ECFMConfigUM PDF
ECFMConfigUM PDF
ECFMConfigUM PDF
com
Configuration User Manual
ARICENT: ECFMConfigum/20090603
2 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CONTENTS
4 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CONTENTS
6 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CONTENTS
1
1.Introduction
Aricent ECFM (Ethernet Connectivity Fault Management) specifies the protocol entities within the
architecture of Virtual Bridged LAN (Local Area Network) that provides the capabilities for detecting,
verifying and isolating connectivity failures in the Virtual Bridged LAN through CC (Continuity Check), LB
(LoopBack) and LT (LinkTrace) protocols for providing complete 802.1ag functionality. Performance
monitoring is done using LM (Loss Measurement), DM (Delay Measurement) functions and TH
(Throughput Measurement).
This document describes the CLI (Command Line Interface) and SNMP (Simple Network Management
Protocol) configurations of Aricent ECFM to detect, isolate and verify the faults in connectivity in the
ECFM managed links. It also describes the configurations related to Y.1731 related configurations. The
reader is expected to have a basic knowledge of the protocol as a pre-requisite.
The acronyms expanded in Table 1-1 are fundamental to the information in this document.
Acronym Abbreviation
CFM Connectivity Fault Management
CFM PDU CFM Protocol Data Unit
CNP Customer Network Port
DMM Delay Measurement Message
DMR Delay Measurement Reply
ECFM Ethernet Connectivity Fault Management
ETH-TH Ethernet Throughput Measurement
EXM Experimental OAM Message
EXP Experimental OAM function
EXR Experimental OAM Reply
FL Frame Loss
ICC ITU Carrier Code
IPDV Inter-Packet Delay Variation
LAN Local Area Network
LBM LoopBack Message
LBR LoopBack Reply
LCK Locked
LMM Loss Measurement Message
LMR Loss Measurement Reply
LTM LinkTrace Message
LTR LinkTrace Reply
MA Maintenance Association
MAC Media Access Control
MAID Maintenance Association Identifier
MCC Maintenance Communication Channel
MD Maintenance Domain
ME Maintenance Entity
MEG Maintenance Entity Group
MEP Maintenance End Point
MEPID Maintenance End Point Identifier
MHF MIP Half Function
MI Multiple Instance
MIP Maintenance Intermediate Point
MSTP Multiple Spanning Tree Protocol
PDV Packet Delay Variation
PIP Provider Instance Port
PNP Provider Network Port
pps Packets per second
SNMP Simple Network Management Protocol
14 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 1: INTRODUCTION
Acronym Abbreviation
TST Test
UMC Unique MEG ID Code
VLAN Virtual LAN
VSM Vendor Specific OAM Message
VSP Vendor Specific OAM
VSR Vendor Specific OAM Reply
CLI Command Line Interface
The terminologies used for ECFM and Y.1731 features are mapped in the Table 1-2.
Maintenance Entity Group End Point (MEP) Maintenance Association End Point (MEP)
1.4 References
[1] ISS CLI User Manual
[2] IEEE Standard P802.1ag/D7.0 – Draft Standard for Virtual Bridged Local
and Metropolitan Area Network.
[3] ITU-T Recommendation Y.1731 (05/2006) – Draft for OAM functions and
mechanisms for Ethernet based networks.
The terms and typographical conventions used in this document are listed and explained in Table 1-3.
Table 1-3: Conventions
Convention Usage
Arial 10 Bold CLI commands
Arial 10 Italics User inputs for CLI commands
Courier New 10 Regular, CLI command outputs
blue color
The chapters in this document are organized to describe the general ECFM
configurations both through CLI and SNMP interfaces. Each chapter is organized task
based. Packet flow configurations are explained using specific topologies.
16 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 1: INTRODUCTION
Scotty Manager, version 2.1.10 is used for the following SNMP operations:
• MIB load
• Set operation
• Get operation
• Walk operation
This section describes the various SNMP operations along with syntax and example.
The MIB Load operation is used to register the MIB files with the SNMP manager.
Table 1-5 lists the MIB files that must be loaded in the SNMP manager before issuing any Get/Set
operation.
Table 1-5: MIB Files
MIB Name Object prefix Description
ARICENT-PROP-PBB-MIB fsPbb MIB module for Aricent PBB
AricentMIMst-MIB fsMIMst MIB module for Aricent proprietary
multiple instance MSTP (Multiple
Spanning Tree Protocol).
ARICENTQ-BRIDGE-MIB fsDot1q The VLAN bridge MIB module for
managing virtual bridged LANs(Local
Area Networks), with multiple instance
capability
ARICENT-PBB-MIB fsPbb Initial version of PBB MIB published in
802.1ap.
ARICENT-MIVLAN-EXT-MIB fsMIVlan The multiple instance extension of
VLAN bridge MIB module.
ARICENT-LA-MIB fsLa The proprietary MIB module for Aricent
LA
ARICENT-CFA-MIB If The MIB module for Aricent CFA
VCM-MIB fsVcm The MIB module for the Aricent virtual
context manager
ARICENT-MIStdBRIDGE-MIB fsDot1d This MIB module for standard bridge
MIB with multiple instance capability.
IF-MIB If The MIB module to describe generic
objects for network interface sub-layers.
This MIB is an updated
version of MIB-II's ifTable. This MIB
incorporates the extensions defined in
RFC 1229.
AricentMIVlan-MIB fsMIDot1q This MIB module is for Aricent
proprietory multiple instance VLAN MIB.
P-BRIDGE-MIB dot1d The bridge MIB extension module
managing Priority and Multicast Filtering
defined by IEEE 802.1D-1998 and
including Restricted Group Registration
defined by IEEE 802.1t-2001.
Q-BRIDGE-MIB dot1q The VLAN bridge MIB module
managing Virtual Bridged Local Area
Networks defined by IEEE 802.1Q-
2003, and including Restricted Vlan
Registration defined by IEEE 802.1u-
2001 and Vlan Classification defined by
IEEE 802.1v-2001
ARICENTP-BRIDGE-MIB fsDot1d The bridge MIB extension module with
multiple instance capability for
managing Priority and Multicast Filtering
defined by IEEE 802.1D-1998. This MIB
includes Restricted Group Registration
defined by IEEE 802.1t-2001.
18 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 1: INTRODUCTION
The Set operation is used to configure a particular value of an object indentified by the indices used in the
operation.
Syntax: % snmpSession set {{ObjectName.Index1.Index2…IndexN DataType ValueToBeSet}}
DataType is an optional argument.
Example:
To set the bridge mode of a switch with Context ID = 1 to Provider Backone I-Component Bridge,
the syntax is:
% snmp0 set {{fsMIVlanBridgeMode.1 providerBackoneICompBridge}}
Where, Index1 = 1 (ContextId)
ValueToBeSet = providerBackoneICompBridge
SNMP session identifier = snmp0
The Get operation is used to obtain the configured value of an object indentified by the indices used in the
operation.
Syntax: % snmpSession get {{ObjectName.Index1.Index2…IndexN}}
Output: {ObjectIdentifier DataType Value}
Example:
To get the value of bridge mode of a switch with Context ID = 1, the syntax is:
% snmp0 get {{fsMIVlanBridgeMode.1}}
Where, Index1 = 1 (ContextId)
SNMP session identifier = snmp0
The output is:
The snmpwalk command is designed to perform a sequence of chained GETNEXT requests. The
command takes a single OID and displays a list of all results which lie within the subtree rooted on this
OID.
Syntax: % snmpSession walk Object TableName {puts $Object}
Output: {ObjectIdentifier DataType Value}
Example:
To view the maintenance end points configured on the bridge.
% snmp0 walk table fsMIEcfmMepMacAddress {puts $table}
Where SNMP session identifier = snmp0
The output is:
{1.3.6.1.4.1.2076.160.1.0.7.1.9.0.1.1.1 {OCTET STRING}
00:01:02:03:04:03}
{1.3.6.1.4.1.2076.160.1.0.7.1.9.0.2.1.2 {OCTET STRING}
00:01:02:03:04:03}
{1.3.6.1.4.1.2076.160.1.0.7.1.9.0.3.1.1 {OCTET STRING}
00:01:02:03:04:03}
The Table 1-6 list the sample ranges used in the configuration commands mentioned in this manual. The
header file of the code should be refered for the exact ranges and scalability constants.
20 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 1: INTRODUCTION
The values mentioned in the Table 1-6 are calculated as per the scalability constants listed in the Table
1-7.
2
2.Product Description
This chapter describes Aricent ECFM and provides an overview of its salient features, such as, MD
(Maintenance Domain), MA (Maintenance Association), Maintenance Point and CFM (Connectivity Fault
Management) messages.
Aricent ECFM provides capabilities useful for detecting, verifying, isolating connectivity failures and
performance monitoring in Virtual Bridged LANs. The fault detection, isolation and verification are done
through CC, LB and LT protocols. Performance monitoring is done using LM and DM functions. These
capabilities can be used in networks operated by multiple independent organizations, each with restricted
access to each other’s equipment.
In general, the network administrator is informed about the failure in the connection, based on the
reception of CCMs (Continuity Check Messages). The administrator can then initiate LB or LT accordingly
to determine and isolate the fault condition.
Aricent ECFM also provides performance monitoring functions for measurement of various performance
parameters in Ethernet point-to-point connections. It also supports measurement of frame loss ratio,
frame delay and frame delay variation performance parameters.
The CFM information is conveyed in protocol frames called CFM PDUs (CFM Protocol Data Units). The
CFM PDUs contain the appropriate control and status information used to detect, verify, and isolate
faults. It also contains information for path discovery in CFM-enabled links. The CFM PDUs are
processed, forwarded or discarded by the entities configured in the Bridge port, based on the MD
(Maintenance Domain) level to which that entity belongs.
• Defines Maintenance Domains, Maintenance Associations, their constituent Maintenance Points, and
the managed objects required to create and administer them.
• Describes the protocols and procedures used by Maintenance Points to detect and diagnose
connectivity faults within a maintenance domain.
A Maintenance Domain is the network or the part of the network for which faults in connectivity are
managed. A domain is owned and operated by a single entity and defined by a set of ports internal to it
and at its boundary.
24 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 2: PRODUCT DESCRIPTION
A Maintenance Domain is fully connected internally, that is, an MEP associated with an MD has
connectivity to every other MEP in the MD, in the absence of faults. The purpose of CFM is to monitor
and diagnose the ability of a maintenance domain to meet its operators’ intentions for connectivity.
Each Maintenance Domain is assigned a unique Maintenance Domain Name and Domain Level to
facilitate the easy identification of administrative responsibility for the Maintenance Domain.
Domains must not intersect, because intersecting indicates the management by more than one entity,
which is not allowed.
Administrator while configuring Maintenance Domains defines certain DSAPs (Domain Service Access
Point) to be directly accessed by the customer. Configuring Maintenance End Point on the defined
DSAPs with the same MAID and MD Level, established to verify the integrity of a single service instance
is one Maintenance Association (MA).
Figure 2-2 displays one Maintenance Association at the Customer MD Level. Two MEPs are defined on
bridge 1 and 6. The two MEPs together comprise one Maintenance Association.
MA is identified by a Short MA name that is unique in a maintenance domain. A MA is associated with
more than one VLAN (Virtual LAN), but different MAs cannot share one VLAN in a single Maintenance
Domain (MD).
For Example:
Figure 2-3 illustrates a service instance from the customer C1 point of view. The customer has four items
of customer equipment attached to the four DSAPs 1-4, by which the operator connects the four DSAPs
to create the service instance that are invisible to the customer.
A maintenance point is a demarcation point on an interface (port) that participates in CFM within a
maintenance domain. Maintenance points on device ports act as filters that confine CFM frames within
the bounds of a domain by dropping frames that do not belong to the correct level. Maintenance Point is
either MEP or MHF.
A MEP or MHF, each have two principal SAPs, an Active SAP, through which the CFM Protocol Data
Units (PDUs) are exchanged and a Passive SAP, through which the unprocessed data frames and CFM
PDUs are passed.
A Maintenance Point is UP, if Active SAP is below Passive SAP or DOWN, if Active SAP is above
Passive SAP.
A MEP is created on the Bridge Port and is associated with exactly one MA. A MEP is identified by its
MEPID (Range 1 - 8191) that is unique in an MA. It inherits the MD Level from the Maintenance Domain
and the Primary VID from the Maintenance Association.
MEP is capable of initiating and terminating OAM frames for fault management and performance
monitoring.
The following are the MEP functions:
• Periodically transmits multicast or unicast CCMs.
• Transmits LBM, LTM, TST, DMM, LMM, AIS and LCK PDUs and responds to the LBMs with LBRs,
LTMs with LTRs, DMMs with DMRs, and LMMs with LMRs.
• Validates the received PDU.
• Discards the CFM PDUs that are at lower MD level than MEP.
26 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 2: PRODUCT DESCRIPTION
Fault Management is capability to pro-actively monitor the network for faults and notify the administrator
so that timely action can be taken to ensure availability of the network. Fault management includes fault
detection, fault verification, fault isolation, fault notification and fault recovery.
Aricent ECFM uses the CC protocol to detect both connectivity failures and unintended connectivity
between service instances. Each MEP can periodically transmit a multicast CCM announcing the identity
of the MEP and its ME (Maintenance Entity), and track the CCMs received from the other MEPs. All
connectivity faults indicate either misdirected CCMs or the differences between the CCMs received and
the configured expectations of MEP. The state of the tracked CCMs is available to the operator for
examination. Following are the various error conditions that can be tracked through CCMs:
1. Loss of Continuity
2. Mismerge condition
3. Unexpected MEP
4. Unexpected MEG Level
5. Unexpected Period
6. Locally Detected Link Failure
7. Internal Hardware Failure
8. Internal Software Failure
Aricent ECFM uses the LB Protocol to support the fault verification functionality. Fault verification is an
administrative action typically performed after fault detection. Operator initiates the unicast LBM
(LoopBack Message) transmission from a specific MEP to an MEP/MIP or multicast LBM transmission to
an ME. On reception of LBM, the MP (MEP/MIP) validates the received LBM and generates the unicast
LBR (Loopback Reply), and transmits it to the originating MEP. The MEP records the information received
in the LBR for examination by the operator.
Unicast LBM can be used for the following applications:
1. To verify bi-directional connectivity of an MEP with an MIP or a peer MEP.
2. To perform a bi-directional in-service or out-of-service diagnostics test between a pair of peer MEPs.
This includes verifying bandwidth throughput, detecting bit errors, and so on.
Multicast LBM can be used for the following application:
1. To verify bi-directional connectivity of an MEP with its entire ME.
Aricent ECFM uses the LT Protocol to determine the Adjacent Relation Retrieval or for Fault Localization.
Operator initiates the multicast LTM (Link Trace Message) transmission from a specific MEP to an MEP.
On reception of LTM, the MP (MEP/MIP) generates the unicast LTR (Link Trace Reply), which is
transmitted back to the originating MEP. The LTM is also forwarded to the next MP. The originating MEP
accumulates the responses for examination by the operator.
Aricent ECFM uses the AIS (Alarm Indication Signal) to suppress alarms at client-layer MEP(s), following
the detection of a fault/Locked condition/AIS condition at the server-layer MEP. Operator can enable or
disable the AIS functionality for an MEP, If AIS is enabled and a fault/Locked Condition/AIS Condition is
detected at an MEP, AIS frames will be transmitted to the client-layer MEPs in the direction opposite to
the peer MEP. On reception of the AIS frame, the client-layer MEP suppresses its fault alarms.
Aricent ECFM uses the LCK (Locked Signal) to communicate to its higher-level MEP(s) that the operator
had deliberately interrupted the data-traffic (Higher layer OAM PDUs and Data-frames), to perform some
Out-Of-Service operations. Operator can enable or disable the Out-Of-Service condition on MEP. When
enabled, LCK frames are transmitted to the client-layer MEP in the direction opposite to the peer MEP.
On reception of LCK frames, the client-layer MEP suppresses its fault alarms, which may have been
triggered by the administrative locking of data-traffic at lower-level MEP.
Aricent ECFM uses the TST (Test Signal) to perform one-way In-Service or Out-Of-Service diagnostics
tests or for verifying bandwidth throughput. Once the Test-Signal operation is initiated, TST frames are
transmitted to the peer MEP. On reception of TST frames, the MEP checks the TST frames for bit errors
and updates the relevant counters to be examined by the operator.
28 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 2: PRODUCT DESCRIPTION
Aricent ECFM uses the MCC (Maintenance Communication Channel) to support remote management
between a pair of MEPs. On initiation, MCC frames are sent to the peer MEP. The received information in
MCC frame is provided to the registered application.
Aricent ECFM uses the EXP (Experimental OAM) to support Experimental OAM functionalities within an
administrative domain. On initiation, EXP frame is sent to the peer MEP, which in turn can respond with
an EXR (Experimental OAM Reply) frame. The received information in EXP or EXR frame is provided to
the registered application.
Aricent ECFM uses the VSP (Vendor Specific OAM) to support proprietary vendor specific functionalities
within an administrative domain. On initiation, VSP frame is sent to the peer MEP, which in turn can
respond with a VSR (Vendor Specific OAM Reply) frame. The received information in VSP or VSR frame
is provided to the registered application.
Performance monitoring is necessary to detect potential faults and to pro-actively notify an operator or
peer network nodes. Such notification can further be used for protecting traffic and ensuring service
availability and service level agreements. Frame Loss Measurement, Frame Delay Measurement and
Throughput Measurement together constitute performance monitoring
Aricent ECFM uses the frame loss measurement function to get the value of Frame Loss Ratio; it is
expressed as the percentage of the number of service frames lost divided by the total number of service
frames transmitted.
Frame Loss Ratio = (Number of service frames lost)/ (Total number of service frames transmitted)
Service frames include data-frames and higher layer OAM PDUs.
Loss Measurement is performed by sending frames with ETH-LM information to the peer MEP and by
receiving frames with ETH-LM information from the peer MEP.
Frame Loss Measurement can be performed in following two ways:
• Dual-Ended ETH-LM, using CCM frame with ETH-LM information.
