Juniper Resiliency Interface
SUMMARY For MX Series routers with MPC or LC480 line cards and for PTX Series routers running Junos OS Evolved, you can configure the Juniper Resiliency Interface (JRI) to detect, correlate, and mitigate exceptions and thereby reduce the mean time to repair (MTTR) for issues. For forwarding exceptions, JRI also extends the inline monitoring services feature with Juniper-specific IPFIX information elements (IEs) for exception data and introduces the concept of an observation cloud, which is a set of observation domains. You can send the IPFIX packets to either an on-box or an off-box collector.
Understand Juniper Resiliency Interface
Packets that need to be forwarded to the adjacent network element or a neighboring
device along a routing path might be dropped by a router owing to several factors.
Every network encounters issues, such as packet loss, from time to time. Some of the
causes for such a loss of traffic or a block in transmission of data packets
include: overloaded system conditions, profiles and policies that restrict the
bandwidth or priority of traffic, network outages, or disruption by physical cable
faults. Packet loss also happens because of incorrect stitching of the forwarding
path or a mismatch between the control plane state and the data plane state. You
could use counters and metrics from show
commands to diagnose and
debug network performance, but doing so can be tedious and time-consuming. JRI
reports exception data from entities in the system which encounter packet drops,
enabling you to automate the workflow involved in detecting, reporting and
mitigating adverse exceptions.
For operating system and routing exceptions, the exception data is reported in telemetry key-value pairs.
For forwarding exceptions, the exception data is reported in IPFIX packets. The IEs in the IPFIX primary data record packet capture the following data:
- Exception reason (for example, firewall discard)
- Packet direction (ingress or egress)
- First N bytes of the packet
- Ingress interface
- Egress interface
- Next-hop identifier (Junos OS only)
Table 1 shows the format of the IPFIX Primary Data Record with the Juniper-specific IEs.
IE Name | IE Identifier | Description | Length (in Bytes) |
---|---|---|---|
forwardingClassandDropPriority | Observation Cloud Common Property ID (CPID)—IE 137, a set of common properties that is locally unique per Observation Cloud | Forwarding class and drop priority ID | 4 |
forwardingExceptionCode | Observation Cloud CPID—IE 137 | Exception code that causes packet drops OR is zero when the exception is not met or set; a 16-bit unsigned integer number | 2 |
forwardingNextHopId | Observation Cloud CPID—IE 137 | (Junos OS only) Unicast next-hop Index used for forwarding | 4 |
egressInterfaceIndex | Observation Cloud CPID—IE 137 | Index of egress logical interface when flowDirection=output, otherwise 0 | 4 |
underlyingIngressInterfaceIndex | Observation Cloud CPID—IE 137 | (Junos OS only) Index of underlying layer 2 ingress logical interface, wherever applicable (for example, AE and IRB cases—see primary-data-record-fields for more information) | 4 |
ingressInterfaceIndex | Observation Cloud CPID—IE 137 | Index of ingress logical interface | 4 |
ingressInterface | IE 10 | SNMP index of ingress logical interface | 4 |
egressInterface | IE 14 | SNMP index of egress logical interface when flowDirection=output, otherwise 0 | 4 |
flowDirection | IE 61 | Direction (0: input, 1:output) | 1 |
dataLinkFrameSize | IE 312 | Length of sampled data link frame | 2 |
dataLinkFrameSection | IE 315 | N octets from the data link frame of the monitored packet | variable |
Limitations:
-
Exceptions are collected and exported on a best-effort basis.
-
Any limitations or caveats for inline monitoring services also apply to JRI, because JRI uses inline monitoring services to sample and collect the packets.
-
All dropped packets cannot be sampled and profiled. Classes of exceptions are sampled at the default sampling rate, unless you configure this rate with the
sampling-rate
statement at either the[edit services inline-monitoring instance instance-name collector collector-name]
hierarchy level (Junos OS) or at the[edit services inline-monitoring instance instance-name]
hierarchy level (Junos OS Evolved). Junos OS allows the sampling rate to be configured per collector, allowing different rates for each collector; Junos OS Evolved allows one sampling rate per inline-monitoring instance. -
For exception reporting in the egress direction, the layer 2 header or any encapsulation header is not included in IE-315, dataLinkFrameSelection, because exceptions happen before layer 2 or tunnel encapsulation.
