is RADIUS.
DSLAM(config)# aaa new-model
DSLAM(config)# aaa authorization auth-proxy default group radius
The following example shows the aaa authorization auth-proxy command as part of an AAA new model configuration. Use these AAA configuration commands to secure the router when the authentication proxy is enabled. Failure to configure the router properly could result in security holes.
DSLAM(config)# aaa new-model
DSLAM(config)# aaa authentication login default group radius
DSLAM(config)# aaa authorization auth-proxy default group radius
Related Commands
Command Descriptionaaa authentication
Specifies one or more AAA authentication methods for use on serial interfaces that run PPP.
aaa new-model
Enables the AAA access control mode.
aaa new-model
To enable the AAA access control model, issue the aaa new-model global configuration command. Use the no form of this command to disable this functionality.
aaa new-model
no aaa new-model
Syntax Description
This command has no arguments or keywords.
Defaults
AAA is not enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
This command enables the AAA access control system.
Examples
The following example initializes AAA:
DSLAM(config)# aaa new-model
Related Commands
accept-dialin
To create an accept-dialin VPDN subgroup, use the accept-dialin VPDN group command. To remove the accept-dialin subgroup from a VPDN group, use the no form of this command.
accept-dialin
no accept-dialin
Syntax Description
This command has no arguments or keywords.
Defaults
Disabled
Command Modes
VPDN group mode
Command History
Usage Guidelines
For a VPDN group to accept dial-in calls, you must also configure the:
•terminate-from VPDN group command
•protocol VPDN subgroup command
•virtual-template accept-dialin command
You must configure the vpdn group command with the accept-dialin or request-dialin command for the dial-in to be functional. The requester initiates a dial-in tunnel. The acceptor accepts a request for a dial-in tunnel.
Examples
If you do not use the terminate-from command, you automatically enable a default VPDN group, which allows all tunnels to share the same tunnel attributes:
DSLAM(config)# vpdn enable
DSLAM(config)# vpdn-group 1
! Default L2TP VPDN group
DSLAM(config-vpdn)# accept-dialin
DSLAM(config-vpdn-acc-in)# protocol l2tp
DSLAM(config-vpdn-acc-in)# virtual-template 1
Related Commands
address-family
To enter the address family submode that configures routing protocols, such as BGP, RIP, and static routing, use the address-family global configuration command. To disable the address-family submode that configures routing protocols, use the no form of this command.
VPN-IPv4 unicast
address-family vpnv4 [unicast]
no address-family vpnv4 [unicast]
IPv4 unicast
address-family ipv4 [unicast]
no address-family ipv4 [unicast]
IPv4 unicast with CE router
address-family ipv4 [unicast] vrf vrf-name
no address-family ipv4 [unicast] vrf vrf-name
Syntax Description
Defaults
Routing information for address family IPv4 is advertised by default when you configure a BGP session using the neighbor...remote-as command, unless you execute the no bgp default ipv4-activate command.
Command Modes
Address-family configuration submode
Command History
Usage Guidelines
When you use the address-family command, you enter address-family configuration submode (prompt:
(config-router-af)#
). Within this submode, you can configure address-family specific parameters for routing protocols, such as BGP, that can accommodate multiple Layer 3 address families.To exit address-family configuration submode and return to router configuration mode, type exit-address-family, or exit.
Examples
The address-family command in the following example places the router into address-family configuration submode for the VPNv4 address family. Within the submode, you can configure advertisement of NLRI for the VPNv4 address family using the neighbor activate command and other related commands:
DSLAM(config)# router bgp 100
DSLAM(config-router)# address-family vpnv4
DSLAM
(config-router-af)#
The command in the following example places the router into address-family configuration submode for the IPv4 address family. Use this form of the command, which specifies a VRF, only to configure routing exchanges between PE and CE devices. This address-family command causes subsequent commands that you enter in the submode to execute in the context of VRF vrf2. Within the submode, you can use the neighbor activate command and other related commands to accomplish the following:
•Configure advertisement of IPv4 NLRI between the PE and CE routers.
•Configure translation of the IPv4 NLRI (that is, translate IPv4 into VPNv4 for NLRI received from the CE, and translate VPNv4 into IPv4 for NLRI to be sent from the PE to the CE).
•Enter the routing parameters that apply to this VRF.
Enter the address-family configuration submode as follows:
DSLAM(config)# router bgp 100
DSLAM(config-router)# address-family ipv4 unicast vrf vrf2
DSLAM(config-router-af)#
Related Commands
Command Descriptionexit-address-family
Exits address-family submode.
neighbor activate
Exchanges an address with a neighboring router.
alarms
To enable alarms in profile command mode, use the alarms command. To disable alarms, use the no form of the command.
alarms
no alarms
Syntax Description
This command has no keywords or arguments.
