service instance cisco что это

Steinkäfer

понедельник, 4 декабря 2017 г.

Cisco EVC

service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это

Bridge domain – это виртуальный коммутатор, который передаёт кадры в соответствии с mac таблицей. У каждого bridge-domain-а существует экземпляр таблицы mac-адресов. Отдельных настроек для bridge-domain-а в конфиге Cisco нет, кроме номера в настройке Service instance, хотя на старых IOS bridge-domain необходимо было

Encapsulation (Flexible Service Mapping) – этот параметр в настройках Service instance задает правила выбора пакетов. Например настройка encapsulation dot1q 351 говорит что будут обработаны только кадры с тегом равным 351 (VLAN 351).

Настройка

interface GigabitEthernet0/0/2
no ip address
negotiation auto
service instance 10 ethernet
encapsulation dot1q 762
bridge-domain 351

interface GigabitEthernet0/0/2
no ip address
negotiation auto
service instance 10 ethernet
encapsulation dot1q 762
bridge-domain 351
service instance 20 ethernet
encapsulation dot1q 315,762,700-722
bridge-domain 300
service instance 40 ethernet
encapsulation untagged
bridge-domain 400

service instance 20 ethernet
encapsulation dot1q 315
rewrite ingress tag pop 1 symmetric
bridge-domain 300

service instance 20 ethernet
encapsulation dot1q 315,762,700-722
rewrite ingress tag pop 1 symmetric
bridge-domain 300

service instance 20 ethernet
encapsulation dot1q 315,762,700-722
rewrite ingress tag pop 1 symmetric
bridge-domain from encapsulation

L3 интерфейсы. Маршрутизация.

service instance 20 ethernet
encapsulation dot1q 315
rewrite ingress tag pop 1 symmetric
bridge-domain 300

interface BDI300
ip address 10.0.0.1 255.255.255.0

QoS для EVC

interface BDI760
ip address 10.10.0.15 255.255.255.254
service-policy input QoS_in

Источник

Understanding Bridge Virtual Interface (BVI) and Bridge Domain Interface (BDI)

Available Languages

Download Options

Contents

Introduction :

This document helps in understanding the concept of BDI (Bridge Domain Interface) and BVI (Bridge group Virtual Interface).

BVI and BDI interfaces are routed interfaces that represent a set of interfaces that are bridged.

For example, say that you want to bridge two interfaces on the router and want them to be in the same Layer-2 broadcast domain. In this scenario, BVI/BDI interface would act as the routed interface for those two bridged physical interfaces. All the packets coming in or going out of these bridged interfaces will have to pass through the BVI/BDI interface.

Prerequisites

Requirements

Concept of Virtual Lans.

Components Used

The information in this document is based on ISR router (for BVI) and ASR1K (for BDI).

service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это

Bridge-Group Virtual Interface: (BVI): For platforms running IOS

A router will not allow us to configure two or more Layer-3 interfaces in the same broadcast domain(Two or more interfaces in the same subnet). Let us consider a scenario where you want to connect two PCs to the router and have them part of the same subnet in addition to internet access from both the PCs.

This can be achieved using BVI concept.

bridge 1 protocol ieee

ip address 10.10.10.10 255.255.255.0

ip address 10.10.10.1 255.255.255.0

ip address 10.10.10.2 255.255.255.255

Bridge Domain Interface (BDI): For platforms running IOS-XE

This concept is very similar to BVI but for devices running IOS-XE.

Below are some of the common terminologies used :

Bridge domain represents a Layer 2 broadcast domain.

Bridge domain interface is a logical interface that allows bidirectional flow of traffic between a Layer-2 bridged network and a Layer-3 routed network.

Ethernet Virtual Circuit (EVC) is an end-to-end representation of a single instance of a Layer-2 service being offered by a provider to a customer. In the Cisco EVC Framework, the bridge domains are made up of one or more Layer-2 interfaces known as Service Instances. A Service Instance is the instantiation of an EVC on a given port on a given router. Service instance is associated with a bridge domain based on the configuration.

service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это

Here are couple of scenarios the describes the use of the Bridge Domain concept on IOS-XE platforms:

A) Fa0/1 on both the switches are Layer-3 interfaces and are in the same broadcast domain. BDI interface configuration on ASR is not required if the motive is to just establish connectivity between the two switches.

Источник

Service instance cisco что это

Итак, начнем с определений:

Bridge domain – это некая L2 логическая широковещательная область внутри устройства. Принцип работы такойже как и у коммутатора, а именно передача кадров в соответствии с mac таблицей. Для каждого номера bridge-domain будет свой экземпляр mac таблицы.

Encapsulation – этот параметр в настройках Service instance задает критерий выбора пакетов. Например настройка encapsulation dot1q 20 говорит что будут обработаны только кадры с тегом равным 20 (VLAN 20).

Рассмотрим самый простой пример настройки интерфейса.

Видно, что на физическом интерфейсе создается логический интерфейс так называемый service instance под номером 5, с encapsulation dot1q 20 и bridge-domain 20.

Все пакеты с тегом 20 будут попадать в bridge-domain 20.

В encapsulation dot1q можно указать несколько тегов. Например 10, c 14 по 16.

Если мы хотим принимать нетегированный траффик то в энкапсуляции задаем untagged.

На одном физическом интерфейсе может быть создано несколько service instanse, причем bridge-domain могут совпадать или быть разными.

Принцип работы rewrite ingress tag pop или трансляция vlan на cisco

Одна из ключевых особенностей технологии EVC это её повышенная гибкость, позволяющая с помощью механиза rewrite направлять кадры с разных vlan в нужный нам bridge-domain.

Рассмотрим пример использования rewrite.

В данном примере из всех входящих кадров с тегом 20 (encapsulation dot1q 20) будет удален внешний тег (rewrite ingress tag pop 1 symmetric), а во все исходящие кадры из bridge-domain будет тег (VLAN 20) добавлен.

Bridge Domain Routing или как связать L3 интерфейс с бридж доменом

Продолжим разговор о гибкости технологии EVC. Вот Вам пример: Клиент отдает нам маркированный траффик в VLAN 20. Нам его нужно принять на L3 интерфейсе, но VLAN 20 и соответственно interface vlan 20 у нас уже заняты, например под управление.

Решение данной задачи используя технологию EVC.

Маркированный траффик (VLAN 20) попадает на порт gigabitethernet0/1 service instance 1, далее снимается метка (rewrite ingress tag pop 1 symmetric) перекидывается в bridge-domainc с номером 300, ну и далее траффик попадает на L3 интерфейс.