• Single-Ended ETH-LM, using LMM (Loss Measurement Message) and LMR (Loss Measurement
Reply) frame.
Aricent ECFM uses the frame delay measurement function to get the Frame Delay Value; it is expressed
as the time elapsed since the start of transmission of first bit of the frame by the source until the reception
of the last bit by the destination.
These Measurements are performed by sending periodic frames with ETH-DM information to the peer
MEP and by receiving frames with ETH-DM information from the peer MEP.
Frame Delay Measurement can be performed in following ways:
• One-Way DM, using 1DM frame.
• Two-Way DM, using DMM (Delay Measurement Message) and DMR (Delay Measurement Reply)
frame.
Aricent ECFM uses the frame delay variation measurement function to get IPDV (Inter-Packet Delay
Variation) and PDV (Packet Delay Variation) values. These Measurements are determined by analyzing
the Frame Delay values taken from Frame Delay Rolling Buffer.
Aricent ECFM uses the throughput measurement function to get throughput value in units of bps (bits per
second); it is expressed as the maximum rate in bps at which none of the offered frames are dropped by
the device.
These measurements are performed by sending periodic ETH-LB or ETH-TST bursts to the peer MEP
and receiving ETH-LB and ETH-TST frames from the peer MEP.
Throughput Measurement can be performed in the following ways.
• One-Way TH, using ETH-TST.
• Two-Way TH, using ETH-LB.
30 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
Chapter
3
3.Configuring ECFM in Single Instance Mode
The chapter describes the configuration of ECFM and Y.1731 specific features in Aricent ISS.
This section describes the configuration guidelines for ECFM and Y.1731 in SI (Single Instance) mode.
1. The following list of commands must be executed in the specified sequence to start and configure the
ECFM and Y.1731 entities1:
• enable
• configure terminal
• vlan <vlan-id>
• ports interface <type> < interface-id >
• vlan active
• exit
• ethernet cfm domain name <domain-name> level <level-id>
• service name <ma-name> [vlan < vlan-id >]
• mep crosscheck mpid <mepid> [vlan <vlan-id>]
• exit
• ethernet cfm enable
• ethernet cfm y1731 enable
• interface <interface-type><interface-id>
1
Refer the ISSCLIum [1] for description of the commands.
• ethernet cfm mep level <level-id> [inward] mpid <mepid> [vlan <vlan-id>] [active]
• exit
• exit
• ethernet cfm cc level <a,b,c-d> [vlan <a,b,c-d>] interval {three-hundred-hertz | ten-ms |
hundred-ms | one-sec | ten-sec | one-min | ten-min}
• ethernet cfm cc enable level < a,b,c-d> [vlan < a,b,c-d>]
• exit
2. The interface type is gigabitethernet and the interface ID needs to be specified as 0/n, where n is the
interface number.
ECFM is operationally disabled, when the switch comes up. When the ECFM is enabled and the ECFM
entities (MD, MA, MEP and MIP) are configured; then CC, LB and LT functionalities can be started.
By default, Y.1731 features are disabled. It can be enabled only after enabling ECFM. When Y.1731 is
enabled, then TST, AIS, LCK, Frame Loss and Frame Delay functionalities can be started.
This section describes the configuration of ECFM and Y.1731 entities in SI mode.
32 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
To login into the User Exec mode, use guest as the Username and guest123 as the
password. To login to the Privileged mode, use the enable command or login with
username as root and password as admin123.
To delete configured MD
• Enter into the global configuration mode and delete the configured MD.
iss(config)# no ethernet cfm domain name TestDomain1 level 7
User can configure MD name type/format using ethernet cfm domain format name level
command.
iss(config)# ethernet cfm domain format char-string name TestDomain2 level 1
• User can configure MD name type/format using the following Set operations.
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 notInService}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 macAddressAndUint}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
This section describes the configuration of the CFM MA within a particular MD.
To configure MA
1. Execute the steps given in section 3.3.1.1 for configuring MD
2. Enter into the ECFM configuration mode and configure service at specific VLAN
iss(config-ether-ecfm)# service name CustAssoc1 vlan 101
3. Return to the Global Configuration mode.
iss(config-ether-ecfm)# exit
To delete configured MA
• Enter into the ECFM configuration mode and delete the service within the MD.
iss(config-ether-ecfm)# no service name CustAssoc1
• User can configure ICC (ITU Carrier Code) and UMC (Unique MEGID Code) using service name
icc umc command.
iss(config-ether-ecfm)# service name CustAssoc1 icc icc1 umc umc1 vlan 101
• User can configure MA name type/format using service format name vlan command.
iss(config-ether-ecfm)# service format primary-vid vlan 1001
• For the configuration of VLAN-UnAware MA(s), vlan keyword must not be provided with the
command.
To configure MA
1. Execute the steps given in section 3.3.1.2 for configuring MD.
2. Configure service at specific VLAN. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1].
34 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
To delete configured MA
• Configure the row status as destroy to delete the service within the MD.[Index: ContextID = 0, MD-
Index = 1, MA-Index = 1].
% snmp0 set {{fsMIEcfmMaRowStatus.0.1.1 destroy}}
To configure MEP
1. Execute the steps given in section 3.3.2.1 for configuring the MA to which MEP needs to be
associated
2. Enter into the ECFM configuration mode and statically define an MEP in a MA-MEP list within a MA
iss (config-ether-ecfm)# mep crosscheck mpid 5 vlan 101
VLAN-Unaware MEP can be defined without specifying the vlan parameter in the
command
3. Make the port 10 as member port of VLAN 101 and configure the VLAN 101 as active
iss(config)# vlan 101
iss(config-vlan)# ports gigabitethernet 0/10
iss(config-vlan)# vlan active
4. Enter into the interface configuration mode
iss (config)# interface gigabitethernet 0/10
5. Configure MEP on the interface in the MD and MA
iss(configure-if)#ethernet cfm mep level 7 mpid 5 vlan 101
In the command inward keyword needs to be specified for up (inward) direction MEP.
Otherwise MEP will be configured as down (outward) direction MEP
6. Enable the configured MEP.
iss(config-if)# ethernet cfm mep level 7 mpid 5 vlan 101 active
To delete MEP
1. Enter into the interface configuration mode and disable the configured MEP
iss(config-if)# no ethernet cfm mep level 7 mpid 5 vlan 101 active
2. Remove the MEP configuration fromm the interface
iss(config-if)# no ethernet cfm mep level 7 mpid 5 vlan 101
3. Return to the global configuration mode
iss(config-if)# exit
• Port (on which the MEP is configured) and VLAN (VLAN with which MEP is associated) must exist
and must be set as UP, and ECFM must be enabled on the port, for starting VLAN Aware MEP
functionality.
• vlan keyword should not be provided with the command for configuration of VLAN-Unaware MEP.
• MEP must be enabled explicitly as MEP is disabled by default.
• User can enter MEP configuration mode by executing ethernet cfm mep level mpid vlan
command. Where user can configure ccm unicast mac address, client’s mac address for AIS and
LCK, drop eligibility and vlan priority of various CFM PDUs, threshold values for delay and loss
functionality, capabilities, offload status etc.
To configure MEP
1. Execute the steps given in section 3.3.2.2 for configuring the MA to which MEP needs to be
associated.
2. Configure the MEP ID 5 in the corresponding MA-MEP list. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 5]
% snmp0 set {{fsMIEcfmMaMepListRowStatus.0.1.1.5 createAndWait}}
% snmp0 set {{fsMIEcfmMaMepListRowStatus.0.1.1.5 active}}
3. Configure the Up MEP at the interface 10. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-
ID = 5]
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.5 createAndWait}}
% snmp0 set {{fsMIEcfmMepPrimaryVid.0.1.1.5 101}}
% snmp0 set {{fsMIEcfmMepDirection.0.1.1.5 up}}
% snmp0 set {{fsMIEcfmMepIfIndex.0.1.1.5 10}}
36 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
On enabling ECFM, if the MEP is configured as Active, LBM and LTM messages can be transmitted
and received. If Y.1731 feature is enabled, then DM, FL (Frame Loss), TST, AIS, and LCK messages
can also be transmitted and received.
This section describes the configuration of the MIP (Maintenance Intermediate Point) on an interface.
MIP can be configured on an interface using either of the following two methods:
1. Explicit MIP Creation
2. Implicit MIP Creation
Table 3-1 lists the various MIP creation criteria and their description.
Table 3-1: MIP Creation Criteria
Enumeration Description
none No MIP can be created.
explicit MIP can be created, if there exists an MEP at next lower MD level on the port.
default MIP can be created on the port.
Maintenance Association - Control of MIP creation criteria is deferred to the
corresponding variable in the enclosing MD.
defer
Default Domain - Control of MIP creation criteria is deferred to the corresponding
variable in the Default MD default MHF criteria.
Configuration steps:
1. Set the default MD level corresponding to the VLAN in Default MD table.
iss(config)# ethernet cfm default-domain vlan 101 level 7
2. Execute the steps given in section 3.3.3.1 to configure an Up direction MEP for the level 7 and VLAN
101.
3. Set the MIP creation criteria. Refer Table 3-1 for the conditions for each MIP creation criteria. If mip-
creation-criteria value of MA is defer, then control of MIP creation criteria is deferred from MA to MD.
• Set the MIP creation criteria parameter to default for an MA
iss(config)#ethernet cfm domain name TestDomain1 level 7
iss(config-ether-ecfm)#service name CustAssoc1 vlan 101 mip-creation-criteria default
OR
• Set the MIP creation criteria to defer for an MA and to default for an MD.
iss(config)# ethernet cfm domain name TestDomain1 level 7
iss(config-ether-ecfm)# set mip-creation-criteria default
iss(config-ether-ecfm)# service name CustAssoc1 vlan 101 mip-creation-criteria defer
4. Entert the interface configuration mode and configure an MIP at specified maintenance level and
VLAN on an interface.
iss(config)# interface gigabitethernet 0/2
iss(config-if)#ethernet cfm mip level 7 vlan 101
Pre-requisites:
1. No MA must be configured at same MD level and VLAN along with an Up direction MEP.
2. Entry in the Default MD table should be present for the same MD level and VLAN or Default MD
default level should be configured. Refer IEEE Standard P802.1ag/D8 Section 12.14.3.1.3 (b).
3. MIP creation criteria parameter should be configured for Default Domain. Refer IEEE Standard
P802.1ag/D8 Section 22.2.3 (m).
Configuration steps:
• Set the parameters such as MD level and MIP creation criteria required for MIP creation for a VLAN
38 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
Managed objects that affect the MIP creation are MA, Default MD, Default Default MD and MEP.
At a particular port, single MIP can be configured for a VLAN at the highest MD level only.
For a particular port p and VLAN x (refer the Table 3-2), MIP creation is evaluated as follows:
1. Determine eligible MD levels for VLAN x based on:
• The MD level of each of the MA that includes VLAN x.
• The Default MD level corresponding to VLAN x.
2. Determine, from the eligible MD levels, a lowest MD level d which satisfies the following condition:
• There is no MP configured on the bridge port p and VLAN x at MD level d or MD level greater than
d.
3. Check the MIP creation criteria (refer Table 3-1) to determine whether an MIP is to be created or not.
To create MIP(s) based on trigger 3 (A change that occurs in the Default MD):
1. Enable the implicit MIP evaluation and creation.
iss(config)# ethernet cfm mip dynamic evaluation
2. Set interfaces 1 and 2 as up.
iss(config)# interface gigabitethernet 0/1
iss(config)#no shutdown
iss(config)#exit
iss(config)# interface gigabitethernet 0/2
iss(config)#no shutdown
iss(config)#exit
3. Create VLANs and make interfaces 1 and 2 as member ports of this VLANs.
iss(config)#vlan 1
iss(config-vlan)# ports gigabitethernet 0/1-2
iss(config)#exit
iss(config)#vlan 2
iss(config-vlan)# ports gigabitethernet 0/1-2
iss(config)#exit
4. Change the global Default MD level as 7 and MIP creation criteria as default.
iss(config)#ethernet cfm default-domain global level 7 mip-creation-criteria default
40 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
For starting MIP functionality, Port (on which the MIP is configured) and VLAN (VLAN with which MIP is
associated) must exist and must be UP and ECFM must be enabled on that Port.
1. Set the MD level corresponding to the VLAN in Default MD table at which MIP is to be created.[Index:
ContextID = 0, VlanID = 101]
% snmp0 set {{fsMIEcfmDefaultMdLevel.0.101 7}}
2. Execute the steps given in section 3.3.3.2 to configure an Up direction MEP for the MD level 7and
VLAN 101.
3. Configure the MIP creation criteria parameter.
• Set the MIP creation criteria parameter to default for MA. [Index: ContextID = 0, MD-Index = 1,
MA-Index = 1]
% snmp0 set {{fsMIEcfmMaRowStatus.0.1.1 notInService}}
• Set the parameters such as MD level and MIP creation criteria, required for the MIP creation for a
VLAN.
1. Configure Default MD table [Index: ContextID = 0, VlanID = 101]
% snmp0 set {{fsMIEcfmDefaultMdLevel.0.101 7}}
% snmp0 set {{fsMIEcfmDefaultMdMhfCreation.0.101 defMHFdefault}}
2. Configure MIP at MD Level 7, VLAN 101 and interface 1. [Index: Interface Number = 1, MD-level
= 7, VlanID = 101]
% snmp0 set {{fsMIEcfmMipRowStatus.1.7.101 createAndGo}}
% snmp0 set {{fsMIEcfmMipRowStatus.1.7.101 active}}
OR
• Set the parameters such as MD level and MIP creation criteria, required for MIP creation at any
VLAN.
1. Configure default MD scalar [Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHF:1 default}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 7}}
2. Configure MIP at MD Level 7, VLAN 101 and interface 1. [Index: Interface Number = 1, MD-level
= 7, VlanID = 101]
% snmp0 set {{fsMIEcfmMipRowStatus.1.7.101 createAndGo}}
42 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
To create MIP(s) based on trigger 3 (A change that occurs in the Default MD):
1. Enable the implicit MIP evaluation and creation. [Index: ContextID = 0]
% snmp0 set {{fsMIEcfmMipDynamicEvaluationStatus.0 true}}
This section describes the association of the VLANs to a Primary VLAN. The scope of VLAN association
is limited to ECFM entities only.
• One VLAN cannot be associated with more than one Primary VLAN only.
• VLAN and Primary VLAN cannot be the same.
44 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
When Aricent ISS switch is made up, by default ECFM is in the start state, but operationally in disable
state, that is, it does not generate, receive or reply to any of the CFM PDUs.
For Ethernet CFM entities to function, ECFM must be enabled, and all the ECFM entities must be
configured (MD, MA, MEP and MIP).
To enable ECFM
1. Enter into the global configuration mode
iss# configure terminal
2. Enable CFM processing globally
iss(config)# ethernet cfm enable
3. Return to the privileged EXEC mode.
iss(config)# exit
To disable ECFM
• Enter into the global configuration mode and disable CFM processing globally
iss(config)# no ethernet cfm enable
When Aricent ISS switch is made up, by default ECFM is in the start state, but operationally in disable
state, that is, it does not generate, receive or reply to any of the CFM PDUs once ECFM gets enabled,
ECFM is enabled on all the interfaces that are up.
For Ethernet CFM entities (MEP and MIP) to function, ECFM must be enabled on each interface, where
the CFM entities are configured, and all the ECFM entities must be configured (MD, MA, MEP and MIP).
On enabling the ECFM, if the MEP is configured as active, LoopBack (LBM) and LinkTrace (LTM)
messages can be transmitted and received.
46 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
By default, Y.1731 compliant features are in disabled state, that is, it does not generate, receive or reply to
any of the Y.1731 compliant CFM PDU(s).
ECFM must be enabled for Y.1731 to start functioning.
Y.1731 should be enabled for Y.1731 compliant features such as AIS, LCK and so on, to start functioning.
By default, Y.1731 compliant features are in disabled state, that is, it does not generate, receive or reply to
any of the CFM PDU(s).
ECFM must be enabled on the interface on which Y.1731 is to be enabled.
On Enabling the Y.1731, if the MEP is configured as active, LoopBack (LBM/LBR), LinkTrace
(LTM/LTR), Test (TST), Alarm Indication Signal (AIS), Lock (LCK), One-Way Delay Measurement
(1DM), Two-Way Delay Measurement (DMM/DMR), Single-ended Loss Measurement (LMM/LMR),
Dual-ended Loss Measurement messages can also be transmitted and received.
48 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
CCM Offloading can be enabled on MEP also using set ethernet cfm offload command
After configuring and enabling Continuity Check Messages, every MEP (if MD, MA and MEP are
configured) transmits CC messages as per the CCM transmission interval that is set.
Set and enable CC parameters for more than one domain levels and VLANs.
Example: ethernet cfm cc level 1-3 vlan 101-105 interval ten-ms
or
ethernet cfm cc level 1,2,3 vlan 101,102,103,104,105 interval ten-ms
To disable CC transmission
• Enter into the global configuration mode and disable CC transmission on specified level and VLAN.
iss(config)# no ethernet cfm cc enable level 1 vlan 101
• For VLAN-UnAware MEPs, vlan keyword must not be provided with the command.
• ECFM should be enabled for the successful CCMs transmission.
• By default, CCM messages are multicast and their role is Fault Management.
• MEP, at specified level and VLAN, must be enabled for successful CCM
transmission.
• When Y.1731 is enabled, user has to explicitly enable CCM transmission in an ME.
50 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
OR
• On an MA to enable CC transmission status on all the MEPs associated with the MA. [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1]
% snmp0 set {{fsMIY1731MeRowStatus.0.1.1 notInService}}
% snmp0 set {{fsMIY1731MeCciEnabled.0.1.1 true}}
% snmp0 set {{fsMIY1731MeRowStatus.0.1.1 active}}
To disable CC functionality
• Disable CC transmission:
• Individually on an MEP [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-Index = 5]:
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.5 notInService}}
% snmp0 set {{fsMIEcfmMepCciEnabled.0.1.1.5 false}}
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.5 active}}
• On an MA. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1]
% snmp0 set {{fsMIY1731MeRowStatus.0.1.1 notInService}}
% snmp0 set {{fsMIY1731MeCciEnabled.0.1.1 false}}
% snmp0 set {{fsMIY1731MeRowStatus.0.1.1 active}}
This section describes enabling crosschecking between the list of configured remote MEP of a domain
and the MEPs learned through the CCMs. By default crosschecking is enabled.