Defaults
Disabled
Command Modes
Profile configuration
Command History
Usage Guidelines
The command affects minor alarms for DSL subscriber ports only. The alarms that this command controls apply to these event classes:
•Near End LOS
•Near End LOCD
•Near End LOF
•Subscriber port failure
•Upstream or downstream bit rate not above minimum bit rate
When you enable or disable alarms, only the specified profile is affected. For example, if you disable alarms on the default profile, other profiles are unaffected.
Use alarms and no alarms to enable and disable minor alarms related to DSL subscriber ports. When you disable these alarms, you receive no notification when alarm conditions exist. (Notification methods include console messages, LEDs, the output of the show facility-alarm status command, and relay alarm signals to external systems for audible or visible alarms.) However, you can track the condition of DSL ports on which alarms are disabled, including conditions that ordinarily trigger alarms, by using the command show dsl interface atm slot#/port#.
You can suppress minimum bit rate alarms without disabling other alarms for the profile. See the "cap bitrate" section on page 3-5, and the "dmt bitrate" section on page 3-32.
Note The alarms command has no effect on critical alarms, major alarms, or minor alarms that are related to subsystems other than the DSL subscriber ports.
Examples
In this example, the command enables alarms for the default profile:
DSLAM# configure terminal
DSLAM(config)# dsl-profile default
DSLAM(cfg-dsl-profile)# alarms
Related Commands
aps clear
To clear outstanding APS priority requests, use the aps clear privileged EXEC command.
aps clear atm interface
Syntax Description
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The aps clear EXEC command allows you to remove all of the APS priority requests on the named ATM interface.
Note This command works only on SONET interfaces in redundant configurations.
Examples
The following example clears outstanding APS priority requests on interface atm 0/1:
DSLAM> enable
DSLAM# aps clear atm 0/1
Related Commands
aps force
To force a switchover to the specified fiber regardless of the failure state, use the aps force privileged EXEC command. To disable the forced switchover, use the aps clear command.
aps force atm interface from [protection | working]
Syntax Description
atm interface
ATM interface for which you want to force the switchover.
protection
The fiber that is local to the NI-2 card in slot 11.
working
The fiber that is local to the NI-2 card in slot 10.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Force is defined as the second highest APS request priority level. The aps force command does not persist over a system restart. The request succeeds if no higher priority request is posted. This command forces a switch to the specified fiber regardless of the failure state of the fiber. See Usage Guidelines in the "show aps" section on page 6-3 for information on request priority levels.
Note The working fiber is local to the NI-2 card in slot 10, and the protection fiber is local to the NI-2 card in slot 11.
Examples
The following example forces a switch on interface ATM 0/2 from the working fiber to the protection fiber:
DSLAM> enable
DSLAM# aps force atm 0/2 from working
Related Commands
aps lockout
The aps lockout privileged EXEC command prevents automatic, manual, and forced APS switchovers from occurring on the specified SONET interface. To disable aps lockout, use the aps clear command.
aps lockout atm interface
Syntax Description
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Lockout is defined as the highest APS request priority level. The aps lockout command does not persist over a system restart. If the working fiber is active, then the aps lockout command prevents a switchover to the protection fiber. If the protection fiber is active, then the aps lockout command prevents a switchover to the working fiber. See Usage Guidelines in the "show aps" section on page 6-3 for information on request priority levels.
Note If the active fiber goes down while the system is under lockout, no switchover occurs to the protection fiber, and data traffic is interrupted until the active fiber connection is restored.
The following example stops the protection fiber from becoming the active fiber by preventing manual, automatic, or forced APS switchovers on interface ATM 0/1:
DSLAM> enable
DSLAM# aps lockout atm 0/1
Related Commands
aps manual
To cause a switchover from the specified fiber to a fiber that is not in a failed state, use the aps manual privileged EXEC command. To clear the switchover request, use the aps clear atm command.
aps manual atm interface from [protection | working]
Syntax Description
atm interface
ATM interface from which you want to switch.
protection
The fiber that is local to the NI-2 card in slot 11.
working
The fiber that is local to the NI-2 card in slot 10.
Defaults
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Manual is the third highest APS request priority level. The request succeeds if no higher priority request is posted. The aps manual command does not persist over a system restart. The atm interface named in the command is the one from which you want to switch. See Usage Guidelines in the "show aps" section on page 6-3 for information on request priority levels.
Examples
The following example forces a switch from the ATM 0/1 working fiber to the ATM 0/1 protection fiber:
DSLAM> enable
DSLAM# aps manual atm 0/1 from working
Related Commands
atm clp-drop
To enable the clp-drop flag for all ports, and for selected traffic types, use the atm clp-drop command.
atm clp-drop [force] {vbr-nrt | ubr} {off | on}
Syntax Description
Defaults
Off
Command Modes
Global configuration
Command History
Usage Guidelines
If the clp-drop flag is enabled, the software drops cells when the specified service-category queues reach 50 percent of the discard threshold limit. This reduces congestion in busy flows.