-
For exception reporting in the egress direction, the receiver of the IPFIX packet must ignore IE-312, dataLinkFrameSize, because the field does not have the correct value.
-
For the egress direction, you cannot configure both sFlow and exception reporting on the same interface.
-
Inline-monitoring instance actions and firewall re-direct instance actions are not supported in the same term of the firewall filter. (Junos OS Evolved)
-
Inline-monitoring instance actions and port-mirroring instance actions are not supported in the same term of the firewall filter. (Junos OS Evolved)
-
For collectors, you cannot configure routing instances, DSCP bits, or forwarding class. (Junos OS Evolved)
-
For more information about the Juniper-specific IEs, including caveats and limitations, see primary-data-record-fields.
Configure JRI for Operating System and Routing Exceptions
To configure JRI for operating system and routing exceptions:
Configure JRI for Forwarding Exceptions
To configure JRI for forwarding exceptions:
Exception Code Reference
SUMMARY This section contains information about the exception codes and their explanations, for both Junos OS and Junos OS Evolved.
MX Exception Codes, Junos OS
To subscribe to a particular exception category, configure the category for a particular FPC and Packet Forwarding Engine. The command completion help shows the available categories:
[edit] user@host# set chassis fpc 0 pfe 0 exception-reporting category ? Possible completions: firewall Firewall exceptions forwarding-state Forwarding state related exceptions layer2 Layer 2 exceptions layer3 Layer 3 exceptions packet-errors Packet format error related exceptions
In the following tables, there is a column with code values; for example,
73
. This value is the exception code that is reported. From
an external viewpoint, when the exception is reported, the actual code sent is
128 + value. For example, the code value 73
would mean that for the unknown family discard
exception
reason, the code reported would be 128 + 73 = 201.
There is only one exception to this rule, the exception reason ttl
expired
, code value 1
. This reason is reported
with the same code value; that is, 128 is not added to the value.
The following tables, organized by exception category, contain the exception reasons, codes, and code descriptions for the MX Series routers.
Reason |
Code |
Description |
---|---|---|
firewall discard |
67 |
Firewall in the packet path has a action. |
firewall discard V6 |
101 |
Firewall in the IPv6 packet path has a action. |
firewall discard out |
113 |
Firewall in the output packet path has a action. |
firewall discard V6 out |
114 |
Firewall in the output IPv6 packet path has a
|
Reason |
Code |
Description |
---|---|---|
unknown family |
73 |
Packets discarded because the corresponding address family is not configured on the interface. |
unknown vrf |
77 |
Routing instance table was not created properly for the VRF ID associated with the input interface. |
Reason |
Code |
Description |
---|---|---|
vlan id out of oif's range |
32 |
Packet's VLAN ID is outside the VLAN range configured on the output interface. |
Reason |
Code |
Description |
---|---|---|
discard route |
66 |
Discard nexthops explicitly installed by routing protocols. |
discard route IPv6 |
102 |
Discard nexthops explicitly installed by IPv6 routing protocol. |
hold route |
70 |
Packet is discarded because it hit a hold nexthop. |
Reason |
Code |
Description |
---|---|---|
bad ipv4 hdr checksum |
2 |
IPv4 checksum verification has failed. |
non-IPv4 layer3 tunnel |
4 |
GRE/IPIP/PIM tunnels are supported only over IPv4, not IPv6. |
GRE unsupported flags |
5 |
Only the |
tunnel pkt too short |
6 |
Length computation error when de-encapsulating packets received with a tunnel header. |
bad IPv6 options pkt |
9 |
IPv6 packet includes too many (or too long) option headers. Option headers extend beyond byte 256 in the input parcel. |
bad IPv4 hdr |
11 |
IPv4 packet header error:
|
bad IPv6 hdr |
110 |
IPv6 packet header error. Version is not 6. |
bad IPv4 pkt len |
12 |
IPv4 frame length too short (is less than Layer 2 encapsulated length plus Layer 3 length). |
bad IPv6 pkt len |
111 |
IPv6 frame length too short (is less than Layer 2 encapsulated length plus Layer 3 length). |
mtu exceeded |
21 |
A packet is discarded as its length, after new header
imposition, exceeds the MTU configured on the logical
interface. For IPv4/IPv6 packets, this indicates the
|
ttl expired |
1 |
Time To Live (TTL) has expired for the packet. |
my-mac check failed |
28 |
For Layer 3 interfaces, the |
my-mac check failed IPv6 |
63 |
For Layer 3 interfaces, the IPv6 |
PTX Series Exception Codes, Junos OS Evolved
Table 7 contains the trap code numbers, the exception codes, and their descriptions for the PTX10004, PTX10008, and PTX10016 routers with the JNP10K-1201 and JNP10K-1202 line cards, and the PTX10001-36MR and PTX10003 routers.