To disable crosschecking
• Enter into the global configuration mode and disable crosschecking at a specified level and VLAN.
iss(config)# ethernet cfm mep crosscheck disable level 1,2 vlan 101.
For VLAN-UnAware MEPs, vlan keyword must not be provided with the command.
To disable crosschecking
• Disable crosschecking functionality. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1]
% snmp0 set {{fsMIEcfmMaCrosscheckStatus.0.1.1 disabled}}
After configuring and enabling LoopBack messages, every MEP (if MD, MA and MEP are configured) can
transmit LoopBack messages.
52 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
The above mentioned steps are only for initiating the loopback message. User may
not get the same output. To get the same output, target entity also needs to be
configured.
In case Y.1731 is enabled, MEP at specified level and VLAN must be enabled for a loopback
transaction. The loopback (ping) capability can be enabled using the following steps
Example: [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-Index = 5]
• % snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 notInService}}
• % snmp0 set {{fsMIY1731MepLoopbackCapability.0.1.1.5 enabled}}
• % snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 active}}
After configuring and enabling LTMs, every MEP (if MD, MA and MEP are configured) can transmit LTMs.
54 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
The above mentioned steps are only for initiating the linktrace message. User may
not get the same output. To get the same output, target entity also needs to be
configured.
56 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
This section describes the steps to configure and enable the transmission and reception of TST PDU by
an MEP.
MEP at specified level and VLAN must be enabled for a test transaction. The test capability can
be enabled using the following steps
Example: [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-Index = 5]
• % snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 notInService}}
• % snmp0 set {{fsMIY1731MepTstCapability.0.1.1.5 enabled}}
• % snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 active}}
58 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
This section describes the steps to configure and enable the transmission and reception of Frame delay
PDU by an MEP.
Frame Delay can be measured using either of the following methods:
• One-way Frame Delay Measurement
• Two-way Frame Delay Measurement
The above mentioned steps are only for initiating the frame delay message. User
may not get the same output. To get the same output, target entity also needs to be
configured.
60 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
This section describes the steps to configure and enable the transmission and reception of Frame loss
PDU by an MEP.
Frame Loss can be measured using either of the following methods:
• Dual-ended using CCM messages
• Single-ended using LMM/LMR messages
The above mentioned steps are only for initiating the frame loss message. User may
not get the same output. To get the same output, target entity also needs to be
configured.
62 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
This section describes the steps to configure and enable the transmission of AIS PDU by an MEP.
64 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
• AIS capability can also be enabled using ethernet cfm mep-capability enable level 3 vlan
5 ais command
• Client layer level must be configured before enabling AIS capability.
• AIS can be send as unicast messages by configuring its unicast MAC address using set
client-layer-mac ais unicast command. (This command runs in ECFM Mep configuration
Mode.)
Example: set client-layer-mac ais unicast 00:01:02:03:04:06
This section describes the steps to configure and enable the transmission of LCK PDU by an MEP.
2. Execute the steps given in section 3.3.9.1 to enable ECFM and Y.1731 on the interface at which MEP
is configured.
3. Configure client layer level.
iss# configure terminal
iss(config)# ethernet cfm domain name TestDomain1 level 7
iss (config-ether-ecfm)# client-layer-level 6
iss# end
4. Enable LCK capability on the MEP, so that when any defect occurs, the MEP starts transmitting the
LCK to all the MEP(s) configured at the client layer level.
iss# configure terminal
iss(config)# interface gigabitethernet 0/10
iss(config-if)# ethernet cfm mep level 3 inward mpid 4 vlan 5 active
iss(config-ether-mep)# set out-of-service enable
iss(config-ether-mep)# end
66 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
• Lck can be send as unicast messages by configuring its unicast MAC address using the
following step
Example:
% snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 notInService}}
% snmp0 set {{fsMIY1731MepLckClientMacAddress.0.1.1.5 00:02:02:03:04:0a}}
% snmp0 set {{fsMIY1731MepRowStatus.0.1.1.5 active}}
The above mentioned steps are only for initiating the throughput transaction. The
user may not get the same output. To get the same output, target entity also needs to
be configured.
• To start the Throughput transaction at an MEP using destination MEPID, execute the
command,
ethernet cfm throughput type one-way mac 00:01:02:03:04:04 level 7 vlan 101 count 15
• Mac Address of the MEP with specified target “mpid” must be learnt prior to the execution of
the command.
• For a VLAN-UnAware MEP, vlan keyword must not be provided with the command.
• “count” and “deadline” keyword, if not provided, assumes infinite number of throughput
measurement.
• MEP at specified level and VLAN must be enabled for a two way throughput transaction
which uses loopback functionality. The loopback (ping) capability can be enabled using either
set params capability enable ping (runs in ECFM MEP configuration mode) or ethernet
cfm mep-capability enable level vlan ping (runs in Global Configuration mode)command.
Example:
iss(config-ether-mep)# set params capability enable ping
iss(config)# ethernet cfm mep-capability enable level 7 vlan 101 ping
• MEP at specified level and VLAN must be enabled for a one way throughput transaction
which uses test functionality. The test capability can be enabled using either set params
capability enable test (runs in ECFM MEP configuration mode) or ethernet cfm mep-
capability enable level vlan test (runs in Global Configuration mode)command.
Example:
iss(config-ether-mep)# set params capability enable test
iss(config)# ethernet cfm mep-capability enable level 7 vlan 101 test
68 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
OR
• Starting the two-way throughput measurement at an MEP using destination MAC address. [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-Index = 5]
% snmp0 set {{fsMIY1731MepTransmitThType.0.1.1.5 twoWay}}
% snmp0 set {{fsMIY1731MepTransmitThDestIsMepId.0.1.1.5 false}}
% snmp0 set {{fsMIY1731MepTransmitThDestMacAddress.0.1.1.5 00:02:02:03:04:0a}}
% snmp0 set {{fsMIY1731MepTransmitThMessages.0.1.1.5 15}}
% snmp0 set {{fsMIY1731MepTransmitThStatus.0.1.1.5 start}}
This section describes the steps required to configure the OUI globally on a device.
Default value corresponds to the first three bytes of the System MAC Address.
This section describes the steps to enable the CFM PDU encapsulation in LLC header on the specified
port.
This section describes the viewing of information related to configured ECFM and Y.1731 entities in SI
mode.
70 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
ECFM entities are displayed on the Aricent ISS shell. Aricent ECFM provides the following show
commands for displaying the ECFM entities:
• show ethernet cfm domain [brief]
• show ethernet cfm service [brief]
• show ethernet cfm maintenance-point local [ mep | mip ] [ interface interface-type interface-
number | domain domain-name | level level- id ]
This section describes the command that is used to display the information (displays the maintenance
domain name, index, level, associated number of services configured and MEP archive time for all the
Maintenance Domain configured on the bridge) of the CFM Maintenance Domains configured in the
system.
This section describes the command that is used to display the details (displays the maintenance
association name, domain name, level, primary VLAN, level, associated number of maintenance end
points which are statically defined and CCM Interval for all the Maintenance Association configured on the
bridge) of all the CFM Maintenance Associations (Services) configured in the system.
72 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 3: CONFIGURING ECFM IN SINGLE INSTANCE MODE
{1.3.6.1.4.1.2076.160.1.0.5.1.2.0.2.1 INTEGER 4}
{1.3.6.1.4.1.2076.160.1.0.5.1.2.0.4.2 INTEGER 1}
{1.3.6.1.4.1.2076.160.1.0.5.1.3.0.1.1 INTEGER charString}
{1.3.6.1.4.1.2076.160.1.0.5.1.3.0.2.1 INTEGER charString}
{1.3.6.1.4.1.2076.160.1.0.5.1.3.0.4.2 INTEGER charString}
{1.3.6.1.4.1.2076.160.1.0.5.1.4.0.1.1 {OCTET STRING} 6D:61:6F:70:65:72:31}
{1.3.6.1.4.1.2076.160.1.0.5.1.4.0.2.1 {OCTET STRING} 6D:61:6F:70:65:72:32}
{1.3.6.1.4.1.2076.160.1.0.5.1.4.0.4.2 {OCTET STRING} 6D:61:6F:70:65:72:33}
{1.3.6.1.4.1.2076.160.1.0.5.1.5.0.1.1 INTEGER defMHFdefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.5.0.2.1 INTEGER defMHFdefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.5.0.4.2 INTEGER defMHFdefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.6.0.1.1 INTEGER sendIdDefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.6.0.2.1 INTEGER sendIdDefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.6.0.4.2 INTEGER sendIdDefer}
{1.3.6.1.4.1.2076.160.1.0.5.1.7.0.1.1 INTEGER interval1s}
{1.3.6.1.4.1.2076.160.1.0.5.1.7.0.2.1 INTEGER interval10ms}
{1.3.6.1.4.1.2076.160.1.0.5.1.7.0.4.2 INTEGER interval10min}
{1.3.6.1.4.1.2076.160.1.0.5.1.8.0.1.1 Unsigned32 1}
{1.3.6.1.4.1.2076.160.1.0.5.1.8.0.2.1 Unsigned32 1}
{1.3.6.1.4.1.2076.160.1.0.5.1.8.0.4.2 Unsigned32 1}
{1.3.6.1.4.1.2076.160.1.0.5.1.9.0.1.1 INTEGER active}
{1.3.6.1.4.1.2076.160.1.0.5.1.9.0.2.1 INTEGER active}
{1.3.6.1.4.1.2076.160.1.0.5.1.9.0.4.2 INTEGER active}
This section describes the command that is used to display the maintenance points configured in the
system.
Maintenance end points are displayed either based on the interface, domain name or domain level, if one
of the inputs is selected; otherwise all the Maintenance points are displayed.
74 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
Chapter
4
4.Configuring ECFM in Multiple Instance Mode
MI Bridge-A MI Bridge-B
P1 P2 P1 P2
Down MEP
Switch configuration mode is used for configuration per switch (virtual context)
Refer Figure 4-1 for topology. Here Maintenance Points (MEP) are configured in a particular switch
(switch 1, switch 2) of the bridges (Bridge-A, Bridge-B) and Continuity check (CC), Linktrace and
Loopback protocols are used to check the connectivity between the two bridges. Frame Delay and Frame
Loss protocols are used for performance monitoring.
For Multiple Instance configuration, enable all the interfaces and map the interfaces to the corresponding
switch (virtual instance).
The commands for the configurations of ECFM are common for both single and multiple instances. Refer
3.1 for the list of commands and interface type.
This section describes the creation and configuration of virtual contexts in the bridges (Bridge-A and
Bridge-B).
76 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
iss(config-if)# no shutdown
iss(config-if)# map switch 1
iss(config-if)# exit
[Index: ContextID = 2]
% snmp0 set {{fsVCStatus.2 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.2 customerBridge}}
% snmp0 set {{fsMIMstSystemControl.2 start}}
% snmp0 set {{fsMIMstModuleStatus.2 enabled}}
This section describes the creation of VLANs in the bridges (Bridge-A and Bridge-B), and the mapping of
the interfaces to the created VLAN.
78 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
This section describes the enabling of ECFM and traceroute caching at both the bridges (Bridge-A and
Bridge-B).
At Bridge-A
• Configure the Down MEP.
iss# configure terminal
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mep level 5 mpid 10 vlan 2 active
iss(config-ether-mep)# end
At Bridge-B
• Configure the Down MEP.
iss# configure terminal
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mep level 5 mpid 30 vlan 2 active
iss(config-either-mep)# end
80 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
At Bridge-A
• Configure the Down MEP. [Index: ContextID = 1, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepRowStatus.1.1.1.10 createAndWait}}
% snmp0 set {{fsMIEcfmMepPrimaryVid.1.1.1.10 2}}
% snmp0 set {{fsMIEcfmMepIfIndex.1.1.1.10 2}}
% snmp0 set {{fsMIEcfmMepDirection.1.1.1.10 down}}
% snmp0 set {{fsMIEcfmMepActive.1.1.1.10 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.1.1.1.10 active}}
At Bridge-B
• Configure the Down MEP. [Index: ContextID = 1, MD-Index = 1, MA-Index = 1, MEP-ID = 30]
% snmp0 set {{fsMIEcfmMepRowStatus.1.1.1.30 createAndWait}}
% snmp0 set {{fsMIEcfmMepPrimaryVid.1.1.1.30 2}}
% snmp0 set {{fsMIEcfmMepIfIndex.1.1.1.30 2}}
% snmp0 set {{fsMIEcfmMepDirection.1.1.1.30 down}}
% snmp0 set {{fsMIEcfmMepActive.1.1.1.30 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.1.1.1.30 active}}
This section describes the enabling of the CCM transmission for fault detection.
This section describes the verification and isolation of fault at bridge (Bridge-A).
At Bridge-A
• Initiate the LBM from an MEP on virtual switch 1 of bridge Bridge-A.
iss# ping ethernet mac 00:02:02:03:04:02 domain OP1 vlan 2 switch 1
82 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
At Bridge-A
• Initiate the LBM from an MEP on virtual switch 1 of bridge Bridge-A. [Index: ContextID = 1, MD-Index
= 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.1.1.1.10 5}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.1.1.1.10 00:02:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.1.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.1.1.1.10 transmit}}
Get the value of following object to check whether LBM is transmitted successfully
% snmp0 get {fsMIEcfmMepLbrIn.1.1.1.10}
{1.3.6.1.4.1.2076.160.1.0.7.1.20.1.1.1.10 Unsigned32 5}
• Initiate Traceroute from an MEP on virtual switch 1 of bridge Bridge-A. [Index: ContextID = 1, MD-
Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetIsMepId.1.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetMacAddress.1.1.1.10 00:02:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLtmStatus.1.1.1.10 transmit}}
This section describes the enabling of Y.1731 on virtual switch 1 of the bridges (Bridge-A and Bridge-B),
for Y.1731 compliant features.
84 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
The section describes the initiation of frame loss measurement at bridge (Bridge-A).
At Bridge-A
• Initiate single-ended frame loss from an MEP on virtual switch 1 of bridge Bridge-A.
iss# ethernet cfm frame loss level 5 vlan 2 mac 00:02:02:03:04:02 count 5 switch 1
iss# show ethernet cfm frame loss buffer detail switch 1
Switch 1
Interface : gigabitethernet 0/2
MEP-ID : 10
Level : 5
VLAN-ID : 2
At Bridge-A
• Initiate single-ended frame loss from an MEP on virtual switch 1 of bridge Bridge-A. [Index: ContextID
= 1, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitLmmInterval.1.1.1.10 interval1s}}
% snmp0 set {{fsMIY1731MepTransmitLmmDeadline.1.1.1.10 5}}
% snmp0 set {{fsMIY1731MepTransmitLmmDestMacAddress.1.1.1.10 00:02:02:03:04:02}}
% snmp0 set {{fsMIY1731MepTransmitLmmMessages.1.1.1.10 4}}
% snmp0 set {{fsMIY1731MepTransmitLmmStatus.1.1.1.10 start}}
• Verify whether the MAC address, interface index, time stamp and measurement time fileds are
updated in the frame loss rolling buffer.
[Index: ContextID = 1, MD-Index = 1, MA-Index = 1, MEP-ID = 10, TransID = 1, Seq No = 2]
% snmp0 get {fsMIY1731FlPeerMepMacAddress.1.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.4.1.1.1.10.1.2 {OCTET STRING}
00:02:02:03:04:02}
% snmp0 get {fsMIY1731FlIfIndex.1.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.5.1.1.1.10.1.2 INTEGER 2}
% snmp0 get {fsMIY1731FlMeasurementTimeStamp.1.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.3.1.1.1.10.1.2 TimeTicks {0d 0:00:30.14}}
% snmp0 get {fsMIY1731FlMeasurementTime.1.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.8.1.1.1.10.1.2 INTEGER 70}
This section describes the initiation of frame delay measurement at bridge (Bridge-A).
At Bridge-A
• Initiate two-way frame delay from an MEP on virtual switch 1 of bridge Bridge-A.
iss# ethernet cfm frame delay start type two-way level 5 vlan 2 mac 00:02:02:03:04:02 count 5
switch 1
iss# show ethernet cfm frame delay buffer detail switch 1
Switch 1
Interface : gigabitethernet 0/2
MEP-ID : 10
86 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
Level : 5
VLAN-ID : 2
At Bridge-A
• Initiate two-way frame delay from an MEP on virtual switch 1 of bridge Bridge-A. [Index: ContextID =
1, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitDmInterval.1.1.1.10 100}}
% snmp0 set {{fsMIY1731MepTransmitDmType.1.1.1.10 twoWay}}
% snmp0 set {{fsMIY1731MepTransmitDmMessages.1.1.1.10 5}}
% snmp0 set {{fsMIY1731MepTransmitDmDestIsMepId.1.1.1.10 false}}
% snmp0 set {{fsMIY1731MepTransmitDmDestMacAddress.1.1.1.10 00:02:02:03:04:02}}
% snmp0 set {{fsMIY1731MepTransmitDmStatus.1.1.1.10 start}}
• View the number for DMM PDUs transmitted. [Index: Interface Number = 2]
% snmp0 get {fsMIY1731PortDmmOut.2}
{1.3.6.1.4.1.29601.2.7.1.1.1.1.14.2 Unsigned32 5}
At Bridge-A
• Initiate test messages from an MEP on virtual switch 1 of bridge Bridge-A.
iss# ethernet cfm test mac 00:02:02:03:04:02 level 5 vlan 2 count 5 switch 1
TST to 00:02:02:03:04:02 from 00:01:02:03:04:02 with 33(64) bytes of data.