А вот еще один пример только теперь мы принимаем траффик с двумя тегами от клиента.

Команды мониторинга и диагностики при работе с bridge-domain и service instance

1.Просмотр информации по bridge-domain. Выводит принадлежность bridge-domain к физическому интерфейсу и сервис инстансу.

2.Просмотр mac таблицы в бридже домене.

3.Просмотр всех созданных service instance.

Просмотр детальной информации по Ethernet Flow Point.

Просмотр статистики по Ethernet Flow Point.

На этом все. Мы рассмотрели только малую часть всех возможностей технологии EVC, но этого понимания должно хватить для дальнейшего самостоятельного освоения. Комментируем, подписываемся ну и всем пока:)

1″ :pagination=»pagination» :callback=»loadData» :options=»paginationOptions»>

Источник

Carrier Ethernet Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)

Book Title

Carrier Ethernet Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)

Chapter Title

Ethernet Virtual Connections Configuration

View with Adobe Reader on a variety of devices

Results

Chapter: Ethernet Virtual Connections Configuration

Ethernet Virtual Connections Configuration

An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint path within the service provider network. An EVC is a conceptual service pipe within the service provider network. A bridge domain is a local broadcast domain that is VLAN-ID-agnostic. An Ethernet flow point (EFP) service instance is a logical interface that connects a bridge domain to a physical port or to an EtherChannel group.

An EVC broadcast domain is determined by a bridge domain and the EFPs that are connected to it. You can connect multiple EFPs to the same bridge domain on the same physical interface, and each EFP can have its own matching criteria and rewrite operation. An incoming frame is matched against EFP matching criteria on the interface, learned on the matching EFP, and forwarded to one or more EFPs in the bridge domain. If there are no matching EFPs, the frame is dropped.

You can use EFPs to configure VLAN translation. For example, if there are two EFPs egressing the same interface, each EFP can have a different VLAN rewrite operation, which is more flexible than the traditional switchport VLAN translation model.

Effective Cisco IOS-XE Release 3.15.0S, QoS policies on EFPs are supported with ingress rewrite type as push. In the ingress direction with one VLAN tag is pushed and in the egress direction one VLAN tag is popped.

This document describes how to configure EVC features.

For detailed information about the commands, see:

Supported EVC Features

Service instance—you create, delete, and modify EFP service instances on Ethernet interfaces.

Encapsulation—you can map traffic to EFPs based on:

802.1Q VLANs (a single VLAN or a list or range of VLANs)

802.1Q tunneling (QinQ) VLANs (a single outer VLAN and a list or range of inner VLANs)

Double-tagged frames mapped to EVC based on C-tags (wildcard S-Tags)

Bridge domains—you can configure EFPs as members of a bridge domain (up to 64 EFPs per bridge domain for bridge domain with BDIs.).

Rewrite (VLAN translation)

pop 1 removes the outermost tag

pop 2 removes the two outermost tags

pop symmetric adds a tag (or 2 tags for pop 2 symmetric ) on egress for a push operation

Ingress push—The rewrite ingress tag push dot1q vlan-id symmetric command adds a tag to an ingress packet

rewrite ingress tag push is supported on QoS with CoS Marking for EVCs on RSP2 module.

Ingress push on Qos on for EVC is not supported on RSP1 module.

EVC push is also supported on 802.1ad.

MAC address learning and aging

EVCs on EtherChannels

Layer 2 protocol tunneling and QinQ

Bridging between EFPs

MSTP (MST on EVC bridge domain)

EFP statistics (packets and bytes)

QoS aware EVC/EFP per service instance

Static MAC Addresses

These Layer 2 port-based features can run with EVC configured on the port:

EVC egress filtering

Restrictions for Ethernet Virtual Connections Configuration

Translate operations are not supported.

You can create a maximum of 128 EFPs per bridge-domain.

The no mac address-table learning bridge-domain bridge-id global configuration command is not currently supported.

Only dot1q encapsulation is supported on trunk EFPs.

service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
Note

Effective Cisco IOS-XE Release 3.14.0S, dot1ad encapsulation is also supported on the trunk EFPs.

Effective Cisco IOS-XE Release 3.15.0S, ingress mapping of Differentiated Services Code Point (DSCP) or Class of Service (CoS) to the C-CoS or S-CoS is mandatory.

Also, mapping profiles between DSCP or CoS and C-CoS or S-CoS should be the same across all ethernet flow points (EFPs).

Egress classification and queuing is based on DSCP or CoS.

There is a traffic drop while traversing from scaled TEFP (2000 VLANs) to EFP configurations.

You can create a maximum of 64 EFPs per bridge-domain.

Ingress mapping of Differentiated Services Code Point (DSCP) or Class of Service (CoS) to the C-CoS or S-CoS is supported.

Egress classification and queuing is based on DSCP or CoS.

Remote MEPs are not learnt when SH group 1 and SH group 2 are configured in the access EVC BD.

TCAM exhaustion message is displayed even when TEFP with 900 VLAN has a QoS policy configured to match a single VLAN. As a result, the TEFP scale is affected.

When EFP is configured with rewrite ingress push, user’s CFI is not preserved.

Ethernet Virtual Connections

You use the ethernet evc evc-id global configuration command to create an Ethernet virtual connection (EVC). The evc-id or name is a text string from 1 to 100 bytes. Entering this command puts the device into service configuration mode (config-srv) where you configure all parameters that are common to an EVC.

In this mode you can enter these commands:

default —Sets a command to its defaults

exit —Exits EVC configuration mode

no — Negates a command or sets its defaults

oam —Specifies the OAM Protocol

uni —Configures a count UNI under EVC

Service Instances and EFPs

Configuring a service instance on a Layer 2 port or EtherChannel creates a pseudoport or Ethernet flow point (EFP) on which you configure EVC features. Each service instance has a unique number per interface, but you can use the same number on different interfaces because service instances on different ports are not related.

If you have defined an EVC by entering the ethernet evc evc-id global configuration command, you can associate the EVC with the service instance (optional). There is no default behavior for a service instance.

Use the service instance number ethernet [ name ] interface configuration command to create an EFP on a Layer 2 interface or EtherChannel and to enter service instance configuration mode. You use service instance configuration mode to configure all management and control date plane attributes and parameters that apply to the service instance on a per-interface basis.

The service instance number is the EFP identifier, an integer from 1 to 4000.