Examples
In this example, the command enables the clp-drop flag for UBR traffic:
DSLAM# configure terminal
DSLAM(config)# atm clp-drop ubr on
Related Commands
None
atm connection-traffic-table-row
To create an entry in the traffic characteristics table, use the atm connection-traffic-table-row global configuration command. To delete an entry, use the no form of this command.
atm connection-traffic-table-row [index row-index] [name string] cbr pcr rate [cdvt cdvt-value]
atm connection-traffic-table-row [index row-index] [name string] {vbr-rt | vbr-nrt} pcr rate {scr0 | scr10} scr-value [mbs mbs-value] [cdvt cdvt-value]
atm connection-traffic-table-row [index row-index] [name string] abr pcr rate [cdvt cdvt-value]
[mcr mcr-value]atm connection-traffic-table-row [index row-index] [name string] ubr pcr rate [cdvt cdvt-value]
[mcr mcr-value]no atm connection-traffic-table-row index row-index
Syntax Description
Defaults
Rows 1 through 6 in the table are predefined.
Command Modes
Global configuration
Command History
Release Modification12.0(5)DA
This command was introduced.
12.2(7)DA
The name keyword was introduced.
Usage Guidelines
This command sets up the traffic characteristics used in PVC, PVP, soft-vc, and soft-vp definition. The characteristics are stored as rows of a table. To reference a row index when you create a PVC, use the atm pvc command in interface configuration mode. To reference a row index when you create a PVP, use the atm pvp command. To reference row indexes when you create a soft-vc or soft-vp, use the atm soft-vc command and atm soft-vp command, respectively.
When you use the atm connection-traffic-table-row command without the index clause, the software uses a free-row index, which is displayed if the command is successful.
When the CDVT or MBS parameter is not specified in the creation of a row, the software chooses a configurable interface default value to use in UPC.
Six connection traffic table rows are defined by default and are numbered 1 through 6. Row 1 is the default row used by the atm pvc command if no rows are explicitly specified. Use the show atm connection-traffic-table command to display the default configurations for rows 2 through 6.
You cannot delete default rows.
Row 1 PCR represents the maximum cell rate that fits in 24 bits.
When you configure an ABR row and do not specify MCR, the software configures MCR as 0 in the CTT row.
The default rows do not have any names.
Examples
In the following example, a CBR CTT row is defined with an index of 200 and a peak cell rate of 7743 kbps.
DSLAM(config)# atm connection-traffic-table-row index 200 name traffic-row1 cbr pcr 7743
Related Commands
atm input-queue
To change the maximum size of the input queue for each subscriber port, use the atm input-queue interface configuration command. To reset the maximum queue size to the default value, use the no form of the command.
atm input-queue [force] {cbr | vbr-rt | vbr-nrt | ubr} max-size size-num
no atm input-queue [force] {cbr | vbr-rt | vbr-nrt | ubr} max-size
Syntax Description
Defaults
The defaults vary by queue (traffic type) as shown here:
Command Modes
Interface configuration
Command History
Release Modification12.0(5)DA
This command was introduced in a previous release. The range of queue sizes and the type of port affected by the command were changed for Release 12.0(5)DA.
Usage Guidelines
This command is supported only on subscriber ports.
The force argument indicates that the change will be made even if it results in the loss of data on the interface queue (the queue must be momentarily disabled for the threshold to be changed). This command without the force argument changes the threshold only if the interface is down. An error message appears and the command does not take effect if the interface is up and the force argument is not present.
To display both the configured and installed values of size-num, use the show atm interface resource command.
Examples
In the following example, the maximum size of the vbr-nrt input queue is set to 512 cells. You can set this even if the interface is up.
DSLAM(config-if)# atm input-queue force vbr-nrt max-size 512
Related Commands
atm input-threshold
To set input-queue discard-threshold values for this node and for any subtended nodes subordinate to this node, use the atm input-threshold global configuration command. To reset a threshold to its default value, use the no form of the command.
atm input-threshold {cbr | vbr-rt | vbr-nrt | ubr} {epd threshold-value | drop threshold-value}
no atm input-threshold {cbr | vbr-rt | vbr-nrt | ubr} {epd | drop}
Syntax Description
{cbr | vbr-nrt |vbr-rt | ubr}
Select the traffic priority. Threshold settings apply to all queues of a given priority.
epd
Early packet discard threshold. The epd value plus the drop value equals the total size of the input queue. For details, see the Usage GuidelinesUsage Guidelines.
drop
Drop threshold. The drop value plus the epd value equals the total size of the input queue. For details, see Usage Guidelines.
threshold-value
Enter the allowed maximum input discard threshold, in cells, for subscriber and subtending ports for the selected traffic parameter. The range is 8 to 262144.