60 bytes to 00:02:02:03:04:02: seq_no=0
60 bytes to 00:02:02:03:04:02: seq_no=1
60 bytes to 00:02:02:03:04:02: seq_no=2
60 bytes to 00:02:02:03:04:02: seq_no=3
60 bytes to 00:02:02:03:04:02: seq_no=4
--- 00:02:02:03:04:02 test statistics ---
packets sent = 5 with prbs signal without crc32 pattern
At Bridge-A
• Initiate test messages from an MEP on virtual switch 1 of bridge Bridge-A. [Index: ContextID = 1, MD-
Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitTstDestType.1.1.1.10 multicast}}
% snmp0 set {{fsMIY1731MepTransmitTstDestMepId.1.1.1.10 30}}
% snmp0 set {{fsMIY1731MepTransmitTstStatus.1.1.1.10 start}}
• Verify whether the test message counter is incremented for TEST messages sent. [Index: ContextID =
1, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 get {fsMIY1731MepTstOut.1.1.1.10}
{1.3.6.1.4.1.29601.2.7.1.2.4.1.58.1.1.1.10 Unsigned32 4}
At Bridge-A
• Configure MD on switch 2.
iss# configure terminal
iss(config)# switch 2
88 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
Switch default
Switch 1
Switch 2
At Bridge-A
• Configure MD on switch 2. [Index: ContextID = 2, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.2.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.2.1 charString}}
% snmp0 set {{fsMIEcfmMdName.2.1 4F:50:32}}
% snmp0 set {{fsMIEcfmMdMdLevel.2.1 2}}
% snmp0 set {{fsMIEcfmMdRowStatus.2.1 active}}
• View the information on Bridge-A for virtual switch 1. [Index: ContextID = 1, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.1.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.1.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.1.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.1.1 {OCTET STRING} 4F:50:31}
% snmp0 get {fsMIEcfmMdMdLevel.1.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.1.1 INTEGER 5}
90 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 4: CONFIGURING ECFM IN MULTIPLE INSTANCE MODE
5
5.Flow Based Configuration
A B
P1 P1
CUST1 P2 P2 CUST2
Bridge Bridge
(OP1) (OP2)
P3 P3
P2
CUST3
P3 Bridge
(OP3)
Entity
P1 Up MEP
MIP
C
Down MEP
This section describes the creation and configuration of interfaces at CUST1, CUST2 and CUST3.
94 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 5: FLOW BASED CONFIGURATION
This section describes the creation of VLAN on bridges (CUST1, CUST2 and CUST3) and assigning of
member ports for the created VLAN.
This section describes the enabling of ECFM, traceroute caching and MIP CCM database on bridges
(CUST1, CUST2, CUST3).
96 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 5: FLOW BASED CONFIGURATION
At CUST1
• Configure the Down MEP.
iss# configure terminal
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mep level 5 mpid 10 vlan 2 active
iss(config-ether-mep)# end
At CUST3
• Configure the Down MEP.
iss# configure terminal
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mep level 5 mpid 30 vlan 2 active
iss(config-ether-mep)# end
At CUST1
• Configure the Down MEP. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.10 createAndWait}}
% snmp0 set {{fsMIEcfmMepPrimaryVid.0.1.1.10 2}}
% snmp0 set {{fsMIEcfmMepIfIndex.0.1.1.10 2}}
% snmp0 set {{fsMIEcfmMepDirection.0.1.1.10 down}}
% snmp0 set {{fsMIEcfmMepActive.0.1.1.10 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.10 active}}
98 ARICENT: ECFMCONFIGUM/20090603
ARICENT CONFIDENTIAL
CHAPTER 5: FLOW BASED CONFIGURATION
At CUST3
• Configure the Down MEP. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 30]
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.30 createAndWait}}
% snmp0 set {{fsMIEcfmMepPrimaryVid.0.1.1.30 2}}
% snmp0 set {{fsMIEcfmMepIfIndex.0.1.1.30 2}}
% snmp0 set {{fsMIEcfmMepDirection.0.1.1.30 down}}
% snmp0 set {{fsMIEcfmMepActive.0.1.1.30 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.30 active}}
This section describes the enabling of the CCM transmission on bridges CUST1 and CUST3
At CUST1
• Enable CCM transmission. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.10 notInService}}
% snmp0 set {{fsMIEcfmExtMepCciEnabled.0.1.1.10 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.10 active}}
At CUST3
• Enable CCM transmission. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 30]
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.30 notInService}}
% snmp0 set {{fsMIEcfmExtMepCciEnabled.0.1.1.30 true}}
% snmp0 set {{fsMIEcfmMepRowStatus.0.1.1.30 active}}
This section describes the configuration of Default Domain with VLAN and MdLevel for MIP creation, and
configuration of MIP in the default domain on the bridge CUST2.
At CUST2
• Configure default domain and MIP
iss(config) # ethernet cfm default-domain vlan 2 level 5 mip-creation-criteria default
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mip level 5 vlan 2 active
At CUST2
• Configure default domain and MIP
[Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 5}}
This section describes the verification of the configured MEP and MIP on the bridges.
At CUST1
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
10 OP1 5 2 MEP Gi0/2 Enabled
At CUST2
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
- - 5 2 MIP Gi0/2 -
- - - 00:02:02:03:04:02 Active
At CUST3
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
30 OP1 5 2 MEP Gi0/2 Enabled
maop1 - Down 00:03:02:03:04:02 Active
At CUST1
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:31}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 5}
At CUST2
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 5}
At CUST3
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:31}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 5}
This section describes the checking of CCM errors on the bridges (CUST1 and CUST3)
At CUST1
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 10
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 30 mac status defect
Implies that CUST-3 is sending CCM with port-status as blocked.
At CUST3
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 30
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 10 remote defect indication
Implies that CUST-1 is sending CCM with RDI as enabled.
At CUST1
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 10]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.10}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.10 {OCTET STRING} 40}
At CUST3
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 30]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.30}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.30 {OCTET STRING} 80}
At CUST1
• Display information about all the configured CFM MAs
iss# show ethernet cfm service
Service Name : maop1
Domain Name : OP1
Index : 1
Primary Vid : 2
Level : 5
At CUST3
• Display information about all the configured CFM MAs
iss# show ethernet cfm service
Service Name : maop1
Domain Name : OP1
Index : 1
Primary Vid : 2
Level : 5
At CUST1
• Display information about all the configured CFM MAs. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 10, RemoteMEP-ID =30]
% snmp0 get {fsMIEcfmRMepMacAddress.0.1.1.10.30}
{1.3.6.1.4.1.2076.160.1.0.11.1.6.0.1.1.10.30 {OCTET STRING}
00:03:02:03:04:02}
At CUST3
• Display information about all the configured CFM MAs. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 30, RemoteMEP-ID = 10]
% snmp0 get {fsMIEcfmRMepMacAddress.0.1.1.30.10}
{1.3.6.1.4.1.2076.160.1.0.11.1.6.0.1.1.30.10 {OCTET STRING}
00:01:02:03:04:02}
This section describes the generation of CCM errors. Interface P2 of CUST3 is made down, to raise a
defect/fault in sample topology.
At CUST3
• Make interface P2 down.
iss(config)# interface gigabitethernet 0/2
iss(config-if)# shutdown
• Wait for 5 seconds and verify any link failure (error/fault/defect)
At CUST1
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 10
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 30 ccm life time expired
At CUST2
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
At CUST3
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 30
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 10 ccm life time expired
At CUST3
• Make interface P2 as down. [Index: Interface Number = 2]
% snmp0 set {{ifMainAdminStatus.2 down}}
• Wait for 5 seconds and verify any link failure (error/fault/defect)
At CUST1
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 10]
% snmp0 get {fsMIEcfmExtMepDefects.0.1.1.10}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.14.0.1.1.10 {OCTET STRING} 20}
At CUST3
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 30]
% snmp0 get {fsMIEcfmExtMepDefects.0.1.1.30}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.14.0.1.1.30 {OCTET STRING} 20}
This section describes the verification and isolation of fault using loopback and link trace messages.
At CUST1
• Initiate the Loopback transaction from CUST1 to MEP at CUST3 to verify the link failure, where
CUST3 MEP’s MAC Address is the learned remote MAC Address known from the command show
ethernet cfm service
iss# ping ethernet mac 00:03:02:03:04:02 domain OP1 vlan 2
Shows there is a link failure between CUST1 and CUST3, as no reply is received from CUST3 and
with the Relay Action as RlyHit
• Initiate the Loopback transaction to MIP at CUST2 to verify if there is a link failure.
iss# ping ethernet mac 00:02:02:03:04:02 domain OP1 vlan 2
At CUST1
• Initiate the loopback transaction from CUST1 to MEP at CUST3 to verify the link failure, where CUST3
MEP’s MAC address is the learned remote MAC. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1,
MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.10 5}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.10 transmit}}
• Initiate traceroute to MEP at bridge CUST1 for isolating link failure (error/fault/defect). [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLtmStatus.0.1.1.10 transmit}}
• Initiate the loopback transaction to MIP at CUST2 for verifying if there is a link failure. [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.10 5}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.10 00:02:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.10 transmit}}
• Check whether LBMs are transmitted successfully and LBRs are received
At CUST3
• Make interface P2 of CUST3 as up.
iss(config)# interface gigabitethernet 0/2
iss(config-if)# no shutdown
• Wait for 5 seconds and check error/fault/defect.
At CUST3
This section describes the checking of CCM errors after configuring the interface as up.
At CUST1
• Wait for 5 seconds after configuring the interface as up and then check for error/fault/defect
iss# show ethernet cfm errors
MEP-ID : 10
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 30 mac status defect
Implies that CUST-3 is sending CCM with port-status as blocked.
At CUST3
• Wait for 5 seconds after configuring the interface as up and then check for error/fault/defect
iss# show ethernet cfm errors
MEP-ID : 30
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
5 2 10 remote defect indication
Implies that CUST-1 is sending CCM with RDI as enabled.
At CUST1
• Wait for 5 seconds after configuring the interface as up and then check for error/fault/defect. [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.10}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.10 {OCTET STRING} 40}
Implies that CUST-3 is sending CCM with port-status as blocked.
At CUST3
• Wait for 5 seconds after configuring the interface as up and then check for error/fault/defect. [Index:
ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 30]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.30}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.30 {OCTET STRING} 80}
Implies that CUST-1 is sending CCM with RDI as enabled.
This section describes the initiation of the loop back and link trace messages to verify and isolate fault.
At CUST1
• Initiate the Loopback transaction from MEP at CUST1 to MEP at CUST3.
iss# ping ethernet mac 00:03:02:03:04:02 domain OP1 vlan 2
At CUST1
• Initiate the loopback transaction from MEP at CUST1 to MEP at CUST3. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.10 5}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.10 transmit}}
• Initiate traceroute from MEP at CUST1 to MEP at CUST3. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLtmStatus.0.1.1.10 transmit}}
At CUST1
• Initiate Two-way Frame delay measurement from MEP at CUST1 to MEP at CUST3.
iss# ethernet cfm frame delay start type two-way level 5 vlan 2 mac 00:03:02:03:04:02 count 5
• Wait for 5 seconds and view the frame delay buffer to see the result.
iss# show ethernet cfm frame delay buffer detail
At CUST1
• Initiate two-way frame delay measurement from MEP at CUST1 to MEP at CUST3. [Index: ContextID
= 0, MD-Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitDmInterval.0.1.1.10 100}}
% snmp0 set {{fsMIY1731MepTransmitDmType.0.1.1.10 twoWay}}
% snmp0 set {{fsMIY1731MepTransmitDmMessages.0.1.1.10 5}}
% snmp0 set {{fsMIY1731MepTransmitDmDestIsMepId.0.1.1.10 false}}
% snmp0 set {{fsMIY1731MepTransmitDmDestMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIY1731MepTransmitDmStatus.0.1.1.10 start}}
• Verify whether the delay measurement message counter is incremented for delay measurement
messages sent
[Index: Interface Number = 2]
% snmp0 get {fsMIY1731PortDmmOut.2}
{1.3.6.1.4.1.29601.2.7.1.1.1.1.14.2 Unsigned32 5}
At CUST1
• Initiate Frame loss measurement from MEP at CUST1 to MEP at CUST3.
iss# ethernet cfm frame loss level 5 vlan 2 mac 00:03:02:03:04:02 count 5
• Wait for 5 seconds and view the frame loss buffer to see the result.
iss# show ethernet cfm frame loss buffer detail
At CUST1
• Initiate frame loss measurement from MEP at CUST1 to MEP at CUST3. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitLmmInterval.0.1.1.10 interval1s}}
% snmp0 set {{fsMIY1731MepTransmitLmmDeadline.0.1.1.10 5}}
% snmp0 set {{fsMIY1731MepTransmitLmmDestMacAddress.0.1.1.10 00:03:02:03:04:02}}
% snmp0 set {{fsMIY1731MepTransmitLmmMessages.0.1.1.10 4}}
% snmp0 set {{fsMIY1731MepTransmitLmmStatus.0.1.1.10 start}}
• Verify whether the fields in the frame loss rolling buffer are updated. [Index: ContextID = 0, MD-Index
= 1, MA-Index = 1, MEP-ID = 10, TransID = 1, Seq No = 2]
% snmp0 get {fsMIY1731FlPeerMepMacAddress.0.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.4.0.1.1.10.1.2 {OCTET STRING}
00:03:02:03:04:02}
% snmp0 get {fsMIY1731FlIfIndex.0.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.5.0.1.1.10.1.2 INTEGER 2}
% snmp0 get {fsMIY1731FlMeasurementTimeStamp.0.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.3.0.1.1.10.1.2 TimeTicks {0d 0:00:30.14}}
% snmp0 get {fsMIY1731FlMeasurementTime.0.1.1.10.1.2}
{1.3.6.1.4.1.29601.2.7.1.2.12.1.8.0.1.1.10.1.2 INTEGER 70}
At CUST1
• Initiate Test message from MEP at CUST1 to MEP at CUST3.
iss# ethernet cfm test mac 00:03:02:03:04:02 domain OP1 vlan 2 count 5
At CUST1
• Initiate test message from MEP at CUST1 to MEP at CUST3. [Index: ContextID = 0, MD-Index = 1,
MA-Index = 1, MEP-ID = 10]
% snmp0 set {{fsMIY1731MepTransmitTstDestType.0.1.1.10 multicast}}
% snmp0 set {{fsMIY1731MepTransmitTstDestMepId.0.1.1.10 30}}
% snmp0 set {{fsMIY1731MepTransmitTstStatus.0.1.1.10 start}}
• Verify whether the test counter in incremented for test messages sent. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 10]
% snmp0 get {fsMIY1731MepTstOut.0.1.1.10}
{1.3.6.1.4.1.29601.2.7.1.2.4.1.58.0.1.1.10 Unsigned32 4}
The following sections describe the configuration of the ECFM functionality for provider bridges on the
following sample topology (Refer Figure 4-1 for topology)
Customer Network
(CB)
P4 Switch1 P3
P5 P2
Provider Network
Operator 1 Network P5 P2
(PEB)
Switch2
P4 P3
P2 P2
(PCB) (PCB)
Switch4 Switch3
P4 P4
P3 P3
P3 P3
(PCB) P4 P4 (PCB)
Switch8 Switch7
Bridge
P2 P2 CB Customer
PEB Provider Edge
P4 P3
PCB Provider Core
(PEB)
Switch6 Entity
Up MEP
Operator 2 Network P5 P2
MIP
Down MEP
P5 P2
MAC Address of ports on the bridges are of form 00:0m:02:03:04:0n, where m is bridge number and n is
the port number for that bridge in this sample topology.
Figure 5-2 depicts a topology for a Provider bridged network consists of two customer bridges (Switch1,
Switch5), two provider edge bridges (Switch2, Switch6), and four provider core bridges (Switch3, Switch4,
Switch7, Switch8). Maintenance Points (MEP/MIP) are configured at same MD Level and VLAN shown by
the a color code, at same type of the bridges. For an example blue color represents MEPs are configured
at Level 7 and VLAN 2 at customer bridges (Switch1 and Switch5).
Connectivity is checked between all the bridges (Switch1 to Switch 8) through Continuity Check Protocol.
A Link failure is intentionally incorporated at P2 of Switch 5. Loopback and Linktrace protocols are then
used for verification and isolation respectively.AIS and LCK are used for fault suppression.
Connectivity at customer bridges is provided through two Provided Edge bridges and four Provider Core
bridges. Service is provided to Customer through the Provider Network and to Provider Network through
the Provider Core Network. Service is provided through configuration of CFM entities at respective MD
Level on customer and provider bridges.
This section describes the configuration of bridge mode for the bridges.
This section describes the configuration of interface types and mapping of VLAN.
At Switch2
• Set interface as CustomerEdgePort
iss(config)# interface gigabitethernet 0/2
iss(config-if)# bridge port-type customerEdgePort
• Create VLAN and make interfaces as member ports of this VLAN and Port P2 as untagged member.
iss(config)# vlan 4
iss(config-vlan)# ports gigabitethernet 0/2,0/3,0/4,0/5 untagged gigabitethernet 0/2
• Configure CVID Registration table for interface with CVLAN to map with SVLAN
iss(config)# interface gigabitethernet 0/2
iss(config-if)# switchport dot1q customer vlan 2
iss(config-if)# switchport customer-vlan 2 service-vlan 4 untagged-pep false untagged-cep
false
• Configure interfaces type as providerNetworkPort
iss(config)# interface gigabitethernet 0/3
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/4
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/5
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
At Switch6
• Configure interface type as customerNetworkPort port-based
iss(config)# interface gigabitethernet 0/2
iss(config-if)# bridge port-type customerNetworkPort port-based
iss(config-if)# exit
• Creating VLAN and make interfaces as member ports of this VLAN and Port P2 as untagged member.
iss(config)# vlan 4
iss(config-vlan)# ports gigabitethernet 0/2,0/3,0/4,0/5 untagged gigabitethernet 0/2
iss(config-vlan)# exit
• Set Primary Vlan (PVID) for an interface
iss(config)# interface gigabitethernet 0/2
iss(config-if)# switchport pvid 4
iss(config-if)# exit
• Configure interface type as providerNetworkPort
iss(config)# interface gigabitethernet 0/3
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/4
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/5
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# exit
At Switch2
• Set interface as customerEdgePort. [Index: Interface Number = 2]
% snmp0 set {{ifMainBrgPortType.2 customerEdgePort}}
• Create VLAN and make interfaces as member ports of this VLAN and Port P2 as untagged member.