When you enter service instance configuration mode, you can configure these options:

default —Sets a command to its defaults

description —Adds a service instance specific description

encapsulation —Configures Ethernet frame match criteria

ethernet —Configures Ethernet-lmi parameters

exit — Exits from service instance configuration mode

ip —Interface Internet Protocol config commands

ipv6 —IPv6 interface subcommands

l2protocol —Configures Layer 2 control protocol processing

mac —Commands for MAC address-based features

no —Negates a command or sets its defaults

service-policy —Attaches a policy-map to an EFP

shutdown —Takes the service instance out of service

Enter the [ no ] shutdown service-instance configuration mode to shut down or bring up a service instance.

snmp —Modify SNMP service instance parameters

Encapsulation

Encapsulation defines the matching criteria that maps a VLAN, a range of VLANs, class of service (CoS) bits, Ethertype, or a combination of these to a service instance. You configure encapsulation in service instance configuration mode. You must configure one encapsulation command per EFP (service instance).

Use the encapsulation service-instance configuration mode command to set encapsulation criteria. Different types of encapsulations are default, dot1q, dot1ad, priority-tagged and untagged. Supported Ethertypes include ipv4, ipv6, pppoe-all, pppoe-discovery, and pppoe-session.

Encapsulation classification options also include:

After you have entered an encapsulation method, these keyword options are available in service instance configuration mode:

bridge-domain —Configures a bridge domain

rewrite —Configures Ethernet rewrite criteria

Defines the matching criteria to be used to map 802.1Q frames ingress on an interface to the appropriate EFP. The options are a single VLAN, a range of VLANs, or lists of VLANs or VLAN ranges. VLAN IDs are 1 to 4094.

Enter a single VLAN ID for an exact match of the outermost tag.

Enter a VLAN range for a ranged outermost match.

Double-tagged 802.1Q encapsulation. Matching criteria to be used to map QinQ frames ingress on an interface to the appropriate EFP. The outer tag is unique and the inner tag can be a single VLAN, a range of VLANs or lists of VLANs or VLAN ranges.

Enter a single VLAN ID in each instance for an exact match of the outermost two tags.

Enter a VLAN range for second-dot1q for an exact outermost tag and a ranged second tag.

Ethertype encapsulation is the payload encapsulation type after VLAN encapsulation.

ethertype—The etype string can have these values: ipv4, ipv6, pppoe-discovery, pppoe-session, or pppoe-all.

Matches any or an exact outermost VLAN or VLAN range and a payload ethertype.

encapsulation dot1q vlan_id cos cos_value second-dot1q vlan-id cos cos_value

CoS value encapsulation defines match criterion after including the CoS for the S-Tag and the C-Tag. The CoS value is a single digit between 1 and 7 for S-Tag and C-Tag.

The result is an exact outermost VLAN and CoS match and second tag. You can also use VLAN ranges.

encapsulation dot1q any

encapsulation Matches any packet with one or more VLANs.

encapsulation dot1q add

encapsulation dot1q add inner vlan range

encapsulation dot1ad add

encapsulation dot1ad add inner vlan range

Adds one or more VLAN tag values for matching criteria. This command is also used with show run command when the encapsulation configuration command is more than the terminal width and ethernet service multi-line command is configured or if the encapsulation command is more than 255 characters.

encapsulation dot1q remove

encapsulation dot1ad remove

Removes one or more VLAN tag values for matching criteria.

ethernet service multi-line

Permits use of multi-line output based on the screen width. This is applicable to encapsulation dot1q add command. This is visible only when show running config command is executed when this command is enabled.

Values are on or off

Matching criteria to be used to map untagged (native) Ethernet frames entering an interface to the appropriate EFP.

Only one EFP per port can have untagged encapsulation. However, a port that hosts EFP matching untagged traffic can also host other EFPs that match tagged frames.

Configures the default EFP on an interface, acting as a catch-all encapsulation. All packets are seen as native. If you enter the rewrite command with encapsulation default, the command is rejected.

If the default EFP is the only one configured on a port, it matches all ingress frames on that port. If you configure the default EFP on a port, you cannot configure any other EFP on the same port with the same bridge domain.

You can configure only one default EFP per interface. If you try to configure more than one, the command is rejected.

Specifies priority-tagged frames. A priority-tagged packet has VLAN ID 0 and CoS value of 0 to 7.

If a packet entering or leaving a port does not match any of the encapsulations on that port, the packet is dropped, resulting in filtering on both ingress and egress. The encapsulation must match the packet on the wire to determine filtering criteria. On the wire refers to packets ingressing the router before any rewrites and to packets egressing the router after all rewrites.

service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
Note

The router does not allow overlapping encapsulation configurations.

Ethertype

The router uses the default ether types 0x8100 and 0x88a8 for dot1q and Q-in-Q encapsulations.

The ethertypes 0x9100 and 0x9200 are supported using the custom ethertype feature by configuring the dot1q tunneling ethertype command on a physical port.

Custom ethertype allows configuration of the ethertype per port. The 0x9100 and 0x9200 ethertypes are supported in the custom ethertype model. 802.1q (0x8100) ethertype is the default ethertype, and is configured under each service instance.

Custom Ethertype

With the custom dot1q ethertype, you can select a non-standard (0x9100 and 0x9200) 2-byte ethertype in order to identify 802.1Q tagged frames. The router is allowed to interoperate with third party vendors’ switches that do not use the standard 0x8100 ethertype to identify 802.1Q-tagged frames. For instance, if 0x9100 ethertype is used as the custom dot1q ethertype on a particular port, incoming frames containing the ethertype are assigned to the VLAN contained in the tag, immediately following the ethertype. Frames that arrive on that same port containing ethertypes other than 0x9100 and 0x8100 are forwarded to service instance with untagged encapsulation, if present.

The interface can be configured with the following ethertypes:

    Restrictions for Custom Ethertypes

    If a custom ethertype is configured under a physical port, all tagged service instances under the physical port are forced to use that particular ethertype.

    Rewrite push is not supported on CET interfaces.

    Custom ethertype is not supported on IP configured/routed interfaces.

    Custom ethertype config 0x88a8 is not supported. Only 0x9100 and 0x9200 are supported.

    Custom Ethertype dynamic update from Dot1q to Tunneling or Tunneling to Dot1q is not supported.

    Outer 0x8100 packets are supported.

    Dot1q Tunneling Ethertype CFI preservation is not supported.

    CFM with Custom Ethertype is not supported.

    Mac-learning limit is not supported.

    802.1ad not supported for CET.

    DHCP snooping not supported for CET.

    Configuration Example

    Bridge Domains

    A service instance must be attached to a bridge domain. Flooding and communication behavior of a bridge domain is similar to that of a VLAN domain. Bridge-domain membership is determined by which service instances have joined it, while VLAN domain membership is determined by the VLAN tag in the packet.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    You must configure encapsulation before you can configure the bridge domain.