If you enter a value that is not a power of 2, the system rounds up or down to the nearest power of 2 and uses that value. For example, if you enter 18, the system rounds down to 16. If you enter a value that falls halfway between two powers of 2, the system rounds up. For example, if you enter 12, the system rounds up to 16.
Defaults
The defaults vary by interface type and by traffic priority, as shown here:
Command Modes
Global configuration
Command History
Usage Guidelines
We recommend that you leave the input queue discard thresholds set to their default values, which are adequate for most configurations.
This command controls the discard threshold settings for up to 52 input queues—one queue for each of four traffic types on each of up to 13 nodes in a subtending group. The behavior of the input queues is affected not only by the input queue discard threshold settings, but also by the setting of the intelligent packet discard feature, which is controlled with the atm pvc command and the atm soft-vc command. The packet discharge setting determines whether the system performs packet-based discards or cell-based discards:
•When packet discharge is enabled, the system performs packet-based discards—that is, when discarding is triggered, the system drops data from the first cell dropped, up to the end of the current AAL5 packet.
This discard method includes policer and partial packet discard (PPD) drops, or entire AAL5 packets (for early packet discard (EPD) drops). The system accepts or rejects subsequent data on a packet-by-packet basis.
•When packet discharge is disabled, the system performs cell-based discards—that is, when discarding, the system drops a cell at a time, and accepts or rejects subsequent data on a cell-by-cell basis. Cell-based discarding is the default behavior.
The packet discharge setting applies to all discards, whether for reasons of queue exhaustion or policing. Packet discharge is disabled by default; use the commands atm pvc vpi vci pd {on | off} or atm soft-vc vpi vci pd { on | off } to enable or disable it.
The input queue discard thresholds work as follows:
•If packet-based discard is in force (the packet discharge feature is enabled), the input queue absorbs packets until the queue reaches the epd threshold. At that point, the queue absorbs the remainder of the current packet, as long as doing so does not cause the queue to fill completely. (The total queue size equals epd value plus drop value.)
After it reaches the epd threshold, the queue drops all subsequent packets until the queue contents drop below the epd threshold. If the queue fills completely before the current packet finishes, then PPD occurs.
•If cell-based discard is in force (the packet discharge feature is disabled), add the epd and drop threshold values to determine the input queue size. When the queue is full, it drops all subsequent cells until its contents fall below the combined threshold value.
If packet-based discard is in force, you can implicitly configure the input queue discard thresholds for either EPD or PPD. For EPD, configure a drop threshold value that is large enough to allow most packets to enter the queue. Appropriate values for this purpose vary by traffic type, but see the thresholds in the Defaults section for examples of EPD settings. For PPD, configure a small drop threshold value. This forces the system to discard the remainder of the packet that fills up the queue.
To set input queue sizes, use the atm input-queue command.
Examples
In this example, the command sets the epd threshold for CBR traffic on subscriber and subtending ports at 32,000 cells:
DSLAM# configure terminal
DSLAM(config)# atm input-threshold cbr epd 32000
Related Commands
atm ni2-switch trunk
To select the interface to use as the trunk on a DS3/8xT1 card, use the atm ni2-switch trunk command. To reset this command to the default value, use the no form of this command.
atm ni2-switch trunk {atm0/1 | atm0/2 | atm0/3 | atm0/4 | atm0/5 | atm0/6 | atm0/7 | atm0/8 | atm0/9 | atm0/ima0 | atm0/ima1 | atm0/ima2 | atm0/ima3}
Syntax Description
{atm0/1 | atm0/2 | atm0/3 | atm0/4 | atm0/5 | atm0/6 | atm0/7 | atm0/8 | atm0/9 | atm0/ima0 | atm0/ima1 | atm0/ima2 | atm0/ima3}
The interface to use as the trunk.
Defaults
The DS3 link is the default trunk interface on the DS3+T1 I/O module (atm ni2-switch trunk atm0/1).
The first E1 link (atm0/2) is the default trunk interface on the E1 I/O module (atm ni2-switch trunk atm0/2).
Note Before you reassign trunk status from an active link or IMA group to a different link or IMA group, you must administratively shut down both the current trunk and the interface to be assigned trunk status.
Command Modes
Global configuration
Command History
Usage Guidelines
Table 2-3 provides the trunk interface and the name to use for it in this command.
Examples
In the following example, the trunk interface is set to T1/E1 link 2.
DSLAM(config)# interface atm0/3
DSLAM(config-if)# shutdown
DSLAM(config)# atm ni2-switch trunk atm0/4
Related Commands
atm oam intercept segment
The atm oam intercept segment command is a global configuration command that enables the NI-2 to accept ATM OAM segment cells on "up" atm connections. If a connection is down, ATM OAM segment cells are not received. The command is enabled by default. Use the no form to disable the NI-2 from receiving ATM OAM segment cells
atm oam intercept segment
no oam intercept segment
Syntax Description
This command has no arguments or keywords.