[Index: ContextID = 0, Vlan-ID = 4]
% snmp0 set {{fsDot1qVlanStaticRowStatus.0.4 createAndWait}}
• Configure CVID Registration table for interface with CVLAN to map with SVLAN
[Index: Interface Number = 2]
% snmp0 set {{fsMIPbPortCVlan.2 2}}
At Switch6
• Configure interface type as customerNetworkPortPortBased. [Index: Interface Number = 2]
% snmp0 set {{ifMainBrgPortType.2 customerNetworkPortPortBased}}
• Create VLAN and make interfaces as member ports of this VLAN and Port P2 as untagged member.
[Index: ContextID = 0, Vlan-ID = 4]
% snmp0 set {{fsDot1qVlanStaticRowStatus.0.4 createAndWait}}
This section describes the enabling of ECFM, MIP CCM database and traceroute caching.
This section describes the configuration of MD, MA and MEPs on the switches.
At Switch1
• Configure Maintenance Domain, Service and MEP List
iss(config)# ethernet cfm domain name OP7 level 7
iss(config-ether-ecfm) # service name maop7 vlan 2
iss(config-ether-ecfm)# mep crosscheck mpid 1 vlan 2
iss(config-ether-ecfm)# mep crosscheck mpid 2 vlan 2
iss(config- ether-ecfm)# exit
• Configure the Down Maintenance End Point (MEP)
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mep level 7 mpid 1 vlan 2 active
iss(config-if)# exit
• Enable the Continuity Check (CCM) transmission
iss(config)# ethernet cfm cc enable level 7 vlan 2
• Enable the Traceroute Cache
iss(config)# ethernet cfm traceroute cache
At Switch5
• Configure Maintenance Domain, Service and MEP List
iss(config)# ethernet cfm domain name OP7 level 7
iss(config-ether-ecfm) # service name maop7 vlan 2
iss(config-ether-ecfm)# mep crosscheck mpid 1 vlan 2
iss(config-ether-ecfm)# mep crosscheck mpid 2 vlan 2
iss(config- ether-ecfm)# exit
• Configure the Down Maintenance End Point (MEP)
At Switch2
• Configure Maintenance Domain
iss(config)# ethernet cfm domain name OP7 level 7
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
and configure MIP in the default domain.
iss(config) # ethernet cfm default-domain vlan 4 level 7 mip-creation-criteria default
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mip level 7 vlan 4 active
iss(config-if)# exit
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
iss(config) # ethernet cfm default-domain vlan 4 level 2 mip-creation-criteria default
At Switch6
• Configure Maintenance Domain
iss(config)# ethernet cfm domain name OP7 level 7
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
and configure MIP in the default domain
iss(config) # ethernet cfm default-domain vlan 4 level 7 mip-creation-criteria default
iss(config)# interface gigabitethernet 0/2
iss(config-if)# ethernet cfm mip level 7 vlan 4 active
iss(config-if)# exit
• Configure Default Domain with VLAN and MdLevel for Maintenace Intermediate Point (MIP) creation
iss(config) # ethernet cfm default-domain vlan 4 level 2 mip-creation-criteria default
At Switch3
• Configure Maintenance Domain
iss(config)# ethernet cfm domain name OP4 level 4
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
and configure MIP in the default domain.
iss(config) # ethernet cfm default-domain vlan 4 level 4 mip-creation-criteria default
iss(config)# interface gigabitethernet 0/3
iss(config-if)# ethernet cfm mip level 4 vlan 4 active
iss(config-if)# exit
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
iss(config) # ethernet cfm default-domain vlan 4 level 2 mip-creation-criteria default
At Switch7
• Configure Maintenance Domain
iss(config)# ethernet cfm domain name OP4 level 4
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
and configure MIP in the default domain.
iss(config) # ethernet cfm default-domain vlan 4 level 4 mip-creation-criteria default
iss(config)# interface gigabitethernet 0/3
iss(config-if)# ethernet cfm mip level 4 vlan 4 active
iss(config-if)# exit
• Configure Default Domain with VLAN and MdLevel for Maintenance Intermediate Point (MIP) creation
iss(config) # ethernet cfm default-domain vlan 4 level 2 mip-creation-criteria default
At Switch1
• Configure maintenance domain, service and MEP list.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
At Switch5
• Configure maintenance domain, service and MEP list.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
At Switch2
• Configure maintenance domain. [Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
• Configure default domain with VLAN and MdLevel for MIP creation, and configure MIP in the default
domain.
[Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 7}}
[Index: Interface Number = 2, MD-level = 7, VlanID = 4]
% snmp0 set {{fsMIEcfmMipRowStatus.2.7.4 createAndWait}}
% snmp0 set {{fsMIEcfmMipRowStatus.2.7.4 active}}
• Configure maintenance domain, service and MEP list. [Index: ContextID = 0, MD-Index = 2]
% snmp0 set {{fsMIEcfmMdRowStatus.0.2 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.2 charString}}
% snmp0 set {{fsMIEcfmMdName.0.2 4F:50:34}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.2 4}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.2 active}}
• Configure default domain with VLAN and MdLevel for MIP creation. [Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 4}}
At Switch6
• Configure maintenance domain. [Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
• Configure default domain with VLAN and MdLevel for MIP creation, and configure MIP in the default
domain
[Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 7}}
• Configure default domain with VLAN and MdLevel for MIP creation. [Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 4}}
At Switch3
• Configure maintenance domain. [Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:34}}
% snmp0 set {{fsMIEcfmMdMdLevel.0.1 4}}
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 active}}
• Configure default domain with VLAN and MdLevel for MIP creation, and configure MIP in the default
domain.
[Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 4}}
At Switch7
• Configure maintenance domain. [Index: ContextID = 0, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.0.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.0.1 charString}}
% snmp0 set {{fsMIEcfmMdName.0.1 4F:50:34}}
• Configure default domain with VLAN and MdLevel for MIP creation, and configure MIP in the default
domain. [Index: ContextID = 0]
% snmp0 set {{fsMIEcfmDefaultMdDefMhfCreation.0 defMHFdefault}}
% snmp0 set {{fsMIEcfmDefaultMdDefLevel.0 4}}
This section describes the verification of the configured MD, MA and MEPs.
At Switch1
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
1 OP7 7 2 MEP Gi0/2 Enabled
maop7 - Down 00:01:02:03:04:02 Active
At Switch2
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
5 OQ2 2 4 MEP Gi0/2 Enabled
maop2 - Up 00:02:02:03:04:02 Active
3 OP4 4 4 MEP Gi0/2 Enabled
maop4 - Up 00:02:02:03:04:02 Active
- - 7 4 MIP Gi0/2 -
- - - 00:02:02:03:04:02 Active
- OQ2 2 4 MIP Gi0/3 -
maop2 - - 00:02:02:03:04:03 Active
At Switch3
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
- OQ2 2 4 MIP Gi0/2 -
maop2 - - 00:03:02:03:04:02 Active
6 OQ2 2 4 MEP Gi0/3 Enabled
maop2 - Up 00:03:02:03:04:03 Active
- - 4 4 MIP Gi0/3 -
- - - 00:03:02:03:04:03 Active
At Switch5
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
2 OP7 7 2 MEP Gi0/2 Enabled
maop7 - Down 00:05:02:03:04:02 Active
At Switch6
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
5 OQ2 2 4 MEP Gi0/2 Enabled
maop2 - Up 00:06:02:03:04:02 Active
4 OP4 4 4 MEP Gi0/2 Enabled
maop4 - Up 00:06:02:03:04:02 Active
- - 7 4 MIP Gi0/2 -
- - - 00:06:02:03:04:02 Active
- OQ2 2 4 MIP Gi0/3 -
maop2 - - 00:06:02:03:04:03 Active
At Switch7
• Display the details of all the MEPs and MIPs.
iss# show ethernet cfm maintenance-point local
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
- OQ2 2 4 MIP Gi0/2 -
maop2 - - 00:07:02:03:04:02 Active
6 OQ2 2 4 MEP Gi0/3 Enabled
maop2 - Up 00:07:02:03:04:03 Active
- - 4 4 MIP Gi0/3 -
- - - 00:07:02:03:04:03 Active
At Switch1
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:37}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 7}
At Switch2
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:37}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 7}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 4}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 4}
At Switch3
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:34}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 4}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
At Switch5
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:37}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 7}
At Switch6
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:37}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 7}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 4}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 4}
At Switch7
• Display the details of all the MEPs and MIPs.
[Index: ContextID = 0, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.0.1 INTEGER charString}
% snmp0 get {fsMIEcfmMdName.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.3.0.1 {OCTET STRING} 4F:50:34}
% snmp0 get {fsMIEcfmMdMdLevel.0.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.4.0.1 INTEGER 4}
[Index: ContextID = 0]
% snmp0 get {fsMIEcfmDefaultMdDefMhfCreation.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.5.0 INTEGER defMHFdefault}
% snmp0 get {fsMIEcfmDefaultMdDefLevel.0}
{1.3.6.1.4.1.2076.160.1.0.1.1.4.0 INTEGER 2}
This section desribes the configuration of interface P2 to raise a defect/fault in sample topology.
At Switch5
• Make interface P2 as down
iss(config)# interface gigabitethernet 0/2
iss(config-if)# shutdown
• Wait for 15 seconds to check for any link failure (error/fault/defect)
At Switch5
• Make interface P2 as down. [Index: Interface Number = 2]
% snmp0 set {{ifMainAdminStatus.2 down}}
At Switch1
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 1
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
7 2 2 ccm life time expired
At Switch2
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
iss#
At Switch3
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
iss#
At Switch5
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
MEP-ID : 2
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
7 2 1 ccm life time expired
At Switch6
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
iss#
At Switch7
• Display the logged CFM continuity check error conditions
iss# show ethernet cfm errors
iss#
At Switch1
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.1 {OCTET STRING} 20}
At Switch2
• Display the logged CFM continuity check error conditions
[Index: ContextID = 0, MD-Index = 2, MA-Index = 2, MEP-ID = 3]
% snmp0 get {fsMIEcfmMepDefects.0.2.2.3}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.2.2.3 {OCTET STRING} 00}
At Switch3
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 2, MA-
Index = 2, MEP-ID = 6]
% snmp0 get {fsMIEcfmMepDefects.0.2.2.6}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.2.2.6 {OCTET STRING} 00}
At Switch5
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 1, MA-
Index = 1, MEP-ID = 2]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.2}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.2 {OCTET STRING} 20}
At Switch6
• Display the logged CFM continuity check error conditions
[Index: ContextID = 0, MD-Index = 2, MA-Index = 2, MEP-ID = 4]
% snmp0 get {fsMIEcfmMepDefects.0.2.2.4}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.2.2.4 {OCTET STRING} 00}
[
Index: ContextID = 0, MD-Index = 3, MA-Index = 3, MEP-ID = 5]
% snmp0 get {fsMIEcfmMepDefects.0.3.3.5}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.3.3.5 {OCTET STRING} 00}
At Switch7
• Display the logged CFM continuity check error conditions. [Index: ContextID = 0, MD-Index = 2, MA-
Index = 2, MEP-ID = 6]
% snmp0 get {fsMIEcfmMepDefects.0.2.2.6}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.2.2.6 {OCTET STRING} 00}
This section describes the initiation of loop back and link trace messages to verify and isolate fault.
Shows there is a link failure between Switch1 and Switch5, as no reply is received with Relay Action
as RlyHit.
• Initiate the LoopBack Transaction to verify any link failure (error/fault/defect)
iss# ping ethernet mac 00:06:02:03:04:02 domain OP7 vlan 2
At Switch1
• Initiate traceroute to isolate any link failure (error/fault/defect). [Index: ContextID = 0, MD-Index = 1,
MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetIsMepId.0.1.1.1 false}}
% snmp0 set {{fsMIEcfmMepTransmitLtmTargetMacAddress.0.1.1.1 00:05:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLtmStatus.0.1.1.1 transmit}}
• Initiate the loopback transaction to MEP on Switch6 for verifying any link failure (error/fault/defect)
[Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.1 1}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.1 00:06:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.1 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.1 transmit}}
• Verify transmission of loopback messages between Switch1 and Switch6. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmMepLbrIn.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.20.0.1.1.1 Unsigned32 1}
% snmp0 get {fsMIEcfmMepTransmitLbmMessages.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.30.0.1.1.1 INTEGER 0}
• Initiate the loopback transaction to MEP on Switch5 for verifying any link failure (error/fault/defect).
[Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.1 1}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.1 00:05:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.1 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.1 transmit}}
• Verify transmission of loopback messages between Switch1 and Switch5. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmMepLbrIn.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.20.0.1.1.1 Unsigned32 1}
% snmp0 get {fsMIEcfmMepTransmitLbmMessages.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.30.0.1.1.1 INTEGER 0}
Shows there is link failure between Switch 1 and Switch 5
At Switch5
• Make interface P2 as up. [Index: Interface Number = 2]
% snmp0 set {{ifMainAdminStatus.2 up}}
This section describes the checking of CCM errors after configuring the interface as up.
• Wait for 15 seconds and check if there is any link failure (error/fault/defect), after configuring interface
P2 as up.
[Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmMepDefects.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.1.1.1 {OCTET STRING} 00}
This section describes the initiation of the loop back and link trace messages to verify and isolate fault.
At Switch1
• Initiate the LoopBack Transaction
iss# ping ethernet mac 00:05:02:03:04:02 domain OP7 vlan 2
Sending 1 Ethernet CFM loopback messages, timeout is 5 seconds
At Switch1
• Initiate the loopback transaction. [Index: ContextID = 0, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIEcfmMepTransmitLbmMessages.0.1.1.1 1}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestMacAddress.0.1.1.1 00:05:02:03:04:02}}
% snmp0 set {{fsMIEcfmMepTransmitLbmDestIsMepId.0.1.1.1 false}}
% snmp0 set {{fsMIEcfmMepTransmitLbmStatus.0.1.1.1 transmit}}
• Verify transmission of loopback messages between Switch1 and Switch6. [Index: ContextID = 0, MD-
Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmMepLbrIn.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.20.0.1.1.1 Unsigned32 1}
% snmp0 get {fsMIEcfmMepTransmitLbmMessages.0.1.1.1}
{1.3.6.1.4.1.2076.160.1.0.7.1.30.0.1.1.1 INTEGER 0}
Shows no link failure between Switch 1 and Switch 6
At Switch6
• Verify CCM errors
iss# show ethernet cfm errors
Shows no link failure, as no error is detected at Switch 6
MEP-ID : 4
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
4 4 3 loss of continuity
MEP-ID : 5
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
2 4 6 loss of continuity
Shows link failure, as error is detected at Switch 6
MEP-ID : 4
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
4 4 3 loss of continuity
4 4 - ais condition
MEP-ID : 5
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
2 4 6 loss of continuity
• Make interface P3, P4 as up, to check if there is any link failure (error/fault/defect).
iss(config)# interface gigabitethernet 0/3
iss(config-if)# no shutdown
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/4
iss(config-if)# no shutdown
iss(config-ether-mep)# end
MEP-ID : 5
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
2 4 6 loss of continuity
MEP-ID : 5
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
2 4 6 loss of continuity
• Verify whether LCK condition exist for MEPID 4 at level 4 and VLAN 4.
iss# show ethernet cfm maintenance-point local detail mpid 4
-----------------------------------------------------------
MPID: 4 MdLevel: 4 VLAN: 4 Dir: Up
-----------------------------------------------------------
Out-Of-Service (LCK)
--------------------
Status : Un-Locked(In-Service)
Condition : Exist
Loopback (LB)
-------------
Capability : Enabled
Multicast LBM Reception Capability : Disabled
At Switch6
• Verify CCM errors.
[Index: ContextID = 0, MD-Index = 2, MA-Index = 2, MEP-ID = 4]
% snmp0 get {fsMIEcfmMepDefects.0.2.2.4}
{1.3.6.1.4.1.2076.160.1.0.7.1.14.0.2.2.4 {OCTET STRING} 00}
• Configure client layer level for domain OQ2. [Index: ContextID = 0, MD-Index = 3]
% snmp0 set {{fsMIY1731MegRowStatus.0.3 notInService}}
% snmp0 set {{fsMIY1731MegClientMEGLevel.0.3 4}}
% snmp0 set {{fsMIY1731MegRowStatus.0.3 active}}
• Configure AIS capability for MEPID 5. [Index: ContextID = 0, MD-Index = 3, MA-Index = 3, MEP-ID =
5]
% snmp0 set {{fsMIY1731MepRowStatus.0.3.3.5 notInService}}
% snmp0 set {{fsMIY1731MepAisCapability.0.3.3.5 enabled}}
% snmp0 set {{fsMIY1731MepRowStatus.0.3.3.5 active}}
• Verify whether AIS condition is set for MEPID 4 at level 4 and VLAN 4. [Index: ContextID = 0, MD-
Index = 2, MA-Index = 2, MEP-ID = 4]
% snmp0 get {{fsMIY1731MepAisCondition.0.2.2.4}}
{1.3.6.1.4.1.29601.2.7.1.2.4.1.91.0.2.2.4 INTEGER true}
• Make interface P3, P4 as up, to check if there is any link failure (error/fault/defect).