For routers running Junos OS Evolved, there is only one exception category,
all
. For example, to subscribe to category
all
and configure FPC 0 to send exceptions to the
inline-monitoring instance i1
:
user@host# set chassis fpc 0 pfe 0 exception-reporting category all inline-monitoring-instance i1
Trap Code | Exception Code | Description |
---|---|---|
1 | dlu.ucode.inv_start_pc |
A valid instruction to process packet was not found; a lookup failure. (For example: my MAC miss on Layer 3 interface.) |
4 | dlu.ucode.discard | DLU UCODE discard (lookup failure) |
5 | dlu.ucode.invalid_seq | DLU UCODE invalid sequence |
6 | dlu.ucode.ip_bc_with_my_mac | DLU UCODE IP broadcast with my MAC |
7 | dlu.ucode.unreachable | DLU UCODE unreachable |
8 | dlu.ucode.not_routable | DLU UCODE not routable |
13 | dlu.ucode.my_ll_mc | DLU UCODE my link-level multicast |
14 | dlu.ucode.bad_sip | DLU UCODE bad source IP address |
15 | dlu.ucode.ttl_exp | DLU UCODE TTL expired |
16 | dlu.ucode.oam_to_cpu | DLU UCODE OAM packet to CPU |
17 | dlu.ucode.ip_mc_iif_mismatch | DLU UCODE IP multicast interface index mismatch |
18 | dlu.ucode.ip_mc_resolve | DLU UCODE IP multicast resolve |
19 | dlu.ucode.vlan_tag_lookup_miss | DLU UCODE VLAN tag lookup miss |
20 | dlu.ucode.vtag_normalize_miss | DLU UCODE VLAN tag normalization miss |
25 | dlu.ipipe.err.trapcode.hw_err | Parity/ECC error |
26 | dlu.ipipe.err.trapcode.config_err | Route configuration error |
27 | dlu.ipipe.err.trapcode.proc_ttl_err | Route programming error (loop) |
29 | dlu.ipipe.err.trapcode.mpls_buf_uflow | Lookup is beyond the supported label stack depth. |
30 | dlu.ipipe.err.trapcode.l3offs_oflow | Incorrect parsing of Layer 3 offset |
31 | dlu.ipipe.err.trapcode.seq_rsvd | Route programming error |
34 | dlu.ilp.lookup.err.trapcode.cfg_err | Route programming error |
36 | igp_misc.trapcode.l2l_invalidopt | Incorrectly constructed host injected packet |
37 | igp_misc.trapcode.invalid_dft_code | Incorrectly constructed host injected packet |
38 | igp_misc.trapcode.cpu_ple | Incorrectly constructed host injected packet |
40 | slu.trapcode.l2_domain_lookup_failure | Wrong type of packet (tagged/untagged) on the interface |
41 | slu.trapcode.stp_blocked | Packet on STP blocked port |
44 | slu.trapcode.eth_mcast | Source MAC address in the packet is multicast |
45 | slu.trapcode.eth_bcast | Source MAC address in the packet is broadcast |
46 | slu.trapcode.eth_src_eq_dest | SLU Ethernet - source address == destination address |
47 | slu.trapcode.l3offset | Incorrect packet (Layer 2 header size > 64) |
48 | slu.trapcode.v4_trunc_pkt | ipv4.totalLength < ipv4.ihl * 4 |
49 | slu.trapcode.v4_ver | IPV4 illegal version |
50 | slu.trapcode.v4_mcast | SLU IPv4—multicast source IP address |
51 | slu.trapcode.v4_bcast | SLU IPv4—broadcast source IP address |
52 | slu.trapcode.v4_src_eq_dest | SLU IPv4—source address == destination address |
53 | slu.trapcode.v4_size | SLU IPv4 minimum/maximum packet size check |
54 | slu.trapcode.v6_ver | SLU IPv6—illegal version |
55 | slu.trapcode.v6_src_eq_dest | SLU IPv6 - source address == destination address |
56 | slu.trapcode.v6_pyldleneq0 | SLU IPv6—header payload length field is equal to 0 |