    Use the bridge-domain bridge-id service-instance configuration mode command to bind the EFP to a bridge domain instance. The bridge-id is the identifier for the bridge domain instance, an integer from 1 to 4000.

    You can enable BDI MTU using the enable_bdi_mtu sdm template.

    Setting Bandwidth

    We recommend you set the bandwidth of the BDI associated with 1-Gigabit Ethernet or 10-Gigabit Ethernet interfaces. The default BDI value is 1 Gigabit for both, 1-Gigabit Ethernet and 10-Gigabit Ethernet interfaces.

    Use the bandwidth command to set the bandwidth on the interfaces.

    The following example shows the bandwidth configuration for BDI interface 120:

    The following example displays the configured bandwidth for BDI interface 120:

    Split-Horizon

    The split-horizon feature allows service instances in a bridge domain to join groups. Service instances in the same bridge domain and split-horizon group cannot forward data between each other, but can forward data between other service instances that are in the same bridge domain, but not in the same split-horizon group.

    Service instances do not have to be in a split-horizon group. If a service instance does not belong to a group, it can send and receive from all ports within the bridge domain. A service instance cannot join more than one split-horizon group.

    EFPs that are not configured with an explicit group_id do not belong to any group.

    You can configure no more than 128 service instances per bridge domain. These 128 EFPs can be distributed among split-horizon groups 0 to 13.

    VPLS uses a reserved internal split group 15 which does not overlap with manually configured split groups. In case VPLS is configured on same bridge domain, scale of 128 EFPs can still be achieved on the same bridge domain.

    128 EFPs and 64 VFIs are supported on the same bridge domain.

    Maximum number of EFPs per bridge-domain is 128. The EFPs can be distributed among split-horizon groups 0 to 13.

    VPLS uses the reserved internal Split-horizon group 15 which does not overlap with manually configured split groups. In case VPLS is configured on the same bridge-domain, the scale of 128 EFPs is achieved on the same bridge-domain.

    64 VFIs are supported on the same bridge-domain.

    Rewrite Operations

    You can use the rewrite command to modify packet VLAN tags. You can use this command to emulate traditional 802.1Q tagging, where packets enter a router on the native VLAN and VLAN tagging properties are added on egress. You can also use the rewrite command to facilitate VLAN translation and QinQ.

    The supported rewrite commands:

    rewrite ingress tag pop 1 symmetric

    rewrite ingress tag pop 2 symmetric

    rewrite ingress tag push dot1q vlan-id symmetric

    Enter the rewrite ingress tag pop < 1 | 2 >symmetric service-instance configuration mode command to specify the encapsulation adjustment to be performed on the frame ingress to the EFP. Entering pop 1 pops (removes) the outermost tag; entering pop 2 removes two outermost tags.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    The symmetric keyword is required to complete rewrite to configuration.

    Static MAC Addresses

    The router supports multicast static MAC addresses, which allow you to enable multicast at the layer 2 level. You can use multicast static MAC addresses to forward multicast packets to specific EFPs on a network.

    Layer 2 Protocol Features

    Layer 2 protocol peering, forwarding, and tunneling on CDP, LACP, LLDP, PAGP, STP, UDLD, and VTP traffic is supported. For more information about these features, see:

    Layer 2 Control Protocol Enhancements

    Starting with Cisco IOS XE Release 16.7.1, you can forward, tunnel, or discard Multiple Registration Protocol (MRP), Multiple VLAN Registration Protocol (MMRP) or Multiple MAC Registration Protocol (MVRP) for a service instance on an ethernet interface.

    Layer 2 Control Protocol Restrictions

    The l2protocol command should be applied on each Ethernet interface.

    The layer 2 protocol options such as discard, forward, or tunnel for MMRP or MVRP are supported on dot1q ports. The default action for these protocols on dot1q port is drop.

    The layer 2 protocol forward option is supported for MMRP or MVRP on dot1ad ports. The default action for these protocols on dot1ad port is drop.

    Configuring Layer 2 Control Protocol Tunnel

    Default EVC Configuration

    No EFPs are configured. No service instances or bridge domains are configured.

    Configuration Guidelines

    The following guidelines apply when you configure EVCs on the router.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    To configure a service instance on an interface, these commands are prerequisites:

    You must configure encapsulation on a service instance before configuring bridge domain.

    ISL trunk encapsulation is not supported.

    The router does not support overlapping configurations on the same interface and same bridge domain. If you have configured a VLAN range encapsulation, or encapsulation default, or encapsulation any on service instance 1, you cannot configure any other encapsulations that also match previous encapsulations in the same interface and bridge domain.

    QinQ is not supported on Trunk EFP interfaces.

    Trunk EFPs should be configured with the rewrite ingress tag pop 1 symmetric command.

    In MST instance, when you add or remove VLAN from Trunk EFP, the BDI interface goes down which results in loss of packets.

    On an access interface configured with EFP untagged and TEFP, when a tagged packet with encapsulation equal to bridge-domain of untagged EFP passes through the access interface, the packet passes through TEFP and returns to the source through EFP untagged configuration and the packet is not dropped.

    Creating Service Instances

    Beginning in privileged EXEC mode, follow these steps to create an EFP service instance:

    SUMMARY STEPS

    DETAILED STEPS

    Enter global configuration mode.

    Specify the port to attach to the policy map, and enter interface configuration mode. Valid interfaces are physical ports.

    service instance number ethernet [ name ]

    Configure an EFP (service instance) and enter service instance configuration) mode.

    The number is the EFP identifier, an integer from 1 to 4000.

    (Optional) ethernet name is the name of a previously configured EVC. You do not need to use an EVC name in a service instance.

    Configure encapsulation type for the service instance.

    default —Configure to match all unmatched packets.

    dot1q —Configure 802.1Q encapsulation. See for details about options for this keyword.

    priority-tagged —Specify priority-tagged frames, VLAN-ID 0 and CoS value of 0 to 7.

    untagged —Map to untagged VLANs. Only one EFP per port can have untagged encapsulation.

    rewrite ingress tag pop < 1 | 2 >symmetric

    (Optional) Specify that encapsulation modification to occur on packets at ingress.

    pop 1 —Pop (remove) the outermost tag.

    pop 2 —Pop (remove) the two outermost tags.

    symmetric — Configure the packet to undergo the reverse of the ingress action at egress. If a tag is popped at ingress, it is pushed (added) at egress. This keyword is required for rewrite to function properly.

    bridge-domain bridge-id [ split-horizon group group-id ]

    Configure the bridge domain ID. The range is from 1 to 4000.