[Index: Interface Number = 3]
% snmp0 set {{ifMainAdminStatus.3 up}}
• Disable AIS capability for MEPID 5. [Index: ContextID = 0, MD-Index = 3, MA-Index = 3, MEP-ID = 5]
% snmp0 set {{fsMIY1731MepRowStatus.0.3.3.5 notInService}}
% snmp0 set {{fsMIY1731MepAisCapability.0.3.3.5 disabled}}
% snmp0 set {{fsMIY1731MepRowStatus.0.3.3.5 active}}
• Verify whether LCK condition exist for MEPID 4 at level 4 and VLAN 4. [Index: ContextID = 0, MD-
Index = 3, MA-Index = 3, MEP-ID = 5]
% snmp0 get {fsMIY1731MepOutOfService.0.3.3.5}
{1.3.6.1.4.1.29601.2.7.1.2.4.1.2.0.3.3.5 INTEGER true}
Customer Network
(PCB)
Switch1
P1
(I-COMP)
Switch2
P9
P18
(B-COMP)
Switch3
P17
P26
Provider Backbone Network BEB
(B-COMP)
Switch4
P27
P36
Bridge
(I-COMP)
PCB Provider Core
Switch5
BEB
Backbone Edge
P33 Entity
Color code
(PCB) Level 7 VLAN 11
Switch6 Internal LAN
Level 6 ISID 300
Figure 5-3 depicts a topology for a provider backbone bridged network that consists of two customer
bridges (Switch1, Switch6), two I-component bridges (Switch2, Switch5), and two B-component bridges
(Switch3, Switch4). Switches 1 to 6 refer to six virtual contexts of the switch. Maintenance points
(MEP/MIP) are configured at same MD Level, and VLANs are shown by the color code. Port P1, P17, P26
and P42 are configured as PNP (Provider Network Port). P10 and P33 are configured as CNP (Customer
Network Port). P9 is configured as PIP (Provider Instance Port). P18 is configured as CBP (Customer
Bridge Port). In addition, there is an internal LAN between Switch4 and Switch5.
Connectivity is checked between all the bridges (Switch1 to Switch6) through continuity check protocol. A
link failure is intentionally incorporated at P9 of Switch2. Due to this link failure, errors will be detected at
Switch1 and Switch6.
This section describes the configuration of default bridge mode and interfaces at virtual contexts.
At Switch1
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/1
iss(config-if)# map switch Switch1
iss(config-if)# end
At Switch2
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/9
iss(config-if)# map switch Switch2
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/10
iss(config-if)# map switch Switch2
iss(config-if)# end
At Switch3
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/17
iss(config-if)# map switch Switch3
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/18
iss(config-if)# map switch Switch3
iss(config-if)# end
At Switch4
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/26
iss(config-if)# map switch Switch4
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/27
iss(config-if)# map switch Switch4
iss(config-if)# end
At Switch5
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/33
iss(config-if)# map switch Switch5
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/36
iss(config-if)# map switch Switch5
iss(config-if)# end
At Switch6
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/42
iss(config-if)# map switch Switch6
iss(config-if)# end
At Switch1
• Set bridge-mode as customerBridge [Index: ContextID = 1]
% snmp0 set {{fsVCStatus.1 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.1 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 false}}
% snmp0 set {{fsDot1qGvrpStatus.1 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.1 enabled}}
% snmp0 set {{fsMIMstSystemControl.1 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.1 false}}
At Switch2
• Set bridge-mode as customerBridge [Index: ContextID = 2]
% snmp0 set {{fsVCStatus.2 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.2 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.2 false}}
% snmp0 set {{fsDot1qGvrpStatus.2 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.2 enabled}}
% snmp0 set {{fsMIMstSystemControl.2 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.2 false}}
At Switch3
• Set bridge-mode as customerBridge [Index: ContextID = 3]
% snmp0 set {{fsVCStatus.3 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.3 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.3 false}}
% snmp0 set {{fsDot1qGvrpStatus.3 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.3 enabled}}
% snmp0 set {{fsMIMstSystemControl.3 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.3 false}}
At Switch4
• Set bridge-mode as customerBridge [Index: ContextID = 4]
% snmp0 set {{fsVCStatus.4 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.4 customerBridge}}
At Switch5
• Set bridge-mode as customerBridge [Index: ContextID = 5]
% snmp0 set {{fsVCStatus.5 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.5 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.5 false}}
% snmp0 set {{fsDot1qGvrpStatus.5 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.5 enabled}}
% snmp0 set {{fsMIMstSystemControl.5 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.5 false}}
At Switch6
• Set bridge-mode as customerBridge [Index: ContextID = 6]
% snmp0 set {{fsVCStatus.6 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.6 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 false}}
% snmp0 set {{fsDot1qGvrpStatus.6 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.6 enabled}}
% snmp0 set {{fsMIMstSystemControl.6 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.6 false}}
At Switch2
• Configure the bridge mode as provider-backbone-icomp
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-icomp
iss(config-switch)# end
At Switch3
• Configure the bridge mode as provider-backbone-bcomp
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
At Switch4
• Configure the bridge mode as provider-backbone-bcomp
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-bcomp
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# end
At Switch5
• Configure the bridge mode as provider-backbone-icomp
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-icomp
iss(config-switch)# end
At Switch6
• Configure the bridge mode as provider-core
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
At Switch1
• Configure the bridge mode as providerCoreBridge [Index: ContextID = 1]
% snmp0 set {{fsMIMstSystemControl.1 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.1 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.1 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 true}}
% snmp0 set {{fsMIVlanBridgeMode.1 providerCoreBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 false}}
% snmp0 set {{fsDot1qGvrpStatus.1 enabled}}
% snmp0 set {{fsMIMstSystemControl.1 start}}
% snmp0 set {{fsMIMstModuleStatus.1 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.1 false}}
At Switch2
• Configure the bridge mode as providerBackoneICompBridge [Index: ContextID = 2]
% snmp0 set {{fsMIMstSystemControl.2 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.2 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.2 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.2 true}}
% snmp0 set {{fsMIVlanBridgeMode.2 providerBackoneICompBridge}}
% snmp0 set {{fsMIRstSystemControl.2 shutdown}}
% snmp0 set {{fsMIRstModuleStatus.2 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.2 false}}
At Switch3
• Configure the bridge mode as providerBackoneBCompBridge [Index: ContextID = 3]
% snmp0 set {{fsMIMstSystemControl.3 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.3 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.3 disabled}}
At Switch4
• Configure the bridge mode as providerBackoneBCompBridge [Index: ContextID = 4]
% snmp0 set {{fsMIMstSystemControl.4 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.4 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.4 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.4 true}}
% snmp0 set {{fsMIVlanBridgeMode.4 providerBackoneBCompBridge}}
% snmp0 set {{fsMIMstSystemControl.4 enabled}}
% snmp0 set {{fsMIMstModuleStatus.4 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.4 false}}
At Switch5
• Configure the bridge mode as providerBackoneICompBridge [Index: ContextID = 5]
% snmp0 set {{fsMIMstSystemControl.5 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.5 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.5 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.5 true}}
% snmp0 set {{fsMIVlanBridgeMode.5 providerBackoneICompBridge}}
% snmp0 set {{fsMIRstSystemControl.5 start}}
% snmp0 set {{fsMIRstModuleStatus.5 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.5 false}}
At Switch6
• Configure the bridge mode as providerCoreBridge [Index: ContextID = 6]
% snmp0 set {{fsMIMstSystemControl.6 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.6 disbaled}}
% snmp0 set {{fsDot1dGmrpStatus.6 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 true}}
% snmp0 set {{fsMIVlanBridgeMode.6 providerCoreBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 false}}
% snmp0 set {{fsDot1qGvrpStatus.6 enabled}}
This section describes the initialization of the ECFM on all the switches.
[Index: ContextID = 2]
% snmp0 set {{fsMIEcfmSystemControl.2 start}}
% snmp0 set {{fsMIEcfmModuleStatus.2 enabled}}
[Index: ContextID = 3]
% snmp0 set {{fsMIEcfmSystemControl.3 start}}
% snmp0 set {{fsMIEcfmModuleStatus.3 enabled}}
[Index: ContextID = 4]
% snmp0 set {{fsMIEcfmSystemControl.4 start}}
% snmp0 set {{fsMIEcfmModuleStatus.4 enabled}}
[Index: ContextID = 5]
% snmp0 set {{fsMIEcfmSystemControl.5 start}}
% snmp0 set {{fsMIEcfmModuleStatus.5 enabled}}
[Index: ContextID = 6]
% snmp0 set {{fsMIEcfmSystemControl.6 start}}
% snmp0 set {{fsMIEcfmModuleStatus.6 enabled}}
At Switch1
• Configure port type of port P1 as PNP
iss# configure terminal
iss(config)# interface gigabitethernet 0/1
iss(config-if)# shutdown
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch2
• Configure port type of port P9 as PIP
iss# configure terminal
At Switch3
• Configure port type of port P18 as CBP
iss# configure terminal
iss(config)# interface gigabitethernet 0/18
iss(config-if)# shutdown
iss(config-if)# bridge port-type customerBackbonePort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch4
• Configure port type of port P26 as PNP
iss# configure terminal
iss(config)# interface gigabitethernet 0/26
iss(config-if)# shutdown
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch5
• Configure port type of port P33 as CNP s-tagged
iss# configure terminal
iss(config)# interface gigabitethernet 0/33
iss(config-if)# shutdown
iss(config-if)# bridge port-type customerNetworkPort s-tagged
iss(config-if)# no shutdown
iss(config-if)# end
At Switch6
• Configure port type of ports and P42 as PNP
iss# configure terminal
iss(config)# interface gigabitethernet 0/42
iss(config-if)# shutdown
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch1
• Configure port type of port P1 as PNP [Index: Interface number = 1]
% snmp0 set {{ifMainBrgPortType.1 providerNetworkPort}}
At Switch2
• Configure port type of port P9 as PIP [Index: Interface number = 9]
% snmp0 set {{ifMainBrgPortType.9 providerInstancePort}}
• Configure port type of port P10 as CNP [Index: Interface number = 10]
% snmp0 set {{ifMainBrgPortType.10 customerNetworkPortStagged}}
At Switch3
• Configure port type of port P18 as CBP [Index: Interface number = 18]
% snmp0 set {{ifMainBrgPortType.18 customerBackbonePort}}
• Configure port type of port P17 as PNP [Index: Interface number = 17]
% snmp0 set {{ifMainBrgPortType.17 providerNetworkPort}}
At Switch4
• Configure port type of port P26 as PNP [Index: Interface number = 26]
% snmp0 set {{ifMainBrgPortType.26 providerNetworkPort}}
• Create a virtual port and configure its port type as CBP [Index: Interface number =5195]
% snmp0 set {{ifMainRowStatus.5195 5}}
% snmp0 set {{ifAlias.5195 virtual2}}
% snmp0 set {{ifMainType.5195 brgPort}}
% snmp0 set {{ifMainRowStatus.5195 active}}
% snmp0 set {{ifMainAdminStatus.5195 up}}
% snmp0 set {{fsVcIfRowStatus.5195 createAndWait }}
% snmp0 set {{fsVcId.5195 4}}
% snmp0 set {{fsVcIfRowStatus.5195 active}}
% snmp0 set {{ifMainBrgPortType.5195 customerBackbonePort}}
At Switch5
• Configure port type of port P33 as CNP s-tagged [Index: Interface number = 33]
% snmp0 set {{ifMainBrgPortType.33 customerNetworkPortStagged}}
• Create a virtual port and configure its port type as PIP [Index: Interface number = 5196]
% snmp0 set {{ifMainRowStatus.5196 5}}
% snmp0 set {{ifAlias.5196 virtual3}}
% snmp0 set {{ifMainType.5196 pip}}
% snmp0 set {{ifMainRowStatus.5196 active}}
% snmp0 set {{ifMainAdminStatus.5196 up}}
% snmp0 set {{fsVcIfRowStatus.5196 createAndWait }}
% snmp0 set {{fsVcId.5196 5}}
% snmp0 set {{fsVcIfRowStatus.5196 active}}
% snmp0 set {{ifMainBrgPortType.5196 providerInstancePort}}
At Switch6
• Configure port type of port P42 as PNP [Index: Interface number = 42]
% snmp0 set {{ifMainBrgPortType.42 providerNetworkPort}}
This section describes the configuration of VLAN and VLAN mappings on respective switches.
At Switch1
• Create VLAN 11 and make interfaces P1 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/1
iss(config-switch-vlan)# end
At Switch2
• Create VLAN 11 and make interfaces P10 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/10
iss(config-switch-vlan)# end
At Switch3
• Create BVLAN 10 and make interfaces P17 and P18 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# vlan 10
iss(config-switch-vlan)# ports gigabitethernet 0/17,0/18 untagged gigabitethernet 0/18
iss(config-switch-vlan)# end
At Switch4
• Create BVLAN 10 and make virtual port as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# vlan 10
iss(config-switch-vlan)# ports gigabitethernet 0/26 virtual 1 untagged virtual 1
iss(config-switch-vlan)# end
At Switch5
• Create VLAN 11 and make interfaces P33 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/33
iss(config-switch-vlan)# end
At Switch6
• Create VLAN 11 and make interface P42 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/42
iss(config-switch-vlan)# end
At Switch1
• Create VLAN 11 and make interfaces P1 as member port of this VLAN [Index: ContextID =1, VLAN-
ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.1.11 createAndWait}}
At Switch2
• Create VLAN 11 and make interfaces P10 as member port of this VLAN [Index: ContextID =2, VLAN-
ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.2.11 createAndWait}}
[Index: ContextID =1, VLAN-ID= 11, Interface number = 10]
% snmp0 set {{fsDot1qVlanStaticPort.2.11.10 addTagged}}
% snmp0 set {{fsDot1qVlanStaticRowStatus.2.11 active}}
At Switch3
• Create BVLAN 10 and make interfaces P17 and P18 as member port of this VLAN [Index: ContextID
=3, VLAN-ID= 10]
% snmp0 set {{fsDot1qVlanStaticRowStatus.3.10 createAndWait}}
At Switch4
• Create BVLAN 10 and make virtual port as member port of this VLAN [Index: ContextID = 4, VLAN-
ID= 10]
% snmp0 set {{fsDot1qVlanStaticRowStatus.4.10 createAndWait}}
At Switch5
• Create VLAN 11 and make interfaces P33 as member port of this VLAN [Index: ContextID =5, VLAN-
ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.5.11 createAndWait}}
At Switch6
• Create VLAN 11 and make interface P42 as member port of this VLAN [Index: ContextID =6, VLAN-
ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.6.11 createAndWait}}
At Switch1
• Create down MEP at interface P1 of Level 7 and Vlan 11
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# ethernet cfm enable
iss(config-switch)# ethernet cfm domain name md7 level 7
iss(config-ether-ecfm)# service name ma7 vlan 11
iss(config-ether-ecfm)# mep crosscheck mpid 1 vlan 11
iss(config-ether-ecfm)# mep crosscheck mpid 2 vlan 11
iss(config-ether-ecfm)# end
iss# configure terminal
iss(config)# interface gigabitethernet 0/1
iss(config-if)# ethernet cfm mep level 7 mpid 1 vlan 11 active
iss(config-ether-mep)# end
iss# show ethernet cfm maintenance-point local mep interface gigabitethernet 0/1 switch
Switch1
Switch Switch1
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
1 md7 7 11 MEP Gi0/1 Disabled
ma7 - Down 00:01:02:03:04:01 Active
At Switch2
• Configure service instance 300 and map port P9 to it. Also configure SVLAN mapping to map s-vlan
11 to ISID 300 with untagged-pip as false
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# service instance 300
iss(config-switch-si)# ports icomp gigabitethernet 0/9
iss(config-switch-si)# service-instance map untagged-pip false vlan 11
iss(config-switch-si)# no shutdown
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)#end
Switch switch2
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
3 md6 6 - MEP Gi0/10 Disabled
ma6 300 Up 00:01:02:03:04:0a Active
At Switch3
• Configure service instance 300 and map port P18 to it. Also configure BVLAN mapping to map b-vlan
10 to ISID 300
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# service instance 300
iss(config-switch-si)# ports bcomp gigabitethernet 0/18
iss(config-switch-si)# member-ports vlan 10 gigabitethernet 0/18
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)# end
At Switch4
• Map virtual port 1 to service instances 300
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# service instance 300
iss(config-switch-si)# ports bcomp virtual 1
At Switch5
• Configure service instance 300 and map virtual port 2 to it. Also configure SVLAN mapping to map s-
vlan 11 to ISID 300 with untagged-pip as false
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# service instance 300
iss(config-switch-si)# ports icomp virtual 2
iss(config-switch-si)# service-instance map untagged-pip false vlan 11
iss(config-switch-si)# no shutdown
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)# end
• Create connection between PIP and CBP of Switch4 and Switch5 respectively
iss# configure terminal
iss(config)# interface virtual 2
iss(config-if)# shutdown
iss(config-if)# exit
iss(config)# interface virtual 1
iss(config-if)# shutdown
iss(config-if)# exit
iss(config)# internal-lan 1 add interface virtual 1,2
iss(config)# interface virtual 1
iss(config-if)# no shutdown
iss(config-if)# exit
iss(config)# interface virtual 2
iss(config-if)# no shutdown
iss(config-if)# end
iss#
Switch switch5
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
4 md6 6 - MEP Gi0/33 Disabled
ma6 300 Up 00:01:02:03:04:21 Active
At Switch6
• Create down MEP at interface P42 of Level 7 and Vlan 11
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# ethernet cfm enable
iss(config-switch)# ethernet cfm domain name md7 level 7
iss(config-ether-ecfm)# service name ma7 vlan 11
iss(config-ether-ecfm)# mep crosscheck mpid 1 vlan 11
iss(config-ether-ecfm)# mep crosscheck mpid 2 vlan 11
iss(config-ether-ecfm)# end
iss# configure terminal
At Switch1
• Create down MEP at interface P1 of Level 7 and Vlan 11
Create the Maintenance Domain [Index: ContextID =1, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.1.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.1.1 charString}}
% snmp0 set {{fsMIEcfmMdName.1.1 6D:64:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.1.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.1.1 active}}
• Display MEP configuration at interface P1 of Level 7 and Vlan 11 [Index: ContextID =1, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.1.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.1.1 INTEGER charString}
At Switch2
• Configure service instance 300 and map port P9 to it. Also configure SVLAN mapping to map s-vlan
11 to ISID 300 with untagged-pip as false [Index: Interface number = 5255]
% snmp0 set {{ifMainRowStatus.5255 createAndWait}}
% snmp0 set {{ifAlias.5255 virtual1}}
% snmp0 set {{ifMainType.5255 brgPort}}
% snmp0 set {{ifMainRowStatus.5255 active}}
% snmp0 set {{ifMainAdminStatus.5255 up}}
% snmp0 set {{fsVcIfRowStatus.5255 createAndWait}}
% snmp0 set {{fsVcId.5255 2}}
% snmp0 set {{fsVcIfRowStatus.5255 active}}
% snmp0 set {{ifMainAdminStatus.5255 up}}
% snmp0 set {{ifMainBrgPortType.5255 virtualInstancePort}}
• Configure service instance 300 as PISID of interface 10. [Index: ContextID = 2, Interface number = 10
]
% snmp0 set {{fsPbbPIsidRowStatus.2.10 createAndWait}}
% snmp0 set {{fsPbbPortPisid.2.10 300}}
% snmp0 set {{fsPbbPIsidRowStatus.2.10 active}}
At Switch3
• Configure service instance 300 and map port P18 to it. Also configure BVLAN mapping to map b-vlan
10 to ISID 300 [Index: ContextID =3, Interface number = 18, ISID = 300]
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.3.18.300 createAndWait}}
% snmp0 set {{fsPbbCBPServiceMappingBVid.3.18.300 10}}
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.3.18.300 active}}
At Switch4
• Map virtual port 1 to service instances 300 [Index: ContextID = 4, Interface number = 5195, ISID =
300]
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.4.5195.300 createAndWait}}
% snmp0 set {{fsPbbCBPServiceMappingBVid.4.5195.300 10}}
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.4.5195.300 active}}
At Switch5
• Configure service instance 300 and map virtual port 2 to it. Also, configure SVLAN mapping to map s-
vlan 11 to ISID 300 with untagged-pip as false
[Index: Interface number = 5256]
% snmp0 set {{ifMainRowStatus.5256 createAndWait }}
% snmp0 set {{ifAlias.5256 virtual4}}
% snmp0 set {{ifMainType.5256 brgPort}}
% snmp0 set {{ifMainRowStatus.5256 active}}
% snmp0 set {{ifMainAdminStatus.5256 up}}
% snmp0 set {{fsVcIfRowStatus.5256 createAndWait }}
% snmp0 set {{fsVcId.5256 5}}
% snmp0 set {{fsVcIfRowStatus.5256 active}}
% snmp0 set {{ifMainAdminStatus.5256 up}}
% snmp0 set {{ifMainBrgPortType.5256 virtualInstancePort}}
• Create connection between PIP and CBP of Switch4 and Switch5 respectively
Create an ILAN interface
[Index: Interface number = 5270]
% snmp0 set {{ifMainRowStatus.5270 createAndWait}}
% snmp0 set {{ifAlias.5270 "internal-lan1"}}
% snmp0 set {{ifMainType.5270 ilan}}
% snmp0 set {{ifMainRowStatus.5270 active}}
At Switch6
• Create down MEP at interface P42 of Level 7 and Vlan 11
Create the Maintenance Domain [Index: ContextID =6, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.6.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.6.1 charString}}
% snmp0 set {{fsMIEcfmMdName.6.1 6D:64:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.6.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.6.1 active}}
• Display MEP configuration at interface P1 of Level 7 and Vlan 11 [Index: ContextID =6, MD-Index = 1]
% snmp0 get {fsMIEcfmMdFormat.6.1}
{1.3.6.1.4.1.2076.160.1.0.4.1.2.6.1 INTEGER charString}
Switch Switch1
Switch Switch2
Switch Switch3
Switch Switch4
Switch Switch5
Switch Switch6
iss#
Shows no link failure, as no error is detected at any of the bridge.