Defaults
The command is enabled by default.
Command Modes
Global configuration
Command History
Usage Guidelines
You can determine the state of this setting by using the show running-config command to check for no atm oam intercept segment. The default setting, atm oam intercept segment, is not displayed by show running-config.
Examples
In this example, the reception of ATM OAM segment cells by NI-2 is disabled.
DSLAM# configure terminal
DSLAM(config)# no atm oam intercept segment
Related Commands
Command Descriptionatm oam intercept end-to-end
Enable/disable accepting ATM end-to-end OAM cells. For more information, see http://www.cisco.com/univercd/cc/td/doc/product/atm/c8540/12_1/12_c_e/command/atm.htm#xtocid71.
atm output-threshold
To change the output queue discard thresholds for the subscriber ports, use the atm output-threshold interface configuration command. To reset a threshold to its default value, use the no form of the command.
atm output-threshold {cbr | vbr-rt | vbr-nrt | ubr} {epd threshold-value | drop threshold-value}
no atm output-threshold {cbr | vbr-rt | vbr-nrt | ubr} {epd | drop}
Syntax Description
The defaults vary by traffic priority, as shown here:
Number of Cells Queue Segment cbr vbr-rt vbr-nrt ubrepd
128
128
1024
1024
drop
128
128
1024
1024
Total queue
256
256
2048
2048
Command Modes
Interface configuration
Command History
Usage Guidelines
We recommend that you leave the output queue discard thresholds set to their default values, which are adequate for most configurations.
The atm output-threshold command controls the discard threshold settings for up to 1040 output queues. The behavior of the output queue is controlled not only by the output queue discard threshold settings, but also by the setting of the intelligent packet discard feature, which is controlled with the atm pvc command.
The packet discharge setting determines whether the system performs packet-based discards or cell-based discards:
•When packet discharge is enabled, the system performs packet-based discards—that is, when discarding is triggered, the system drops data from the first cell dropped, up to the end of the current AAL5 packet.
This discard method includes policer and PPD drops, or entire AAL5 packets (for EPD drops). The system accepts or rejects subsequent data on a packet-by-packet basis.
•When packet discharge is disabled, the system performs cell-based discards—that is, when discarding, the system drops a cell at a time, and accepts or rejects subsequent data on a cell-by-cell basis. Cell-based discarding is the default behavior.
The packet discharge setting applies to all discards, whether the discards occur for reasons of queue exhaustion or policing. Packet discharge is disabled by default; use the command atm pvc vpi vci pd {on | off} to enable or disable it.
The output queue discard thresholds work as follows:
•If packet-based discard is in force (the packet discharge feature is enabled), the output queue absorbs packets until the queue reaches the epd threshold. At that point, the queue absorbs the remainder of the current packet, as long as doing so does not cause the queue to fill completely. (The total queue size equals epd value plus drop value.)
After it reaches the epd threshold, the queue drops all subsequent packets until the queue contents drop below the epd threshold. If the queue fills completely before the current packet finishes, then PPD occurs.
•If cell-based discard is in force (the packet discharge feature is disabled), add the epd and drop threshold values to determine the output queue size. When the queue is full, it drops all subsequent cells until its contents fall below the combined threshold value.
If packet-based discard is in force, you can implicitly configure the output queue discard thresholds for either EPD or PPD. For EPD, configure a drop threshold value that is large enough to allow most packets to enter the queue. Appropriate values for this purpose vary by traffic type; see the thresholds in the Defaults section for examples of EPD settings. For PPD, configure a very small drop threshold value to force the system to discard the remainder of the packet that fills up the queue.
Examples
In this example, the command sets the drop threshold for VBR-NRT traffic on subscriber ports at 16,000 cells:
DSLAM# configure terminal
DSLAM(config)# interface atm0/1
DSLAM(config-if)# atm output-threshold vbr-nrt drop 16000
Related Commands
atm pvc
To create a PVC, use the atm pvc interface configuration command. To create a permanent virtual channel connection (PVCC), use the long form of the atm pvc command. To create a permanent virtual channel link (PVCL), use the short form of the atm pvc command. To remove the specified PVC, use the no form of this command.
atm pvc vpi-A [vci-A | any-vci] [upc upc-A] [pd pd] [rx-cttr index] [tx-cttr index] interface atm slot-B/port-B vpi-B [vci-B | any-vci] [upc upc-B] [name string] [conn-type conntype-B]
atm pvc vpi vci [upc upc] [pd pd] [rx-cttr index] [tx-cttr index]
no atm pvc vpi vci
Note The A and B suffixes of the command arguments refer to the ends of the connection. A is the local end; B is the remote end.
Syntax Description
Command Modes
Interface configuration
Command History
Release Modification12.0(5)DA
This command was introduced.
12.2(5)DA
The name keyword was introduced.