57 | slu.trapcode.v6_size | SLU IPv6 minimum/maximum packet size check |
58 | slu.trapcode.tcp_tiny_attack_frag0 | SLU TCP—tiny TCP attack with frag_off =
0 |
59 | slu.trapcode.tcp_tiny_attack_frag1 | SLU TCP—tiny TCP attack with frag_off =
1 |
60 | slu.trapcode.ip_tcp_pyldlen | SLU IP/TCP—illegal IP payload length |
61 | slu.trapcode.ip_udp_pyldlen | SLU UDP—illegal IP payload length |
62 | slu.trapcode.ip_icmp_pyldlen | SLU ICMP—illegal IP payload length |
63 | slu.trapcode.ip_igmp_pyldlen | SLU IGMP—illegal IP payload length |
64 | slu.trapcode.ip_pim_pyldlen | SLU PIM—illegal IP payload length |
65 | slu.trapcode.ip_sctp_pyldlen | SLU SCTP—illegal IP payload length |
66 | slu.trapcode.ip_gre_pyldlen | SLU GRE—illegal IP payload length |
67 | slu.trapcode.ip_ah_pyldlen | SLU AH—illegal IP payload length |
68 | slu.trapcode.packet_length_err | SLU Trapcode value for minimum size packets |
69 | slu.trapcode.v4_opt_hdr | SLU IPv4 option header is NOT one of the acceptable types |
70 | slu.trapcode.v6_ext_hdr | SLU IPv6 extension header IS one of the trappable types |
71 | slu.trapcode.v4_hdr_len | SLU IPv4—illegal header length |
72 | slu.trapcode.ah_hdr_len | SLU AH—illegal header length field |
73 | slu.trapcode.eth_repl | SLU trapcode for ethertype parsing limit reached |
74 | slu.trapcode.eth_nomatch | SLU no match found in KnownEthertypes
CAM |
75 | slu.trapcode.v4_chksum | SLU IPv4—checksum error |
76 | slu.trapcode.tcp_hdr_len | SLU IPv4—illegal TCP header length |
77 | slu.trapcode.l2_ple | Packet Layer 2 header size is greater than 128 bytes |
78 | slu.trapcode.eth_ple | SLU Ethertype parser limit exceeded |
79 | slu.trapcode.v4_ple | SLU IPv4 parser limit exceeded |
80 | slu.trapcode.v6_ple | SLU IPv6 parser limit exceeded |
81 | slu.trapcode.tcp_ple | SLU TCP parser limit exceeded |
82 | slu.trapcode.udp_ple | SLU UDP parser limit exceeded |
83 | slu.trapcode.icmp_ple | SLU ICMP parser limit exceeded |
84 | slu.trapcode.igmp_ple | SLU IGMP parser limit exceeded |
85 | slu.trapcode.pim_ple | SLU PIM parser limit exceeded |
86 | slu.trapcode.sctp_ple | SLU SCTP parser limit exceeded |
87 | slu.trapcode.gre_ple | SLU GRE parser limit exceeded |
88 | slu.trapcode.ah_ple | SLU AH parser limit exceeded |
89 | slu.trapcode.gtp_ple | SLU GTP parser limit exceeded |
90 | slu.trapcode.vxlan_ple | SLU VXLAN parser limit exceeded |
91 | slu.trapcode.oam_ple | SLU Ethernet OAM parser limit exceeded |
92 | slu.trapcode.ptp_ple | SLU PTP parser limit exceeded |
93 | slu.trapcode.eth_invalidtag | Invalid Ethernet tag |
95 | slu.trapcode.oam_discard | Ethernet OAM bad configuration/incorrect packet |
96 | slu.trapcode.fttl_exp | SLU fabric TTL expired check |
97 | slu.trapcode.oam_bad_mac | Ethernet OAM incorrect packet |
98 | slu.trapcode.tunnel_ip_options | Tunnel termination of IP options packet |
99 | slu.trapcode.tunnel_ttl_expired | TTL expired on tunnel packet |
101 | slu.trapcode.gport_tcam_miss | Incorrect tunnel packet |
105 | irp.core.trapcode.mem_err | Parity/ECC error |
106 | irp.core.trapcode.cfg_err | Incorrect hardware nexthop programming |
107 | irp.core.trapcode.pttl_expire | Incorrect hardware nexthop programming |