    You can use the split-horizon keyword to configure the port as a member of a split horizon group. The group-id range is from 0 to 2.

    Return to privileged EXEC mode.

    show ethernet service instance show bridge-domain [ n | split-horizon ]

    Verify your entries.

    copy running-config startup-config

    (Optional) Save your entries in the configuration file.

    Use the no forms of the commands to remove the service instance, encapsulation type, or bridge domain or to disable the rewrite operation.

    Creating a Trunk EFP

    Beginning in privileged EXEC mode, follow these steps to create an EFP service instance:

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note
    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note
    Use the no forms of the commands to remove the service instance, encapsulation type, or bridge domain or to disable the rewrite operation.

    Trunk EFPs on port-channel interfaces is supported. Traffic may not flow to the TEFP when the port-channel or its member links are in down state.

    SUMMARY STEPS

    DETAILED STEPS

    Enter global configuration mode.

    Specify the port to attach to the policy map, and enter interface configuration mode. Valid interfaces are physical ports.

    service instance [ trunk ] number ethernet

    Configure an EFP (service instance) and enter service instance configuration) mode.

    The number is the EFP identifier, an integer from 1 to 4000.

    The trunk keyword identifies the trunk ID to which the service instance is assigned.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note
    NoteOnly dot1q encapsulation is supported on trunk EFPs.

    Configure encapsulation type for the service instance.

    default —Configure to match all unmatched packets.

    dot1q —Configure 802.1Q encapsulation. See Table 1 for details about options for this keyword.

    priority-tagged —Specify priority-tagged frames, VLAN-ID 0 and CoS value of 0 to 7.

    untagged —Map to untagged VLANs. Only one EFP per port can have untagged encapsulation.

    rewrite ingress tag pop < 1 | 2 >symmetric

    (Optional) Specify that encapsulation modification to occur on packets at ingress.

    pop 1 —Pop (remove) the outermost tag.

    pop 2 —Pop (remove) the two outermost tags.

    CautionThe pop2 option is not currently supported on Trunk EFPs.

    symmetric —Configure the packet to undergo the reverse of the ingress action at egress. If a tag is popped at ingress, it is pushed (added) at egress. This keyword is required for rewrite to function properly.

    Configures the router to derive bridge domains from the encapsulation VLAN list.

    Return to privileged EXEC mode.

    Use one of the following commands

    Verify your entries.

    copy running-config startup-config

    (Optional) Save your entries in the configuration file.

    Configuring Asymmetric EFPs

    You can configure asymmetric rewrite rules in both ingress and egress directions of the EFP.

    Encapsulation (EVC filtering) is verified at the egress for these rewrite rules:

    Rewrite rule is rewrite ingress tag push dot1q symmetric

    Rewrite rule is rewrite ingress tag push dot1q

    Rewrite rule is rewrite egress tag pop 1

    Pre-requisites

    Ensure that split-horizon groups are configured to avoid flooding between EFPs of the same Bridge Domain (BD).

    Restrictions

    Transparent CFM is not supported with Asymmetric EFP.

    Q-in-Q encapsulation type in the EFP is not supported. Frames with dot1q greater than value 1 is supported. Dot1ad is not supported.

    Trunk-EFPs usage is not supported

    2 Tag push or pop is not supported.

    Translate option, in VLAN Translation, is not supported with asymmetric rewrite rules.

    External Loopback operations are not supported.

    Ignoring MLD reports (IPv6) is not supported

    When the encapsulation is untagged in one of the EFPs, for example if rewrite egress tag pop 1 is configured on the EFP, then rewrite ingress tag pop 1 will cancel the rewrite rule and the packet is sent without rewrites.

    If there are different EFPs in the same BD that are carrying unicast and multicast traffic, then MAC learning should be disabled on the multicast EFP using disable-learning command.

    Asymmetric rewrite configuration fails for the priority-tagged encapsulation.

    When the encapsulation is untagged in one of the EFPs, for example if rewrite egress tag pop 1 is configured on the EFP, then single tagged frames will cancel the rewrite rule and the packet is sent without rewrites.

    When two EFPs are configured at the egress under the same bridge-domain such that one of the EFPs matches the tag pushed at the egress and the other EFP does not check for encapsulation match, MAC movement can happen between the EFPs which would lead the VLAN tagging output based on the EFP on which the MAC address is learnt at the given point in time. This is an expected behavior by design. Split-horizon can be used to isolate the EFPs to avoid this behavior.

    Procedure

    Example for Configuring a Service Instance

    Example for Encapsulation Using a VLAN Range

    Configuration Example for Larger String VLAN in Encapsulation

    Configuration Example

    Example for Two Service Instances Joining the Same Bridge Domain

    In this example, service instance 1 on interfaces Gigabit Ethernet 0/0/1 and 0/0/2 can bridge between each other.

    Example for Bridge Domains and VLAN Encapsulation

    Unlike VLANs, the bridge-domain number does not need to match the VLAN encapsulation number.

    However, when encapsulations do not match in the same bridge domain, traffic cannot be forwarded. In this example, the service instances on Gigabit Ethernet 0/0/1 and 0/0/2 can not forward between each other, since the encapsulations don’t match (filtering criteria). However, you can use the rewrite command to allow communication between these two.

    Example for Rewrite

    In this example, a packet that matches the encapsulation will have one tag removed (popped off). The symmetric keyword allows the reverse direction to have the inverse action: a packet that egresses out this service instance will have the encapsulation (VLAN 10) added (pushed on).

    Example for Split Horizon

    In this example, service instances 1 and 2 cannot forward and receive packets from each other. Service instance 3 can forward traffic to any service instance in bridge domain 3000 since no other service instance in bridge domain 3000 is in split-horizon group 2. Service instance 4 can forward traffic to any service instance in bridge domain 3000 since it has not joined any split-horizon groups.

    Example for Hairpinning

    The switch supports hairpinning, which refers to traffic ingressing and egressing same interface. To achieve haripinning, configure two EFPs in the same bridge domain on the same physical interface, as in this example.

    Example for Egress Filtering

    In EVC switching, egress filtering is performed before the frame is sent on the egress EFP. Egress filtering ensures that when a frame is sent, it conforms to the matching criteria of the service instance applied on the ingress direction. EFP does not require egress filtering if the number of pops is the same as the number of VLANs specified in the encapsulation command.

    Egress Filtering is not supported on the RSP3 module.

    Specifying the cos keyword in the encapsulation command is relevant only in the ingress direction. For egress filtering, cos is ignored.

    For example, consider the following configuration.