12.2(7)DA
The conn-type keyword was introduced.
Usage Guidelines
Use the atm pvc commands to create or delete the following types of ATM connections:
•Transit point-to-point PVCC
•Point-to-point PVCL
•Point-to-point permanent virtual channel connection terminated at ASP (terminating VC)
When you set UBR connections, the tx-cttr and rx-cttr fields are not needed. However, these fields are required when you set up a CBR, VBR, or ABR connection. See the "atm connection-traffic-table-row" section for information on creating an entry in the traffic characteristics table.
Assigning VPI Values to Shaped VP Tunnels
If you configure VP tunnels with traffic shaping, you can use only 32 VPIs, even though the full range of VPI values is 0 to 255. If you have not yet assigned any VPIs, all values from 0 to 255 are available. Once you begin to assign VPIs, however, the assigned VPIs limit the VPIs that remain. (You assign VPIs by using the atm pvp or atm pvc commands.)
After a particular VPI value is assigned to a shaped VP tunnel, every 32nd VPI value above and below the first one is eliminated—that is, the original value modulo 32. For example, if you assign VPI 94 to a shaped VP tunnel, the following VPI values become unavailable for any purpose: 30, 62, 126, 158, 190, and 222.
To avoid problems, choose a block of 32 consecutive VPI values (for example, 0 to 31 or 101 to 132). The software rejects invalid VPI values.
Examples
The following example shows how to configure a terminating PVC between interface ATM 3/1 and the ASP port (ATM 0/0).
DSLAM(config)# interface atm 0/0
DSLAM(config-if)# atm pvc 0 any-vci interface atm 3/1 0 100
The following example shows how to set up a UBR PVC connection between interface ATM 4/1 and ATM 4/,2 with VPI 0 and VCI 40.
DSLAM(config)# interface atm 4/1
DSLAM(config-if)# atm pvc 0 40 interface atm 4/2 0 40
The following example shows a display using the encap variable.
DSLAM(config-if)# atm pvc 100 200 interface atm 0/0 0 344 encap ?
aal5mux AAL5+MUX Encapsulation
aal5snap AAL5+LLC/SNAP Encapsulation
The following example shows the commands that you use to establish a PVC between a logical interface (VP tunnel) on ATM 4/1.99 and ATM 3/1.
DSLAM(config)# interface atm 4/1.99
DSLAM(config-subif)# atm pvc 99 100 interface atm 3/1 0 89
DSLAM(config-subif)# end
The following example shows how to use the show atm vc command to display all VCs on an interface.
DSLAM# show atm vc interface atm 0/1.51
Interface VPI VCI Type X-Interface X-VPI X-VCI Status Name
ATM0/1.51 51 3 PVC ATM0/0 0 75 DOWN
ATM0/1.51 51 4 PVC ATM0/0 0 76 DOWN
ATM0/1.51 51 5 PVC ATM0/0 0 74 DOWN
ATM0/1.51 51 16 PVC ATM0/0 0 73 DOWN
The following example deletes a previously configured ATM transit point-to-point PVC.
DSLAM(config-if)# interface atm 1/1
DSLAM(config-if)# no atm pvc 50 100
Related Commands
atm pvp
To create a permanent virtual path (PVP), use the atm pvp interface configuration command. To create a permanent virtual path connection (PVPC), use the long form of the atm pvp command. To create a permanent virtual path link (PVPL), use the short form of the atm pvp command. To remove the specified PVP, use the no form of this command.
atm pvp vpi-A [cast-type type-A] [upc upc-A] [rx-cttr index] [tx-cttr index]
interface atm slot#/port# [cast-type type-B] [upc upc-B] [name string][conn-type conntype-B]atm pvp vpi [cast-type type] [hierarchical | shaped] [upc upc] [rx-cttr index] [tx-cttr index]
no atm pvp vpi
Syntax Description
Defaults
See Syntax Description.
Command Modes
Interface configuration
Command History
Release Modification12.0(5)DA
This command was introduced.
12.2(7)DA
The name keyword was introduced.
12.2(7)DA
The conn-type keyword was introduced.
Usage Guidelines
When you specify the PVP as shaped, you must subsequently use it as a VP tunnel (by the interface command). You can use only CBR VPs for shaped tunnels. A shaped PVP cannot be cross-connected.
Note Hierarchical tunnels are not supported on DSLAM platform hardware.