108 | irp.core.trapcode.voq_ip_option_ip4 | Virtual output queue (VOQ) IP option IPv4 packet. (NOT ERROR) |
109 | irp.core.trapcode.voq_ip_option_ip6 | VOQ IP option IPv6 packet. (NOT ERROR) |
110 | irp.core.trapcode.trap_after_lkup | IRP VOQ trap after lookup (debugging) |
111 | irp.core.trapcode.storm0 | BUM traffic exceeded configured limits |
112 | irp.core.trapcode.storm1 | BUM traffic exceeded configured limits |
113 | irp.core.trapcode.storm2 | BUM traffic exceeded configured limits |
114 | irp.core.trapcode.storm3 | BUM traffic exceeded configured limits |
115 | irp.core.trapcode.voqcalc | Incorrect hardware nexthop programming |
116 | irp.core.trapcode.act_stbyte | Incoming packet does not satisfy split horizon criteria. |
117 | irp.core.trapcode.act_srcid | Incoming packet does not satisfy split horizon criteria. |
118 | irp.core.trapcode.act_igportid | Incoming packet does not satisfy split horizon criteria. |
119 | irp.core.trapcode.act_gl2dom0 | Incoming packet does not satisfy split horizon criteria. |
120 | irp.core.trapcode.act_gl2dom1 | Incoming packet does not satisfy split horizon criteria. |
121 | irp.core.trapcode.act_ref | Multicast-only fast reroute (MoFRR) aging (NOT ERROR) |
122 | irp.core.trapcode.ttl_ig_ip6 | IPv6 ingress TTL expired |
123 | irp.core.trapcode.ttl_ig_ip4 | IPv4 ingress TTL expired |
124 | irp.core.trapcode.ttl_eg_ip6 | IPv6 egress TTL expired |
125 | irp.core.trapcode.ttl_eg_ip4 | IPv4 egress TTL expired |
126 | irp.core.trapcode.trap_all | IRP trap all parcels |
127 | irp.core.trapcode.packetlen | Incorrect incoming packet |
128 | irp.core.trapcode.vlanparse | Incorrect incoming packet |
129 | irp.core.trapcode.vlandiscard | Incorrect incoming packet |
130 | irp.core.trapcode.opthead | Incorrect incoming packet |
131 | irp.core.trapcode.policer | Packet dropped because of policer action |
132 | epp.epc.cfg.common.trapcode.hw_err | Parity/ECC error |
133 | epp.epc.cfg.common.trapcode.ntlu_cfg | Debugging (NOT ERROR) |
135 | epp.epc.cfg.common.trapcode.ptp_enable_trap | Debugging (NOT ERROR) |
136 | epp.epc.cfg.common.trapcode.l2_tags_exceeded_trap | Incorrect incoming packet (Layer 2 tags exceeded 46 bytes) |
137 | epp.epc.cfg.common.trapcode.dual_hash_miss |
Programming error (Ingress to egress token programming). Transient error; can be ignored. |
139 | epp.epc.cfg.common.trapcode.reorder_timedout_pkt | Hardware egress processing error |
140 | epp.epc.cfg.common.trapcode.qos_rewrite_enable_trap | Debugging (NOT ERROR) |
141 | epp.epc.cfg.common.trapcode.illegal_qix | Egress nexthop programming error |
143 | epp.epc.cfg.common.trapcode.eth_tme | EPP more than 9 Ethertypes |
144 | epp.epc.cfg.common.trapcode.eth_passbuf | EPP passthru parsing failed |
145 | epp.epc.cfg.common.trapcode.oam_ple | EPP Ethernet OAM parser limit exceeded |
146 | epp.epc.cfg.common.trapcode.oam_discard | EPP Ethernet OAM discard |
147 | epp.epc.cfg.common.trapcode.oam_bad_mac | EPP Ethernet bad MAC address (incorrect incoming packet) |
148 | epp.epe.cfg.elu.trapcode.hw_err | Parity/ECC error |
149 | epp.epe.cfg.elu.trapcode.desc_addr_err | EPP error generating descriptor address (programming error) |