    If a packet with VLAN tag 10 or 20 is received on Gigabit Ethernet 0/0/3, the ingress logical port would be service instance 3. For the frame to be forwarded on a service instance, the egress frame must match the encapsulation defined on that service instance after the rewrite is done. Service instance 1 checks for outermost VLAN 20; service instance 2 checks for VLAN 30. In this example, the frame with VLAN tags 10 and 20 can be sent to service instance 1 but not to service instance 2.

    Configuring Examples for Asymmetric EFPs

    Configuring Asymmetric EFP with POP

    Configuring Asymmetric EFP with Single Tag Push

    Configuring Asymmetric EFP with Ingress VLAN Rewrite Disabled for IGMP Control Packets»

    Configuring Asymmetric EFP with Disabled MAC Address Learning

    Configuring Other Features on EFPs

    EFPs and EtherChannels

    You can configure EFP service instances on EtherChannel port channels, but EtherChannels are not supported on ports configured with service instances. Load-balancing on port channels is based on the MAC address or IP address of the traffic flow on the EtherChannel interface.

    This example configures a service instance on an EtherChannel port channel. Configuration on the ports in the port channel are independent from the service instance configuration.

    Layer 2 Protocol Peering

    For Layer 2 protocols (CDP, UDLD, LLDP, MSTP, LACP, PTP peer delay, ELMI, LOAM ) to peer with a neighbor on a port that has an EFP service instance configured, you need to enter the l2 protocol peer protocol service-instance configuration command on the service instance.

    This example shows how to configure CDP to peer with a neighbor on a service instance:

    Layer 2 Protocol Software Forwarding

    Layer 2 protocol forwarding is based on the bridge domain ID and the destination MAC address.

    Selecting the l2protocol forward option causes the router to flood interfaces in the same VLAN or bridge-domain with untagged or tagged BPDU packets. You can apply the l2protocol forward command to CDP, LACP, LLDP, PAGP, STP, UDLD, and VTP traffic. This is an example how to configure the l2protocol forward option:

    Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Using EFPs

    Tunneling is a feature used by service providers whose networks carry traffic of multiple customers and who are required to maintain the VLAN and Layer 2 protocol configurations of each customer without impacting the traffic of other customers. The router uses EFPs to support QinQ and Layer 2 protocol tunneling.

    802.1Q Tunneling (QinQ)

    Service provider customers often have specific requirements for VLAN IDs and the number of VLANs to be supported. The VLAN ranges required by different customers in the same service-provider network might overlap, and traffic of customers through the infrastructure might be mixed. Assigning a unique range of VLAN IDs to each customer would restrict customer configurations and could easily exceed the VLAN limit (4096) of the 802.1Q specification.

    Using the EVCs, service providers can encapsulate packets that enter the service-provider network with multiple customer VLAN IDs (C-VLANs) and a single 0x8100 Ethertype VLAN tag with a service provider VLAN (S-VLAN). Within the service provider network, packets are switched based on the S-VLAN. When the packets egress the service provider network onto the customer network, the S-VLAN tag is decapsulated and the original customer packet is restored.

    Figure below shows the tag structures of the double-tagged packets.

    In figure below, Customer A was assigned VLAN 30, and Customer B was assigned VLAN 40. Packets entering the edge switches with 802.1Q tags are double-tagged when they enter the service-provider network, with the outer tag containing VLAN ID 30 or 40, appropriately, and the inner tag containing the original VLAN number, for example, VLAN 100. Even if both Customers A and B have VLAN 100 in their networks, the traffic remains segregated within the service-provider network because the outer tag is different. Each customer controls its own VLAN numbering space, which is independent of the VLAN numbering space used by other customers and the VLAN numbering space used by the service-provider network. At the outbound port, the original VLAN numbers on the customer’s network are recovered.

    Method 1

    In this example, for Customer A, interface Gigabit Ethernet 0/1 is the customer-facing port, and Gigabit Ethernet 0/2 is a trunk port facing the service provider network. For Customer B, Gigabit Ethernet 0/3 is the customer-facing port, and Gigabit Ethernet 0/4 is the trunk port facing the service provider network.

    For Customer A, service instance 1 on Gigabit Ethernet 0/1 is configured with the VLAN encapsulations used by the customer: C-VLANs 1–100. These are forwarded on bridge-domain 4000. The service provider facing port is configured with a service instance on the same bridge-domain and with an encapsulation dot1q command matching the S-VLAN. The rewrite ingress pop 1 symmetric command also implies a push of the configured encapsulation on egress packets. Therefore, the original packets with VLAN tags between 1 and 100 are encapsulated with another S-VLAN (VLAN 30) tag when exiting Gigabit Ethernet port 0/0/2.

    The same scenario applies to Customer B.

    Method 2

    QinQ is also supported when sending packets between an EFP and a trunk EFP. The same external behavior as Method 1 can be achieved with this configuration:

    Customer A

    Again, service instance 1 on Gigabit Ethernet port 0/1 is configured with the VLAN encapsulations used by the customer. These are forwarded on bridge-domain 30. The service provider facing port is configured as a trunk port. The trunk port pushes a tag matching the bridge-domain that the packet is forwarded on (in this case S-VLAN 30).

    For double tagged (S-VLAN = 30, C-VLAN = 1 to 100) packets coming in from the provider network, the trunk port pops the outer S-VLAN (30) and forwards the packet on that bridge-domain.

    Customer B

    You can also combine the customer A and B configurations, as follows:

    Customer A and B

    For information about the effect on cost of service (CoS) for different EFT tagging operations, see the Cisco ASR 920 Router Chassis Software Configuration Guide.

    Example for VLAN Translation Configurations

    For 1-to-1 VLAN translation configuration:

    For 2-to-1 VLAN translation configuration:

    Example for Ingress Mapping of C-CoS to S-CoS

    S-CoS is marked with the S-CoS value when the packet is matched with the C-CoS value at ingress. In the following example, GigabitEthernet 0/1 is the ingress interface and GigabitEthernet 0/3 is the egress interface. This classification is done at the ingress interface and the S-CoS value is set at 4.

    Example for Ingress Mapping of C-CoS to C-CoS

    In the following example, both C-CoS and S-CoS are configured with CoS=4. The example also illustrates the ingress mapping of C-DSCP or C-CoS to C-CoS, where CoS is marked for both S-CoS and C-CoS.