The commands are used to create or delete the following types of ATM connections on a switch:
•Transit point-to-point PVPC
•Transit point-to-multipoint PVPC
•Point-to-point PVPL
•Point-to-multipoint PVPL
Examples
The following example shows a typical configuration for PPP over ATM, using a RADIUS authentication server:
DSLAM(config)# interface virtual-template 1
DSLAM(config-if)# ip unnumbered ethernet 0/0
DSLAM(config-if)# peer default ip address pool telecommuters
DSLAM(config-if)# ppp authentication chap
DSLAM(config-if)# exit
DSLAM(config)# ip local pool telecommuters 10.36.1.1 10.36.1.254
DSLAM(config)# aaa new-model
DSLAM(config)# aaa authentication ppp default radius
DSLAM(config)# radius-server host 172.31.5.96
DSLAM(config)# radius-server key foo
DSLAM(config)# radius-server attribute nas-port format e
DSLAM(config)# interface atm 1/1
DSLAM(config-if)# atm pvp 1
DSLAM(config-if)# interface atm 1/1.40 multipoint
DSLAM(config-subif)# pvc 0/50
DSLAM(config-if-atm-vc)# encapsulation aal5mux ppp virtual-template 1
DSLAM(config-if-atm-vc)# exit
DSLAM(config-subif)# pvc 0/51
DSLAM(config-if-atm-vc)# encapsulation aal5mux ppp virtual-template 1
DSLAM(config-if-atm-vc)# exit
Related Commands
atm route-bridged
To configure an interface to use ATM route-bridged encapsulation, use the atm route-bridged interface configuration command.
atm route-bridged ip
Syntax Description
Defaults
No default behavior or values.
Command Modes
Interface configuration
Command History
Examples
The following example configures ATM route-bridge encapsulation on an interface:
DSLAM(config)# interface atm 1/1
DSLAM(config-if)# ip address 172.69.5.9 255.255.255.0
DSLAM(config-if)# atm route-bridged ip
DSLAM(config-if)# pvc 0/32
atm soft-vc
To create a soft PVC on the DSLAM, use the atm soft-vc interface configuration command.
atm soft-vc source-vpi source-vci dest-address atm-address dest-vpi dest-vci [enable | disable]
[upc upc] [pd pd] [rx-cttr index] [tx-cttr index]
[retry-interval [first retry-interval] [maximum retry-interval]]
[explicit-path precedence {name path-name | identifier path-id}
[upto partial-entry-index] [only-explicit]] [name string]For existing soft PVCs, use the no form of the command to delete the soft PVC.
no atm soft-vc source-vpi source-vci
To respecify the explicit paths, use the redo-explicit form.
atm soft-vc source-vpi source-vci [enable | disable] [redo-explicit [explicit-path precedence
{name path-name | identifier path-id} [upto partial-entry index] [only-explicit]]]To signal connections with nonstandard user-defined traffic management options, use the alternate-signalling tagging form. This form may be beneficial in networks where switches use these options to manage UPC options in a manner other than that currently defined by PNNI.
atm soft-vc alternate-signalling tagging {fwd | bwd | bidir}
Syntax Description
Defaults
See Syntax Description.
Command Modes
Interface configuration
Command History
Release Modification12.0(5)DA
This command was introduced.
12.2(5)DA
The name and alternate-signalling tagging keywords were added.
Usage Guidelines
Obtain the destination port address before configuring a soft PVC by using the show atm interface or show atm addresses command on the destination DSLAM.
The creation of a soft PVC might be unsuccessful because of the following scenarios:
•A VPI or VCI collision at the source or destination DSLAM.
•The source or destination interface is not up (or autoconfiguration is not complete).
•The specified destination address is incorrect.
You can assign up to three explicit paths to a soft VC, by using precedence numbers 1 through 3. The system considers the precedence 1 explicit path as the primary path and tries it first. If it fails, the next precedence path is tried. You can specify explicit paths either by name or by identifier.
You can change the explicit path options without tearing down an existing soft PVC. Use the redo-explicit form of the command to respecify all of the explicit path options.
After configuring a soft PVC, use the show atm vc interface command on the source node (specify the source VPI and source VCI) to verify that the soft PVC is working and to see the explicit path that the software is using.
Note The configuration that displays for soft connections with explicit paths is always shown as two separate lines. The redo-explicit keyword is on the second line, even if it was originally configured through the use of a single command line.
Note To use the atm soft-vc alternate-signalling tagging command, you must shut down the interface and set the upc to tag.
Examples
The following example shows how a user at the destination DSLAM displays the address of the destination port.
DSLAM> show atm address
Switch Address(es):
47.0091.8100.0000.0005.312a.2c01.0005.312a.2c01.00 active
NOTE: Switch addresses with selector bytes 01 through 7F
are reserved for use by PNNI routing
PNNI Local Node Address(es):
47.0091.8100.0000.0005.312a.2c01.0005.312a.2c01.01 Node 1
Soft VC Address(es):
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0010.00 ATM0/1
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0020.00 ATM0/2
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0030.00 ATM0/3
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0040.00 ATM0/4
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0050.00 ATM0/5
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0060.00 ATM0/6
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0070.00 ATM0/7
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0080.00 ATM0/8
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0090.00 ATM0/9
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00a0.00 ATM0/IMA0
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00b0.00 ATM0/IMA1
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00c0.00 ATM0/IMA2
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00d0.00 ATM0/IMA3
The following example shows how to configure a soft-vc with the alternative tagging option set to forward.