At Switch2
• Make interface P10 as down, to raise a defect/fault in sample topology
iss# configure terminal
iss(config)# interface gigabitethernet 0/10
iss(config-if)# shutdown
Switch switch1
MEP-ID : 1
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
7 11 2 ccm life time expired
Switch switch2
MEP-ID : 3
Level ISID RMEP-ID Current defect type
----- ---- ------- -------------------
6 300 4 remote defect indication
Switch switch3
Switch switch4
Switch switch5
MEP-ID : 4
Level ISID RMEP-ID Current defect type
----- ---- ------- -------------------
6 300 3 mac status defect
Switch switch6
MEP-ID : 2
Level VLAN RMEP-ID Current defect type
----- ---- ------- -------------------
7 11 1 ccm life time expired
At Switch2
• Make interface P10 as down, to raise a defect/fault in sample topology
[Index: Interface number = 10]
% snmp0 set {{ifMainAdminStatus.10 down}}
• Wait for 15 seconds to check for any link failure (error/fault/defect)
[Index: ContextID =1, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmExtMepDefects.1.1.1.1}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.14.1.1.1.1 {OCTET STRING} 20}
This section describes the initiation of loopback to verify the defect location.
• Verify the loopback messages transmitted between the Switch5 and Switch6. [Index: ContextID =6,
MD-Index = 1, MA-Index = 1, MEP-ID = 2]
• Verify the loopback messages transmitted between the Switch5 and Switch2. [Index: ContextID =5,
MD-Index = 1, MA-Index = 1, MEP-ID = 4]
% snmp0 get {fsMIEcfmExtMepLbrIn.5.1.1.4}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.20.5.1.1.4 Unsigned32 3}
% snmp0 get {fsMIEcfmExtMepTransmitLbmMessages.5.1.1.4}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.30.5.1.1.4 INTEGER 0}
Customer Network
(PCB)
Switch1
P1
(I-COMP)
Switch2
P9
P18
(B-COMP)
Switch3
P17
P26
Provider Backbone Network BEB
(B-COMP)
Switch4
P27 Bridge
P36 PCB Provider Core
(I-COMP) BEB
Switch5
Entity
P33 MIP
Color code
(PCB) Level 7 VLAN 11
Switch6 Level 6 ISID 300
Figure 5-4 depicts a topology for a provider backbone bridged network that consists of two customer
bridges (Switch1, Switch6), two I-component bridges (Switch2, Switch5), and two B-component bridges
(Switch3, Switch4). Switches 1 to 6 refer to six virtual contexts of the switch. Maintenance points
(MEP/MIP) are configured at same MD Level, and VLANs are shown using the same color code. Port P1,
P17, P26 and P42 are configured as PNP. P10 and P33 are configured as CNP. P9 is configured as PIP.
P18 is configured as CBP.
This section describes the configuration of default bridge mode and interfaces at virtual contexts.
At Switch1
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/1
iss(config-if)# map switch Switch1
iss(config-if)# no shutdown
iss(config-if)# end
At Switch2
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/9
iss(config-if)# map switch Switch2
iss(config-if)# no shutdown
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/10
iss(config-if)# map switch Switch2
iss(config-if)# no shutdown
iss(config-if)# end
At Switch3
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/17
At Switch4
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/26
iss(config-if)# map switch Switch4
iss(config-if)# no shutdown
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/27
iss(config-if)# map switch Switch4
iss(config-if)# no shutdown
iss(config-if)# end
At Switch5
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
• Create interfaces as up
iss(config)# interface gigabitethernet 0/33
iss(config-if)# map switch Switch5
iss(config-if)# no shutdown
iss(config-if)# exit
iss(config)# interface gigabitethernet 0/36
iss(config-if)# map switch Switch5
iss(config-if)# no shutdown
iss(config-if)# end
At Switch6
• Set bridge-mode as customer and spanning tree mode as mst
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# bridge-mode customer
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# no shutdown vlan
iss(config-switch)# set gvrp enable
iss(config-switch)# set gmrp enable
iss(config-switch)# end
• Create interfaces as up
iss(config)# interface gigabitethernet 0/42
iss(config-if)# map switch Switch6
iss(config-if)# no shutdown
iss(config-if)# end
At Switch1
• Set bridge-mode as customerBridge [Index: ContextID = 1]
% snmp0 set {{fsVCStatus.1 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.1 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 false}}
At Switch2
• Set bridge-mode as customerBridge [Index: ContextID = 2]
% snmp0 set {{fsVCStatus.2 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.2 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.2 false}}
% snmp0 set {{fsDot1qGvrpStatus.2 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.2 enabled}}
% snmp0 set {{fsMIMstSystemControl.2 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.2 false}}
• Create interfaces as up
[Index: Interface number = 9]
% snmp0 set {{ifMainRowStatus.9 createAndWait}}
% snmp0 set {{ifAlias.9 Slot0/9}}
% snmp0 set {{ifMainType.9 ethernetCsmacd}}
% snmp0 set {{ifMainRowStatus.9 active}}
% snmp0 set {{ifMainAdminStatus.9 up}}
% snmp0 set {{fsVcIfRowStatus.9 createAndWait}}
% snmp0 set {{fsVcId.9 2}}
% snmp0 set {{fsVcIfRowStatus.9 active}}
At Switch3
• Set bridge-mode as customerBridge [Index: ContextID = 3]
% snmp0 set {{fsVCStatus.3 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.3 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.3 false}}
% snmp0 set {{fsDot1qGvrpStatus.3 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.3 enabled}}
% snmp0 set {{fsMIMstSystemControl.3 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.3 false}}
• Create interfaces as up
[Index: Interface number = 17]
% snmp0 set {{ifMainRowStatus.17 createAndWait}}
% snmp0 set {{ifAlias.17 Slot0/17}}
% snmp0 set {{ifMainType.17 ethernetCsmacd}}
% snmp0 set {{ifMainRowStatus.17 active}}
% snmp0 set {{ifMainAdminStatus.17 up}}
% snmp0 set {{fsVcIfRowStatus.17 createAndWait}}
% snmp0 set {{fsVcId.17 3}}
% snmp0 set {{fsVcIfRowStatus.17 active}}
At Switch4
• Set bridge-mode as customerBridge [Index: ContextID = 4]
% snmp0 set {{fsVCStatus.4 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.4 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.4 false}}
% snmp0 set {{fsDot1qGvrpStatus.4 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.4 enabled}}
% snmp0 set {{fsMIMstSystemControl.4 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.4 false}}
• Create interfaces as up
[Index: Interface number = 26]
% snmp0 set {{ifMainRowStatus.26 createAndWait}}
% snmp0 set {{ifAlias.26 Slot0/26}}
% snmp0 set {{ifMainType.26 ethernetCsmacd}}
% snmp0 set {{ifMainRowStatus.26 active}}
% snmp0 set {{ifMainAdminStatus.26 up}}
% snmp0 set {{fsVcIfRowStatus.26 createAndWait}}
% snmp0 set {{fsVcId.26 4}}
% snmp0 set {{fsVcIfRowStatus.26 active}}
At Switch5
• Set bridge-mode as customerBridge [Index: ContextID = 5]
% snmp0 set {{fsVCStatus.5 createAndGo}}
• Create interfaces as up
[Index: Interface number = 33]
% snmp0 set {{ifMainRowStatus.33 createAndWait}}
% snmp0 set {{ifAlias.33 Slot0/33}}
% snmp0 set {{ifMainType.33 ethernetCsmacd}}
% snmp0 set {{ifMainRowStatus.33 active}}
% snmp0 set {{ifMainAdminStatus.33 up}}
% snmp0 set {{fsVcIfRowStatus.33 createAndWait}}
% snmp0 set {{fsVcId.33 5}}
% snmp0 set {{fsVcIfRowStatus.33 active}}
At Switch6
• Set bridge-mode as customerBridge [Index: ContextID = 6]
% snmp0 set {{fsVCStatus.6 createAndGo}}
% snmp0 set {{fsMIVlanBridgeMode.6 customerBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 false}}
% snmp0 set {{fsDot1qGvrpStatus.6 enabled}}
% snmp0 set {{fsDot1dGmrpStatus.6 enabled}}
% snmp0 set {{fsMIMstSystemControl.6 start}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.6 false}}
At Switch1
• Configure the bridge mode as provider-core
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-core
iss(config-switch)# no shutdown garp
iss(config-switch)# set gvrp enable
iss(config-switch)# spanning-tree mode mst
iss(config-switch)#end
At Switch2
• Configure the bridge mode as provider backbone bridge (I-component)
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
At Switch3
• Configure the bridge mode as provider backbone bridge (B-component)
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-bcomp
iss(config-switch)# spanning-tree mode mst
iss(config-switch)#end
At Switch4
• Configure the bridge mode as provider backbone bridge (B-component)
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-bcomp
iss(config-switch)# spanning-tree mode mst
iss(config-switch)# end
At Switch5
• Configure the bridge mode as provider backbone bridge (I-component)
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-backbone-icomp
iss(config-switch)# end
At Switch6
• Configure the bridge mode as provider-core
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# shutdown spanning-tree
iss(config-switch)# set gvrp disable
iss(config-switch)# set gmrp disable
iss(config-switch)# shutdown garp
iss(config-switch)# bridge-mode provider-core
iss(config-switch)# no shutdown garp
iss(config-switch)# set gvrp enable
iss(config-switch)# spanning-tree mode mst
iss(config-switch)#end
At Switch1
• Configure the bridge mode as providerCoreBridge [Index: ContextID = 1]
% snmp0 set {{fsMIMstSystemControl.1 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.1 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.1 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 true}}
% snmp0 set {{fsMIVlanBridgeMode.1 providerCoreBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.1 false}}
% snmp0 set {{fsDot1qGvrpStatus.1 enabled}}
% snmp0 set {{fsMIMstSystemControl.1 start}}
% snmp0 set {{fsMIMstModuleStatus.1 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.1 false}}
At Switch2
• Configure the bridge mode as provider backbone bridge (I-component) [Index: ContextID = 2]
% snmp0 set {{fsMIMstSystemControl.2 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.2 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.2 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.2 true}}
At Switch3
• Configure the bridge mode as provider backbone bridge (B-component) [Index: ContextID = 3]
% snmp0 set {{fsMIMstSystemControl.3 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.3 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.3 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.3 true}}
% snmp0 set {{fsMIVlanBridgeMode.3 providerBackoneBCompBridge}}
% snmp0 set {{fsMIMstSystemControl.3 start}}
% snmp0 set {{fsMIMstModuleStatus.3 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.3 false}}
At Switch4
• Configure the bridge mode as provider backbone bridge (B-component) [Index: ContextID = 4]
% snmp0 set {{fsMIMstSystemControl.4 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.4 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.4 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.4 true}}
% snmp0 set {{fsMIVlanBridgeMode.4 providerBackoneBCompBridge}}
% snmp0 set {{fsMIMstSystemControl.4 start}}
% snmp0 set {{fsMIMstModuleStatus.4 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.4 false}}
At Switch5
• Configure the bridge mode as provider backbone bridge (I-component) [Index: ContextID = 5]
% snmp0 set {{fsMIMstSystemControl.5 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.5 disabled}}
% snmp0 set {{fsDot1dGmrpStatus.5 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.5 true}}
% snmp0 set {{fsMIVlanBridgeMode.5 providerBackoneICompBridge}}
% snmp0 set {{fsMIRstSystemControl.5 start}}
% snmp0 set {{fsMIRstModuleStatus.5 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.5 false}}
At Switch6
• Configure the bridge mode as providerCoreBridge [Index: ContextID = 6]
% snmp0 set {{fsMIMstSystemControl.6 shutdown}}
% snmp0 set {{fsDot1qGvrpStatus.6 disbaled}}
% snmp0 set {{fsDot1dGmrpStatus.6 disabled}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 true}}
% snmp0 set {{fsMIVlanBridgeMode.6 providerCoreBridge}}
% snmp0 set {{fsMIDot1qFutureGarpShutdownStatus.6 false}}
% snmp0 set {{fsDot1qGvrpStatus.6 enabled}}
% snmp0 set {{fsMIMstSystemControl.6 start}}
% snmp0 set {{fsMIMstModuleStatus.6 enabled}}
% snmp0 set {{fsMIDot1qFutureVlanShutdownStatus.6 false}}
[Index: ContextID = 2]
% snmp0 set {{fsMIEcfmSystemControl.2 start}}
% snmp0 set {{fsMIEcfmModuleStatus.2 enabled}}
[Index: ContextID = 3]
% snmp0 set {{fsMIEcfmSystemControl.3 start}}
% snmp0 set {{fsMIEcfmModuleStatus.3 enabled}}
[Index: ContextID = 4]
% snmp0 set {{fsMIEcfmSystemControl.4 start}}
% snmp0 set {{fsMIEcfmModuleStatus.4 enabled}}
[Index: ContextID = 5]
% snmp0 set {{fsMIEcfmSystemControl.5 start}}
% snmp0 set {{fsMIEcfmModuleStatus.5 enabled}}
[Index: ContextID = 6]
% snmp0 set {{fsMIEcfmSystemControl.6 start}}
% snmp0 set {{fsMIEcfmModuleStatus.6 enabled}}
At Switch1
• Configure port type of port P1 as PNP
At Switch2
• Configure port type of port P9 as PIP
iss# configure terminal
iss(config)# interface gigabitethernet 0/9
iss(config-if)# shutdown
iss(config-if)# port-type providerInstancePort
iss(config-if)# no shutdown
iss(config-if)# exit
At Switch3
• Configure port type of port P18 as CBP
iss# configure terminal
iss(config)# interface gigabitethernet 0/18
iss(config-if)# shutdown
iss(config-if)# bridge port-type customerBackbonePort
iss(config-if)# no shutdown
iss(config-if)# end
iss(config-if)# no shutdown
iss(config-if)# end
At Switch4
• Configure port type of port P26 as PNP
iss# configure terminal
iss(config)# interface gigabitethernet 0/26
iss(config-if)# shutdown
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch5
• Configure port type of port P33 as CNP s-tagged
iss# configure terminal
iss(config)# interface gigabitethernet 0/33
iss(config-if)# shutdown
iss(config-if)# bridge port-type customerNetworkPort s-tagged
iss(config-if)# no shutdown
iss(config-if)# end
iss(config-if)# end
At Switch6
• Configure port type of port P42 as PNP
iss# configure terminal
iss(config)# interface gigabitethernet 0/42
iss(config-if)# shutdown
iss(config-if)# bridge port-type providerNetworkPort
iss(config-if)# no shutdown
iss(config-if)# end
At Switch1
• Configure port type of port P1 as PNP [Index: Interface number = 1]
% snmp0 set {{ifMainBrgPortType.1 providerNetworkPort}}
At Switch2
• Configure port type of port P9 as PIP [Index: Interface number = 9]
% snmp0 set {{ifMainBrgPortType.9 providerInstancePort}}
• Configure port type of port P10 as CNP [Index: Interface number = 10]
% snmp0 set {{ifMainBrgPortType.10 customerNetworkPortStagged}}
At Switch3
• Configure port type of port P18 as CBP [Index: Interface number = 18]
% snmp0 set {{ifMainBrgPortType.18 customerBackbonePort}}
• Configure port type of port P17 as PNP [Index: Interface number = 17]
% snmp0 set {{ifMainBrgPortType.17 providerNetworkPort}}
At Switch4
• Configure port type of port P26 as PNP [Index: Interface number = 26]
% snmp0 set {{ifMainBrgPortType.26 providerNetworkPort}}
• Configure port type of port P27 as CBP [Index: Interface number = 27]
% snmp0 set {{ifMainBrgPortType.27 customerBackbonePort}}
At Switch5
• Configure port type of port P33 as CNP s-tagged [Index: Interface number = 33]
% snmp0 set {{ifMainBrgPortType.33 customerNetworkPortStagged}}
• Configure port type of port P36 as PIP [Index: Interface number = 36]
% snmp0 set {{ifMainBrgPortType.36 providerInstancePort}}
At Switch6
• Configure port type of port P42 as PNP [Index: Interface number = 42]
% snmp0 set {{ifMainBrgPortType.42 providerNetworkPort}}
This section describes the configuration of VLAN and VLAN mappings on respective switches.