    Example for Egress Classification Based on CoS

    EFPs and Ethernet over Multiprotocol Layer Switching (EoMPLS)

    When you configure a pseudowire under a VLAN interface (for example, VLAN 33), the pseudowire becomes a virtual Layer 2 port in that VLAN (VLAN 33), or bridge domain. In this bridge domain, you can configure other types of Layer 2 ports, such as EFP portss. Switching functionalities, such as MAC address learning, flooding, and forwarding to learned MAC addresses, apply to all the Layer 2 ports, including the pseudowire.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    When a pseudowire is present in the same bridge domain as an EFP, you cannot configure the EFP with the rewrite ingress tag pop 2 symmetric service instance configuration command. Other restrictions about switching between EFPs or between EFPs also still apply.

    For more information about configuring pseudowire, see the Cisco ASR 920 Router Chassis Software Configuration Guide.

    Bridge Domain Routing

    The switch supports IP routing and multicast routing for bridge domains, including Layer 3 and Layer 2 VPNs, using the BDI model. There are the limitations:

    You must configure BDIs for bridge-domain routing.

    The bridge domain must be in the range of 1 to 4094 to match the supported VLAN range.

    You can use bridge domain routing with only native packets.

    Bridge domain routing only works if proper tag popping is configured on the corresponding EFP BD. For example, if an EFP is configured with a single tag then rewrite should be pop 1 symmetric. If the EFP is configured with double tag then rewrite should be pop 2 symmetric. For double tag EFP, pop 1 symmetric and routing on the BDI is not supported.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    Traffic engineering is not supported for BDI Routing.

    This is an example of configuring bridge-domain routing with a single tag EFP:

    This is an example of configuring bridge-domain routing with two tags:

    EFPs and Trunk Port MAC Addresses

    Because forwarding can occur between EFPs and trunk ports, MAC address movement can occur on learned addresses. Addresses learned on EFPs will have the format of interface + EFP ID, for example gigabitethernet 0/0/1 + EFP 1. When an address moves between a non-secured EFP and a trunk port, the behavior is similar to that of moving between trunk ports.

    To see MAC address information for bridge domains, use the show mac-address-table bdomain domain command.

    When an EFP property changes (bridge domain, rewrite, encapsulation, split-horizon, secured or unsecured, or a state change), the old dynamic MAC addresses are flushed from their existing tables. This is to prevent old invalid entries from lingering.

    EFPs and MSTP

    EFP bridge domains are supported by the Multiple Spanning Tree Protocol (MSTP). These restrictions apply when running STP with bridge domains.

    EVC supports only MSTP.

    All incoming VLANs (outer-most or single) mapped to a bridge domain must belong to the same MST instance or loops could occur.

    For all EFPs that are mapped to the same MST instance, you must configure backup EFPs on every redundant path to prevent loss of connectivity due to STP blocking a port.

    When STP mode is PVST+ or PVRST, EFP information is not passed to the protocol. EVC only supports only MSTP.

    Changing STP mode from MST to PVRST is not allowed.

    L3 Unicast and Multicast Routing on a Bridge Domain with Multiple EFPs

    L3 unicast routing and L3 multicast routing are supported on bridge domains with multiple EFPs. This feature provides the following functionality:

    Broadcast domains are determined through bridge-domains rather than VLANs

    Multiple EFPs on a single bridge domain and physical interface with L3 multicast routing enabled is supported

    Each EFP has its own match criteria and its own ingress and egress rewrite operations

    Figure below shows an access-facing port with multiple EFPs configured to the route or bridge.

    Example for Configuring L3 Multicast Routing on a Bridge Domain

    The following example shows how to configure L3 multicast routing on a bridge domain using existing IOS commands.

    Cross-Connect on EFP Interfaces

    Cross-connect provides the ability to match the encapsulation of received packets on the ingress side of an EFP interface and send them out with the same encapsulation through the egress side of the EFP interface. Cross-connect bridge-domain entries are provided, and encapsulation matching is achieved by matching bridge-domain entries for the EFPs on which cross-connect is configured.

    The following types of encapsulation tags are supported:

    rewrite tags with pop1

    Restrictions

    A bridge-domain cannot be configured on an EFP if cross-connect is already configured.

    Cross-connect works only when the MPLS license is enabled.

    Priority-tagged encapsulation is not supported.

    L2VPN VC statistics are not supported on the RSP3 module.

    Configuring Cross-Connect on an EFP Interface

    Beginning in privileged EXEC mode, follow these steps to configure cross-Connect on an EFP Interface.

    SUMMARY STEPS

    DETAILED STEPS

    Enter global configuration mode.

    Specify an interface to configure, and enter interface configuration mode.

    service instance number ethernet [ name ]

    Configure an EFP (service instance) and enter service instance configuration) mode.

    The number is the EFP identifier, an integer from 1 to 4000.

    (Optional) ethernet name is the name of a previously configured EVC. You do not need to use an EVC name in a service instance.

    encapsulation dot1q vlan_id cos cos_value second-dot1q vlan-id cos cos_value

    CoS value encapsulation defines match criterion after including the CoS for the S-Tag and the C-Tag. The CoS value is a single digit between 1 and 7 for S-Tag and C-Tag.

    xconnect peer-router-id vcid pw-class pw-class name

    Bind the attachment circuit to a pseudowire virtual circuit (VC) and enter xconnect configuration mode.

    Return to privileged EXEC mode.

    This is an example configuration of cross-connect on an EFP interface:

    MAC Address Forwarding, Learning and Aging on EFPs

    Layer 2 forwarding is based on the bridge domain ID and the destination MAC address. The frame is forwarded to an EFP if the binding between the bridge domain, destination MAC address, and EFP is known. Otherwise, the frame is flooded to all the EFPs or ports in the bridge domain.

    MAC address learning is based on bridge domain ID, source MAC addresses, and logical port number. MAC addresses are managed per bridge domain when the incoming packet is examined and matched against the EFPs configured on the interface. If there is no EFP configured, the bridge domain ID equal to the outer-most VLAN tag is used as forwarding and learning look-up key.

    If there is no matching entry in the Layer 2 forwarding table for the ingress frame, the frame is flooded to all the ports within the bridge domain. Flooding within the bridge domain occurs for unknown unicast, unknown multicast, and broadcast.

    Dynamic addresses are addresses learned from the source MAC address when the frame enters the router. All unknown source MAC addresses are sent to the CPU along with ingress logical port number and bridge domain ID for learning. Once the MAC address is learned, the subsequent frame with the destination MAC address is forwarded to the learned port. When a MAC address moves to a different port, the Layer 2 forwarding entry is updated with the corresponding port.

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note

    The router does not currently support the no mac address-table learning bridge-domain bridge-id global configuration command.