150 | epp.epe.cfg.elu.trapcode.pdct_drop | Egress policer drop |
151 | epp.epe.cfg.elu.trapcode.pdct_err | Parity/ECC error |
152 | epp.epe.cfg.elu.trapcode.l3_mtu_chk_fail | MTU check exceeded. |
153 | epp.epe.cfg.elu.trapcode.df_set_for_fragmentation | DF set on incoming packet |
154 | epp.epe.cfg.elu.trapcode.mpls_ovfl | Incorrect egress nexthop programming (> 8 label push) |
155 | epp.epe.cfg.elu.trapcode.ing_pfe_ttl_exp | Ingress TTL expired |
156 | epp.epe.cfg.elu.trapcode.egr_pfe_ttl_exp | Egress TTL expired |
157 | epp.epe.cfg.elu.trapcode.desc_prog_err | EPP illegal descriptor programming |
158 | epp.epe.cfg.elu.trapcode.l2plen_ofl | EPP Layer 2 length is too large |
160 | epp.epe.cfg.elu.trapcode.l3_plen_chk_fail | EPP Layer 3 length failed minimum and maximum length check |
161 | epp.epe.cfg.elu.trapcode.dmac_prog_err | EPP illegal destination MAC programming |
162 | epp.epe.cfg.elu.trapcode.smac_prog_err | EPP illegal source MAC programming |
163 | epp.epe.cfg.elu.trapcode.l3l4_err | Incorrect egress nexthop programming |
164 | epp.epe.cfg.elu.trapcode.invld_vlan_sel | Invalid combination of VLAN tags |
165 | epp.epe.cfg.elu.trapcode.tunnel_data_invld | EPP tunnel buffer construction error (programming error) |
166 | epp.epe.cfg.elu.trapcode.hdr_seq_rsvd | Incorrect egress nexthop programming (tunnel/template/MPLS) |
167 | epp.epe.cfg.elu.trapcode.rewrite_tmp_nxt_type | EPP rewrite enabled but tmpNxtType
unknown |
168 | epp.epe.cfg.elu.trapcode.rewrite_mpls_buf_ovfl | EPP rewrite MPLS buffer overflow |
169 | epp.epe.cfg.elu.trapcode.rewrite_newheader_size_exceeded | EPP new header legal size exceeded |
170 | epp.epe.cfg.elu.trapcode.opt_hdr_err | EPP invalid option header |
171 | epp.epe.cfg.elu.trapcode.fft_prog_err | EPP FFT programming error |
172 | epp.epe.cfg.elu.trapcode.pkt_chk.same_port | EPP packet check same port |
173 | epp.epe.cfg.elu.trapcode.pkt_chk.same_lport | EPP packet check same lport |
174 | epp.epe.cfg.elu.trapcode.pkt_chk.same_l2domain | EPP packet check same Layer 2 domain |
175 | epp.epe.cfg.elu.trapcode.pkt_chk.ip_redir | EPP packet check IP redirect |
176 | epp.epe.cfg.elu.trapcode.pkt_chk.same_gl2domain | EPP packet check same gl Layer 2 domain |
177 | epp.epe.cfg.elu.trapcode.pkt_chk.split_horizon | EPP packet check split horizon |
178 | epp.epe.cfg.elu.trapcode.pkt_chk.same_port_l2d | EPP packet check same port/Layer 2 domain |
179 | epp.epe.cfg.elu.trapcode.pkt_chk.same_source_id | EPP packet check same source ID |
181 | epp.epe.cfg.elu.trapcode.pkt_chk.is_true | EPP packet check is_true |
220 | sw.igp_ai_rule_invalid | SW IGP AI rule invalid |
221 | sw.igp_ai_invalid_pattern | SW IGP AI invalid pattern |
222 | sw.igp_ui_no_tag_support | SW IGP UI rule no tag support |
223 | sw.egp_ui_no_tag_support | SW EGP UI rule no tag support |
248 | sw.egnh.cfg_trap | Egress nexthop descriptor trap to CPU |
249 | sw.egnh.cfg_discard | Egress nexthop descriptor discard |
250 | sw.egnh.cfg_pfh_trap | Discard nexthop |
251 | sw.irp_nh_discard_sample | Discard nexthop |
Change History Table
Feature support is determined by the platform and release you are using. Use Feature Explorer to determine if a feature is supported on your platform.