Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
 

Related Documentation

 

Configuring a Maintenance Endpoint

To configure the maintenance endpoint, include the mep mep-id statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name] hierarchy level.

Enabling Maintenance Endpoint Automatic Discovery

You can enable the MEP to accept continuity check messages from all remote MEPs of the same maintenance association.

To configure automatic discovery, include the auto-discovery statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

Configuring the Maintenance Endpoint Direction

You can specify the direction in which CFM packets are transmitted for the MEP.

Direction up continuity check messages (CCMs) are transmitted out of every logical interface that is part of the same bridging or VPLS instance except for the interface configured on this MEP.

Direction down CCMs are transmitted only out of the interface configured on this MEP.

Note: Ports in the Spanning Tree Protocol (STP) blocking state do not block CFM packets destined to a down MEP. Ports in an STP blocking state without the continuity check protocol configured do block CFM packets.

To configure the MEP direction, include the direction statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

Note: Starting with Junos OS Release 12.3, for all interfaces configured on Modular Port Concentrators (MPCs) on MX Series 3D Universal Edge Routers, you no longer need to configure the no-control-word statement for all Layer 2 VPNs and Layer 2 circuits over which you are running CFM MEPs. For all other interfaces on MX Series routers and on all our routers and switches, you must continue to configure the no-control-word statement at the [edit routing-instances routing-instance-name protocols l2vpn] or [edit protocols l2circuit neighbor neighbor-id interface interface-name] hierarchy level when you configure CFM MEPs. Otherwise, the CFM packets are not transmitted, and the show oam ethernet connectivity-fault-management mep-database command does not display any remote MEPs.

Configuring the Maintenance Endpoint Interface

You must specify the interface to which the MEP is attached. It can be a physical interface, logical interface, or trunk interface.

On MX Series routers, you can enable the MEP on a specific VLAN of a trunk interface.

To configure the interface, include the interface interface-name statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

MEP Interface Configuration

This example shows the MEP interface configuration statements:

[edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name]
mep mep-id {direction (up | down);interface (ge | xe)-(fpc/pic/port | fpc/pic/port.domain | fpc/pic/port.domain vlan vlan-id);auto-discovery; priority number;}

Configuring the Maintenance Endpoint Priority

You can specify the IEEE 802.1 priority bits that are used by continuity check and link trace messages.

To configure the priority, include the priority statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

Configuring the Maintenance Endpoint Lowest Priority Defect

You can specify the lowest priority defect that is allowed to generate a fault alarm. This configuration determines whether to generate a fault alarm whenever it detects a defect. This configuration is done at the MEP level.

To configure the lowest priority defect, include the lowest-priority-defect options statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

Table 1 describes the available lowest priority defect options.

Table 1: Lowest Priority Defect Options

Option

Description

all-defects

Allows all defects.

err-xcon

Allows only erroneous CCM and cross-connect CCM defects.

mac-rem-err-xcon

Allows only MAC, not receiving CCM, erroneous CCM, and cross-connect defects.

no-defect

Allows no defect.

rem-err-xcon

Allows only not receiving CCM, erroneous CCM, and cross-connect CCM defects.

xcon

Allows only cross-connect CCM defects.

The following configuration example shows mac-rem-err-xcon as the lowest priority defect:

[edit protocols]
oam {ethernet {connectivity-fault-management {maintenance-domain md6 {level 6;maintenance-association ma6 {mep 200 {interface ge-5/0/0.0;direction down;lowest-priority-defect mac-rem-err-xcon;}}}}}}

Configuring a Remote Maintenance Endpoint

You can configure a remote MEP from which CCM messages are expected. If autodiscovery is not enabled, the remote MEP must be configured under the mep statement. If the remote MEP is not configured under the mep statement, the CCMs from the remote MEP are treated as errors.

To configure the remote MEP, include the remote-mep statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id] hierarchy level.

Configuring a Remote Maintenance Endpoint Action Profile

You can specify the name of the action profile to use for the remote MEP.

To configure the action profile, include the action-profile profile-name statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id remote-mep mep-id] hierarchy level. The profile must already be defined at the [edit protocols oam ethernet connectivity-fault-management] hierarchy level.

Configuring Maintenance Endpoint Service Protection

You can enable service protection for a VPWS (Virtual Private Wire Service) over MPLS by specifying a working path or protect path on the MEP. Service protection provides end-to-end connection protection of the working path in the event of a failure.

To configure service protection, you must create two separate transport paths a working path and a protect path. You can specify the working path and protect path by creating two maintenance associations. To associate the maintenance association with a path, you must configure the MEP interface statement within the maintenance association and specify the path as working or protect.

To configure the MEP interface, include the interface statement at the [edit protocols oam ethernet connectivity-fault-management maintenance-domain domain-name maintenance-association ma-name mep mep-id hierarchy level. On the interface statement, specify the path as (working | protect). The direction must also be configured as direction down for both sessions.

Note: If the path is not specified, the session monitors the active path.

Table 2 describes the available service protection options.

Table 2: Service Protection Options

Option

Description

working

Specifies the working path.

protect

Specifies the protect path.

The following configuration example shows service protection is enabled for the VPWS service. The CCM session is configured for the working path and references the CCM session configured for the protect path in the protect-maintenance-association statement. The APS profile is configured and associated with the maintenance-association for the working path:

[edit protocols]
oam {ethernet {connectivity-fault-management {maintenance-domain vpws-service-1 {name-format none;level 5;maintenance-association W {short-name-format character-string;protect-maintenance-association P {aps-profile aps-profile-1;}continuity-check {interval 1s;}mep 1 {interface ge-1/3/5.0 working;direction down;auto-discovery;}}maintenance-association P {short-name-format character-string;continuity-check {interval 1s;}mep 1 {interface ge-1/3/5.0 protect;direction down;auto-discovery;}}}}}}
 

Related Documentation

 

Published: 2013-02-13

 

Related Documentation

 

Published: 2013-02-13