DSLAM(config)# interface atm 0/1
DSLAM(config-if)# atm soft-vc alternate-signalling tagging fwd
Related Commands
atm soft-vp
To create a soft PVP on the DSLAM, use the atm soft-vp interface configuration command.
atm soft-vp vpi-s dest-address address vpi-d [upc upc] [rx-cttr index] [tx-cttr index]
[retry-interval [first retry-interval] [maximum retry-interval][name string]For existing soft PVPs, use the no form of the command to delete the soft PVP.
no atm soft-vp vpi-s
Use the redo-explicit form of the command to respecify explicit paths.
atm soft-vp vpi-s [enable | disable]
redo-explicit [explicit-path precedence {name path-name | identifier path-id}
[upto partial-entry-index] [only-explicit]]Syntax Description[upto partial-entry-index] [only-explicit]]][upto partial-entry-index] [only-explicit]]]
Defaults
See Syntax Description.
Command Modes
Interface configuration
Command History
Release Modification12.0(5)DA
This command was introduced.
12.2(5)DA
The name and alternate-signalling tagging keywords were added.
Usage Guidelines
Obtain the destination port address before configuring a soft PVC by using the show atm interface or show atm addresses command on the destination DSLAM.
The creation of a soft PVC might be unsuccessful because of the following scenarios:
•A VPI or VCI collision at the source or destination DSLAM.
•The source or destination interface is not up (or autoconfiguration is not complete).
•The specified destination address is incorrect.
You can assign up to three explicit paths to a soft VC, by using precedence numbers 1 through 3. The system considers the precedence 1 explicit path as the primary path and tries it first. If it fails, the next precedence path is tried. You can specify explicit paths either by name or by identifier.
You can change the explicit path options without tearing down an existing soft PVC. Use the redo-explicit form of the command to respecify all of the explicit path options.
After configuring a soft PVC, use the show atm vc interface command on the source node (specify the source VPI and source VCI) to verify that the soft PVC is working and to see the explicit path that the software is using.
Note The configuration that displays for soft connections with explicit paths is always shown as two separate lines. The redo-explicit keyword is on the second line, even if it was originally configured through the use of a single command line.
Note To use the atm soft-vc alternate-signalling tagging command, you must shut down the interface and set the upc to tag.
Examples
The following example shows how a user at the destination DSLAM displays the address of the destination port.
DSLAM> show atm address
Switch Address(es):
47.0091.8100.0000.0005.312a.2c01.0005.312a.2c01.00 active
NOTE: Switch addresses with selector bytes 01 through 7F
are reserved for use by PNNI routing
PNNI Local Node Address(es):
47.0091.8100.0000.0005.312a.2c01.0005.312a.2c01.01 Node 1
Soft VC Address(es):
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0010.00 ATM0/1
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0020.00 ATM0/2
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0030.00 ATM0/3
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0040.00 ATM0/4
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0050.00 ATM0/5
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0060.00 ATM0/6
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0070.00 ATM0/7
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0080.00 ATM0/8
47.0091.8100.0000.0005.312a.2c01.4000.0c98.0090.00 ATM0/9
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00a0.00 ATM0/IMA0
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00b0.00 ATM0/IMA1
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00c0.00 ATM0/IMA2
47.0091.8100.0000.0005.312a.2c01.4000.0c90.00d0.00 ATM0/IMA3
The following example shows how to configure a soft-vc with the alternative tagging option set to forward.
DSLAM(config)# interface atm 0/1
DSLAM(config-if)# atm soft-vc alternate-signalling tagging fwd
Related Commands
auto-sync
To enter the auto-sync submode for automatically synchronizing the configuration/flash between the Cisco primary and secondary redundant NI-2s, use the auto-sync global configuration command.
auto-sync bootflash
auto-sync config
auto-sync exit
auto-sync flash
auto-sync running-config
Syntax Description
Defaults
•auto-sync config
•auto-sync running-config
Command Modes
Auto-sync configuration submode
Command History
Usage Guidelines
The auto-sync config and auto-sync running-config global configuration commands are enabled by default. You need to use these commands only if you previously disabled the commands.
You must also manually synchronize the flash files and bootflash files before you can enable autosynchronization. Otherwise, when operation changes from the primary to the secondary device, the operation of the DSLAM might change if the software versions differ from one NI-2 to the other.
Examples
The following example enables autosynchronization of the bootflash files:
DSLAM# configure terminal
DSLAM(config)# auto-sync
DSLAM(config-auto-sync)# bootflash
The following example disables autosynchronization of the bootflash files:
DSLAM# configure terminal
DSLAM(config)# auto-sync
DSLAM(config-auto-sync)# bootflash
Related Commands
Posted: Tue May 11 08:54:41 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.