At Switch1
• Create VLAN 11 and make interfaces P1 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/1
iss(config-switch-vlan)# end
At Switch2
• Create VLAN 11 and make interface P10 as member port
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/10
iss(config-switch-vlan)# end
At Switch3
• Create BVLAN 10 and make interfaces P17 and P18 as member port of this VLAN
iss# configure terminal
At Switch4
• Create BVLAN 10 and make P26 and P27 port as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# vlan 10
iss(config-switch-vlan)# ports gigabitethernet 0/26,0/27 untagged gigabitethernet 0/27
iss(config-switch-vlan)# end
At Switch5
• Create VLAN 11 and make interface P33 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/33
iss(config-switch-vlan)# end
At Switch6
• Create VLAN 11 and make interface P42 as member port of this VLAN
iss# configure terminal
iss(config)# switch Switch6
iss(config-switch)# vlan 11
iss(config-switch-vlan)# ports gigabitethernet 0/42
iss(config-switch-vlan)# end
At Switch1
• Create VLAN 11 and make interface P1 as member port of this VLAN [Index: ContextID =1, VLAN-ID=
11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.1.11 createAndWait}}
At Switch2
• Create VLAN 11 and make interface P10 as member port of this VLAN
[Index: ContextID =2, VLAN-ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.2.11 createAndWait}}
At Switch3
• Create BVLAN 10 and make interfaces P17 and P18 as member port of this VLAN
[Index: ContextID =3, VLAN-ID= 10]
% snmp0 set {{fsDot1qVlanStaticRowStatus.3.10 createAndWait}}
At Switch4
• Create BVLAN 10 and make ports P26 and P27 as member ports of this VLAN
[Index: ContextID = 4, VLAN-ID= 10]
snmp0 set {{fsDot1qVlanStaticRowStatus.4.10 createAndWait}}
At Switch5
• Create VLAN 11 and make interface P33 as member port of this VLAN
[Index: ContextID =5, VLAN-ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.5.11 createAndWait}}
At Switch6
• Create VLAN 11 and make interface P42 as member port of this VLAN
[Index: ContextID =6, VLAN-ID= 11]
% snmp0 set {{fsDot1qVlanStaticRowStatus.6.11 createAndWait}}
This section describes the configuration of Y.1731 and PBB on respective switches.
At Switch1
• Create down MEP of level 7 and VLAN 11 at interface P1
iss# configure terminal
iss(config)# switch Switch1
iss(config-switch)# ethernet cfm enable
iss(config-switch)# ethernet cfm domain name md7 level 7
iss(config-ether-ecfm)# service name ma7 vlan 11
iss(config-ether-ecfm)# mep crosscheck mpid 1 vlan 11
At Switch2
• Configure service instance 300 and map port P9 to it. Also configure SVLAN mapping to map s-vlan
11 to ISID 300 with untagged-pip as false
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# service instance 300
iss(config-switch-si)# ports icomp gigabitethernet 0/9
iss(config-switch-si)# service-instance map untagged-pip false vlan 11
iss(config-switch-si)# no shutdown
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)#end
Switch Switch2
-------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
-------------------------------------------------------------------------
3 md6 6 - MEP Gi0/9 Disabled
ma6 300 Down 00:01:02:03:04:09 Active
At Switch3
• Configure service instance 300 and map port P18 to it. Also configure BVLAN mapping to map B-
VLAN 10 to ISID 300
iss# configure terminal
iss(config)# switch Switch3
iss(config-switch)# ethernet cfm enable
iss(config-switch)# service instance 300
iss(config-switch-si)# ports bcomp gigabitethernet 0/18
iss(config-switch-si)# member-ports vlan 10 gigabitethernet 0/18
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)# end
Switch Switch3
---------------------------------------------------------------------------
At Switch4
• Configure service instance 300 and map port P27 to it. Also map BVLAN 10 to ISID 300.
iss# configure terminal
iss(config)# switch Switch4
iss(config-switch)# service instance 300
iss(config-switch-si)# ports bcomp gigabitethernet 0/27
iss(config-switch-si)# member-ports vlan 10 gigabitethernet 0/27
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)# end
Switch Switch4
---------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
---------------------------------------------------------------------------
- - 6 - MIP Gi0/27 -
- 300 - 00:01:02:03:04:1b Active
At Switch5
• Configure service instance 300 and map port P36 to it. Also configure SVLAN mapping to map S-
VLAN 11 to ISID 300 with untagged-pip as false
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# service instance 300
iss(config-switch-si)# ports icomp gigabitethernet 0/36
iss(config-switch-si)# service-instance map untagged-pip false vlan 11
iss(config-switch-si)# no shutdown
iss(config-switch-si)# set service-instance status enable
iss(config-switch-si)# end
• Create down MEP of level 6 and service instance 300 at interface P36
iss# configure terminal
iss(config)# switch Switch5
iss(config-switch)# ethernet cfm enable
iss(config-switch)# ethernet cfm domain name md6 level 6
iss(config-ether-ecfm)# service name ma6 service-instance 300
iss(config-ether-ecfm)# mep crosscheck mpid 3 service-instance 300
iss(config-ether-ecfm)# mep crosscheck mpid 4 service-instance 300
iss(config-ether-ecfm)# end
iss# configure terminal
iss(config)# interface gigabitethernet 0/36
iss(config-if)# ethernet cfm mep level 6 mpid 4 service-instance 300 active
iss(config-ether-mep)# end
iss# show ethernet cfm maintenance-point local mep interface gigabitethernet 0/36
Switch Switch5
------------------------------------------------------------------------
MPID DomainName Level VLAN Type Port CC-Status
ServiceName ISID Dir MAC MP-Status
------------------------------------------------------------------------
4 md6 6 - MEP Gi0/36 Disabled
ma6 300 Down 00:01:02:03:04:24 Active
At Switch6
• Create down MEP of level 7 and VLAN 11 at interface P42
iss# configure terminal
At Switch1
• Create down MEP of level 7 and VLAN 11 at interface P1
At Switch2
• Configure service instance 300 and map port P9 to it. Also configure SVLAN mapping to map s-vlan
11 to ISID 300 with untagged-pip as false
[Index: Interface number = 5255]
% snmp0 set {{ifMainRowStatus.5255 createAndWait}}
% snmp0 set {{ifAlias.5255 virtual1}}
% snmp0 set {{ifMainType.5255 brgPort}}
% snmp0 set {{ifMainRowStatus.5255 active}}
% snmp0 set {{ifMainAdminStatus.5255 up}}
% snmp0 set {{fsVcIfRowStatus.5255 createAndWait}}
% snmp0 set {{fsVcId.5255 2}}
% snmp0 set {{fsVcIfRowStatus.5255 active}}
% snmp0 set {{ifMainAdminStatus.5255 up}}
% snmp0 set {{ifMainBrgPortType.5255 virtualInstancePort}}
At Switch3
• Configure service instance 300 and map port P18 to it. Also configure BVLAN mapping to map B-Vlan
10 to ISID 300
[Index: ContextID =3, Interface number = 18, ISID = 300]
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.3.18.300 createAndWait}}
At Switch4
• Configure service instance 300 and map port P27 to it. Also map BVLAN 10 to ISID 300 [Index:
ContextID = 4, Interface number = 27, ISID = 300]
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.4.27.300 createAndWait}}
% snmp0 set {{fsPbbCBPServiceMappingBVid.4.27.300 10}}
% snmp0 set {{fsPbbCBPServiceMappingRowStatus.4.27.300 active}}
At Switch5
• Configure service instance 300 and map port P36 to it. Also, configure SVLAN mapping to map S-
VLAN 11 to ISID 300 with untagged-pip as false
[Index: Interface number = 5256]
% snmp0 set {{ifMainRowStatus.5256 createAndWait }}
% snmp0 set {{ifAlias.5256 virtual4}}
% snmp0 set {{ifMainType.5256 brgPort}}
% snmp0 set {{ifMainRowStatus.5256 active}}
% snmp0 set {{ifMainAdminStatus.5256 up}}
% snmp0 set {{fsVcIfRowStatus.5256 createAndWait }}
% snmp0 set {{fsVcId.5256 5}}
% snmp0 set {{fsVcIfRowStatus.5256 active}}
% snmp0 set {{ifMainAdminStatus.5256 up}}
% snmp0 set {{ifMainBrgPortType.5256 virtualInstancePort}}
At Switch6
• Create down MEP of level 7 and VLAN 11 at interface P42
Create the maintenance domain [Index: ContextID =6, MD-Index = 1]
% snmp0 set {{fsMIEcfmMdRowStatus.6.1 createAndWait}}
% snmp0 set {{fsMIEcfmMdFormat.6.1 charString}}
% snmp0 set {{fsMIEcfmMdName.6.1 6D:64:37}}
% snmp0 set {{fsMIEcfmMdMdLevel.6.1 7}}
% snmp0 set {{fsMIEcfmMdRowStatus.6.1 active}}
This section describes the enabling of the Y.1731 feature on all the switches.
[Index: ContextID = 2]
% snmp0 set {{fsMIY1731OperStatus.2 enabled}}
[Index: ContextID = 3]
% snmp0 set {{fsMIY1731OperStatus.3 enabled}}
[Index: ContextID = 4]
% snmp0 set {{fsMIY1731OperStatus.4 enabled}}
[Index: ContextID = 5]
% snmp0 set {{fsMIY1731OperStatus.5 enabled}}
[Index: ContextID = 6]
% snmp0 set {{fsMIY1731OperStatus.6 enabled}}
This section describes the verification of link failures using continuity defects/errors
• Wait for 15 seconds after doing the configurations explained upto section 5.4.9.1 and then check for
any defect/fault
iss# show ethernet cfm errors
Switch default
Switch Switch1
Switch Switch2
Switch Switch3
Switch Switch4
Switch Switch5
Switch Switch6
iss#
Shows no link failure, as no error is detected at any of the switches.
• Wait for 15 seconds after doing the configurations explained upto section 5.4.9.2 and then check for
any defect/fault
[Index: ContextID =1, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 get {fsMIEcfmExtMepDefects.1.1.1.1}
{1.3.6.1.4.1.29601.2.13.1.2.3.1.14.1.1.1.1 {OCTET STRING} 00}
• Enable AIS capability on the MEP, so that when any defect occurs, the MEP starts transmitting the
AIS to all the MEP(s) configured at the client layer level.
iss# configure terminal
iss(config)# interface gigabitethernet 0/9
iss(config-if)# ethernet cfm mep level 6 mpid 3 service-instance 300 active
iss(config-ether-mep)# set ais enable
iss(config-ether-mep)# end
• Enable AIS capability on the MEP, so that when any defect occurs, the MEP starts transmitting the
AIS to all the MEP(s) configured at the client layer level. [Index: ContextID = 2, MD-Index = 1, MA-
Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIY1731MepRowStatus.2.1.1.1 notInService}}
% snmp0 set {{fsMIY1731MepAisCapability.2.1.1.1 enabled}}
% snmp0 set {{fsMIY1731MepRowStatus.2.1.1.1 active}}
This section describes configuration and enabling of the transmission of LCK PDU by an MEP.
Client MEG must be set for the maintainance domain of the MEP before setiing the
MEP as out-of-service.
• Enable LCK capability on the MEP, so that when any defect occurs, the MEP starts transmitting the
LCK to all the MEP(s) configured at the client layer level.
iss# configure terminal
iss(config)# interface gigabitethernet 0/9
iss(config-if)# ethernet cfm mep level 6 mpid 3 service-instance 300 active
iss(config-ether-mep)# set out-of-service enable
iss(config-ether-mep)# end
This section describes the configuration and enabling of the transmission and reception of TST PDU by an
MEP.
• Send the TST message to an MEP using.MEPID [Index: ContextID = 2, MD-Index = 1, MA-Index = 1,
MEP-ID = 1]
% snmp0 set {{fsMIY1731MepTransmitTstDestType.2.1.1.1 multicast}}
% snmp0 set {{fsMIY1731MepTransmitTstDestMepId.2.1.1.1 2}}
% snmp0 set {{fsMIY1731MepTransmitTstStatus.2.1.1.1 start}}
This section describes the steps to configure and enable the transmission and reception of Frame delay
PDU by an MEP.
Frame delay can be measured using either of the following methods:
1. One-way Frame Delay Measurement
2. Two-way Frame Delay Measurement
• configuring the count or deadline parameter while initiating the delay measurement.
OR
• using the ethernet cfm frame delay stop type level service-instance command.
• Send the One-way frame delay message to an MEP [Index: ContextID = 2, MD-Index = 1, MA-Index =
1, MEP-ID = 1].
% snmp0 set {{fsMIY1731MepTransmitDmInterval.2.1.1.1 100}}
% snmp0 set {{fsMIY1731MepTransmitDmType.2.1.1.1 oneWay}}
% snmp0 set {{fsMIY1731MepTransmitDmMessages.2.1.1.1 5}}
% snmp0 set {{fsMIY1731MepTransmitDmDestIsMepId.2.1.1.1 false}}
% snmp0 set {{fsMIY1731MepTransmitDmDestMacAddress.2.1.1.1 00:01:02:03:04:24}}
% snmp0 set {{fsMIY1731MepTransmitDmStatus.2.1.1.1 start}}
• Send the Two-way frame delay message to an MEP [Index: ContextID = 2, MD-Index = 1, MA-Index =
1, MEP-ID = 1].
% snmp0 set {{fsMIY1731MepTransmitDmInterval.2.1.1.1 100}}
% snmp0 set {{fsMIY1731MepTransmitDmType.2.1.1.1 twoWay}}
% snmp0 set {{fsMIY1731MepTransmitDmMessages.2.1.1.1 5}}
% snmp0 set {{fsMIY1731MepTransmitDmDestIsMepId.2.1.1.1 false}}
% snmp0 set {{fsMIY1731MepTransmitDmDestMacAddress.2.1.1.1 00:01:02:03:04:24}}
% snmp0 set {{fsMIY1731MepTransmitDmStatus.2.1.1.1 start}}
This section describes the steps to configure and enable the transmission and reception of frame loss
PDU by an MEP.
Frame loss can be measured using either one of the following methods:
1. Dual-ended using CCM messages
2. Single-ended using LMM/LMR messages
• Send the message to measure frame loss by setting the role as performance-monitoring.
iss# configure terminal
iss(config)# switch Switch2
iss(config-switch)# ethernet cfm cc level 6 service-instance 300 role performance-monitoring
iss(config)# end
• Stop the frame loss measurement [Index: ContextID = 2, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIY1731MepTransmitLmmStatus.2.1.1.1 stop}}
• Send the message to measure frame loss by setting the role as performance-monitoring [Index:
ContextID = 2, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIY1731MeRowStatus.2.1.1 notInService}}
% snmp0 set {{fsMIY1731MeCcmApplication.2.1.1 ccPerformanceMonitoring}}
% snmp0 set {{fsMIY1731MeRowStatus.2.1.1 active}}
• Stop dual-ended frame loss measurement by setting role other than performance-monitoring [Index:
ContextID = 2, MD-Index = 1, MA-Index = 1, MEP-ID = 1]
% snmp0 set {{fsMIY1731MeRowStatus.2.1.1 notInService}}
% snmp0 set {{fsMIY1731MeCcmApplication.2.1.1 ccFaultManagement}}
% snmp0 set {{fsMIY1731MeRowStatus.2.1.1 active}}
This section describes the steps to configure and enable the throughput measurement at an MEP.
Throughput can be measured using one of the following methods:
1. One-way Throughput Measurement
2. Two-way Throughput Measurement
The above mentioned steps are only for initiating the throughput transaction. The
user may not get the same output. To get the same output, target entity also needs to
be configured.
• Start the one-way throughput measurement at an MEP using destination MAC address. [Index:
ContextID = 2, MD-Index = 1, MA-Index = 1, MEP-ID = 1].
% snmp0 set {{fsMIY1731MepTransmitThDestMacAddress.2.1.1.1 00:01:02:03:04:24}}
• Start the two-way throughput measurement at an MEP using destination MAC address. [Index:
ContextID = 2, MD-Index = 1, MA-Index = 1, MEP-ID = 1].
% snmp0 set {{fsMIY1731MepTransmitThDestMacAddress.2.1.1.1 00:01:02:03:04:24}}
Dear Reader:
We aspire to provide you with important information, delivered efficiently. If this guide has been
informative, useful, and effective, your satisfaction is our reward. If not, tell us how it can be improved.
Your valuable input will help us understand your information needs better.
Please fill up the form provided below and mail it to us at the address provided on the Copyright page.
Thank you for participating in our quest for total customer satisfaction.