    Dynamic addresses are aged out if there is no frame from the host with the MAC address. If the aged-out frame is received by the switch, it is flooded to the EFPs in the bridge domain and the Layer 2 forwarding entry is created again. The default for aging dynamic addresses is 5 minutes. However, when MST undergoes a topology change, the aging time is reduced to the forward-delay time configured by the spanning tree. The aging time reverts back to the last configured value when the topology change expires.

    You can configure a dynamic address aging time per bridge domain using the mac aging-time time command. The range is in seconds and valid values are 120-300. The default value is 300. An aging time of 0 means that the address aging is disabled.

    MAC address movement is detected when the host moves from one port to another. If a host moves to another port or EFP, the learning lookup for the installed entry fails because the ingress logical port number does not match and a new learning cache entry is created. The detection of MAC address movement is disabled for static MAC addresses where the forwarding behavior is configured by the user.

    Configuring a Static MAC Address

    This section describes how to configure a static MAC address on the router. For an overview of static MAC addresses, see Static MAC Addresses.

    Limitations

    The following limitations apply when configuring static MAC addresses:

    Static MAC addresses are supported only on egress ports.

    You can configure up to 1024 multicast static MAC addresses

    You can assign up to 24 EFPs to a bridge domain configured with a multicast static MAC address.

    MAC entries configured across different bridge-domains are represented as separate entries in the router MAC table.

    Multicast static MAC addresses apply only to layer 2 traffic; layer 3 multicast traffic is not affected by a static MAC configuration and is forwarded to all EFPs in a bridge domain.

    Configuring a Static MAC Address

    SUMMARY STEPS

    DETAILED STEPS

    Example:

    Enter global configuration mode.

    Example:

    Specify the port to attach to the policy map, and enter interface configuration mode. Valid interfaces are physical ports.

    Example:

    To set a primary or secondary IP address for an interface, use the ip address interface configuration command. To remove an IP address or disable IP processing, use the no form of this command.

    no negotiation auto

    Example:

    Disables autonegotiation on Gigabit Ethernet interfaces.

    service instance number ethernet [ name ]

    Example:

    Configure an EFP (service instance) and enter service instance configuration) mode.

    The number is the EFP identifier, an integer from 1 to 4000.

    (Optional) ethernet name is the name of a previously configured EVC. You do not need to use an EVC name in a service instance.

    Example:

    Configure encapsulation type for the service instance.

    default —Configure to match all unmatched packets.

    dot1q —Configure 802.1Q encapsulation. See for details about options for this keyword.

    priority-tagged —Specify priority-tagged frames, VLAN-ID 0 and CoS value of 0 to 7.

    untagged —Map to untagged VLANs. Only one EFP per port can have untagged encapsulation.

    bridge-domain bridge-id [ split-horizon group group-id ]

    Example:

    Configure the bridge domain ID. The range is from 1 to 4000.

    You can use the split-horizon keyword to configure the port as a member of a split horizon group. The group-id range is from 0 to 2.

    mac static address address

    Example:

    Specifies the multicast MAC address.

    Example:

    Return to privileged EXEC mode.

    Configuring a Multicast Static MAC Address

    SUMMARY STEPS

    DETAILED STEPS

    Example:

    Enter global configuration mode.

    Example:

    Specify the port to attach to the policy map, and enter interface configuration mode. Valid interfaces are physical ports.

    service instance number ethernet [ name ]

    Example:

    Configure an EFP (service instance) and enter service instance configuration) mode.

    The number is the EFP identifier, an integer from 1 to 4000.

    (Optional) ethernet name is the name of a previously configured EVC. You do not need to use an EVC name in a service instance.

    Example:

    Configure encapsulation type for the service instance.

    default —Configure to match all unmatched packets.

    dot1q —Configure 802.1Q encapsulation. See Table 1 for details about options for this keyword.

    priority-tagged —Specify priority-tagged frames, VLAN-ID 0 and CoS value of 0 to 7.

    untagged —Map to untagged VLANs. Only one EFP per port can have untagged encapsulation.

    bridge-domain bridge-id [ split-horizon group group-id ]

    Example:

    Configure the bridge domain ID. The range is from 1 to 4000.

    You can use the split-horizon keyword to configure the port as a member of a split horizon group. The group-id range is from 0 to 2.

    mac static address address

    Example:

    Specifies the multicast MAC address.

    Example:

    Return to privileged EXEC mode.

    Configuration Example

    This is an example configuration of a static MAC address on an EFP interface:

    This configuration specifies that any layer 2 traffic sent to destination MAC address 1302.4302.23c3 is forwarded only to service instance 10 of bridge-domain interface Gigabit Ethernet 0/0/3.

    To disable a static MAC configuration, apply the mac static address address command to the service instance:

    Monitoring EVC

    show ethernet service evc [ id evc-id | interface interface-id ] [ detail ]

    Displays information about all EVCs, or a specific EVC when you enter an EVC ID, or all EVCs on an interface when you enter an interface ID. The detail option provides additional information about the EVC.

    show ethernet service instance [ id instance-id interface interface-id | interface interface-id ] <[ detail ] | [ stats]>

    Displays information about one or more service instance (EFPs). If you specify an EFP ID and interface, only data pertaining to that particular EFP is displayed. If you specify only an interface ID, data is displayed for all EFPs on the interface.

    show bridge-domain [ n ]

    When you enter n, this command displays all the members of the specified bridge-domain, if a bridge-domain with the specified number exists.

    If you do not enter n, the command displays all the members of all bridge-domains in the system.

    show bridge-domain n split-horizon [ group < group_id | all >]

    When you do not specify a group group_id, this command displays all the members of bridge-domain n that belong to split horizon group 0.

    If you specify a numerical group_id, this command displays all the members of the specified group id.

    show ethernet service instance detail

    This command displays detailed service instance information, including Layer 2 protocol information. This is an example of the output:

    show mac address-table

    This command displays dynamically learned or statically configured MAC security addresses.

    show mac address-table bridge-domain bridge-domain id

    This command displays MAC address table information for the specified bridge domain.

    show mac address-table count bridge-domain bridge-domain id

    This command displays the number of addresses present for the specified bridge domain.

    show mac address-table learning bridge-domain bridge-domain id

    This command displays the learning status for the specified bridge domain.

    This is an example of output from the show ethernet service instance detail command:

    This is an example of output from the show bridge-domain command:

    This is an example of output from the show ethernet service instance statistics command:

    This is an example of output from the show mac-address table count command:

    Источник

    Добавить комментарий

    Ваш адрес email не будет опубликован. Обязательные поля помечены *

    service instance cisco что это. Смотреть фото service instance cisco что это. Смотреть картинку service instance cisco что это. Картинка про service instance cisco что это. Фото service instance cisco что это
    Note